[Info-vax] OpenSSL CSWS-2.2-1
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Sat Apr 6 21:58:38 EDT 2019
On 2019-04-07 00:17:43 +0000, Robert A. Brooks said:
> On 4/6/2019 6:54 PM, terry-groups at glaver.org wrote:
>> On Saturday, April 6, 2019 at 1:24:05 PM UTC-4, Stephen Hoffman wrote:
>>> The current OpenVMS CSWS version is based on Apache HTTP Server V2.4-38.
>>
>> Is it really that up-to-date? I'd be amazed.
Be amazed, then.
>> A Google search for "OpenVMS CSWS" leads me to
>> https://support.hpe.com/hpsc/doc/public/display?docId=a00058394en_us
>> which says it is based on Apache 2.0.65, and took apparently nearly a
>> year and a half (based on June 2013 release date from the Apache
>> Foundation and an October 2014 date on the HP release notes).
HPE have less than two years' new-patch support announced, and they're
clearly working toward their long-announced exit from the OpenVMS
business.
> We (VSI) have a much more current version of Apache, although I'd be
> hard-pressed to tell you what that is. I suspect the version that
> Steve referred to is ours.
The referenced Apache version is from VSI.
Again, HPE is exiting the OpenVMS business.
If you're planning to stay with OpenVMS and want current versions and
support, you'll want to migrate your licenses and support and versions
to VSI.
>> 2) Assigning (apparently) arbitrary version numbers instead of using
>> the upstream version number (possibly with a suffix like "-VMS1",
>> "-VMS2", etc. if multiple VMS releases against the same upstream
>> version are needed (which shouldn't happen if the upstream releases are
>> being tracked regularly).
>
> In general, I didn't think we are doing that, although the "-Q" above
> confuses me. Then again, I know very little about our open source work.
Version-numbering has been confusing with vendor-provided ports for a
while, yes. VSI has been using the upstream open source version
numbers, to their credit.
VSI is unfortunately sticking with the absurd product names though, but
then acronyms and obfuscations are the OpenVMS way. We can't have
something cleverly called "webserver", after all. Much too obvious.
Requirements around the possession of arcane or obscure knowledge—like
what SWS or CSWS translates into—is part of the membership in the
OpenVMS club. Plain names and clear descriptions? Those are just not
permitted. So we have CSWS, which everybody obviously knows is a web
server.
>> 3) Producing incompatible releases of various upstream packages that
>> are supposed to work together. I've read many posts where people say
>> that package A requires OpenSSL X, but package B requires OpenSSL Y
>> which has a different API than OpenSSL X.
>
> I do know that we are pretty good at documenting requirements and
> restrictions, and ensuring that they are accurate.
This is a restriction of the upstream in the case of the OpenSSL APIs,
and the upstream OpenSSL releases are themselves not completely
compatible.
The then-HP SSL V1.3 to SSL V1.4 change—why that wasn't labeled a "2.0"
release?—required app rebuilds and potentially app source code changes.
To address that incompatibility when it next arose, then-HP tried to
make this stuff independent with the SSL1 kit in addition to the
existing SSL kit, but didn't quite complete the design.
VSI has moved to allow multiple installed versions in parallel with
their latest V8.4-2L1 and V8.4-2L2 releases, which will ease the
migrations.
We're headed for another OpenSSL update and likely later this year, as
the OpenSSL security patches are ending for the current series. We'll
see a version based on 1.1.1, and then 3.0.0 as that arrives.
OpenSSL 3.0.0 will be the first release with an Apache 2 license, too.
This particular mess is also why I've commented around the lack of an
API for OpenVMS that masks these differences and that makes creating a
secure network connection rather less of a project than is currently
involved. I've pointed to Secure Transport and similar approaches as
one of various examples from other platforms that have sought to reduce
or to isolate SSL-level differences from the application developers.
Alternatives to OpenSSL include NaCl and libtls, among others.
Then there's the discussion of why any of Apache and OpenSSL is
separate from the OpenVMS distribution, and not integrated. Having
worked with server platforms with integrated networking and network
services, the OpenVMS approach is just a hassle. When it works.
And there's the discussion about VSI marketing.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list