Re: [DISCUSS] Minimum version of OpenSSL

2019-02-22 Thread Leif Hedstrom
> On Feb 21, 2019, at 11:37 PM, Masaori Koshiba wrote: > > Hi all, > > Could we bump minimum requirements of OpenSSL version to 1.0.2 on next > major release? > > I just noticed that SSLUtils says that Traffic Server requires an OpenSSL > library version 0.9.4 or greater [*1]. > But I think

Re: [DISCUSS] Minimum version of OpenSSL

2019-02-22 Thread Susan Hinrichs
Definitely at least drawing the line at openssl 1.0.1 makes sense. As Leif notes moving to 1.0.2 for the baseline means that some supported distributions cannot use the system openssl. For Centos6 anyway we require a replacement for the system compiler which you can acquire from devtoolset. Is t

Re: [DISCUSS] Minimum version of OpenSSL

2019-02-22 Thread Leif Hedstrom
> On Feb 22, 2019, at 10:15 AM, Susan Hinrichs > wrote: > > Definitely at least drawing the line at openssl 1.0.1 makes sense. As Leif > notes moving to 1.0.2 for the baseline means that some supported > distributions cannot use the system openssl. For Centos6 anyway we require > a replacem

Re: [DISCUSS] Minimum version of OpenSSL

2019-02-22 Thread Susan Hinrichs
A quick search shows only instructions for how to build openssl 1.0.2 from source on Rhel6/Centos6. If there is an epel-like rpm it does not seem to be well advertised. I'd suggest keeping the openssl minimum version to 1.0.1 until we stop support for Centos 6. On Fri, Feb 22, 2019 at 11:41 AM L

Re: [API Proposal] TSSslServerCertUpdate and TSSslClientCertUpdate

2019-02-22 Thread Zeyuan Yu
After discussion, TSSslClientCertUpdate should take two arguments instead of just one since client contexts are stored in a map with keys comprising of both cert and key. TSReturnCode TSSslClientCertUpdate(const char *cert_path, const char *key_path) Zeyuan Yu 于2019年2月21日周四 下午1:13写道: > TSReturnC