TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSL after Heartbleed

113 pointsby Halienjaover 8 years ago

9 comments

zAy0LfpBZLC8mACover 8 years ago
&gt; Needless to say, OpenSSL is looking for contributors. Beyond contributing patches, interested developers can test the pre-releases, report bugs, and help to close bugs. The presenters concluded by saying that they would like users to get in touch, especially those who are distributing OpenSSL further downstream.<p>... and just a few days later they closed ~ 150 bugs, some with patches attached, &quot;because they were too old&quot;:<p><a href="https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2016&#x2F;10&#x2F;12&#x2F;f2f-rt-github&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2016&#x2F;10&#x2F;12&#x2F;f2f-rt-github&#x2F;</a><p><a href="https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-dev&#x2F;2016-October&#x2F;008638.html" rel="nofollow">https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-dev&#x2F;2016-October&#x2F;0...</a>
评论 #12750726 未加载
TwoBitover 8 years ago
Whenever there&#x27;s an article about OpenSSL, I get on my soapbox to talk about how shitty it is. The design is terrible, both internally and in the public API. Building it is a PITA. It is almost completely unaware of this thing called multithreading. It still is hard-coded to be able to read certificates only via disk files with fopen, despite having a screwy BIO system which is a half baked attempt at sometimes abstracting IO.<p>If it was anything other than a security library, it would have died long ago.
评论 #12750311 未加载
评论 #12751083 未加载
评论 #12751075 未加载
评论 #12750406 未加载
jvermillardover 8 years ago
I recently experienced a bug with OpenSSL 1.1 and the team was pretty reactive! I&#x27;m using OpenSSL 1.1 because it&#x27;s the only DTLS implementation featuring all the extensions (OCSP stappling) and ciphersuites (AES-CCM-8) I need.
__david__over 8 years ago
Interesting, I had no idea the changes that were happening to OpenSSL. It&#x27;s sad that it took Heartbleed to kick it in the butt, but it&#x27;s heartening that they appear to be heading in a better direction now.<p>I&#x27;m also curious how LibreSSL is doing—I haven&#x27;t heard much about it lately. Did it fizzle, or is it still making good progress?
评论 #12750486 未加载
iUsedToCodeover 8 years ago
How come the biggest names in IT don&#x27;t work towards creating a modern, better security library?<p>It&#x27;s pennies for them, they wouldn&#x27;t even see it on the balance. Having security issues slows down business significantly. Non-geeks keep hearing about major bugs in basic security and it surely has a negative effect on the spread of internet and services based on it.
评论 #12751809 未加载
评论 #12753718 未加载
评论 #12757698 未加载
评论 #12752458 未加载
评论 #12751812 未加载
mSparksover 8 years ago
For me, Heartbleed was much much more than: -&gt;At its core, Heartbleed was a simple bug, a missing buffer-length check<p>It was a catastrophic failure of a critical internet component that highlighted the truth that these supposed crypto security experts didnt have a clue.<p>We&#x27;re talking about the kind of &quot;simple bug&quot; analogous to a television with bare wires as a power switch.<p>Imho it will take a lot more than a couple of years and a team change to reinspire faith in that brand of security. If we should at all.
评论 #12750282 未加载
评论 #12750488 未加载
评论 #12752713 未加载
zevebover 8 years ago
&gt; The code was hard to maintain and hard to contribute to, especially for developers in the US due to crypto export issues.<p>That&#x27;s not really true: per <a href="https:&#x2F;&#x2F;www.bis.doc.gov&#x2F;index.php&#x2F;policy-guidance&#x2F;encryption&#x2F;registration#One" rel="nofollow">https:&#x2F;&#x2F;www.bis.doc.gov&#x2F;index.php&#x2F;policy-guidance&#x2F;encryption...</a>, publicly available software (which includes free software) just requires a notification under exception TSU. All you have to do, per <a href="https:&#x2F;&#x2F;www.law.cornell.edu&#x2F;cfr&#x2F;text&#x2F;15&#x2F;740.13" rel="nofollow">https:&#x2F;&#x2F;www.law.cornell.edu&#x2F;cfr&#x2F;text&#x2F;15&#x2F;740.13</a>, is send an email to crypt@bis.doc.gov and to enc@nsa.gov with the location of the source code. As long as you don&#x27;t change the location, you never have to worry about it again.<p>The regulation even notes that simply providing source code on a public website does not constitute export to a prohibited country.<p>It&#x27;s really not a big deal.<p>(Note: I am not a lawyer; this does not constitute legal advice)
cm3over 8 years ago
The original NaCl had assembly implementations, I believe generated with a Perl script (not unlike OpenSSL&#x27;s asm generator), and looking around libsodium I cannot see assembly implementations of the loops. Does anyone know why that is? I believe the Linux kernel implementation of ChaCha20 carries asm versions.
zengidover 8 years ago
&gt;A recently added tool will modify the code to invert the sense of the conditions in if statements to see whether the test suite catches the resulting bug; if it doesn&#x27;t, there is a coverage gap in the test suite.<p>Does anyone have any info on this tool? I&#x27;m intrigued.