OpenSSL STATUS Last modified at
- ______________ $Date: 1999/05/18 08:52:01 $
+ ______________ $Date: 2003/02/28 15:17:45 $
DEVELOPMENT STATE
- o OpenSSL 0.9.3: Freezed... only bugfixes and cleanups allowed!
- Proposed release date: Mon May 24th, 1999
- Release manager: Ben Laurie <ben@openssl.org>
- !! Important: Any non-bugfix, non-cleanup
- !! and non-documentation commits should
- !! be approved by Ben, first.
-
- o OpenSSL 0.9.2b: Released on March 22th, 1999
- o OpenSSL 0.9.1c: Released on December 23th, 1998
-
- [ Proposed new numbering scheme: <major>.<minor>[<patchlevel>]
- 0.9.1c is 0913
- 1.0 is 010000
- 1.0 a is 010001
- 1.8 z is 01081a ]
+ o OpenSSL 0.9.8: Under development...
+ o OpenSSL 0.9.7a: Released on February 19th, 2003
+ o OpenSSL 0.9.7: Released on December 31st, 2002
+ o OpenSSL 0.9.6i: Released on February 19th, 2003
+ o OpenSSL 0.9.6h: Released on December 5th, 2002
+ o OpenSSL 0.9.6g: Released on August 9th, 2002
+ o OpenSSL 0.9.6f: Released on August 8th, 2002
+ o OpenSSL 0.9.6e: Released on July 30th, 2002
+ o OpenSSL 0.9.6d: Released on May 9th, 2002
+ o OpenSSL 0.9.6c: Released on December 21st, 2001
+ o OpenSSL 0.9.6b: Released on July 9th, 2001
+ o OpenSSL 0.9.6a: Released on April 5th, 2001
+ o OpenSSL 0.9.6: Released on September 24th, 2000
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
+ o OpenSSL 0.9.3a: Released on May 29th, 1999
+ o OpenSSL 0.9.3: Released on May 25th, 1999
+ o OpenSSL 0.9.2b: Released on March 22th, 1999
+ o OpenSSL 0.9.1c: Released on December 23th, 1998
+
+ [See also http://www.openssl.org/support/rt2.html]
RELEASE SHOWSTOPPERS
- o BSD/OS: assembler functions must not have leading underscores
- o exptest and rsa_oaep_test fail with irix64-*
- (Don Badrak <dbadrak@geo.census.gov>: "Re: Problems to compile openssl
- on IRIX 6.2", openssl-users)
+ o
AVAILABLE PATCHES
- o OCSP (titchenert@certco.com)
- o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
+ o
IN PROGRESS
o Steve is currently working on (in no particular order):
- Proper (or at least usable) certificate chain verification.
- Documentation on X509 V3 extension code.
- PKCS #8 and PKCS#5 v2.0 support.
+ ASN1 code redesign, butchery, replacement.
+ OCSP
+ EVP cipher enhancement.
+ Enhanced certificate chain verification.
Private key, certificate and CRL API and implementation.
- Checking and bugfixing PKCS#7 (S/MIME code).
-
- o Mark is currently working on:
- Folding in any changes that are in the C2Net code base that were
- not in the original SSLeay-0.9.1.b release. Plus other minor
- tidying.
-
- o Ralf is currently working on:
- 1. Support for SSL_set_default_verify_paths(),
- SSL_load_verify_locations(), SSL_get_cert_store() and
- SSL_set_cert_store() functions which work like their existing
- SSL_CTX_xxx() variants but on a per connection basis. That's needed
- to let us provide full-featured per-URL client verification in
- mod_ssl or Apache-SSL.
- => It still dumps core, so I suspend this and investigate
- again for OpenSSL 0.9.3.
- 2. The perl/ stuff to make it really work the first time ;-)
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 3. The new documentation set in POD format under doc/
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 4. More cleanups to get rid of obsolete/old/ugly files in the
- source tree which are not really needed.
- => Done all which were possible with my personal knowledge
-
- o Ben is currently working on:
- 1. Function Prototype Thought Police issues.
- 2. Integrated documentation.
- 3. New TLS Ciphersuites.
- 4. Anything else that takes his fancy.
+ Developing and bugfixing PKCS#7 (S/MIME code).
+ Various X509 issues: character sets, certificate request extensions.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UI (User Interface)
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Shared library support for VMS.
+ Kerberos 5 authentication (Heimdal)
+ Constification
+ Compression
+ Attribute Certificate support
+ Certificate Pair support
+ Storage Engines (primarly an LDAP storage engine)
+ Certificate chain validation with full RFC 3280 compatibility
NEEDS PATCH
- o broken demos
- o salzr@certco.com (Rich Salz): Bug in X509_name_print
- <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
- o [ Compilation warnings: ctype-related int vs. char ]
- => now casts (unsigned char), maybe those arrays should have
- members of that type rather than plain char (i.e.
- unsigned char *p; ....; if (isspace(*p)) ...; where it's now
- char *p; ....; if (isspace((unsigned char)*p)) ...;)
- o $(PERL) in */Makefile.ssl
- o "Sign the certificate?" - "n" creates empty certificate file
- o dubious declaration of crypt() in des.h
+ o 0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not
+ handle ECCdraft cipher suites correctly.
+
+ o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
+
+ o "OpenSSL STATUS" is never up-to-date.
OPEN ISSUES
compiler PIC and linker DSO flags from Apache
into the OpenSSL Configure script.
- o The perl/ stuff needs a major overhaul. Currently it's
- totally obsolete. Either we clean it up and enhance it to be up-to-date
- with the C code or we also could replace it with the really nice
- Net::SSLeay package we can find under
- http://www.neuronio.pt/SSLeay.pm.html. Ralf uses this package for a
- longer time and it works fine and is a nice Perl module. Best would be
- to convince the author to work for the OpenSSL project and create a
- Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
- us.
-
- Status: Ralf thinks we should both contact the author of Net::SSLeay
- and look how much effort it is to bring Eric's perl/ stuff up
- to date.
- Paul +1
-
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
-
- o Properly initialize the PRNG in the absence of /dev/random.
-
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
+ Ulf: +1 for using GNU autoconf and libtool (but not automake,
+ which apparently is not flexible enough to generate
+ libcrypto)
WISHES
- o Mats Nilsson <mats.nilsson@xware.se>:
- "Add reference counting to all substructures of X509 etc. For instance,
- X509_NAME lacks a reference counter, while EVP_PKEY has one. I'm
- making COM-wrappers for selected parts of SSLeay for a project of ours,
- and has found this inconsistency in copy semantics annoying."
+ o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
+ where the callback function can request that the function be aborted.
+ [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
+
+ o SRP in TLS.
+ [wished by:
+ Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
+ Tom Holroyd <tomh@po.crl.go.jp>]
+
+ See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
+ as well as http://www-cs-students.stanford.edu/~tjw/srp/.
+ Tom Holroyd tells us there is a SRP patch for OpenSSH at
+ http://members.tripod.com/professor_tom/archives/, that could
+ be useful.