Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 1FD4A2009C5 for ; Mon, 16 May 2016 18:43:07 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 1E5CA160A16; Mon, 16 May 2016 16:43:07 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 1812C160131 for ; Mon, 16 May 2016 18:43:05 +0200 (CEST) Received: (qmail 49616 invoked by uid 500); 16 May 2016 16:43:05 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 49606 invoked by uid 99); 16 May 2016 16:43:05 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 16 May 2016 16:43:05 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id ACCBDC0E1C for ; Mon, 16 May 2016 16:43:04 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 1.298 X-Spam-Level: * X-Spam-Status: No, score=1.298 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=2, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd4-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=rowe-clan-net.20150623.gappssmtp.com Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id Ha4qN-1uuSX3 for ; Mon, 16 May 2016 16:43:01 +0000 (UTC) Received: from mail-io0-f171.google.com (mail-io0-f171.google.com [209.85.223.171]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id D50545F19B for ; Mon, 16 May 2016 16:43:00 +0000 (UTC) Received: by mail-io0-f171.google.com with SMTP id f89so216330157ioi.0 for ; Mon, 16 May 2016 09:43:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rowe-clan-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=l29RQ2/XF7yQT1GrfzA+DmdEzG8GRZKCznhNdvPzw9g=; b=1CWdHlz+SnOJvdux0c5QLzaQRtpuO8R27dio3JNtB1xDYbewtuYzPE6rgqd0pJRtH7 XWV9V3flH+gmAbNIhQVBXU5sxDzyIn/jnMBGvH4OdsRmlNBDAV0NzoAQfxOMVEXuyCWB Etkeaw1mJDQLwBkrHxlJVjgZz9Cz1+ADdLb9OpBHyjHbm1U0Q6PUn/mAyKcTJ61xLhnv skAdDA2H038Kc4+3jBffCBLUgeEdiSnNzPHFDHJsr53iJ6f2KCFIa/6ujQ9461oRQC5f YtqGrl6vK0Z+YXp+SE3bg+afuDlsl+g1ua/zlqJ8Rha/CokF9jaBlBrm5R4tVMcOcRiq OIPg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=l29RQ2/XF7yQT1GrfzA+DmdEzG8GRZKCznhNdvPzw9g=; b=SWTV3VnaguESfWzV1pqToyVw/bkK0Kdl1FutVroIWFVN1bLmJ7XVvivd4azUXeOvw+ JIoOjsDC4TceojKfvPpdcNpxUNUfBeOzVb0/AJrr6t3FUPTQl7iWlpMMY1T6GZ/RovII TiCFC2lyVsqFS7HMW19zUpYnuJXlMlMO3xA+OIc+OJtQjqjOIDMaw1Y0+aIYuLsd2F6s rWO4hYXpy7p1dEUgHobWIlu35ptD4n6NX6ISBT0m5Gs0ZQX+q775LSOfwQl2tDsZRPEi r4gnhGJhPfK+zPpC58OoCSNvREfW0PNtak1OCrviuM1qY/4qP2PYZIqxMXTda8QNazi0 RtqQ== X-Gm-Message-State: AOPr4FUTgKncRoHnOcfjMXhrBAp0Nu1aMvFw68KGQHm/gvv1AaDPD68BVQ6d6Xd5lH9PVt/C4BG7TiUtXAiUjbOW MIME-Version: 1.0 X-Received: by 10.107.17.34 with SMTP id z34mr21482306ioi.150.1463416980183; Mon, 16 May 2016 09:43:00 -0700 (PDT) Received: by 10.107.3.218 with HTTP; Mon, 16 May 2016 09:43:00 -0700 (PDT) In-Reply-To: <95C74A6C-BD2D-4C7B-AF0C-DA4BC9E68494@exonetric.com> References: <95C74A6C-BD2D-4C7B-AF0C-DA4BC9E68494@exonetric.com> Date: Mon, 16 May 2016 11:43:00 -0500 Message-ID: Subject: Re: End of the road of 2.2.x maintenance? From: William A Rowe Jr To: Mark Blackman Cc: httpd Content-Type: multipart/alternative; boundary=001a113f3d26433c490532f85186 archived-at: Mon, 16 May 2016 16:43:07 -0000 --001a113f3d26433c490532f85186 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On Wed, May 11, 2016 at 2:31 PM, Mark Blackman wrote: > > On 10 May 2016, at 21:38, William A Rowe Jr wrote: > > Are we ready to start the 12 month countdown as of the next/final bug > fix release of 2.2, and highlight this in both the 2.2 and 2.4 announce > broadcasts? > > Feedback desired > > As a big consumer of Apache 2.2 in my day job, where we are obliged to > track Apache=E2=80=99s policies very closely, I would prefer to delay thi= s a bit. > When Apache announces the formal end-of-life date of 2.2, we will be > required to engineer the migration of 6000+ wildly diverse sites to Apach= e > 2.4 to meet internal audit policies. I would propose the 12 month countdo= wn > starts no earlier than Jan 2017 (as a consumer). > An underlying issue from my own perspective is that OpenSSL 