Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Oct 2014 09:38:03 +0200
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Ryan Steinmetz <zi@FreeBSD.org>
Cc:        gecko@freebsd.org, ports-secteam@freebsd.org, chromium@freebsd.org
Subject:   Re: POODLE SSLv3 vulnerability
Message-ID:  <86siipg4v8.fsf@nine.des.no>
In-Reply-To: <20141015020813.GA5814@exodus.zi0r.com> (Ryan Steinmetz's message of "Tue, 14 Oct 2014 22:08:13 -0400")
References:  <86iojmgn40.fsf@nine.des.no> <20141015020813.GA5814@exodus.zi0r.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Ryan Steinmetz <zi@FreeBSD.org> writes:
> It might be less surprising if we bundle the addon with the current
> installation.

I disagree.  The change I proposed is simple and unobtrusive.  Please
consider this a formal request from the Security Officer.

DES
=2D-=20
Dag-Erling Sm=C3=B8rgrav - des@des.no

--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJUPiRbAAoJEO1n7NZdz2rngR8P/2sXguNxmUzWwWb0+zDt0m9l
AgKhhDFscuF8oOjjgDP3VqkUf7rXCU6bu/4U2+rNEVxe1g7l4KRaducJ7KvDAmJE
v04nhckazq7TzQLK8cT1JhFbZdRQhVLbv49kQ+p5JUYhj5lvHduk/GhJXspIaMKs
7NeWaERmf/crnDoNA5X5J4yZwWT4YFjQ/AECE/n3Vr5z7F4gxEdkLRgiuUSBN4Sf
ls1+5DmBOGxuj9tz90l6POrisMdOeZ82QEDkqshzvCh8dVVU2ZxzK9w4QVJMdHLI
BkCOUXxiJs/DzaWtHMa3vt2IcbHUNU0jQeCF2f4Jn5X6SnHCEznxMkHdLUojD4q0
py60xcvTyRYEEISjeuM8MOgeBliYHbjgCeIxkwF7rRZG0kLx3e6BPwNfFlRv86u7
gOzCcd/3MFDzVmgSSA8x/GGUs5u4e2XJHByqiAFHCLjZEnaz82V+KUvFvKubd56z
ixbowsspi4DQPthFoTTdXCR0jg02pfq/bl7ZZMAyYd5auGucGpOGX1pfT9qkc7oF
Z0PJ0dpIBjIEomPdZV86fD5LuVTW+ToqdsWYgsIn3oPREUqeiagFKHGa6JmsH0A7
9uDI7CmCp7v12Vmo7ayMMgINrmzh4Z20YTFWio68na/Eriz9QuQ5wk1vcRtNmLgz
yg7049eT+n/xxw9ueIYU
=JCCA
-----END PGP SIGNATURE-----
--=-=-=--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86siipg4v8.fsf>