Sujet : Re: Laptop replacement
De : joe (at) *nospam* jretrading.com (Joe)
Groupes : comp.misc uk.d-i-yDate : 03. Apr 2025, 10:05:30
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <20250403100530.0d7bd5b0@jrenewsid.jretrading.com>
References : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
User-Agent : Claws Mail 4.3.1 (GTK 3.24.49; x86_64-pc-linux-gnu)
On Wed, 2 Apr 2025 21:02:02 +0100
John R Walliker <
jrwalliker@gmail.com> wrote:
On 02/04/2025 07:41, Lawrence D'Oliveiro wrote:
Exhibit A: OpenSSL
<https://arstechnica.com/information-technology/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/>.
This example is 11 years old!
And it will never be forgotten. It is a perfect textbook example of how
not to create extremely important and sensitive production software, to
be used by half the world. It will be taught in computer science
classes forever.
The bug was a schoolboy buffer addressing error. The code involved a
new function in OpenSSL, one which had previously been considered
unnecessary. It was coded by a student, and it was audited by *one*
other person, who had a close personal connection with the writer,
before inclusion in the Linux kernel.
In other words, everything that could be done incorrectly in terms of
accepted software engineering practices was done. The error was always
claimed to be accidental, but certainly, the intelligence services of
the world, and many criminals, benefited from it.
-- Joe