This bug was fixed in the package haproxy - 1.8.8-1ubuntu0.6
---------------
haproxy (1.8.8-1ubuntu0.6) bionic; urgency=medium
* Fix issues around dh_params when building against openssl 1.1.1
to avoid regressing the minimal key size (LP: 1841936)
- d/p/lp-1841936-BUG-MEDIUM-ssl-tune.ssl.default-dh-param-value-ignor.patch
- d/p/lp-1841936-CLEANUP-ssl-make-ssl_sock_load_dh_params-handle-errc.patch
haproxy (1.8.8-1ubuntu0.5) bionic; urgency=medium
* no change rebuild to pick up openssl 1.1.1 and via that
TLSv1.3 (LP: #1841936)
-- Christian Ehrhardt <[email protected]> Wed, 23 Oct
2019 11:37:53 +0200
** Changed in: haproxy (Ubuntu Bionic)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841936
Title:
Rebuild openssl 1.1.1 to pickup TLSv1.3 (bionic) and unbreak existing
builds against 1.1.1 (dh key size)
To manage notifications about this bug go to:
https://bugs.launchpad.net/haproxy/+bug/1841936/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs