Home Business IT Open Source OpenBSD begins clean-up of OpenSSL code

OpenBSD begins clean-up of OpenSSL code

The OpenBSD project has begun the process of cleaningup "a very bad codebase" - that of OpenSSL - in the wake of the disclosure of a flaw that compromised security on sites using the cryptographic software library.

The flaw, which is referred to as Heartbleed, was introduced into the code upstream in December 2011. when exploited, it leaks the contents of memory from server to client and vice versa.

The OpenBSD project is in no way responsible for OpenSSL; however, like many other operating systems it does include the software library in its own distribution.

However, it has taken on the task of cleaning up the code, first for use in its own distribution and later, if possible, by others. The project has a reputation for being extra-careful about security and many websites that look for that extra layer of protection run on OpenBSD.

OpenBSD project chief Theo de Raadt pointed iTWire to the following changes which have already been made:

splitting up the libcrypto and libssl build directories;

fixing a use-after-free bug;

removal of ancient MacOS, Netware, OS/2, VMS and Windows build junk;

removal of “bugs” directory, benchmarks, INSTALL files, and shared library goo for lame platforms;

removal of most (all?) backend engines, some of which didn’t even have appropriate licensing;

ripping out some windows-specific cruft;

removal of various wrappers for things like sockets, snprintf, opendir, etc. to actually expose real return values:

KNF of most C files (Kernel normal form, or KNF, is the coding style used in the development of code for the BSD operating systems);

removal of weak entropy additions; and

removal of all heartbeat functionality which resulted in Heartbleed.

"We make no promises to anyone else at this point," De Raadt said. "The codebase we are starting from is very bad."

"We are first trying to make this fit for our own purposes, then more generally fit for purpose. Current OpenSSL does not meet that standard by any stretch of the imagination."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.