RE: [openssl.org #479] support version independent upgrade

2003-02-03 Thread Jim Sahaj

Actually, I'd prefer that I wouldn't have to relink and redistribute my application 
every
time a security patch comes out for OpenSSL.  I haven't seen any issues in our 
application
upgrading from 0.9.6 to 0.9.7 using this non version technique on our local 
development nodes.

The version technique doesn't just prevent backward compatibility but it 
prevents users from getting potential security upgrades that *may* work
just fine.  It's definitely not a desirable distribution scenario as it sits now. 
It forces developers to do relinks and redistribute whether they're needed or not.

-Original Message-
From: Richard Levitte - VMS Whacker [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 27, 2003 2:10 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: Jim Sahaj
Subject: Re: [openssl.org #479] support version independent upgrade 


In message [EMAIL PROTECTED] on Mon, 27 Jan 2003 22:40:24 
+0100 (MET),  via RT [EMAIL PROTECTED] said:

rt Currently, on many Unix platforms I link my application against 
rt libssl.so and libcrypto.so. Typically, these are links set to resolve 
rt down to the versioned types of these files, like libssl.so.0.9.7 and 
rt libcrypto.so.0.9.7.  The internal names of these shared objects 
rt include the major and minor version so even though I link against the 
rt shared objects without the version, such as libssl.so, my application 
rt becomes tied to the versioned shared objects at link time, for 
rt instance libssl.so.0.9.7.

There's a reason: until OpenSSL 1, we don't guarantee backward binary
compatibility.  There are technical reasons for this, like the need to
make changes to published structures (it may be argued that it
shouldn't be needed, but to achieve such flexibility, we either need
to hide them (which would require huge changes for everyone) or redo
them in such a way that they become rather generic) and other stuff.

Because of this, we're forced to do what we currently do with shared
libraries.  Perhaps you'd prefer that your applications crash
mysteriously and in an unrecoverable manner?

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #479] support version independent upgrade

2003-01-28 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Mon, 27 Jan 2003 23:33:24 
+0100 (MET), [EMAIL PROTECTED] via RT [EMAIL PROTECTED] said:

rt Actually, I'd prefer that I wouldn't have to relink and
rt redistribute my application every time a security patch comes out
rt for OpenSSL.  I haven't seen any issues in our application
rt upgrading from 0.9.6 to 0.9.7 using this non version technique on
rt our local development nodes.

If all you wanted was security patches, you upgrad to the next patch
level of 0.9.6.  0.9.7 contains a lot more changes than just security
patches.  Also, as a very simple test, I built 0.9.6h and 0.9.7 with
shared support, but made sure I linked the 0.9.7 test suite against
the 0.9.6h libraries.  Then I ran them.  Kaboom (I don't recall
exactly where, I did it some time ago...).

So if *you* haven't had any issues, count your blessings and don't
make any changes to your applications.  Unfortunately, since it's
easily proven that there's a risk of mysterious crashes, we can't
support your claim.  Sorry.

rt The version technique doesn't just prevent backward compatibility
rt but it prevents users from getting potential security upgrades
rt that *may* work just fine.  It's definitely not a desirable
rt distribution scenario as it sits now.  It forces developers to do
rt relinks and redistribute whether they're needed or not.

I agree that the current situation isn't optimal for shared libraries.
What would you do in our place (and please look outside your
particular sandbox, and think of all the reports of mysterious crashes
that will flow in to us (which they sometimes do for systems like
Windows, where there is no versioning).  Basically, place yourself in
our shoes).

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #479] support version independent upgrade

2003-01-28 Thread Richard Levitte - VMS Whacker via RT

In message [EMAIL PROTECTED] on Mon, 27 Jan 2003 23:33:24 
+0100 (MET), [EMAIL PROTECTED] via RT [EMAIL PROTECTED] said:

rt Actually, I'd prefer that I wouldn't have to relink and
rt redistribute my application every time a security patch comes out
rt for OpenSSL.  I haven't seen any issues in our application
rt upgrading from 0.9.6 to 0.9.7 using this non version technique on
rt our local development nodes.

If all you wanted was security patches, you upgrad to the next patch
level of 0.9.6.  0.9.7 contains a lot more changes than just security
patches.  Also, as a very simple test, I built 0.9.6h and 0.9.7 with
shared support, but made sure I linked the 0.9.7 test suite against
the 0.9.6h libraries.  Then I ran them.  Kaboom (I don't recall
exactly where, I did it some time ago...).

So if *you* haven't had any issues, count your blessings and don't
make any changes to your applications.  Unfortunately, since it's
easily proven that there's a risk of mysterious crashes, we can't
support your claim.  Sorry.

rt The version technique doesn't just prevent backward compatibility
rt but it prevents users from getting potential security upgrades
rt that *may* work just fine.  It's definitely not a desirable
rt distribution scenario as it sits now.  It forces developers to do
rt relinks and redistribute whether they're needed or not.

I agree that the current situation isn't optimal for shared libraries.
What would you do in our place (and please look outside your
particular sandbox, and think of all the reports of mysterious crashes
that will flow in to us (which they sometimes do for systems like
Windows, where there is no versioning).  Basically, place yourself in
our shoes).

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #479] support version independent upgrade

2003-01-27 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Mon, 27 Jan 2003 22:40:24 
+0100 (MET),  via RT [EMAIL PROTECTED] said:

rt Currently, on many Unix platforms I link my application against 
rt libssl.so and libcrypto.so. Typically, these are links set to resolve 
rt down to the versioned types of these files, like libssl.so.0.9.7 and 
rt libcrypto.so.0.9.7.  The internal names of these shared objects 
rt include the major and minor version so even though I link against the 
rt shared objects without the version, such as libssl.so, my application 
rt becomes tied to the versioned shared objects at link time, for 
rt instance libssl.so.0.9.7.

There's a reason: until OpenSSL 1, we don't guarantee backward binary
compatibility.  There are technical reasons for this, like the need to
make changes to published structures (it may be argued that it
shouldn't be needed, but to achieve such flexibility, we either need
to hide them (which would require huge changes for everyone) or redo
them in such a way that they become rather generic) and other stuff.

Because of this, we're forced to do what we currently do with shared
libraries.  Perhaps you'd prefer that your applications crash
mysteriously and in an unrecoverable manner?

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #479] support version independent upgrade

2003-01-27 Thread Richard Levitte - VMS Whacker via RT

In message [EMAIL PROTECTED] on Mon, 27 Jan 2003 22:40:24 
+0100 (MET),  via RT [EMAIL PROTECTED] said:

rt Currently, on many Unix platforms I link my application against 
rt libssl.so and libcrypto.so. Typically, these are links set to resolve 
rt down to the versioned types of these files, like libssl.so.0.9.7 and 
rt libcrypto.so.0.9.7.  The internal names of these shared objects 
rt include the major and minor version so even though I link against the 
rt shared objects without the version, such as libssl.so, my application 
rt becomes tied to the versioned shared objects at link time, for 
rt instance libssl.so.0.9.7.

There's a reason: until OpenSSL 1, we don't guarantee backward binary
compatibility.  There are technical reasons for this, like the need to
make changes to published structures (it may be argued that it
shouldn't be needed, but to achieve such flexibility, we either need
to hide them (which would require huge changes for everyone) or redo
them in such a way that they become rather generic) and other stuff.

Because of this, we're forced to do what we currently do with shared
libraries.  Perhaps you'd prefer that your applications crash
mysteriously and in an unrecoverable manner?

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]