Hi Chris,

Am 08.01.26 um 19:15 schrieb Christopher Schultz:
Rainer,

On 1/8/26 6:58 AM, Rainer Jung wrote:
Am 06.01.26 um 21:22 schrieb Mark Thomas:
The key differences in version 2.0.12 compared to 2.0.9 are:

- The windows binaries in this release have been built with OpenSSL
   3.5.4 and APR 1.7.6

- OCSP support is included (but not enabled) by default with various
   improvements to the OCSP checks

- Add the ability to configure TLS 1.3 ciphers

The 2.0.x branch is primarily intended for use with Tomcat 10.1.x onwards but can be used with earlier versions as long as the APR/ native connector is not used.

The proposed release artifacts can be found at [1],
and the build was done using tag [2].

The Apache Tomcat Native 2.0.12 release is
  [X] Stable, go ahead and release
  [ ] Broken because of ...

+1 for release

- checked artefacts for completeness

- checked artefact gpg signatures and sha512 hashes

- compared source tarballs against git sources

- checked OpenSSL version in Windows binaries

- checked some consistencies against own jnirelease.sh results

- built it against OpenSSL 3.6.0, 3.5.4 and 3.0.18, each on Platforms Solaris 10 Sparc, SLES 12 and 15 and RHEL 7, 8, 9 and 10 (Linux on x86_64). APR was 1.7.6.
   OK, but a few OpenSSL 3 deprecation warnings

- tested via TC unit tests with tcnative/OpenSSL but only the SSL/TLS related tests on the above platforms plus Solaris 11 Sparc using TC 11.0.15, 10.1.50 and 9.0.113 with latest patch levels of JDK 8, 11, 17, 21, 25, 26 and 27 from Adoptium Temurin, Amazon Corretto, Azul Zulu, Oracle, RedHat and OpenJDK where applicable.    No new failures or increased level of failures, only the normal amount of crashes.

Permission in the source tarball:

The sources are packed with broad group permissions (write allowed) for the included files. That is normal eg. on a Linux system with USERGROUPS_ENAB. Each user gets as his default group one with the same name as the user (eg. mark:mark). And then the broader permissions make sense. But when extracting such a tarball or zip on a system with a bigger group, the permissions might be a bit too open. So I would prefer to distribute artefacts packed with *no* group write permissions for the files contained in the archive.

+1

I wonder what your UMASK setting is. tar should be using your umask during extraction unless you specify the -p flag.

Yeah, it is mostly about the -p flag. But also to have safe defaults independent of extraction tool behavior.

OpenSSL deprecation warnings:

src/ssl.c:993:9: warning: 'SSL_SESSION_get_time' is deprecated: Since OpenSSL 3.4;not Y2038-safe, replace with SSL_SESSION_get_time_ex() [- Wdeprecated-declarations]

src/sslcontext.c:1041:9: warning: 'EC_KEY_new_by_curve_name' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
src/7 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_new_by_curve_name(int nid);

src/sslcontext.c:1045:5: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
src/2 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key);

src/sslutils.c:208:5: warning: 'PEM_read_bio_ECPKParameters' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]   471 | DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, ECPKParameters, EC_GROUP)

Thanks a bunch for RM!

Yep, we've been slowly trying to work-around the deprecations, mostly by using "new improved" techniques. Unfortunately, this often requires large portions of code to be re-written which causes impedance between versions, etc.

So we'll get there.

Yeah, for instance 2.x has only 3 deprecated symbols left in use, 1.3 has many more. So quite a progress already in 2.x!

Best regards,

Rainer


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to