-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test against OpenSSL 3 #7350
Test against OpenSSL 3 #7350
Comments
Note: 3.0 or higher is also necessary in order to test FFDH in TLS 1.3, see #7627 (comment) (Btw, our current "base" version is 1.0.2 which is already EOL. We might want another issue to upgrade the base version.) (Also, do we still need "legacy" to be that old? Probably yes for RC4 and 3DES ciphersuites in 2.28. This should be documented. Should probably be yet another issue.) |
I'm moving this issue in the same EPIC as FFDH support, as we want interop testing on the CI. |
Note: this means currently all the cases that require OpenSSL 3.x are never executed in the CI. See #2691 - but also #5389 and #5390. CC @gilles-peskine-arm FYI. |
Should we replace |
I'm not aware of any reason we would need both, so I think just replacing |
I ran For the
And for I'm currently investigating the failures. Will post further updates. |
We're currently working on switching An alternative could be to introduce an |
I've been thinking about how we can upgrade versions of OpenSSL and GnuTLS on the CI. Currently, the docker files decide which version is This hasn't been an issue until now because we have not upgraded OpenSSL or GnuTLS since the current Jenkins/Docker-based CI was put in place. Therefore my plan is that the dockerfiles will provide e.g. The dockerfiles will keep providing the current bare/LEGACY/NEXT names for backward compatibility for a few months. |
Note: we currently have OpenSSL 3.0 and 3.1 installed in the CI's docker images: https://github.com/Mbed-TLS/mbedtls-test/blob/master/resources/docker_files/ubuntu-16.04/Dockerfile#L196 So this is now about whether we are using them when we should. |
Also, I was wondering what level of interop testing we currently have. So, I grabbed the
So it looks like we are getting some level of interop testing for 1.3 with both OpenSSL and GnuTLS as we stand. (The question came up while discussing the priority level of this issue.) |
I'll note we currently have a function |
Our current "OpenSSL Next" is OpenSSL 1.1.1. This will reach the end of its life in 6 months:
https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/
With this in mind, we should enable compatibility testing with OpenSSL 3.
The text was updated successfully, but these errors were encountered: