-
Notifications
You must be signed in to change notification settings - Fork 844
Do not set @SECLEVEL with boringssl #9989
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not set @SECLEVEL with boringssl #9989
Conversation
|
Too much duplication. I'd suggest: and |
|
SECLEVEL=0 was OK for a stopgap, but I assume there's a better way to address this. Should the cipher suite value be updated for the more stringent openssl3? This would presumably make boringssl happy too. |
bneradt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I assume tests/gold_tests/tls/tls_client_versions_minmax.test.py will need to be updated with a similar change?
Ah, nevermind. I suppose the issue with these tests is that they force the older TLS versions which OpenSSL 3.0 now requires an explicit SECLEVEL=0 configuration to use. |
Looks good. But no need for the format string. This should work just fine: 'proxy.config.ssl.server.cipher_suite': cipher_suite,Thank you @masaori335 for updating for boringssl. |
28470c8 to
055d4ca
Compare
|
Updated to reduce dups. Please take another look. |
bneradt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the update for OpenSSL 3.x
(cherry picked from commit b462f08)
|
Cherry-picked to v9.2.x |
An AuTest filed with boringssl. It looks like boringssl doesn't like the change for the openssl 3.0 (#9753).