• A core developer of Nginx, the popular web server, has quit the project and started a fork called freenginx.
  • The developer cited disagreements with the new management at F5, which acquired Nginx Inc. in 2019, over security policies.
  • The dispute arose from the assigning of Common Vulnerabilities and Exposures (CVEs) to bugs in the experimental HTTP/3 code.

Archive link: https://archive.ph/U4XRN

  • just_another_person@lemmy.world
    link
    fedilink
    English
    arrow-up
    25
    ·
    10 months ago

    I believe what this is saying is that management decided to only fix CVEs in certain versions going forward, instead of older versions. It’s hard to tell for sure.

    • JakenVeina@lemm.ee
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      3
      ·
      10 months ago

      There was another article I read that had a snippet from F5. As I read it, their concern was that they have two release tracks: the paid/subscription track, and the free track. They are actually the same code, but the free track is just 2 releases behind, so the idea is that if you want the “latest and greatest” stuff, you gotta pay. It’s a fairly common strategy in the industry.

      So, the concern is that for security vulnerabilities that are not CVEs, info about the vulnerability (and how to exploit it) is out in the wild for two whole releases, before the patch reaches the free-tier users.

      Seems like an actively good position on F5’s part, from this angle.

      • just_another_person@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        10 months ago

        Not particularly when you consider it is standard practice to NOT be charging for CVE and emergency for released products from similar companies. Hell, even RedHat pushed upstream and downstream packages to CentOS if they were the first to patch. Happens with Canonical and the Debian team as well. This engineer saw what F5 was doing, thought it was wrong, and bailed. Seems like a valid response to me.

      • neclimdul@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 months ago

        Thanks for that.

        Its a weird that the couldn’t just choose to back port the fixes that have security implications even if it wouldn’t deserve a cve.

      • lemmyingly@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 months ago

        What’s considered as a release in the nginx world?

        Any minor update or just the major updates?

        Eg. 1.25.4 was recently released. 4 months prior was 1.25.3. 2 months prior to that it was 1.25.2. etc