On 10/15/2018 01:25 PM, William A Rowe Jr wrote:
On Sun, Oct 14, 2018 at 4:38 PM Dennis Clarke <dcla...@blastwave.org <mailto:dcla...@blastwave.org>> wrote:


    As a red herring that illustrates how oddball the situation could get :

    $ /usr/sfw/bin/openssl version 2>&1 | cut -f1 -d\(
    OpenSSL 0.9.7d 17 Mar 2004
    [...]
    Segmentation Fault(coredump)


I think we can safely ignore OpenSSL 0.9.7 as the final release was over 11 years ago.

Like I was saying it is a red^H^H^Hdead herring :-\

The 0.9.8 will only be encountered on rusting RHEL 5 (mainstream EOL a year ago in spring) and similarly ancient installations across other os/architectures.

*nod*

1.0.0 only saw the light of day in broad adoption via SLES 11 (mainstream EOL spring next year).

The Oracle folks pushed out 1.0.2 onto legacy Solaris a while ago :

$ which openssl
/usr/bin/openssl
$ /usr/bin/openssl version
OpenSSL 1.0.2n  7 Dec 2017


> There are a good number of 1.0.1 installations lingering around...

tons.

> Breaking 1.0.1 support would seem unwise

A disaster is what I am thinking.

> but we probably should start
> ignoring 0.9.8 and 1.0.0 for all practical purposes.

Anything pre 1.x.y should be considered rust.

Dennis

Reply via email to