Hi,

> It certainly would, but Valgrind isn't the only analysis tool people
> might want to use. A runtime flag provides a means of obtaining accurate
> results with any tool.

Unfortunately, for am attacker it also provides a means of (possibly)
weakening your program's randomness behind your back, so IMO any way
to configure this behaviour at runtime is a potential security issue.

IMO it's better to tell people unable to ignore "bogus" warnings (or
make their analysis tool ignore them, e.g. via a suppressions file) to
use a special build option, like it's currently done.

In fact, I'd generally (i.e. not specifically for OpenSSL) wish
developers would invest more of their time into fixing bugs and/or
adding features rather than trying to get rid of the last "bogus"
warnings caused by some more or less obscure compiler or analysis
tool - that would also (need to) result in a healthier reaction to
such warnings by other developers and packagers: just assume that
the authors know what they are doing instead of trying to "fix" even
the last warning by whatever inappropriate means.

        Regards,
                Stefan

P.S.: Of course, I realize it's a problem if you have lots of bogus
        warnings and can't even find the real problematic ones in
        between them, but there must be a reasonable compromise
        somewhere between "a lot" and "zero".





______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to