-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It's time to upgrade openssl to version 3.0.x! #929
Comments
Any timelines for this please? This is becoming a blocker |
refer to https://www.openssl.org/source/ |
Well, the extended support from openssl is hardly practical since we / others use the OpenREsty binary directly since custom Lua builds is heavily discouraged according to the official documentation, due to the complexity involved. So the OpenResty images are the only source for kosher builds containing latest versions of OpenSSL. The later builds are also importance from compliance perspective and it is not just a question of support. |
Currently, countries around the world are paying close attention to network security. openssl1.x may be directly disabled if it fails the security baseline test, and if it cannot be upgraded. Is it possible to find a way to cheat the test, for example, just change the version number 🤣🤣🤣🤣🤣🤣🤣 |
Do we know if this work is planned ? Is someone working on this ? Can we help in any ways possible ? |
They promised in a previous issue to release 1.25.x before the end of the year. |
Can you please share a reference to this promise, so that i can check in on it whenever i need to get tensed up in my free time ? |
|
@zhuizhuhaomeng Can you please comment if OpenSSL 3 upgrade is going to be part of Nginx 1.25.x upgrade? |
At least, there are two things to do: If anyone can submit a PR, it would be appreciated! |
Hi, Just wanted to confirm I got things right.. In the latest
So, although Openresty 1.25.3.1 is based on Nginx 1.25.3, for which there are builds using OpenSSL 3.X, Openresty itself is still built against OpenSSL 1.1.1. Currently, there's no oficial Docker image using OpenSSL 3.X. Is my understanding correct? Thanks. |
Seems @luisgoncalves is right. Also dropping from forum:
|
Just chiming in with my 2 cents Now that OpenSSL 1.1.1 is EOL with 1.1.1w being the last public release, curious what are OpenResty and Lua Nginx's ssl* plans for the future, and what will you upgrade the base to? Several projects also discuss their futures beyond OpenSSL 1.1.1 at haproxy/haproxy#2294 and quictls/quictls#14. I ask as my Nginx builds, which have optional Lua Nginx modules support, can be compiled against the following crypto libraries below. But naturally, not all are expected to be supported by Lua Nginx.
Personally, for my own Nginx builds, I am leaning towards https://github.com/aws/aws-lc, which combines the best of BoringSSL and OpenSSL 1.1.1 code base with HTTP/2 and HTTP/3 QUIC support and retaining OCSP stapling support and dual RSA + ECDSA SSL certificate support which BoringSSL ripped out. AWS-LC is also the easiest and fastest to compile too! 😎 Amazon AWS-LC team are also focussing on compatibility with a lot of common software including Nginx and nginx patches - see https://github.com/aws/aws-lc/tree/main/tests/ci/integration and they're FIPS 140-3 certificated https://aws.amazon.com/blogs/security/aws-lc-is-now-fips-140-3-certified/ FYI, performance wise AWS-LC > BoringSSL > OpenSSL/quicTLS 1.1.1 > OpenSSL/quicTLS 3.3 > 3.2 > 3.1 >3.0 > LibreSSL. So if you're worried about performance regressions in OpenSSL 3.0-3.3, then my choice is still AWS AWS-LC 😃 |
In my test results, OpenResty 1.25.3.1 + QUIC can work well with OpenSSL 3.x. I will test BoringSSL and aws-lc in the future. |
Result:
I have open a PR(openresty/lua-nginx-module#2357) to fix it. |
@devhaozi how did you tested it, can you share that in isolated environment like Docker file in gist? |
Pls refer to my PR, there is no problem with the basic functions, but test 140 failed, current not clear whether it is an AWS-LC problem? And OpenResty support OpenSSL 3 since 1.25, but they don't use it in production due to performance regressions. |
OpenResty 1.27.1.1 has been released and this issue can be closed. |
Great news !! Can you please advice if the performance issues referred to above is now fixed ? I would be very much interested to know if 1.27.1.1 has the 3.0 OpenSSL FIPS provider bundled along with the image ? Or will this have to be added in / compiled in manually ? |
It is well known that openssl version 1.x has been end of life.

In the meantime, nginx has been actively upgraded to openSSL 3.0.x
The text was updated successfully, but these errors were encountered: