On 15/02/15 16:00, Arne Schwabe wrote: > On 15.02.2015 15:24, Steffan Karger wrote: >> As reported in trac #502, SSL compression can cause problems in some corner >> cases. OpenVPN does not need SSL compression, since the control channel is >> low bandwidth. This does not influence the data channel compressen (i.e. >> --comp or --comp-lzo). >> >> Even though this has not yet been relevant for OpenVPN (since an attacker >> can not easily control contents of control channel messages), SSL >> compression has been used in the CRIME and BREACH attacks on TLS. TLS 1.3 >> will probably even remove support for compression all together, for >> exactly this reason. >> >> Since we don't need it, and SSL compression causes issues, let's just >> disable it in OpenSSL builds. PolarSSL has no run-time flag to disable >> compression, but is by default compiled without compression. >> > ACK from me. Sounds sensible to me. If do not support 0.9.8 anymore (in > -master perhaps?) I would like this to be commited without ifdef.
We've agreed to support RHEL5 until it goes EOL, which is March 31, 2017. [1] As RHEL5 is on 0.9.8 we need to support it. RHEL6 is on 1.0.1, so we'll have something to look forward too ;-) [1] There is also an additional "extended life cycle" which RHEL customers may opt-in for (for an additional fee), which I don't think we should relate too. <https://access.redhat.com/support/policy/updates/errata> -- kind regards, David Sommerseth