On 31/05/17 17:48, Simon Matter wrote:
[...snip...]
>>
>> Do you depend on building against OpenSSL 0.9.8?  If so, which
>> OS/distribution do you use?
> 
> Yes, I have a case with very customized CentOS 5 systems where we also
> backport security related patches. 

Well, officially we no longer support RHEL 5 or older as of v2.4.
AFAIR, we even agreed late last year when getting ready for the 2.4
release that we won't intentionally break 2.4 builds on unsupported
distros but we will not bother supporting it when we want to move forward.

It is good you take care of backporting security related patches.  But
wanting the OpenVPN community to maintain new OpenVPN releases buildable
on those old distros is effectively shifting that responsibility over to
the OpenVPN community.

Had the v2.5 release been in the pipe for the next 6-7 months or so,
then I would be more easily persuaded to let v2.4 keep support for
openssl-0.9.8 around.   But the reality is that we don't currently have
a release plan for v2.5.

> Of course the same could be done for openvpn but it's easier to just
> follow the current 2.4 stream. 
Right, having others doing your work is always the easiest path for
yourself ;-)

> That's why my suggestion to keep all the compat hacks in 2.4.x and
> kick them out only in the main devel branch.

Which is really speaking against what was the agreement when the 2.4
release started to take shape late last year.

But AFAIR, there also exists compat-openssl10 in RHEL5.  Which could
resolve this issue for you.

> I guess that's what most package maintainers expect to happen and
> it keep mailing lists quiet

Most package maintainers wants to have as little work as possible while
providing the latest and greatest to their users.  But how that is
achieved is primarily the package maintainer's responsibility.

We as a the upstream project will strive to make life as easy as
possible for package maintainers, but not at any cost.

I further encourage you to read chapter 6.9 in the Quarklabs security
audit [1].  Their recommendation is:

    "We thus recommend suppressing these workarounds and to return an
     error during compile time if the OpenSSL version is too old. Only
     versions 1.0.2 and further should be satisfactory."

Also have in mind that this audit is performed against the v2.4 code base.

So when we're having 1.0.1e as the oldest supported OpenSSL version (as
that is what RHEL6 and RHEL7 ships and gets security fixes), I think
that enforcing v2.4 to comply to this strengthens the overall security
in OpenVPN.

If package maintainers want to run OpenVPN v2.4 on older OS/distro
releases with older OpenSSL libraries, then that is their own decision
and they need to take care of the additional work themselves.  Insisting
on upstream OpenVPN developers to make package maintainer's life easy
and disregarding recommendations from security auditors at the same time
is at best a fairly ignorant attitude.

And in practicality, package maintainers will then need to revert the
two commits which removes support for older OpenSSL versions.


[1] <https://ostif.org/wp-content/uploads/2017/05/OpenVPN1.2final.pdf>


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to