OpenSSL STATUS Last modified at
- ______________ $Date: 1999/08/05 11:50:09 $
+ ______________ $Date: 2002/11/21 22:39:08 $
DEVELOPMENT STATE
- o OpenSSL 0.9.4: Under development...
- Proposed code freeze: August, 2nd 1999
- Proposed release date: August, 9th 1999
-
- o OpenSSL 0.9.3a: Released on May 29th, 1999
- o OpenSSL 0.9.3: Released on May 25th, 1999
- o OpenSSL 0.9.2b: Released on March 22th, 1999
- o OpenSSL 0.9.1c: Released on December 23th, 1998
+ o OpenSSL 0.9.8: Under development...
+ o OpenSSL 0.9.7-beta4: Released on November 19th, 2002
+ Debian GNU/Linux (kernel version 2.4.19, gcc 2.95.4) - PASSED
+ o OpenSSL 0.9.7-beta3: Released on July 30th, 2002
+ o OpenSSL 0.9.7-beta2: Released on June 16th, 2002
+ o OpenSSL 0.9.7-beta1: Released on June 1st, 2002
+ o OpenSSL 0.9.6g: Released on August 9th, 2002
+ o OpenSSL 0.9.6f: Released on August 8th, 2002
+ o OpenSSL 0.9.6e: Released on July 30th, 2002
+ o OpenSSL 0.9.6d: Released on May 9th, 2002
+ o OpenSSL 0.9.6c: Released on December 21st, 2001
+ o OpenSSL 0.9.6b: Released on July 9th, 2001
+ o OpenSSL 0.9.6a: Released on April 5th, 2001
+ o OpenSSL 0.9.6: Released on September 24th, 2000
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
+ o OpenSSL 0.9.3a: Released on May 29th, 1999
+ o OpenSSL 0.9.3: Released on May 25th, 1999
+ o OpenSSL 0.9.2b: Released on March 22th, 1999
+ o OpenSSL 0.9.1c: Released on December 23th, 1998
+
+ [See also http://www.openssl.org/support/rt2.html]
RELEASE SHOWSTOPPERS
- o internal_verify doesn't know about X509.v3 (basicConstraints
- CA flag ...)
+ o BN_mod_mul verification fails for mips3-sgi-irix
+ unless configured with no-asm
+
+ o [2002-11-21]
+ PR 343 mentions that scrubbing memory with 'memset(ptr, 0, n)' may
+ be optimized away in modern compilers. This is definitely not good
+ and needs to be fixed immediately. The formula to use is presented
+ in:
+
+ http://online.securityfocus.com/archive/82/297918/2002-10-27/2002-11-02/0
+
+ The problem report that mentions this is:
+
+ https://www.aet.TU-Cottbus.DE/rt2/Ticket/Display.html?id=343
AVAILABLE PATCHES
- o OCSP (titchenert@certco.com)
- o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
+ o
IN PROGRESS
o Steve is currently working on (in no particular order):
- Proper (or at least usable) certificate chain verification.
+ ASN1 code redesign, butchery, replacement.
+ OCSP
+ EVP cipher enhancement.
+ Enhanced certificate chain verification.
Private key, certificate and CRL API and implementation.
- Checking and bugfixing PKCS#7 (S/MIME code).
-
- o Mark is currently working on:
- Folding in any changes that are in the C2Net code base that were
- not in the original SSLeay-0.9.1.b release. Plus other minor
- tidying.
-
- o Ralf is currently working on:
- 1. Support for SSL_set_default_verify_paths(),
- SSL_load_verify_locations(), SSL_get_cert_store() and
- SSL_set_cert_store() functions which work like their existing
- SSL_CTX_xxx() variants but on a per connection basis. That's needed
- to let us provide full-featured per-URL client verification in
- mod_ssl or Apache-SSL.
- => It still dumps core, so I suspend this and investigate
- again for OpenSSL 0.9.3.
- 2. The perl/ stuff to make it really work the first time ;-)
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 3. The new documentation set in POD format under doc/
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 4. More cleanups to get rid of obsolete/old/ugly files in the
- source tree which are not really needed.
- => Done all which were possible with my personal knowledge
-
- o Ben is currently working on:
- 1. Function Prototype Thought Police issues.
- 2. Integrated documentation.
- 3. New TLS Ciphersuites.
- 4. Anything else that takes his fancy.
+ Developing and bugfixing PKCS#7 (S/MIME code).
+ Various X509 issues: character sets, certificate request extensions.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UI (User Interface)
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Shared library support for VMS.
+ Kerberos 5 authentication
+ Constification
+ OCSP
NEEDS PATCH
- o salzr@certco.com (Rich Salz): Bug in X509_name_print
- <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
- o $(PERL) in */Makefile.ssl
- o "Sign the certificate?" - "n" creates empty certificate file
+ o 0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not
+ handle ECCdraft cipher suites correctly.
+
+ o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
+
+ o "OpenSSL STATUS" is never up-to-date.
OPEN ISSUES
compiler PIC and linker DSO flags from Apache
into the OpenSSL Configure script.
- o The perl/ stuff needs a major overhaul. Currently it's
- totally obsolete. Either we clean it up and enhance it to be up-to-date
- with the C code or we also could replace it with the really nice
- Net::SSLeay package we can find under
- http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a
- longer time and it works fine and is a nice Perl module. Best would be
- to convince the author to work for the OpenSSL project and create a
- Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
- us.
-
- Status: Ralf thinks we should both contact the author of Net::SSLeay
- and look how much effort it is to bring Eric's perl/ stuff up
- to date.
- Paul +1
-
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
-
- o Properly initialize the PRNG in the absence of /dev/random.
-
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
+ Ulf: +1 for using GNU autoconf and libtool (but not automake,
+ which apparently is not flexible enough to generate
+ libcrypto)
WISHES
- o
+ o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
+ where the callback function can request that the function be aborted.
+ [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
+
+ o SRP in TLS.
+ [wished by:
+ Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
+ Tom Holroyd <tomh@po.crl.go.jp>]
+
+ See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
+ as well as http://www-cs-students.stanford.edu/~tjw/srp/.
+
+ Tom Holroyd tells us there is a SRP patch for OpenSSH at
+ http://members.tripod.com/professor_tom/archives/, that could
+ be useful.