OpenSSL STATUS Last modified at
- ______________ $Date: 2000/04/01 12:32:10 $
+ ______________ $Date: 2002/02/20 14:07:07 $
DEVELOPMENT STATE
- o OpenSSL 0.9.6: Under development...
- o OpenSSL 0.9.5a: Released on April 1st, 2000
- o OpenSSL 0.9.5: Released on February 28th, 2000
- o OpenSSL 0.9.4: Released on August 09th, 1999
- o OpenSSL 0.9.3a: Released on May 29th, 1999
- o OpenSSL 0.9.3: Released on May 25th, 1999
- o OpenSSL 0.9.2b: Released on March 22th, 1999
- o OpenSSL 0.9.1c: Released on December 23th, 1998
+ o OpenSSL 0.9.7: Under development...
+ o OpenSSL 0.9.6c: Released on December 21st, 2001
+ o OpenSSL 0.9.6b: Released on July 9th, 2001
+ o OpenSSL 0.9.6a: Released on April 5th, 2001
+ o OpenSSL 0.9.6: Released on September 24th, 2000
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
+ o OpenSSL 0.9.3a: Released on May 29th, 1999
+ o OpenSSL 0.9.3: Released on May 25th, 1999
+ o OpenSSL 0.9.2b: Released on March 22th, 1999
+ o OpenSSL 0.9.1c: Released on December 23th, 1998
RELEASE SHOWSTOPPERS
+ o BIGNUM library failures on 64-bit platforms (0.9.7-dev):
+ - BN_mod_mul verificiation (bc) fails for solaris64-sparcv9-cc
+
+ Checked on Result
+ alpha-cc (Tru64 version 4.0) works
+ linux-alpha+bwx-gcc doesn't work. Reported by
+ Sean O'Riordain <seanpor@acm.org>
+
+ Needs checked on
+ [add platforms here]
+
AVAILABLE PATCHES
- o CA.pl patch (Damien Miller)
+ o
IN PROGRESS
o Steve is currently working on (in no particular order):
- Proper (or at least usable) certificate chain verification.
+ ASN1 code redesign, butchery, replacement.
+ OCSP
+ EVP cipher enhancement.
+ Enhanced certificate chain verification.
Private key, certificate and CRL API and implementation.
Developing and bugfixing PKCS#7 (S/MIME code).
Various X509 issues: character sets, certificate request extensions.
- Documentation for the openssl utility.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UI (User Interface)
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Shared library support for VMS.
+ Kerberos 5 authentication
+ Constification
+ OCSP
NEEDS PATCH
- o non-blocking socket on AIX
- o $(PERL) in */Makefile.ssl
- o "Sign the certificate?" - "n" creates empty certificate file
+ o An (optional) countermeasure against the predictable-IV CBC
+ weakness in SSL/TLS should be added; see
+ http://www.openssl.org/~bodo/tls-cbc.txt
- OPEN ISSUES
+ o All 'openssl' subprograms taking '-des' and '-des3' options should
+ include AES support (0.9.7-dev)
+
+ o 'openssl speed' should include AES support (0.9.7-dev)
+
+ o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
- o internal_verify doesn't know about X509.v3 (basicConstraints
- CA flag ...)
+ o Whenever strncpy is used, make sure the resulting string is NULL-terminated
+ or an error is reported
+
+ o "OpenSSL STATUS" is never up-to-date.
+
+ OPEN ISSUES
o The Makefile hierarchy and build mechanism is still not a round thing:
to date.
Paul +1
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
+ WISHES
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
+ o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
+ where the callback function can request that the function be aborted.
+ [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
- WISHES
+ o SRP in TLS.
+ [wished by:
+ Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
+ Tom Holroyd <tomh@po.crl.go.jp>]
- o
+ See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
+ as well as http://www-cs-students.stanford.edu/~tjw/srp/.
+
+ Tom Holroyd tells us there is a SRP patch for OpenSSH at
+ http://members.tripod.com/professor_tom/archives/, that could
+ be useful.