I'd probably use OpenBSD instead of FreeBSD on my servers if I had known about it earlier. But lazyness is one of my greatest weeknesses, and I'm not into changing running systems anyway.
snemarch wrote:security needs to be bloody well tested, especially for critical infrastructure code.
My private server (where I run LibreSSL on) is mainly a playfield without much SSL-related stuff. Critical infrastructure is housed on other servers (primarily running FreeBSD with OpenSSL).
snemarch wrote:but they're making aggressive changes to a very complex and fragile codebase.
Aggressive but well-thought and well-audited changes nevertheless.
snemarch wrote:Define "worked"

. Keep in mind that the OpenBSD development process is to make something that works
on OpenBSD, and when satisfied with that result, write shims for other systems.
AFAICS the FreeBSD "port" was mainly a new Makefile, while the Linux port was, uhm, annoying.
snemarch wrote:AFAIK there have been no "heavy kernel patches" to Linux, but there was a LibReSSL bug for a
semi-theoretical PID clash problem, which resulted in a suggestion for
kernel getrandom syscall (which also helps avoid another semi-theoretical problem with FD exhaustion and inavailability of /dev/random). But perhaps there's some other issues I've missed or forgotten?
Actually, that's even the main part. LibreSSL made Linux get a
sane random pool, it forced Linux developers to
fix breakages inside their kernel. There surely are some more (reading the LKML not everything is patched yet), but obviously "the BSDs" share a security system Linux still lacks.
snemarch wrote:The OpenBSD developers warned people not to try writing these if they didn't know what they were doing, but that didn't stop people from writing some very very terribad implementations that were a lot less secure than standard OpenSSL.
That's why people shouldn't use third-party wrappers for core components. I, for one, do.
snemarch wrote:Which is true, but not an excuse to deploy in-heavy-flux code to production servers. A philosophy the OpenBSD guys follow.
I may be too pragmatic on that, but if I have the choice between "stable" and "secure", I choose security.
snemarch wrote:I was referring to the real-world usage of OpenSSL in critical infrastructure
I never had to. My company's projects are mainly developed within the intranet, the main project I'm working on would gather nothing from just having OpenSSL.