X-Original-To: alpine-devel@lists.alpinelinux.org Received: from mx1.tetrasec.net (mx1.tetrasec.net [74.117.190.25]) by lists.alpinelinux.org (Postfix) with ESMTP id 6B1735C589B for ; Thu, 25 Oct 2018 08:44:54 +0000 (GMT) Received: from mx1.tetrasec.net (mail.local [127.0.0.1]) by mx1.tetrasec.net (Postfix) with ESMTP id 404069E1E0E; Thu, 25 Oct 2018 08:44:54 +0000 (GMT) Received: from ncopa-desktop.copa.dup.pw (67.63.200.37.customer.cdi.no [37.200.63.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: alpine@tanael.org) by mx1.tetrasec.net (Postfix) with ESMTPSA id 9FC549E00F8; Thu, 25 Oct 2018 08:44:53 +0000 (GMT) Date: Thu, 25 Oct 2018 10:44:50 +0200 From: Natanael Copa To: William Pitcock Cc: alpine-dev Subject: Re: [alpine-devel] Re: openssl 1.1 support Message-ID: <20181025104450.23747f0a@ncopa-desktop.copa.dup.pw> In-Reply-To: <20181025103550.18d4cc2c@ncopa-desktop.copa.dup.pw> References: <20181024171950.2343fefd@ncopa-desktop.copa.dup.pw> <20181025103550.18d4cc2c@ncopa-desktop.copa.dup.pw> X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-alpine-linux-musl) X-Mailinglist: alpine-devel Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 25 Oct 2018 10:35:50 +0200 Natanael Copa wrote: > On Wed, 24 Oct 2018 18:47:51 -0500 > William Pitcock wrote: > > ... > > > > There are also some patches that fedora uses that we may want. Some of > > > fedoras patches are for multilib and FIPS support, which I don't think > > > we care about (yet), but there are some that replaces getenv() with > > > secure_getenv(). > > > > I do not think musl have secure_getenv(3) yet. > > We don't but its relatively easy to implement same functionality: > > inline *char secure_getenv(const char *name) { > return getauxval(AT_SECURE) ? NULL : getenv(name); > } > > I think it may be good that we do that so that nobody gets a nasty > surprise if a suid binary is linked to openssl. It seems that they have applied something to solve that upstream: https://github.com/openssl/openssl/commit/79c2c741303ed188214b9299a51c837635f7e9a8 I guess we can backport that. -nc --- Unsubscribe: alpine-devel+unsubscribe@lists.alpinelinux.org Help: alpine-devel+help@lists.alpinelinux.org ---