[Info-vax] OpenSSL CSWS-2.2-1
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Wed Jun 5 23:07:36 EDT 2019
On 2019-06-05 05:37:05 +0000, Dave Froble said:
> You're missing the point. If a significant part of some companies
> business is with a trading partner who will not upgrade their SSL
> capabilities, and you have no way to get them to change, then, you do
> what you have to do to stay in business.
>
> Most of your arguments are good, but, when the alternatives are "stay
> in business" or "go out of business", the choice is easy, at least for
> me.
These companies that are both buying support and that are rolling out
OpenVMS and layered product upgrades, but that are also not
particularly maintaining their own code? That's not going to be a
growing market. Or one with much funding.
Given: OpenSSL isn't going to stop tweaking APIs with future releases.
Other products and other APIs will have similar issues, such as with
requiring particular and longer certificates.
Let those companies stay on older OpenVMS releases for the duration of
some hypothetical long-term-support LTS-style support offering. And
specifically with an old OpenSSL, these companies can't fix a flunked
audit without some app-level work, which means they're already well on
their way to maintenance or to outsourcing or to gone, or well on their
way to eventually flunking some audit or some review, and then funding
an upgrade or a port. Let these companies then figure out how to link
their own OpenSSL port. Or let these companies pay more for the older
OpenSSL. Either of these on the off chance these companies decide to
fund an upgrade or a port.
Preferably, give the folks a networking API that allows us to expunge
our pages and pages of existing IPv4 and IPv6 and DNS and TLS and
certificate-related code, as a path for folks needing SSL upgrades, and
as a foundation for new apps and for porting. And for better
capabilities and security. This also makes future software upgrades
somewhat easier, but there's a cost here to both VSI and to end-users.
Catering to the past at the expense of the present and of the future is
what got OpenVMS where it is now. I really don't think continuing
these practices can get OpenVMS where VSI and most of us want it to be,
either.
The economics have changed markedly over the years, the tech has
changed, the treadmill of upgrades is only going to accelerate, and VSI
and VSI customers are operating with fewer folks and smaller budgets.
VSI can't be everything for all. Not without a bigger and more vibrant
installed base. And how does VSI get to that? It won't be with
perpetual support of OpenSSL 0.9.8.7.6.5.4xyzzy.
Total upward-compatibility is an impossible dream. It trains folks to
dig in, and to want what is impossible. Some customer app code is
inevitably going to have to be tweaked. That's the world we're in. We
can't fit thirty-two bytes in an eight-byte buffer. Not without code
changes. Or you're not upgrading. Or the rest of us are losing out on
fixes and updates for the apps we are maintaining.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list