Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

README update #46

Open
zabbal opened this issue Nov 8, 2022 · 4 comments
Open

README update #46

zabbal opened this issue Nov 8, 2022 · 4 comments

Comments

@zabbal
Copy link

zabbal commented Nov 8, 2022

The README mentions using master OpenSSL version. There's been recent OpenSSL release (prompted by security vulnerability) - perhaps it can be used instead of master branch to simplify maintenance a bit?

@fooinha
Copy link
Owner

fooinha commented Nov 8, 2022

Not sure if I understand.

This repository has a patch to be applied to OpenSSL, and the user must apply the patch on a source code version that is compatible.

The patch has to be updated if OpenSSL changes its source code.

I've followed OpenSSL vulnerability and it's related certificate validation and email addresses with special unicode chars, only exploitable in very specific circumstances.

@zabbal
Copy link
Author

zabbal commented Nov 8, 2022

That's my point exactly: if the patch for OpenSSL is against particular released version than it doesn't have to be updated any longer. If it's against master branch than the patch have to be regularly updated requiring extra maintenance efforts.

@fooinha
Copy link
Owner

fooinha commented Nov 8, 2022

@zabbal , generally speaking I'm all in favour of the suggested approach. The drawback is that I think that the dependant project - in this case, this one - should keep pace with regularly updated releases if any security or critical issue happens in the dependency.

If we lock to a specific OpenSSL version here, we might also "lock" users to a vulnerable version, until we either update the patch or the README.

In the past, for OpenSSL, we kept all patches for previous versions of OpenSSL, whenever we updated the patch ( which is not very common )

@zabbal
Copy link
Author

zabbal commented Dec 12, 2022

I'm not sure I'm following - if you set requirements for version X of OpenSSL in your release Y than it's not a lock-up, it's a common practice. If for any reason (including CVE) you need to bump dependency version to X2, you just make release Y2. You've got to do it from time to time anyway.

Having explicit version numbers makes maintenance much more predictable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants