[Openswan dev] Openswan + FIPS thoughts

Michael Richardson mcr at xelerance.com
Wed Oct 31 13:45:27 EDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


>>>>> "David" == David McCullough <David_Mccullough at securecomputing.com> writes:
    David> As always, I have trouble knowing which git tree to pull from
    David> you guys :-) 

  Us too :-)

    David> Actually, given all the requirements, I think we need to use
    David> 3.0.  Is that even an option ?  Porting our OCF changes up to
    David> 2.5 may be safer at this point if 3.0 is truly unstable and
    David> untested ?  Seems like #testing is 2.5 based.

  3.0 is considered "#unstable"
  Having said that, the KLIPS part of it is very well tested with OCF
acceleration on the Vulcan card.  As 60% of the issues were in fact in
KLIPS code (at the interface to OCF), likely most of that stability
applies to other hardware as well.

  Merging #testing into #unstable is relatively easy.
  Once we finish ikev2, we will advance the state, i.e. 
       #testing  -> #stable
       #unstable -> #testing
       new work  -> #unstable

- -- 
]            Bear: "Me, I'm just the shape of a bear."          |  firewalls  [
]   Michael Richardson,    Xelerance Corporation, Ottawa, ON    |net architect[
] mcr at xelerance.com      http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Finger me for keys

iQEVAwUBRyi/NICLcPvd0N1lAQJRnQgAuo6LG1djtd8wOzmxrGtKO1kk2uPb/2Wb
DBo5lE80LBqcMSxnhHwN+MtoZJEuzfzRgUDou0ku1wAf/vrNrvThAefZ+MLSkBSU
aNnXJSO493nyQ438i0hC9J7x8cdMPTcW8LnMGSjm0efN95G0u29fylKzYyPw5Vc4
Pkon1n4VP9HyHGEE2WfIvzJrCpe2JFQ9VdDC6EwrifIR2zdG5eTS4WakDQwfnLtl
VHYBRukHSGQToS1Tr9J9KveKkVst7cJiulkfeFigNy5zt1p25h5DJH0/3lxffmDC
N1+3+IGudiRy96UxWeFBqlk08h6pWpRnhaJ5X/bPGmlpfsg8bOWUTg==
=saMB
-----END PGP SIGNATURE-----


More information about the Dev mailing list