On 15/02/15 16:00, Arne Schwabe wrote:
> On 15.02.2015 15:24, Steffan Karger wrote:
>> As reported in trac #502, SSL compression can cause problems in some corner
>> cases.  OpenVPN does not need SSL compression, since the control channel is
>> low bandwidth.  This does not influence the data channel compressen (i.e.
>> --comp or --comp-lzo).
>>
>> Even though this has not yet been relevant for OpenVPN (since an attacker
>> can not easily control contents of control channel messages), SSL
>> compression has been used in the CRIME and BREACH attacks on TLS.  TLS 1.3
>> will probably even remove support for compression all together, for
>> exactly this reason.
>>
>> Since we don't need it, and SSL compression causes issues, let's just
>> disable it in OpenSSL builds.  PolarSSL has no run-time flag to disable
>> compression, but is by default compiled without compression.
>>
> ACK from me. Sounds sensible to me. If do not support 0.9.8 anymore (in
> -master perhaps?) I would like this to be commited without ifdef.

We've agreed to support RHEL5 until it goes EOL, which is March 31,
2017. [1]  As RHEL5 is on 0.9.8 we need to support it.  RHEL6 is on
1.0.1, so we'll have something to look forward too ;-)


[1] There is also an additional "extended life cycle" which RHEL
    customers may opt-in for (for an additional fee), which I don't
    think we should relate too.
    <https://access.redhat.com/support/policy/updates/errata>


-- 
kind regards,

David Sommerseth

Reply via email to