As mentioned in a previous
blog post, OpenSSL team members met with various representatives of the FIPS
sponsor organisations back in September last year to discuss design and planning
for the new FIPS module development project.
Since then there has been much design work taking place and we are now able to
publish the draft design documentation. You can read about how we see the longer
term architecture of OpenSSL changing in the future
here and you
can read about our specific plans for OpenSSL 3.0 (our next release which will
include a FIPS validated module)
here.
20 years ago, on the 23rd December 1998, the first version of OpenSSL was
released. OpenSSL was not the original name planned for the project but it was
changed over just a few hours before the site went live. Let’s take a look at
some of the early history of OpenSSL as some of the background has not been
documented before.
The OpenSSL Management Committee has been looking at the versioning scheme that
is currently in use. Over the years we’ve received plenty of feedback about the
“uniqueness” of this scheme, and it does cause some confusion for some users. We
would like to adopt a more typical version numbering approach.
The current versioning scheme has this format:
MAJOR.MINOR.FIX[PATCH]
The new scheme will have this format:
MAJOR.MINOR.PATCH
In practical terms our “letter” patch releases become patch numbers and “fix”
is dropped from the concept. In future, API/ABI compatibility will only be
guaranteed for the same MAJOR version number. Previously we guaranteed
API/ABI compatibility across the same MAJOR.MINOR combination. This more closely
aligns with the expectations of users who are familiar with semantic versioning.
We are not at this stage directly adopting semantic versioning because it would
mean changing our current LTS policies and practices.
The OpenSSL Management Committee (OMC) on behalf of the OpenSSL Project would
like to formally express its thanks to the following organisations
for agreeing to sponsor the next
FIPS validation effort: Akamai Technologies, Blue Cedar, NetApp, Oracle, VMware.
Four weeks ago, the OpenSSL team gathered with many of the organisations
sponsoring the next FIPS module for a face-to-face meeting in Brisbane,
Australia.
We got a great deal accomplished during that week. Having most of
the fips-sponsor organisations in the same location helps ensure that
we are all on the same page for the decisions we need to make going forward.
After two years of work we are excited to be releasing our latest version today -
OpenSSL 1.1.1. This is also our new Long Term Support (LTS) version and so we
are committing to support it for at least five years.
OpenSSL 1.1.1 has been a huge team effort with nearly 5000 commits having been
made from over 200 individual contributors since the release of OpenSSL 1.1.0.
These statistics just illustrate the amazing vitality and diversity of the
OpenSSL community. The contributions didn’t just come in the form of commits
though. There has been a great deal of interest in this new version so thanks
needs to be extended to the large number of users who have downloaded the beta
releases to test them out and report bugs.
Back around the end of 2014 we posted our
release strategy. This
was the first time we defined support timelines for our releases, and added
the concept of an LTS (long-term support) release. At our OMC meeting
earlier this month, we picked our next LTS release. This post walks through
that announcement, and tries to explain all the implications of it.
“That we remove “We strongly believe that the right to advance patches/info
should not be based in any way on paid membership to some forum. You can not
pay us to get security patches in advance.” from the security policy and Mark
posts a blog entry to explain the change including that we have no
current such service.”
At the OpenSSL Management Committee meeting earlier this month we passed the vote above to remove a section our security policy. Part of that vote
was that I would write this blog post to explain why we made this change.
The following is a press release that we just put out about how finishing
off our relicensing effort. For the impatient, please see
https://license.openssl.org/trying-to-find
to help us find the last people; we want to change the license with our
next release, which is currently in Alpha, and tentatively set for May.
For background, you can see all posts in the
license tag.
Note: This is an outdated version of this blog post. This information is now
maintained in a wiki page. See
here for the latest version.
The forthcoming OpenSSL 1.1.1 release will include support for TLSv1.3. The new
release will be binary and API compatible with OpenSSL 1.1.0. In theory, if your
application supports OpenSSL 1.1.0, then all you need to do to upgrade is to drop
in the new version of OpenSSL when it becomes available and you will
automatically start being able to use TLSv1.3. However there are some issues
that application developers and deployers need to be aware of. In this blog post
I am going to cover some of those things.