-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/06/12 13:41, Samuli Seppänen wrote:
> 
>> Hi,
>> 
>> On Thu, Jun 07, 2012 at 11:48:37AM +0200, Paul Bakker wrote:
>>> Agreed as well..
>> So what...?  1.1.4 or "1.1.0, and put the responsibility on the
>> distro"?
>> 
> I think this question is related to our project policies, not just
> to PolarSSL support. Do we want to try to protect packagers and
> those building from source from security issues by trying to force
> them to use latest libraries? In practice, some OS/distro packagers
> (e.g. for Debian stable) would have to circumvent our version
> checks due their own project policies.

I probably lean more towards what Alon said earlier in this thread.
We should bother about APIs not which security level/issues each
version have.  Otherwise, we make life miserable for package
maintainers, where they might often backport security fixes without
altering the major/minor version number - which Adriaan also said.

In RHEL the packages are stabilised on a specific version and only
bugfixes and security fixes are backported and only exceptionally
features are backported.  And even more seldom a package rebase
happens.  And then to need to circumvent such version restrictions
when building openvpn, actually makes things harder for users.


kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk/QnKAACgkQDC186MBRfrqadgCfUTrnypxWo56F6W/NmmexSG/z
Ma8An1ZWD4seXjE/f65+NRFUjjXcpEzQ
=vRpM
-----END PGP SIGNATURE-----

Reply via email to