Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Aren't two of the three implementations you're mentioning mainly used in clients though? Most Linux boxes are not used as clients, and so there is a monoculture of Linux server security.

You, rightly, mentioned NSS elsewhere, but do people actually use this on servers in any great number? I guess you could argue that Apache and Nginx shipping OpenSSL as the default option for https is the problem, in which case shouldn't we change that, or is there something else about OpenSSL that prevents people from using NSS?



NSS implements both the client and server side of TLS. And OpenSSL and NSS aren't the only options; if X.509 bugs are more your style, you could try PolarSSL or MatrixSSL:

https://twitter.com/tqbf/status/454022864660750336/photo/1


Fill in the blank: 50% of the things being compromised is ______% as bad as all the things being compromised.

Sometimes a partial compromise is easy to deal with, and the number in the blank is way less than 50. Lots of diverse things is good.

Sometimes half the units being compromised is almost as bad as all the units being compromised. Lots of diverse things is a bad thing in this environment.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: