[#59445] [ruby-trunk - Bug #9335][Open] dynamic rescue regression in Ruby 2.1 — "fdr (Daniel Farina)" <daniel@...>
[#59462] [ruby-trunk - Bug #9342][Open] [PATCH] SizedQueue#clear does not notify waiting threads in Ruby 1.9.3 — "jsc (Justin Collins)" <redmine@...>
[#59466] [ruby-trunk - Bug #9343][Open] [PATCH] SizedQueue#max= wakes up waiters properly — "normalperson (Eric Wong)" <normalperson@...>
Issue #9343 has been updated by Eric Wong.
[#59498] [ruby-trunk - Bug #9352][Open] [BUG] rb_sys_fail_str(connect(2) for [fe80::1%lo0]:3000) - errno == 0 — "kain (Claudio Poli)" <claudio@...>
[#59516] [ruby-trunk - Bug #9356][Open] TCPSocket.new does not seem to handle INTR — "charliesome (Charlie Somerville)" <charliesome@...>
Issue #9356 has been updated by Shugo Maeda.
[#59517] [ruby-trunk - Bug #9357][Open] TracePoint's c_return traces return from call to 'trace' — "andhapp (Anuj Dutta)" <anuj@...>
[#59538] [ruby-trunk - Feature #9362][Assigned] Minimize cache misshit to gain optimal speed — "shyouhei (Shyouhei Urabe)" <shyouhei@...>
Hi, I noticed a trivial typo in array.c, and it fails building struct.c
Eric Wong <[email protected]> wrote:
Btw, I just pushed a few trivial fixes up (a few more failures below):
OK, last update of the night :o I think everything is good on 32-bit...
Eric Wong <[email protected]> wrote:
Btw, I started working on cachelined-time branch on git://80x24.org/ruby
Eric Wong <[email protected]> wrote:
On 01/06/2014 12:02 PM, Eric Wong wrote:
Urabe Shyouhei <[email protected]> wrote:
Intersting challenge.
On 01/06/2014 04:52 PM, SASADA Koichi wrote:
On 01/06/2014 06:11 PM, Urabe Shyouhei wrote:
(2014/01/06 23:10), Urabe Shyouhei wrote:
On 01/07/2014 07:36 AM, SASADA Koichi wrote:
[#59564] [ruby-trunk - Bug #9365][Open] Sporadic TypeError (wrong argument type Thread (expected VM/thread)) from IO#close (via Net:HTTP) — "ggiesemann (Geoffrey Giesemann)" <geoffwa@...>
Issue #9365 has been updated by Geoffrey Giesemann.
[#59728] Ruby 2.1.0 in Production: known bugs and patches — Aman Gupta <[email protected]>
Last week, we upgraded the github.com rails app to ruby 2.1.0 in production.
Hello Aman,
[#59770] bug report did not propagate to ruby-core — Mean Login <meanlogin@...>
https://bugs.ruby-lang.org/issues/9416
[#59791] About unmarshallable DRb objects life-time — Rodrigo Rosenfeld Rosas <rr.rosas@...>
A while ago I created a proof-of-concept that I intended to use in my
On 15 Jan 2014, at 11:58, Rodrigo Rosenfeld Rosas <[email protected]> =
Em 15-01-2014 19:42, Eric Hodel escreveu:
On 16 Jan 2014, at 02:15, Rodrigo Rosenfeld Rosas <[email protected]> =
Em 16-01-2014 19:43, Eric Hodel escreveu:
On 17 Jan 2014, at 04:22, Rodrigo Rosenfeld Rosas <[email protected]> =
Em 17-01-2014 19:53, Eric Hodel escreveu:
On 18 Jan 2014, at 15:12, Rodrigo Rosenfeld Rosas <[email protected]> =
Em 20-01-2014 21:51, Eric Hodel escreveu:
On 21 Jan 2014, at 02:01, Rodrigo Rosenfeld Rosas <[email protected]> =
Em 21-01-2014 19:36, Eric Hodel escreveu:
[#59807] [ruby-trunk - misc #9421] [Open] [PATCH] doc/contributing.rdoc: allow/encourage other git hosts — normalperson@...
