dalini wrote:
so one may call this a debian problem, but actually it is a openssl problem and specially of there release-policy for stable releases...maybe i will write an e-mail and talk about security in terms of broken protocol implementations which will crash protocols and it will be a security risc therefore, maybe not that you can 'hack' openssl with a buffer overflow, no you just have to install the stable d version to break your whole security infrastructure if it uses pkcs#7 maybe they then consider it a security risc...
somehow they have some strange understanding of security in my point of view - i will test this, since i don't have time and and i don't want to explain everytime that 0.9.7d is just broken - even if its the stable openssl release - actually this can't just be
greetings dalini
------------------------------------------------------- This SF.net email is sponsored by: IT Product Guide on ITManagersJournal Use IT products in your business? Tell us what you think of them. Give us Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more http://productguide.itmanagersjournal.com/guidepromo.tmpl _______________________________________________ Openca-Users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/openca-users
