From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 59216 invoked by alias); 31 Aug 2016 16:42:24 -0000 Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner@cygwin.com Mail-Followup-To: cygwin@cygwin.com Received: (qmail 59204 invoked by uid 89); 31 Aug 2016 16:42:23 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.9 required=5.0 tests=BAYES_00,KAM_LAZY_DOMAIN_SECURITY,SPF_HELO_PASS autolearn=no version=3.3.2 spammy=H*M:cygwin, H*Ad:U*yselkowitz, H*F:U*yselkowitz, distros X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 31 Aug 2016 16:42:22 +0000 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 64F19635C1 for ; Wed, 31 Aug 2016 16:42:21 +0000 (UTC) Received: from [10.10.116.17] (ovpn-116-17.rdu2.redhat.com [10.10.116.17]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id u7VGgJuo030971 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 31 Aug 2016 12:42:21 -0400 Subject: Re: [ANNOUNCEMENT] openssl 1.0.2h-1 To: cygwin@cygwin.com References: <20160831111034.GA15557@calimero.vinschen.de> From: Yaakov Selkowitz Message-ID: Date: Wed, 31 Aug 2016 18:30:00 -0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20160831111034.GA15557@calimero.vinschen.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2016-08/txt/msg00643.txt.bz2 On 2016-08-31 06:10, Corinna Vinschen wrote: > We can't and we won't switch to OpenSSH 1.1.0 unless at least the first > problems are ironed out. There were a lot of partially backward > incompatible changes, one of them results in OpenSSH not working with > OpenSSL 1.1.0 yet. > > So, for the time being, we stay with 1.0.2. It will be supported by > upstream for at least another two years, so there's no reason for hurry. +1. I suggest we wait until one or more of the major Linux distros has tackled this first so that patches for the API incompatibilities will already be available. -- Yaakov -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple