Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

OpenBSD's leadership focuses on clean and correct code, not necessarily on security. Of course, that leads to security though.


This is incorrect. Security is definitely a first-class goal for them, not "just" clean and correct code.

That is, they do not only fix code, but try hard to ensure that code which doesn't match their quality goals can't do much harm. And this is security.

The topic at hand (vmm) is the best example for that. At a first glance, this is about creating a clean and correct hypervisor. But what is this good for? To be able to run less secure systems within OpenBSD without them doing too much damage.

Another example is pushing hard to enforce W^X on all kinds of applications, even browsers:

http://www.tedunangst.com/flak/post/now-or-never-exec

This doesn't fix any existing bugs, but it actively mitigates the damage that a bug may have (ideally, it prevents a buffer overflow bug from being actually exploitable).

From their website:

http://www.openbsd.org/security.html

| Our aspiration is to be NUMBER ONE in the industry for security

Sure, security by clean and correct code is their main measure to increase security. They call it "proactive security". But there's tons of stuff in OpenBSD which is "merely" mitigation.


> This is incorrect. Security is definitely a first-class goal for them, not "just" clean and correct code.

I get the impression that the dominant attitude among OpenBSD developers is that if you have to choose between simplicity and security, your basic approach is flawed and should be reconsider. This line of thinking - that you don't make things more secure by making them more complicated - also results in a simple yet powerful system.

So unless I am mistaken, "clean and correct code" and "security" are not two different goals, in a way they are two faces of the same coin.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: