On 8/8/24 12:46 PM, Clemens Lang wrote:
Hi,


Speaking of LTS distros: RHEL 6.10 supports TLS 1.2.

RHEL 6.10 is not a supported distro, it's Extended Life Cycle ended 1 month and one week ago (30 Jun 2024)

https://access.redhat.com/support/policy/updates/errata/#Life_Cycle_Dates

At what point is a distro not LTS, but a museum piece which we can ignore?
I believe, after it is no longer supported. I also believe the LTS means that the vendor/creator of the distro will provide the support, and will make security patches and possibly back-port features if requested. This is nothing the community should do for them. (I can claim to support a 20 year old version of OpenSSL if I wanted to, but I would not expect/request the OpenSSL maintainers to fix my issues for me)
What currently supported LTS distro does not support TLS 1.2?


2. Scanning or crawling a wide variety of systems, e.g. by a search
engine indexer, an asset enumeration tool, a security scanner, or during
a pentest.
What good is a search engine index of a webpage no modern browser will connect 
to?

It is good for penetration testers, if no normal expected users need to connect to the service, and only malicious users are expected to connect to it, it might be beneficial for the security posture to bring it offline/put it behind a proxy.

The other use cases sound like they’d be done with special tooling anyway, in 
which case that can continue to ship an older version of OpenSSL for this 
purpose.

Agreed, if an older version of OpenSSL is needed for specific testing purposes, I can boot up an old live cd in a vm, or download old source releases and build OpenSSL from source myself.

Regards,

Jens Timmerman

Reply via email to