1.0.1 support ends this year on December 31st. If there were ever a critical time to update a deployment stack from end-to-end, the termination of support for the highest-risk component would be the time to do so. From an operational perspective, the historical trend has been a 3 year rolling deprecation of physical commodity hardware systems (although not for big iron). It seems within the scope of modern cloud and virtualized deployments, that window may be growing shorter - with many apps provisioned on their own discrete client environments. The larger issue from our perspective, as an open-source collaboration - not as a commercial distributor, is that it is hard to support users who have insisted on deploying new httpd 2.2 instances over these past three years. 2.4.1 was released literally 4 years ago. Users who insist on deploying software which is already 3 to 4 years out of date need to seek some paid commercial mitigation in terms of support, or assume the risk of supporting the source code themselves (it is open source, when it breaks we all get to keep all of the pieces and fix them as we like.) This isn't really an appropriate role for ASF projects and volunteers. The 2.4 release a radically different situation than Gnome 3, for example, which led to a split of opinion and dedicated communities interested in continuing the legacy of Gnome 2. The migration path from 2.2 to 2.4 is not painless, but is really not complex or unfamiliar. Modules are included to ease the transition, particularly the transition of auth schemas. > What=E2=80=99s the cost of maintaining (but maybe not updating) Apache 2.= 2? > Finding the volunteers among our committers and PMC members willing to continue to evaluate and triage security reports, backport fixes, creating release candidates and at least 3 PMC members willing to review and vote on a release. And those costs are deducted from the opportunity to further support the 2.4 branch and advance the development trunk. Already, a rather large majority of our committers have abandoned the 2.2 maintenance branch and focus their attentions on trunk (2.6/3.0 future release) and the 2.4 maintenance branch. So this question is largely directed to the dedicated minority of committers who have continued to service this branch throughout its 10 years. If there are 3 clear votes against moving toward EOL at this time from our PMC, this poll would fail (there is a big enough contingent to keep 2.2 releases alive for an extended period of time). Without 3 PMC members reviewing release candidates, 2.2 would already be EOL by default. Note that our choice to end ASF development of the 2.2 maintenance branch only indirectly impacts the decision by vendors to end or continue commercial support and security fixes to the software. This is why I'd suggested that we may continue to collect security patches to the final 2.2.x release, as we have several distributors represented here who have a lot to gain a lot by collaborating and reviewing the efficacy of security patches as a community. As an OSS project, we would simply elect not to craft a "release" of that software following our EOL consensus date. Two vendor-supported examples, RHEL 6 still ships 2.2.15 and SLES 12 still ships 2.2.22 - absolutely ancient software that they choose as a business model to patch and update for key defects. That's a byproduct of their decisions, not ASF decisions. Hope this adds clarity to the suggested EOL, you can go back through the list archives to see how we arrived at the decisions to end maintenance of the 2.0, and 1.3 releases. It's always better to work as a group to that end date, than to let an OSS project reach that point unannounced by attrition of participants. Yours, Bill --001a113f3d26433c490532f85186 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
On W= ed, May 11, 2016 at 2:31 PM, Mark Blackman <mark@exonetric.com> wrote:

