From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mx.groups.io with SMTP id smtpd.web08.48659.1638777916154135989 for ; Mon, 06 Dec 2021 00:05:16 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=TCVbcVDg; spf=pass (domain: redhat.com, ip: 170.10.129.124, mailfrom: kraxel@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1638777914; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=TVfQ5NiJg156d2A/CKhfLeWTVJ2q30dDjp3EZFG6YXw=; b=TCVbcVDgj9Z8BBPpEuKoI+swL0bNT8cHaRixMgvQ41Z8/ijhKkCVb5WY+nFf4v+s8poYIG QezMltuWZbCZJigxpNVlbby8jlANswGtn663bJrzBtA4zCWySSlZbAueA8oNV1qc4ObeCv zXTJluzqCni7wdRvthMYNr+dOFG2R/Y= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-561-8Bmk-2sFNHmRH2FxB2W7bw-1; Mon, 06 Dec 2021 03:05:11 -0500 X-MC-Unique: 8Bmk-2sFNHmRH2FxB2W7bw-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 78B0A83DD2A; Mon, 6 Dec 2021 08:05:09 +0000 (UTC) Received: from sirius.home.kraxel.org (unknown [10.39.192.5]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0EC825F4E1; Mon, 6 Dec 2021 08:05:08 +0000 (UTC) Received: by sirius.home.kraxel.org (Postfix, from userid 1000) id 485EC18003A7; Mon, 6 Dec 2021 09:05:07 +0100 (CET) Date: Mon, 6 Dec 2021 09:05:07 +0100 From: "Gerd Hoffmann" To: devel@edk2.groups.io, michael.d.kinney@intel.com Cc: "Yao, Jiewen" , "Wang, Jian J" , "Jiang, Guomin" , Pawel Polawski , Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= , "Lu, XiaoyuX" Subject: Re: [edk2-devel] [PATCH 00/24] CryptoPkg/openssl: update openssl submodule to v3.0 Message-ID: <20211206080507.ovx3vuz3slowanos@sirius.home.kraxel.org> References: <20211203160748.866150-1-kraxel@redhat.com> MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=kraxel@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Dec 03, 2021 at 04:32:48PM +0000, Michael D Kinney wrote: > Hi Gerd, > > Thank you for starting this work! > > Can you point the community as a summary of the changes/improvements in v3.0 and your > take on why it is important to upgrade TianoCore. >>From the openssl website: The latest stable version is the 3.0 series. Also available is the 1.1.1 series which is our Long Term Support (LTS) version, supported until 11th September 2023. All older versions (including 1.1.0, 1.0.2, 1.0.0 and 0.9.8) are now out of support and should not be used. So, long-term there is simply no way around upgrading. Version 1.1.1 will go out of support in less than two years, after that date we wouldn't get security fixes any more. I think it makes sense to start the porting effort early and not wait until the last minute with the switch to 3.x take care, Gerd