OpenSSL STATUS Last modified at
- ______________ $Date: 1999/05/31 12:13:10 $
+ ______________ $Date: 2000/07/02 21:11:11 $
DEVELOPMENT STATE
- o OpenSSL 0.9.4: Under development...
+ o OpenSSL 0.9.6: Under development...
+ o OpenSSL 0.9.5a: Released on April 1st, 2000
+ o OpenSSL 0.9.5: Released on February 28th, 2000
+ o OpenSSL 0.9.4: Released on August 09th, 1999
o OpenSSL 0.9.3a: Released on May 29th, 1999
o OpenSSL 0.9.3: Released on May 25th, 1999
o OpenSSL 0.9.2b: Released on March 22th, 1999
RELEASE SHOWSTOPPERS
- o internal_verify doesn't know about X509.v3 (basicConstraints
- CA flag ...)
-
AVAILABLE PATCHES
- o OCSP (titchenert@certco.com)
- o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
+ o CA.pl patch (Damien Miller)
IN PROGRESS
o Steve is currently working on (in no particular order):
+ ASN1 code redesign, butchery, replacement.
+ EVP cipher enhancement.
Proper (or at least usable) certificate chain verification.
- Documentation on X509 V3 extension code.
- PKCS #8 and PKCS#5 v2.0 support.
Private key, certificate and CRL API and implementation.
- Checking and bugfixing PKCS#7 (S/MIME code).
-
- o Mark is currently working on:
- Folding in any changes that are in the C2Net code base that were
- not in the original SSLeay-0.9.1.b release. Plus other minor
- tidying.
-
- o Ralf is currently working on:
- 1. Support for SSL_set_default_verify_paths(),
- SSL_load_verify_locations(), SSL_get_cert_store() and
- SSL_set_cert_store() functions which work like their existing
- SSL_CTX_xxx() variants but on a per connection basis. That's needed
- to let us provide full-featured per-URL client verification in
- mod_ssl or Apache-SSL.
- => It still dumps core, so I suspend this and investigate
- again for OpenSSL 0.9.3.
- 2. The perl/ stuff to make it really work the first time ;-)
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 3. The new documentation set in POD format under doc/
- => I'll investigate a few more hours for OpenSSL 0.9.2
- 4. More cleanups to get rid of obsolete/old/ugly files in the
- source tree which are not really needed.
- => Done all which were possible with my personal knowledge
-
- o Ben is currently working on:
- 1. Function Prototype Thought Police issues.
- 2. Integrated documentation.
- 3. New TLS Ciphersuites.
- 4. Anything else that takes his fancy.
+ Developing and bugfixing PKCS#7 (S/MIME code).
+ Various X509 issues: character sets, certificate request extensions.
+ o Geoff and Richard are currently working on:
+ ENGINE (the new code that gives hardware support among others).
+ o Richard is currently working on:
+ UTIL (a new set of library functions to support some higher level
+ functionality that is currently missing).
+ Dynamic thread-lock support.
NEEDS PATCH
- o broken demos
- o salzr@certco.com (Rich Salz): Bug in X509_name_print
- <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
+ o non-blocking socket on AIX
o $(PERL) in */Makefile.ssl
o "Sign the certificate?" - "n" creates empty certificate file
- o dubious declaration of crypt() in des.h
OPEN ISSUES
+ o internal_verify doesn't know about X509.v3 (basicConstraints
+ CA flag ...)
+
o The Makefile hierarchy and build mechanism is still not a round thing:
1. The config vs. Configure scripts
compiler PIC and linker DSO flags from Apache
into the OpenSSL Configure script.
+ Ulf: +1 for using GNU autoconf and libtool (but not automake,
+ which apparently is not flexible enough to generate
+ libcrypto)
+
+
o The perl/ stuff needs a major overhaul. Currently it's
totally obsolete. Either we clean it up and enhance it to be up-to-date
with the C code or we also could replace it with the really nice
to date.
Paul +1
- o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
- structure for each cipher. This may make sense for things like DES but
- for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
- use the EVP interface and set up the cipher parameters. The ASN1 stuff
- is also foo wrt ciphers whose AlgorithmIdentifier has more than just
- an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
- don't work unless the key length matches the fixed value (some vendors
- use a key length decided by the size of the RSA encrypted key and expect
- RC2 to adapt).
-
- o Properly initialize the PRNG in the absence of /dev/random.
-
- o ERR_error_string(..., buf) does not know how large buf is,
- there should be ERR_error_string_n(..., buf, bufsize)
- or similar.
-
WISHES
- o Mats Nilsson <mats.nilsson@xware.se>:
- "Add reference counting to all substructures of X509 etc. For instance,
- X509_NAME lacks a reference counter, while EVP_PKEY has one. I'm
- making COM-wrappers for selected parts of SSLeay for a project of ours,
- and has found this inconsistency in copy semantics annoying."
-
+ o