[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#765639: affecting more and more people



On Mon, 15 Feb 2016 18:59:46 +0000 "Adam D. Barratt" <adam@adam-barratt.org.uk> wrote:
> On Mon, 2016-02-15 at 19:46 +0100, Christian Beer wrote:
> > Hi,
> >
> > there are more people reporting that they are directly affected by a bug
> > in the Debian Jessie openssl package where it doesn't check an
> > alternative certificate chain (which is fixed in the latest upstream 1.0.1).
> [...]
> > Right now the combination of openssl and ca-certificates in Debian
> > Jessie is not working for a lot of websites (that they themselves can't
> > fix). I understand the hesitation to upgrade openssl but I would like to
> > return to a working Jessie rather than use an obviously broken one.
>
> If it's that broken, then it should be fixed anyway, regardless of any
> decision of whether or not to accept full upstream releases in to
> Jessie.
>
> Regards,
>
> Adam

As a long-time Debian user who is indirectly affected by this issue, I'd like to see Debian simply adopt the upstream 1.0.2 releases instead of trying to maintain a messy fork that contains a mix of 1.0.1 and backported 1.0.2 changes. Staying as close as possible to upstream benefits Debian by using releases that have been reviewed and tested by both upstream and also other OpenSSL users. Every change backported onto Debian's stable version of OpenSSL also carries the risk of creating a new security vulnerability unique to Debian, and staying close to upstream minimizes this. Although upstream could introduce bugs in their new releases, the same is equally true when Debian makes its own releases from backported changes.

Some upstreams do not make releases that are suitable for reuse as SRUs, so I think this kind of policy may need to be decided on a case by case basis. In the case of OpenSSL, it' a mature, widely used package whose releases consist mostly of security updates anyway, and they've also promised not to break binary compatibility between last-digit releases like 1.0.1 and 1.0.2.[1] There seems to be little justification for the risk and significant effort required to maintain a fork that sits in between 1.0.1 and 1.0.2, and I think that if new upstream releases do introduce problems, Debian is better off working directly with upstream than trying to do its own completely separate OpenSSL development.

Also, my own testing seems to show that the certificate chain issue is still present in the latest 1.0.1 release (as I commented on 813468), so adopting the latest 1.0.2 release seems like the only reasonable alternative.

[1] https://www.openssl.org/policies/releasestrat.html

Reply to: