Although OpenSSL is in the base, it is not used in any third party software and vulnerable code therefore almost never used in practice.
# pkg required-depends opensslfreeradius3-3.0.23_1libfido2-1.8.0squid-4.15mysql57-client-5.7.35_1opnsense-update-21.7.1php74-openssl-7.4.22_1unbound-1.13.1openldap-client-2.4.59_1cyrus-sasl-gssapi-2.1.27_1cyrus-sasl-2.1.27_2krb5-1.19.2nmap-7.91_1git-2.32.0_1hostapd-2.9_4iperf3-3.10.1_1isc-dhcp44-server-4.4.2P1_1lighttpd-1.4.59monit-5.28.0mpd5-5.9ntp-4.2.8p15openssh-portable-8.6.p1,1openvpn-2.5.3ruby-2.7.4,1strongswan-5.9.2_2syslog-ng-3.33.2wpa_supplicant-2.9_11cpdup-1.22ldns-1.7.1_2curl-7.78.0libevent-2.1.12py38-cryptography-3.3.2python38-3.8.11
# sockstat -l | fgrep :443root lighttpd 85837 5 tcp4 *:443 *:*root lighttpd 85837 6 tcp6 *:443 *:*
# ldd /usr/local/lib/lighttpd/mod_openssl.so/usr/local/lib/lighttpd/mod_openssl.so: libssl.so.11 => /usr/local/lib/libssl.so.11 (0x5e143c01000) libcrypto.so.11 => /usr/local/lib/libcrypto.so.11 (0x5e143ca2000) libc.so.7 => /lib/libc.so.7 (0x5e103126000) libthr.so.3 => /lib/libthr.so.3 (0x5e1030ba000)
I beg your pardon, but is that really so?
Franco literally said in his earlier post that “all the current reports should be fixed in 21.7.2”. So precisely what point are you trying to make now? Seems to me that you entirely misread his earlier post, and your “gotcha” attempts have misfired on all fronts
So, IMHO, there should be neither soothing nor misleading messages about the problem, but a quick fix (tm), which Franco is doing right now.
P.S.: Your friend really shouldn't make an IPMI public
Franco’s post was not in my view meant to be “soothing” (if that is meant to imply a deflection of the issue) and it certainly was not misleading. He answered the specific question about how OpenSSL was incorporated in OPNsense, and then said that the latest advisories would be addressed in the next release. You are throwing undeserved shade