Clemens Lang wrote:
On 7. Aug 2024, at 19:48, Solar Designer <so...@openwall.com> wrote:

1. Hosting a public server that's meant to be usable by the widest
audience possible, including from both up-to-date and older systems.
For example, a website should display in latest web browsers, but
command-line downloads from the same server should also work from old
systems (e.g., running LTS distros).

Speaking of LTS distros: RHEL 6.10 supports TLS 1.2.
At what point is a distro not LTS, but a museum piece which we can ignore?
What currently supported LTS distro does not support TLS 1.2?

Legacy is a long tail and there is a big difference between communications on the open Internet and support for archaic protocol versions to talk to older devices on a LAN. Disabling support by default is one thing; removing it entirely is another and much more serious.

2. Scanning or crawling a wide variety of systems, e.g. by a search
engine indexer, an asset enumeration tool, a security scanner, or during
a pentest.

What good is a search engine index of a webpage no modern browser will connect 
to?

A user may have an older browser around, the page may also be available via plain HTTP (very likely if the server is that old), or the search engine might offer a cached copy. For a specific crawler that could have use for this scenario, consider the Internet Archive Wayback Machine.

The other use cases sound like they’d be done with special tooling anyway, in 
which case that can continue to ship an older version of OpenSSL for this 
purpose.

Presumably that "older version of OpenSSL" would be unmaintained, which means that it is likely to accumulate known exploits over time. This could be *very* bad for an asset enumeration tool or security scanner that could encounter a malicious server that insists on an old protocol version in order to exploit that older library and crack the scanner host!


-- Jacob

Reply via email to