Update
Matthew Selsky
Matthew.Selsky at twosigma.com
Mon Feb 11 00:22:17 UTC 2019
On Sat, Feb 09, 2019 at 02:19:50PM -0800, Hal Murray via devel wrote:
>
> esr at thyrsus.com said:
> >> Are we ever going to want to use anything older than TLS1.2? Spec says no,
> >> but it might be interesting for testing.
> > I'm not interested in complicating our lives with a surfeit of obsolete APIs.
>
> Sounds good. It's probably worth updating our requirements section to include
> a version of OpenSSL new enough to support TLS1.2
>
> We should be able to add that check to waf. I looked into it a bit, but it
> was going to take too long.
>
> We can get the version info either of two ways.
>
> Their command line tool is openssl.
> $ openssl version
> OpenSSL 1.1.1a FIPS 20 Nov 2018
> $
> It's not part of the -dev package and otherwise not (yet) necessary to build.
> We might end up using it for some testing, but I can't think of a good example.
>
> OPENSSL_VERSION_NUMBER is defined in openssl/opensslv.h which gets pulled in
> by openssl/ssl.h
> It looks like:
> # define OPENSSL_VERSION_NUMBER 0x1010101fL
> There is also a text version:
> # define OPENSSL_VERSION_TEXT "OpenSSL 1.1.1a FIPS 20 Nov 2018"
>
> I don't know what version we need, but I'm pretty sure I can track it down.
> Their man pages are good about having a HISTORY section describing when a
> feature was added.
Per https://en.wikipedia.org/wiki/OpenSSL, OpenSSL added support for tls1.2 in version 1.0.1. And that version was end of support in December 2016.
So any version of OpenSSL that we encounter on a supported operating system will have a "new enough" OpenSSL to support tls1.2.
We can add a check for TLS1_2_VERSION (from openssl/tls1.h), if we want to be explicit about support for the feature. We definitely don't want to check for the version since features could be backported.
Eric, shall I add that?
Thanks,
-Matt
More information about the devel
mailing list