Conversation

the openssl fix, however, is entirely wrong from an ISO C point of view, and only fixes the immediate problem: github.com/openssl/openss if Clang starts applying this specific (and valid) optimization at the block level, then the code breaks again as it still invokes UB.
2
26
furthermore, this issue should have been assigned a CVE because it resulted in incorrect elliptic curve behavior in builds where assembly code was not used
1
19
the reason the FOSS world is stuck with OpenSSL has nothing to do with there not being capable forks to replace it, but with the fact that OpenSSL is FIPS certified, and therefore can be "white label FIPS certified". an example of this being:
1
38
vendors such as redhat and canonical do these "white label" FIPS certifications which cost much less than doing a new FIPS certification from scratch. they then charge for FIPS as a separate SKU, and make a lot of money. that money does not improve OpenSSL, however.
2
26
Android put in a HUGE effort to get rid of all the cryptography / TLS implementations other than BoringSSL. It implements the Java standard library, BouncyCastle, conscrypt and other APIs on top it and did that mostly transparently, so everything in the OS using BoringSSL now.
1
3
I think there used to be at least 3 TLS implementations and even more cryptography libraries. Nothing like the dozens of them that are in a traditional Linux distribution. Has Fedora / RHEL ever gotten around to undoing their horrible choice to use NSS as much as they could?
2