Upstream has indicated via http://mailman.nginx.org/pipermail/nginx- devel/2019-July/012430.html that to their knowledge, with TLS1.3 enabled, there is no other 'TLS 1.3' behavior not handled by OpenSSL that is otherwise introduced by default.
Note that in NGINX Upstream, and down here in Ubuntu, the default nginx.conf file that's going to be available by this SRU doesn't actually *enable* TLS 1.3 by default - that will be the largest difference. TLS 1.3 will be enabled only if enabled by the administrator, at which point all TLS1.3 risk and compatibility assumptions are accepted by the sysadmin who actually enables it. ** Description changed: [Impact] Upstream NGINX notified me that for proper TLS1.3 controls in NGINX it needs rebuilt against OpenSSL 1.1.1 that is how in Bionic. [Test Case] PREREQUISITES: - (1) Install `curl` and `ssl-cert` if not already installed. - (2) Replace the contents of /etc/nginx/sites-available/default with the contents of the attached `test-config-ssl.conf` file attached on this bug. + (1) Install `ssl-cert` if not already installed. + (2) Install latest OpenSSL from bionic-updates. This includes libssl, etc. - (3) Install the current NGINX version. - (4) + Current Version (TLS1.3 "Used By Default" due to OpenSSL configs globally) + (2) Install the current NGINX version. + (3) Replace the contents of /etc/nginx/sites-available/default with the contents of the attached `test-config-ssl.conf` file attached on this bug. + (4) From the NGINX server itself, RUN: openssl s_client -tls1_3 -connect localhost:443 + + You should see output indicating TLS1.3 is available by default. + + (5) Also run: openssl s_client -tls1_2 -connect localhost:443 + + It should still establish a new TLS1.2 connection. + + + New Version (TLS1.3 Available at Build Time, default Disabled by nginx configs in the package): + + (5) Install the nginx version from Proposed + (6) Replace the contents of /etc/nginx/sites-available/default with the contents of the attached `test-config-ssl.conf` file attached on this bug. (7) From the NGINX server itself, RUN: openssl s_client -tls1_3 -connect localhost:443 + + This should fail to connect as expected (default nginx.conf doesn't + enable TLS1.3) + + (8) Run: openssl s_client -tls1_2 -connect localhost:443 + + This should still work. + [Regression Potential] Moderate but all would be due to OpenSSL versions which we can’t revert to. This is a no-change rebuild, any regressions in this would be directly due to OpenSSL. [Other Info] This is based on info obtained from https://trac.nginx.org/nginx/ticket/1654 Upstream has indicated that a rebuild against 1.1.1 shouldn't introduce any other 'oddness' that isn't already a problem due to the OpenSSL SRU independently of the NGINX rebuild. TLS1.2 and such should still function as intended, TLS1.3 will be disabled by default. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1836366 Title: [SRU] No Changes Rebuild in Bionic for OpenSSL compat reasons To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1836366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs