Page MenuHomeFreeBSD
Feed Advanced Search

Sep 20 2023

bz removed a member for secteam: bz.
Sep 20 2023, 1:21 PM

Aug 29 2023

markj added a comment to D41614: geli: fix setkey behavior on detached providers.

The change looks Okay to me but I wonder if we should separate the variable into two cached values, one for new and the other for !new.

When changing multiple providers at the same time, this would allow the library to cache both passphrases so the user don't have to enter them over and over again.

Aug 29 2023, 1:35 PM · security, secteam
delphij added a comment to D41614: geli: fix setkey behavior on detached providers.

The change looks Okay to me but I wonder if we should separate the variable into two cached values, one for new and the other for !new.

Aug 29 2023, 4:03 AM · security, secteam

Aug 28 2023

cem removed a watcher for secteam: cem.
Aug 28 2023, 2:24 PM
freebsd_igalic.co added reviewers for D41614: geli: fix setkey behavior on detached providers: secteam, security.
Aug 28 2023, 10:12 AM · security, secteam

Mar 26 2023

guest-patmaddox removed a watcher for secteam: guest-patmaddox.
Mar 26 2023, 6:50 PM
guest-patmaddox added a watcher for secteam: guest-patmaddox.
Mar 26 2023, 11:34 AM

Mar 6 2023

ngie abandoned D38835: openssl: Vendor import of OpenSSL-3.0.8.

Merged as https://reviews.freebsd.org/rGe4520c8bd1d3 .

Mar 6 2023, 7:54 PM · security, secteam

Mar 4 2023

ngie added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.

Are there any objections to continuing with the creation of the vendor/openssl-3.0 branch?

Mar 4 2023, 5:45 AM · security, secteam

Mar 3 2023

ngie added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.
In D38835#884813, @dim wrote:
In D38835#884784, @ngie wrote:

Part of what I would like to do based on informal discussions in IRC is to put OpenSSL 3 into its own subdirectory, make it into a private library (props goes to @dim for the idea!) and transition utilities in base over to OpenSSL 3, then work on the ports story with @brnrd .

If openssl3 is going to be a private lib, then ports can't use it at all, right? I see there is already security/openssl which is 1.1.1t, and security/openssl-devel which is 3.0.8 (strange, because the development version of OpenSSL is 3.1.0 but I digress). So ports would have to link against the former or the latter (and can't use both). Also, if we make a private openssl3 lib, we'll have to rename all symbols so as to not conflict with ports. Alternatively, the ports openssl versions should rename all _their_ symbols to not conflict. That might also solve the problem of mixing 1.1 and 3.0.

In any case, getting openssl3 in side-by-side is a good first step, allowing piecemeal work to be done.

Mar 3 2023, 7:14 PM · security, secteam

Mar 2 2023

dim added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.
In D38835#884784, @ngie wrote:

Part of what I would like to do based on informal discussions in IRC is to put OpenSSL 3 into its own subdirectory, make it into a private library (props goes to @dim for the idea!) and transition utilities in base over to OpenSSL 3, then work on the ports story with @brnrd .

Mar 2 2023, 6:51 PM · security, secteam
ngie updated subscribers of D38835: openssl: Vendor import of OpenSSL-3.0.8.

Part of what I would like to do based on informal discussions in IRC is to put OpenSSL 3 into its own subdirectory, make it into a private library (props goes to @dim for the idea!) and transition utilities in base over to OpenSSL 3, then work on the ports story with @brnrd .

Mar 2 2023, 6:38 PM · security, secteam
ngie added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.
In D38835#884625, @jkim wrote:
In D38835#884575, @ngie wrote:

I followed a different import process than what’s described in FreeBSD-UPGRADE because it was much simpler for me to use rsync -av —-delete to update the contents than multiple calls to find/tar/comm.

Actually, we need to rewrite both FreeBSD-upgrade and FreeBSD-Xlist from scratch for OpenSSL 3.0 because it is quite different.

Mar 2 2023, 6:35 PM · security, secteam
jkim added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.
In D38835#884575, @ngie wrote:

I followed a different import process than what’s described in FreeBSD-UPGRADE because it was much simpler for me to use rsync -av —-delete to update the contents than multiple calls to find/tar/comm.

Mar 2 2023, 6:19 PM · security, secteam
ngie added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.

I assume your vendor/openssl-3.0 branch started from the current vendor/openssl?

Mar 2 2023, 5:45 PM · security, secteam

Mar 1 2023

emaste added a comment to D38835: openssl: Vendor import of OpenSSL-3.0.8.

I assume your vendor/openssl-3.0 branch started from the current vendor/openssl?

Mar 1 2023, 3:22 PM · security, secteam
ngie updated the test plan for D38835: openssl: Vendor import of OpenSSL-3.0.8.
Mar 1 2023, 3:42 AM · security, secteam
ngie updated the test plan for D38835: openssl: Vendor import of OpenSSL-3.0.8.
Mar 1 2023, 3:39 AM · security, secteam
ngie retitled D38835: openssl: Vendor import of OpenSSL-3.0.8 from Summary: openssl: Vendor import of OpenSSL-3.0.8 to openssl: Vendor import of OpenSSL-3.0.8.
Mar 1 2023, 3:32 AM · security, secteam
ngie added projects to D38835: openssl: Vendor import of OpenSSL-3.0.8: secteam, security.
Mar 1 2023, 3:31 AM · security, secteam

