--On April 25, 2014 at 12:08:08 AM +0100 Matt Caswell <fr...@baggins.org> wrote:
I would suggest the following process to do as Ben has requested:

1) We start looking at the newest entries in RT first and work
backwards in time. This is on the basis that the newest bugs are
likely to still be present and most relevant. As we go back in time I
suspect we'll see more and more which are no longer relevant - we will
start hitting the law of diminishing returns.

The problem with this approach are significant requests that have languished for years. One such example would be <http://rt.openssl.org/Ticket/Display.html?id=1365>, which is 8 years old now. The best place to get the fix these days is probably directly from Debian (<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=589520>).

Note it also has dupes/related:

<http://rt.openssl.org/Ticket/Display.html?id=1832>
<http://rt.openssl.org/Ticket/Display.html?id=2051>
<http://rt.openssl.org/Ticket/Display.html?id=2069>

I've been patching my own openssl build with the ipv6 support for s_client for a few years now, as we have IPv6 only clients where it is necessary for debugging purposes. There are likely other extremely useful fixes that also have gone nowhere for nearly a decade that would provide immediate pluses to have them committed.


2) Any new RT entries coming in should get the very highest priority.
We can only start to make progress if the problem doesn't continue to
grow.

This may induce people to file more duplicates to get older issues addressed, causing additional work overhead.

--Quanah

--
Quanah Gibson-Mount
Server Architect
Zimbra, Inc
--------------------
Zimbra ::  the leader in open source messaging and collaboration

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to