On Tue, 2024-08-06 at 05:02 -0400, Neil Horman wrote:

> The current proposal under consideration is to explicitly disable TLS
> 1.0/1.1 at build time, in our 4.0 release (tentatively scheduled to
> release in the next 12-18 months), with an eye to completely remove
> the impacted code in a future major release.  The default
> configuration could be overridden to re-enable TLS 1.0/1.1 at build
> time.
> 
> Questions to the community are:
> 
> 1) Are distributions/users comfortable with this approach in the time
> frame proposed?

I lead a quite unusual application (BMC Discovery), which is an IT
discovery tool. Its purpose is to connect to everything it can in an IT
environment and interrogate it, to find out what it is, and what it is
doing.

We would all agree that everything ought to be using modern TLS
versions and encryption algorithms, but the reality is that we
encounter many ancient systems that are using old protocols. It is
important to us that we can connect to things even if they are now
considered insecure, not least because that way we can report that they
_are_ old and insecure.

Obviously this is quite an unusual use of OpenSSL, but I think it is a
good use case for retaining these old algorithms for as long as
possible, even if they are disabled by default. If new OpenSSL versions
drop support for older protocols, we will have to start using multiple
versions, so we can use old OpenSSL versions for old discovery targets.

Regards,

Duncan Grisby.

-- 
Duncan Grisby <dun...@grisby.org>

Reply via email to