From owner-freebsd-questions@FreeBSD.ORG Fri Dec 17 16:11:30 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 773B110656B8 for ; Fri, 17 Dec 2010 16:11:30 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from mail.potentialtech.com (internet.potentialtech.com [66.167.251.6]) by mx1.freebsd.org (Postfix) with ESMTP id 440C88FC0A for ; Fri, 17 Dec 2010 16:11:29 +0000 (UTC) Received: from overdrive.ws.pitbpa0.priv.collaborativefusion.com (pr40.pitbpa0.pub.collaborativefusion.com [206.210.89.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.potentialtech.com (Postfix) with ESMTPSA id 0A12FF7419; Fri, 17 Dec 2010 11:11:28 -0500 (EST) Date: Fri, 17 Dec 2010 11:11:27 -0500 From: Bill Moran To: jackoroses@gmail.com Message-Id: <20101217111127.6ff882ca.wmoran@potentialtech.com> In-Reply-To: References: Organization: Bill Moran X-Mailer: Sylpheed 3.0.3 (GTK+ 2.20.1; amd64-portbld-freebsd8.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: FreeBSD Mailing List Subject: Re: FreeBSD IPSec stack contains backdoors? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Dec 2010 16:11:30 -0000 In response to Mike L : > Reads like an unacceptable response to an issue that seems quite critical. Go to hell. This whole thing has been completely blown out of proportion, and I'm sick of the FUD and all the other associated bullshit. As has already been revealed by people WHO WERE THERE who are willing to give actual details: The NSA and the FBI were using OpenBSD code to experiment with whether backdoors could be created. The did not submit their resultant code, and had no intention of doing so. It was an experiment, which is part of what open source is all about. You, Greg attention-whore Perry, and the mass-media all need to go back to snapping paparazzi photos of celebrities. Here, I formally double DES' bounty. If anyone can find any FBI inserted backdoors in such a way as to meet DES' criteria, I'll pay out the same as whatever he pays out. > On Fri, Dec 17, 2010 at 4:31 AM, Giorgos Keramidas wrote: > > > The FreeBSD security officer team has already written an official > > response about this. Please have a look at: > > > > > > http://lists.freebsd.org/pipermail/freebsd-security/2010-December/005746.html > > > > Regards, > > Giorgos > > > > On Fri, 17 Dec 2010 14:28:37 +0600, Victor Lyapunov < > > fullblaststorm@gmail.com> wrote: > > > ---------- Forwarded message ---------- > > > From: Victor Lyapunov > > > Date: 2010/12/15 > > > Subject: FreeBSD IPSec stack contains backdoors? > > > To: FreeBSD Mailing List > > > > > > Hi folks, > > > Recently OpenBSD developer Gregory Perry disclosed information about > > > possible backdoors in OpenBSD IPSec stack (see > > > http://permalink.gmane.org/gmane.os.openbsd.tech/22557) In particular, > > > Gregory Perry, who has been working on a OpenBSD -ish implementation > > > of IPSec says a number of backdoors have been introduced into the > > > code. > > > > > > As far as I am aware, FreeBSD contains considerable amount of code > > > ported from OpenBSD. The question is: was the FreeBSD's ipsec code > > > ported from OpenBSD's implementation? If so, what might be the impact > > > of this? > > > > > > Thanks, > > > Victor Lyapunov. > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" -- Bill Moran http://www.potentialtech.com http://people.collaborativefusion.com/~wmoran/