Issue #9421 has been reported by Eric Wong.
[#59882] [ruby-trunk - Feature #9428] [Rejected] Inline argument expressions and re-assignment — matz@...
Issue #9428 has been updated by Yukihiro Matsumoto.
On 2014/01/20 11:32, [email protected] wrote:
[#59909] [ruby-trunk - Feature #9425] [PATCH] st: use power-of-two sizes to avoid slow modulo ops — shyouhei@...
Issue #9425 has been updated by Shyouhei Urabe.
[email protected] wrote:
[#60229] [ruby-trunk - Feature #9427] [Feedback] [PATCH] io.c: remove socket check for sendfile — akr@...
Issue #9427 has been updated by Akira Tanaka.
[#60377] Re: [ruby-cvs:51920] nobu:r44775 (trunk): socket.c: suppress warnings — Eric Wong <normalperson@...>
[email protected] wrote:
[ruby-core:60131] Re: [ruby-trunk - Bug #9424] ruby 1.9 & 2.x has insecure SSL/TLS client defaults
[email protected] wrote: > > Alright, I see you are not blaming Debian people. Thank you. > > But I see "I don't know what these lines of code in OpenSSL do, but Valgrind > complains." is a completely valid reason to fix something. In fact I have > just read the patch denbian introduced and still see no problem on it. So I > can't draw a line between #1 and #2. They are equally true. And the history > tells the patch was wrong; how can you say #2 is OK? To me, the difference hinges on the premise that the defaults function by selecting from a set of features which are intended to be enabled or disabled /by design/. For example, the first time my servers were scanned with tools like Nessus or OpenVAS, I received reports similar to the following: Your https is vulnerable due to old protocols and weak ciphers. Remove vulnerable Apache SSL defaults as follows: # enable SSLv3 and TLSv1, but not SSLv2 SSLProtocol all -SSLv2 # exclude weak ciphers SSLCipherSuite !EXPORT40:!EXPORT56:!LOW:!ADH:DHE-RSA-AES256-SHA:EDH-RSA-DES-CBC3-SHA:DHE-RSA-AES128-SHA:AES256-SHA:DES-CBC3-SHA:AES128-SHA:RC4-SHA This seems to me very different than if the report were to tell me instead: "Apply the following ad hoc patch to source code that affects the OpenSSL internals." Rather, the protocol list and cipher suite configuration seems intended to be customizable by design. > Recap. Ruby is not just requested to have a particular patch. Ruby is > requested to act as a sanity proxy over OpenSSL to prevent it from going mad. > Without any patch you CAN operate Ruby safely already, right? But you say > that's not sufficient. You request us to provide Ruby that you CANT fail. I believe my own position to be less extreme: I have not been arguing for a Ruby that can't fail; just a Ruby whose default configuration excludes already- known weak ciphers or protocol versions. However, since I'm not a security expert, my argument has been based on the assumption that information provided by tools like Nessus (and various security blogs) is correct. My presumption had been that customizing Ruby's OpenSSL defaults is something which could be accomplished in approximately as simple a manner as the Apache SSL customization above. (It sounds like this has mostly been true, apart from some difficulty arising from supporting older OpenSSL versions.) > Those patches proposed here SEEMS to provide adequate defaults to > OpenSSL and so what? I think that doesn't finish this story. Because no one > can say those patches are ultimate solutions. And the request here is for > us to provide ultimate solution for users. I'm not sure which posts have been advocating an ultimate solution? My understanding is that once specific protocol versions or ciphers have been identified by security experts as weak or exploitable, there's no plausible future in which this will cease to be true. So my reasoning is, if specific ciphers or protocol versions are known now to be weak, and will continue to be weak until the end of time, then it would seem to benefit Ruby users if these were disabled by default. (Of course, my viewpoint is the same should also be true for Apache users, but I've never joined any Apache development mailing lists.) Regards, Bill