On 10 May 2016, at 21:38,= William A Rowe Jr <wrowe@rowe-clan.net> wrote:

Are = we ready to start the 12 month countdown as of the next/final bug
fix release of 2.2, and highlight this in both = the 2.2 and 2.4 announce
broadcasts?

Feedback desired
=
As a big consumer of Apache 2.2 = in my day job, where we are obliged to track Apache=E2=80=99s policies very= closely, I would prefer to delay this a bit. When Apache announces the for= mal end-of-life date of 2.2, we will be required to engineer the migration = of 6000+ wildly diverse sites to Apache 2.4 to meet internal audit policies= . I would propose the 12 month countdown starts no earlier than Jan 2017 (a= s a consumer).

An underlyi= ng issue from my own perspective is that OpenSSL 1.0.1 support ends this ye= ar on December 31st. If there were ever a critical time to update a deploym= ent stack from end-to-end, the termination of support for the highest-risk = component would be the time to do so.

From a= n operational perspective, the historical trend has been a 3 year rolling d= eprecation of physical commodity hardware systems (although not for big iro= n). It seems within the scope of modern cloud and virtualized deployments, = that window may be growing =C2=A0shorter - with many apps provisioned on th= eir own discrete client environments.

The larger i= ssue from our perspective, as an open-source collaboration - not as a comme= rcial distributor, is that it is hard to support users who have insisted on= deploying new httpd 2.2 instances over these past three years. 2.4.1 was r= eleased literally 4 years ago. Users who insist on deploying software which= is already 3 to 4 years out of date need to seek some paid commercial miti= gation in terms of support, or assume the risk of supporting the source cod= e themselves (it is open source, when it breaks we all get to keep all of t= he pieces and fix them as we like.)=C2=A0

This= isn't really an appropriate role for ASF projects and volunteers. The = 2.4 release a radically different situation than Gnome 3, for example, whic= h led to a split of opinion and dedicated communities interested in continu= ing the legacy of Gnome 2. The migration path from 2.2 to 2.4 is not painle= ss, but is really not complex or unfamiliar. Modules are included to ease t= he transition, particularly the transition of auth schemas.
=C2= =A0
What=E2=80=99s the cost of maintaining (but maybe not updating) Apache 2= .2?

Finding the volunteers amon= g our committers and PMC members willing to continue to evaluate and triage= security reports, backport fixes, creating release candidates and at least= 3 PMC members willing to review and vote on a release. And those costs are= deducted from the opportunity to further support the 2.4 branch and advanc= e the development trunk.

Already, a rather large m= ajority of our committers have abandoned the 2.2 maintenance branch and foc= us their attentions on trunk (2.6/3.0 future release) and the 2.4 maintenan= ce branch. So this question is largely directed to the dedicated minority o= f committers who have continued to service this branch throughout its 10 ye= ars.

If there are 3 clear votes against moving tow= ard EOL at this time from our PMC, this poll would fail (there is a big eno= ugh contingent to keep 2.2 releases alive for an extended period of time). = Without 3 PMC members reviewing release candidates, 2.2 would already be EO= L by default.

Note that our choice to end ASF deve= lopment of the 2.2 maintenance branch only indirectly impacts the decision = by vendors to end or continue commercial support and security fixes to the = software. This is why I'd suggested that we may continue to collect sec= urity patches to the final 2.2.x release, as we have several distributors r= epresented here who have a lot to gain a lot by collaborating and reviewing= the efficacy of security patches as a community. As an OSS project, we wou= ld simply elect not to craft a "release" of that software followi= ng our EOL consensus date. Two vendor-supported examples, RHEL 6 still ship= s 2.2.15 and SLES 12 still ships 2.2.22 - absolutely ancient software that = they choose as a business model to patch and update for key defects. That&#= 39;s a byproduct of their decisions, not ASF decisions.

Hope this adds clarity to the suggested EOL, you can go back through = the list archives to see how we arrived at the decisions to end maintenance= of the 2.0, and 1.3 releases. It's always better to work as a group to= that end date, than to let an OSS project reach that point unannounced by = attrition of participants.

Yours,

Bill


--001a113f3d26433c490532f85186--