> On 16 November 2015 at 19:05, Hubert Kario <hka...@redhat.com> wrote:
>> Example: CAdES V1.2.2 was published in late 2000, the first serious
>> attacks on MD2 were not published until 2004. I think it is not
>> unreasonable for CAdES-A documents to exist today which were originally
>> signed with MD2 while it was still considered secure and that are still
>> relevant today, just 15 years later.
> 
> ​This doesn't explain why the code needs to exist in future versions of
> openssl. The previous ones aren't going to vanish and can be compiled and used
> to rescue data in theoretical edge cases like this. You're making it sound
> like this is making the data totally inaccessible which is not the case.

Of course people can keep the current OpenSSL version indefinitely – and if
the maintainers are too aggressive, it might just happen.

But the vast majority of the uses would like to upgrade to new releases with
hopefully more bugs fixed and fewer bugs introduced – and maintain their
current functionality. Because if the new version stops decrypting their
documents, who needs it?

Several people pointed out: SSL/TLS is where the algorithm agility is, where
the exploits are, and what needs to be pruned. So remove the dead wood from
libssl. Leave libcrypto alone – it is useful as-is, and real-life big
packages (like Perl) depend on it providing all the services it currently
offers. Don’t punish users for choosing OpenSSL library to handle their
non-SSL cryptographic needs and implicitly trusting the developers that they
won’t be left in the cold.


Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to