On 04/03/2016 15:57, walt wrote:
> I notice that openssl-1.0.2g-r2 restores SSLv2 as a temporary fix
> for the breakage caused by r1 yesterday.
> 
> My machines are working just fine without SSLv2 so I'm going to skip
> the update to r2 and keep r1 while waiting for a permanent fix.  I'm
> not a security expert, so I'd like to hear opinions from people who are.
> 
> Should people who have already installed r1 and are not having any
> problems just stay with r1 for now?  Or not.
> 
> 


The relevant bug is here

https://bugs.gentoo.org/show_bug.cgi?id=576128

If you have sslv2 enabled, your choices are clear:

1. high likelihood of wholesale breakage, or
2. wait a little longer for a proper fix

Obviously -r1 is ideal as it disables sslv2. If you have it and it
works, leave it in place.

Everyone else is going to have to make up their own mind, and there's no
sane rational advice that can be given for all, considering what the
choices are above.

FreeBSD is also hit with the same issue for similar reasons, and Fedora
has it's own pain. Between them and Gentoo I have every confidence a
real fix will come out soon.

My choice is to sit tight for now. I can't afford to run the risk of
taking the company's vital FreeBSD servers of the air to fix a bug
unproven to be exploited in the wild. It's a tough choice.


-- 
Alan McKinnon
[email protected]


Reply via email to