Mar 28 2022

gnn removed a member for secteam: gnn.
Mar 28 2022, 10:01 PM

Sep 13 2021

emaste added a member for secteam: oshogbo.
Sep 13 2021, 12:45 PM

Jun 15 2021

gordon removed a member for secteam: jmg.
Jun 15 2021, 4:00 AM
gordon added a member for secteam: philip.
Jun 15 2021, 4:00 AM
gordon removed a member for secteam: glebius.
Jun 15 2021, 4:00 AM

Apr 6 2021

gordon added a member for secteam: markj.
Apr 6 2021, 4:00 PM

May 21 2020

gordon added members for secteam: gnn, bz.
May 21 2020, 4:33 PM

May 19 2019

cem added a watcher for secteam: cem.
May 19 2019, 9:32 PM

May 11 2019

oshogbo added a watcher for secteam: oshogbo.
May 11 2019, 1:33 PM

Jul 11 2018

cem abandoned D15389: aesni(4): improve session lookup performance.
Jul 11 2018, 10:50 PM · secteam
cem commandeered D15389: aesni(4): improve session lookup performance.

https://reviews.freebsd.org/D16215 (+ https://reviews.freebsd.org/D16216 for IPsec and https://reviews.freebsd.org/D16219 for aesni(4) ) solves the problem generally.

Jul 11 2018, 10:50 PM · secteam

Jul 10 2018

dwm added a watcher for secteam: dwm.
Jul 10 2018, 8:30 PM

May 27 2018

jmg added a comment to D15389: aesni(4): improve session lookup performance.

I agree w/ cem that we need a general solution to this. I'm fine w/ this patch, but I do question the wisdom in making this code aesni only. This code really needs to be turned into a library which any OCF driver can use, as this performance problem is not limited to aesni.

May 27 2018, 9:25 PM · secteam

May 25 2018

cem added a comment to D15389: aesni(4): improve session lookup performance.

So what is the plan here? Wait for somebody willing to do the session management in OCF right?

May 25 2018, 7:21 AM · secteam
emeric.poupon_stormshield.eu added a comment to D15389: aesni(4): improve session lookup performance.
In D15389#328341, @cem wrote:

Nobody wants this? It is definitely better than the current code though.

Sure, it improves performance (I haven't tested, but I'm quite willing to take your word for it) of a single OCF driver in the case that some consumer is allocating a lot of sessions (or maybe a reasonable number of sessions on a high core-count CPU). But that doesn't make it definitely better.

It adds complexity and perpetuates the problem that every OCF driver needs to copy and paste crappy session management. I think a general solution that moves the session management into OCF and out of drivers is a better way to fix this. You don't need the RB tree if sessions are just pointers.

May 25 2018, 7:11 AM · secteam

May 24 2018

cem added a comment to D15389: aesni(4): improve session lookup performance.

Nobody wants this? It is definitely better than the current code though.

May 24 2018, 3:03 PM · secteam
emeric.poupon_stormshield.eu added a comment to D15389: aesni(4): improve session lookup performance.

Nobody wants this? It is definitely better than the current code though.

May 24 2018, 12:21 PM · secteam

May 16 2018

emeric.poupon_stormshield.eu updated the diff for D15389: aesni(4): improve session lookup performance.

Remove bad comment

May 16 2018, 9:32 AM · secteam

May 14 2018

emeric.poupon_stormshield.eu updated the diff for D15389: aesni(4): improve session lookup performance.

Remarks

May 14 2018, 8:07 AM · secteam
emeric.poupon_stormshield.eu added inline comments to D15389: aesni(4): improve session lookup performance.
May 14 2018, 7:21 AM · secteam
emeric.poupon_stormshield.eu added a comment to D15389: aesni(4): improve session lookup performance.
In D15389#324522, @cem wrote:

I agree that the current system sucks and that it does not scale with multiple sessions. I'm not sure a binary tree is the right replacement, though. And probably session management should be lifted out into OCF (OpenCrypto Framework) so that all drivers can benefit from it without copy-pasting.

OCF has a number of shortcomings which John detailed here: https://lists.freebsd.org/pipermail/freebsd-arch/2018-January/018835.html

May 14 2018, 7:20 AM · secteam

May 11 2018

cem added a reviewer for D15389: aesni(4): improve session lookup performance: jhb.

I agree that the current system sucks and that it does not scale with multiple sessions. I'm not sure a binary tree is the right replacement, though. And probably session management should be lifted out into OCF (OpenCrypto Framework) so that all drivers can benefit from it without copy-pasting.

May 11 2018, 4:09 PM · secteam
emeric.poupon_stormshield.eu created D15389: aesni(4): improve session lookup performance.
May 11 2018, 1:36 PM · secteam

Mar 13 2018

badfilemagic_gmail.com removed a watcher for secteam: badfilemagic_gmail.com.
Mar 13 2018, 4:23 PM

Dec 8 2017

gordon added a member for secteam: emaste.
Dec 8 2017, 5:37 AM

Jul 15 2017

delphij added a member for secteam: gordon.
Jul 15 2017, 4:01 PM

Jun 11 2017

badfilemagic_gmail.com added a watcher for secteam: badfilemagic_gmail.com.
Jun 11 2017, 3:31 PM

Mar 22 2016

lattera-gmail.com added a watcher for secteam: lattera-gmail.com.
Mar 22 2016, 12:22 AM

Aug 11 2015

delphij added members for secteam: jmg, glebius.
Aug 11 2015, 7:48 PM

Jul 15 2015

eadler changed the edit policy for secteam.
Jul 15 2015, 2:32 AM
eadler changed the join policy for secteam.
Jul 15 2015, 2:29 AM

Jul 14 2015

delphij added a member for secteam: delphij.
Jul 14 2015, 6:33 PM