[Info-vax] New OpenSSL update from HP
David Froble
davef at tsoft-inc.com
Sun Jun 14 23:33:47 EDT 2015
Stephen Hoffman wrote:
> On 2015-06-15 00:22:00 +0000, RobertsonEricW said:
>
>> On Sunday, June 14, 2015 at 7:47:10 PM UTC-4, Stephen Hoffman wrote:
>>> Then there's that more than a few folks don't really understand how
>>> certificates and DH and the rest work, and there's absolutely no
>>> integration with OpenVMS at present -- there are four different
>>> certificate stores commonly encountered, if not more. (CDSA,
>>> OpenSSL, ssh and sshd, Apache, and probably some others.)
>>
>> Yes. This multiplication of certificate stores needs to start being
>> constrained. This so that the maintenance of the software that uses,
>> stores, or originates certificates is simplified amongst all of the
>> various software that routinely perform these certificate operations.
>
> That, and to protect and manage the certificates. And to be integrated
> and much more transparently available throughout OpenVMS, preferably.
>
>> As you point out this particular problem is not OpenVMS specific.
>> Though, outside of OpenVMS, I am not aware of any other software of
>> recent vintage that uses CDSA for certificate processing, storage or
>> origination.
>
> CDSA was effectively abandoned a ~decade ago AFAICT.
>
>> So, at some point in the future of OpenVMS, CDSA will likely need to
>> be deprecated to consolidate the state of software on OpenVMS as well
>> as the software originated from the Open Source quarters.
>
> CDSA is already toast, AFAICT. The question becomes when it gets
> deprecated and retired and replaced, and by what. Which then leads to
> when the existing dependencies on CDSA in the customer and third-party
> code and within OpenVMS itself — with PCSI and VMSINSTAL amongst those,
> for the CDSA-based kit signatures — are resolved and reworked. This
> also ties back to my earlier comments around the fundamental
> incompatibility of upward compatibility while also making (some)
> (somewhat expeditious) forward progress with security and substantial
> new features. You cannot and should not disrupt APIs and interfaces
> arbitrarily or capriciously, but you can and will need to make some
> (incompatible) changes. Or you're stuck supporting and enhancing and
> documenting a decade-outdated and dead-end framework that likely doesn't
> really do all of what you really want, and that likely doesn't deal with
> current standards and expectations.
>
>
Is that a bit like the guy that would not look at a problem with modems,
because he didn't have a modem, or thought nobody still used modems?
:-)
More information about the Info-vax
mailing list