--  
Principal Security Engineer, Akamai Technologies
IM: rs...@jabber.me Twitter: RichSalz


> You are almost certainly far better qualified to make this decision than most
> administrators.

Not sure who the "you" is.  Me, openssl, or the original poster :)

> Nevertheless, if upgrading OpenSSL from version X to version
> Y causes a ciphersuite (or TLS version) to be dropped into VULNERABLE,
> there are going to be angry phone calls from users whose browser or
> application has stopped working. It is the administrator who is going to get
> those phone calls, not you

I am more concerned about the case where a common crypto type is broken, and 
zillions (a technical term :) of websites are now at-risk because there wasn't 
an immediate OpenSSL update that added the broken crypto  to the VULNERABLE 
list, and everyone didn't update immediately.

Policy and configuration should be on a separate, arguably faster, distribution 
pattern than code.   Which is why I favor a "profile" mechanism in openssl.conf 
and not hardwired magic keywords embedded in code.

> So there’s bettercrypto.org and there’s Qualys and there’s this BCP
> document that the UTA working group at the IETF is writing

Perhaps modesty prevented you from posting the link, but it won't stop me 
(we're both in the acknowledgements section :)
        https://tools.ietf.org/html/draft-ietf-uta-tls-bcp-07


_______________________________________________
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev

Reply via email to