Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120420131643.GA26757@openwall.com>
Date: Fri, 20 Apr 2012 17:16:43 +0400
From: Solar Designer <solar@...nwall.com>
To: owl-dev@...ts.openwall.com
Subject: Re: owl and openssh

On Thu, Apr 19, 2012 at 07:05:55AM +0200, Pawe?? Hajdan, Jr. wrote:
> Isn't upstream interested in those owl patches? Have they been submitted
> and rejected?

I discussed the key blacklisting stuff with upstream while we were still
designing it (we'd consider their preferences if any).  They did not
want it.  Yet we wanted to have it, and we actually caught some weak
keys (from Debian systems) in the wild shortly after we deployed those
updated packages on clients' Owl-based systems that we manage (and where
their other contractors, etc. have accounts).  So those would be real
vulnerabilities in real systems if we did not include that code.

It is understandable that OpenBSD did not want to complicate their code
because of another project's fault, and OpenSSH portable did not want to
differ in this respect this time.  They would potentially include
generic user-configurable blacklisting, but implementation and user
interface wise it would need to be substantially different from the
efficient mass blacklisting of a fixed set of keys that we needed for
dealing with the Debian incident.

In general, OpenSSH patches that we have were considered for upstream
relevance.  Some were submitted, a subset of those were merged.

I started typing specific info here, but the list was quickly getting
long, so I felt that it's not productive use of my time.  Perhaps you
did not mean to spend much of my time on an elaborate answer with your
quick question.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.