On Sun, Oct 14, 2018 at 4:38 PM Dennis Clarke <dcla...@blastwave.org> wrote:
> > As a red herring that illustrates how oddball the situation could get : > > $ /usr/sfw/bin/openssl version 2>&1 | cut -f1 -d\( > OpenSSL 0.9.7d 17 Mar 2004 > [...] > Segmentation Fault(coredump) > I think we can safely ignore OpenSSL 0.9.7 as the final release was over 11 years ago. Right now, only 1.1.1, 1.1.0 (12 month EOL clock started), and 1.0.2 (through 2019) are recognized by the OpenSSL project. The 0.9.8 will only be encountered on rusting RHEL 5 (mainstream EOL a year ago in spring) and similarly ancient installations across other os/architectures. 1.0.0 only saw the light of day in broad adoption via SLES 11 (mainstream EOL spring next year). There are a good number of 1.0.1 installations lingering around... everything shipped between and including RHEL 6 and RHEL 7 including SLES 12 and Ubuntu 12.04 and 14.04 shipped with that flavor. Breaking 1.0.1 support would seem unwise, but we probably should start ignoring 0.9.8 and 1.0.0 for all practical purposes.