[Info-vax] OpenSSL CSWS-2.2-1
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Jun 3 12:13:31 EDT 2019
On 2019-05-30 18:47:12 +0000, Craig A. Berry said:
> Oh well, I tried. They just released it and the product name is
> indeedSSL111. So eventually we'll be going cross-eyed over things like
> version V1.1-2C of a product named SSL111.
...
> I'm revising this advice slightly (not that it's any more likely to be
> followed than my advice above) based on the fact that beginning with
> OpenSSL 3.0.0, all versions sharing a major version number will be
> binary compatible. So a product name of SSL03 would be sufficient for
> everything in the 3.x.x series.
Multiple parallel kits works better when the goal is to minimal changes
with some possibility of coexistence and incremental migration. This
is what I've previously suggested, too.
But I've rethought what I was suggesting here a while back, too. Ship
a TLS patch kit with all of the latest of the currently-supported TLS
versions—the two or three or whatever that are actively seeing OpenSSL
patches—and that removes the unsupported versions, and whatever
TLS-related changes are needed in the OpenVMS-specific TLS framework
that abstracts the changes in the OpenSSL APIs.
This as part of integrating IP networking and security, integrate
certificates, replacing and deprecating CDSA, etc. And part of keeping
that security current, particularly since OpenVMS claims to be "the
most secure operating system on the planet".
An omnibus kit that also deprecates and eventually removes the
unsupported OpenSSL releases will cause some grief for some app
developers and some sites. The TLS API provides a path for some of
those to migrate, and better handling around encryption, and around
writing a network server without having to deal (as much) with IPv4 and
IPv6 and certificates and DNS and the rest. The rest of the folks want
or need to be insecure and down-revision and for whatever reason, and
can find and integrate their own OpenSSL kits.
Down-revision and backward-compatibility? I really don't care why
those of y'all want or need to run down-revision and variously fossil
software, y'all have your reasons. I've heard most of those reasons
too, and you're probably not special. Whether you've accepted or
ignored or mitigated the associated risks, your down-revision needs
should not degrade the security of the rest of the folks and of those
developers that are keeping apps current. There's no transparent
upgrade path here short of the addition of a TLS API, and there'll be
folks that can't or won't upgrade to and migrate to that, and for
whatever reason. We're on a treadmill of upgrades, whether any of us
wants to be. But I digress.
This all assumes there's to be more of an investment in security and of
keeping SSL current, and around adding (better) support for calls from
the descriptor-oriented programming languages. Otherwise, we get what
we have: parallel OpenSSL kits for three and potentially more releases.
In a yet better world, OpenVMS logs first-use and then periodic
(monthly?) message about apps using deprecated and insecure APIs, too.
There are a number of folks that just don't know or don't realize
they're using insecure constructs.
But....
If the associated investment around security is to continue to be
delegated to the apps and the ISVs as is currently the case, then
parallel kits. Craig's proposed naming seems reasonable for that.
Though this current approach is going to be yet another round of
permutations and complexity; of kicking the costs to the system
administration ("manager") and to the ISVs and developers.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list