On 01/16/2015 05:54 AM, Paul Eggleton wrote:
On Friday 16 January 2015 02:05:27 Fan, Xin wrote:
There will always be differences in how people expect software to be
configured for whatever target and application they are building for,
hence why we make it fairly easy to adjust the configuration.
Actually, I had the same opinion with you at the beginning.

But in last December, the ntp published 4 serious
vulnerabilities(CVE-2014-9293, CVE-2014-9294,CVE-2014-9295,CVE-2014-9296).
So I think even the display a clock function, it should also be protected
by openssl for the safety connection.
I'm not sure this follows. Correct me if I'm wrong, but SSL doesn't actually
prevent me as an unauthorised user from making a connection - it just ensures
that when I connect to a server that firstly the data sent over the connection
is encrypted, and furthermore that the connection is directly to the server I
think it is and not someone else masquerading as that server.

Though this is the common mode of operation, ssl also permits client authentication through certificates, so the server knows that the client is who it says it is. I generally run public-facing restricted access web servers this way, in addition to using HTTP authentication. I don't know but would assume ntp would support the same capability through configuration files if ssl is enabled in the build.

I doubt the number of people in the world that would configure ntp that way is very large, though. As long as it's available through PACKAGECONFIG (and it is) I'm not convinced changing the default is critical, but it's probably not a big deal either unless the added dependencies are a burden for somebody's small-footprint installation. (In which case they could override PACKAGECONFIG. That's what I love about Yocto.)

Peter

  This would mean
that for example any buffer overflows such as the ones in the vulnerabilities
you point to would still be accessible and potentially exploitable even if the
connection were only available as encrypted using SSL, at least as far as I
can tell.

And I find more packages in Yocto which also use the openssl as the
default option, so I think ntp also should set the openssl option as default
setting.
In a lot of other cases SSL is on by default because it really makes sense;
for example it's common to want to fetch files from https servers so in the
general case you would want curl to be built with SSL support by default. I'm
not sure the same can be said of ntp. Again, I'm happy to be corrected though.

Cheers,
Paul


--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel

Reply via email to