Graham Leggett wrote:
> On 13 Apr 2014, at 2:04 PM, Michael Ströder <mich...@stroeder.com> wrote:
>> No, it does *not* answer the question.
>>
>> The question was: Who is currently using it?
> 
> Just to clarify any possible confusion, whether or not a piece of software
> actively uses the heartbeat makes no difference to the bug, you are still
> vulnerable simply by virtue of the feature being there. Make sure that if
> you are using an effected version of openssl, you patch openssl.

I understood Hanno's question like this:
Why the hell is everybody forced to deploy half-baken code in security
sensitive systems which is only needed in 0.000001% use-case niches like DTLS?

This is related to the
why-gets-TLS-more-and-more-bloated-and-how-should-implementors-ever-get-this-right
discussions on ietf-tls mailing list.

A clarifying note especially to OpenSSL developers:
Many thanks for your work and I feel your pain these days.
But maybe it's the right time to think about putting two feet on the brake
pedal against the feature bloat.

Ciao, Michael.


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to