From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Natasha Kerensikova Newsgroups: comp.lang.ada Subject: Re: OpenSSL development (Heartbleed) Date: Wed, 23 Apr 2014 05:38:21 +0000 (UTC) Organization: A noiseless patient Spider Message-ID: References: <-OGdnezdYpRWFc_OnZ2dnUVZ_vednZ2d@giganews.com> <535297f1$0$6715$9b4e6d93@newsspool3.arcor-online.net> <5352a585$0$6707$9b4e6d93@newsspool3.arcor-online.net> <535688a0$0$6721$9b4e6d93@newsspool3.arcor-online.net> <19mxjybev4fc9.1fkxznem326v8$.dlg@40tude.net> <1ottu3pw9hxl1.i1h7v3r51vk0.dlg@40tude.net> Injection-Date: Wed, 23 Apr 2014 05:38:21 +0000 (UTC) Injection-Info: mx05.eternal-september.org; posting-host="76a49b86bc3e16725b7cfca3d85cb4c8"; logging-data="27966"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19I8ouXDVcIKd0IJfX2c6O+" User-Agent: slrn/1.0.1 (FreeBSD) Cancel-Lock: sha1:PJ0iS5ZWVrxd+ALcmv1f5q1ZkdQ= Xref: news.eternal-september.org comp.lang.ada:19509 Date: 2014-04-23T05:38:21+00:00 List-Id: On 2014-04-22, Dmitry A. Kazakov wrote: > On Tue, 22 Apr 2014 16:57:28 +0000 (UTC), Simon Clubley wrote: >> No, properly _implemented_ standards are what is required. >> >> Heartbleed came about because a boundary check was missing which allowed >> a invalid request to be processed instead of being rejected and, because >> of the _implementation_, was allowed access to memory that had nothing to >> do with the request. >> >> This was a failure in the implementation of the standard, not a failure >> of the standard itself. > > Boundary checks or not, the transport layer shall have no access to the > server data. > > A tightly coupled system is vulnerable. If compromising just one component > opens all gates wide, that is a bad standard and bad design. The effects of > errors and faults must be bounded per design. How would you design a transport layer that has no access to whatever is supposed to be transported? "Heartbleed" didn't leak any data that ins't legitimataly needed by OpenSSL (i.e. transported data and/or transport parameters (like keys))