-
Notifications
You must be signed in to change notification settings - Fork 30.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Openssl upgrade v4 #6551
Openssl upgrade v4 #6551
Conversation
/cc @jasnell |
Ci is green 🎉🎉🎉 |
LGTM. Thanks. |
LGTM although strictly speaking this PR is targeting the wrong branch (v4.x instead of v4.x-staging) and it brings back a couple of files that were removed in 1d0e4a9. |
This is targeting 4.x rather than staging as we will be directly cutting
off 4.x for the release and not including everything currently on staging
|
This replaces all sources of openssl-1.0.2h.tar.gz into deps/openssl/openssl PR-URL: nodejs#6551 Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
All symlink files in `deps/openssl/openssl/include/openssl/` are removed and replaced with real header files to avoid issues on Windows. Two files of opensslconf.h in crypto and include dir are replaced to refer config/opensslconf.h. PR-URL: nodejs#6551 Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
`x86masm.pl` was mistakenly using .486 instruction set, why `cpuid` (and perhaps others) are requiring .686 . Fixes: nodejs#589 PR-URL: nodejs#1389 Reviewed-By: Fedor Indutny <fedor@indutny.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp>
See https://mta.openssl.org/pipermail/openssl-dev/2015-February/000651.html iojs needs to stop using masm and move to nasm or yasm on Win32. Fixes: nodejs#589 PR-URL: nodejs#1389 Reviewed-By: Fedor Indutny <fedor@indutny.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reapply b910613 . Fixes: nodejs#589 PR-URL: nodejs#1389 Reviewed-By: Fedor Indutny <fedor@indutny.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
In openssl s_client on Windows, RAND_screen() is invoked to initialize random state but it takes several seconds in each connection. This added -no_rand_screen to openssl s_client on Windows to skip RAND_screen() and gets a better performance in the unit test of test-tls-server-verify. Do not enable this except to use in the unit test. Fixes: nodejs#1461 PR-URL: nodejs#1836 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Regenerate asm files with Makefile and CC=gcc and ASM=gcc where gcc-4.8.4. Also asm files in asm_obsolete dir to support old compiler and assembler are regenerated without CC and ASM envs. PR-URL: nodejs#6551 Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
ce23de4
to
1efd96c
Compare
Notable changes * deps: * update openssl to 1.0.2h. (Shigeki Ohtsu) [#6551](#6551) - Please see our blog postfor more info on the security contents of this release. https://nodejs.org/en/blog/vulnerability/openssl-may-2016/
Notable changes * deps: * update openssl to 1.0.2h. (Shigeki Ohtsu) [#6551](#6551) - Please see our blog postfor more info on the security contents of this release. https://nodejs.org/en/blog/vulnerability/openssl-may-2016/ PR-URL: #6583 Reviewed-By: James M Snell <jasnell@gmail.com>
for some reason after this fix I can no longer connect to a postgres hosted on aws. where connectionString can be something like: I get: { error: password authentication failed for user "master"... (same issue with ssl=true) is this a bug or a change that I need to handle differently? |
@eyalsach does the same code on a previous node.js version still work? |
See #6782 (comment), this should be reported to node-pg first, unless it's been bisected to exactly this commit (and even then it's still possible node-pg needs to tweak something, so reporting it there is a good first step.) |
Sure, with v5.10.1 it works fine On Mon, May 16, 2016 at 8:41 AM, Fedor Indutny notifications@github.com
|
Will do, thanks On Mon, May 16, 2016 at 8:43 AM, Ben Noordhuis notifications@github.com
|
Affected core subsystem(s)
tls/crypto
Description of change
openssl sources are upgraded to 1.0.2h and applied floating patches.
One more works was made in this upgrade.
asm codes were changed in this upgrade so that asm and asm_obsolete were regenerated. openssl headers were unchanged so that config/ are not regenerated.
Fix: #6458
R: @indutny or @bnoordhuis or @shigeki