You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
That would suggest that SSL context reuse isn't even concurrency safe when used to connect to different hostnames... When ssl_get0_param is missing which was introduced in OpenSSL 1.0.2. That's been EOL for a long time but we still support it.
Indeed, we must consider dropping support for OpenSSL < 1.1.1.
1.0.2 reached EOL in 2019. Even Ubuntu 18.04 (EOL in 2023) had OpenSSL 1.1.1. Despite being EOL 1.1.1 is still supported by the Ubuntu security team until 2025 (when 20.04 will reach EOL). We can look at other operating systems and distributions but most should use 3.0.0 or newer, and at worst 1.1.1 (with backported patches).
The text was updated successfully, but these errors were encountered:
Versions 1.1.1 and 1.0.2 are no longer supported. Extended support for 1.1.1 and 1.0.2 to gain access to security fixes for those versions is available.
But yeah that doesn't mean we must keep it. If somebody want's to pay for Crystal premium support for outdated SSL libraries, I suppse we could reconsider though 😏💸
As outlined by @straight-shoota in #15419:
Indeed, we must consider dropping support for OpenSSL < 1.1.1.
1.0.2 reached EOL in 2019. Even Ubuntu 18.04 (EOL in 2023) had OpenSSL 1.1.1. Despite being EOL 1.1.1 is still supported by the Ubuntu security team until 2025 (when 20.04 will reach EOL). We can look at other operating systems and distributions but most should use 3.0.0 or newer, and at worst 1.1.1 (with backported patches).
The text was updated successfully, but these errors were encountered: