Return-Path: X-Original-To: apmail-openoffice-dev-archive@www.apache.org Delivered-To: apmail-openoffice-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id C499E19E5C for ; Mon, 28 Mar 2016 20:59:40 +0000 (UTC) Received: (qmail 14304 invoked by uid 500); 28 Mar 2016 20:59:40 -0000 Delivered-To: apmail-openoffice-dev-archive@openoffice.apache.org Received: (qmail 14231 invoked by uid 500); 28 Mar 2016 20:59:40 -0000 Mailing-List: contact dev-help@openoffice.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@openoffice.apache.org Delivered-To: mailing list dev@openoffice.apache.org Received: (qmail 14220 invoked by uid 99); 28 Mar 2016 20:59:40 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 28 Mar 2016 20:59:40 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id D06F9C0217 for ; Mon, 28 Mar 2016 20:59:39 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 0.999 X-Spam-Level: X-Spam-Status: No, score=0.999 tagged_above=-999 required=6.31 tests=[KAM_LAZY_DOMAIN_SECURITY=1, SPF_HELO_PASS=-0.001] autolearn=disabled Received: from mx2-lw-us.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id Gpo7phuaZ3Vq for ; Mon, 28 Mar 2016 20:59:38 +0000 (UTC) Received: from gw.catspoiler.org (gw.catspoiler.org [75.1.14.242]) by mx2-lw-us.apache.org (ASF Mail Server at mx2-lw-us.apache.org) with ESMTPS id 9EC475F47D for ; Mon, 28 Mar 2016 20:59:38 +0000 (UTC) Received: from apache.org (mousie.catspoiler.org [192.168.101.2]) by gw.catspoiler.org (8.15.2/8.15.2) with ESMTP id u2SKxVAG086785 for ; Mon, 28 Mar 2016 13:59:35 -0700 (PDT) (envelope-from truckman@apache.org) Message-Id: <201603282059.u2SKxVAG086785@gw.catspoiler.org> Date: Mon, 28 Mar 2016 13:59:30 -0700 (PDT) From: Don Lewis Subject: Re: Release Manager for 4.2.0? To: dev@openoffice.apache.org In-Reply-To: <56F99872.5040503@apache.org> MIME-Version: 1.0 Content-Type: TEXT/plain; charset=us-ascii On 28 Mar, Pedro Giffuni wrote: > Hi Don; > >> On 28 Mar, Pedro Giffuni wrote: >> > In reply to Don, >> >> >> The versions of openssl and curl badly need updating for the same >> >> reason, and there is one CVE for serf. >> > >> > FreeBSD casually keeps some backported updates for the same openssl >> > version AOO uses: >> > >> > https://svnweb.freebsd.org/base/stable/9/crypto/openssl/?view=log >> > >> > It should be pretty straightforward to take them from there and use >> them >> > into >> > main/openssl with minor adaptions. >> >> That would fix only part of the problem. The other part of the problem >> is that the version of openssl that we currently bundle doesn't >> implement the newer and more secure protocols and ciphers. The older >> and less secure ones are gradually getting disabled on the server side. >> >> For instance, my only copy of Windows is XP, and the last version of IE >> released for XP can no longer connect to some web sites because they >> have disabled all of the protocols that IE supports. >> > > That is a valid concern, however I am unsure about what in OpenOffice > uses the new cyphers. I think OpenSSL is used for signing documents: > when we update OpenSSL will AOO automatically accept more signing > options? I would expect browsers will bring their own SSL > implementations. I don't know what OpenOffice uses it for, either, but I would expect that it also gets used for downloading extensions. I hadn't even thought about signatures. That's something I haven't exercised it at all. > TBH, when I updated OpenSSL in AOO, I intentionally didn't upgrade it > further because the newer versions have more code but also more > vulnerabilities, therefore the expected maintenance cost would be > higher. The FreeBSD 9.x updates are only a temporary workaround. > Now that upstream is not maintaining the older 0.9.8 version > it probably makes sense to reconsider upgrading. And using FreeBSD 9.x as a patch source will not work past the end of this year because of the FreeBSD 9 EOL. The FreeBSD OpenOffice port uses --with-system-openssl, and when I build it for my own use, I set WITH_OPENSSL_PORT=yes, so I am always using the latest and greatest openssl release. I haven't run into any problems with it. I just signed a document with it ;-) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@openoffice.apache.org For additional commands, e-mail: dev-help@openoffice.apache.org