-
-
Notifications
You must be signed in to change notification settings - Fork 31.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update OpenSSL versions for CI and Windows #131423
Comments
Any reason we shouldn't move the Windows release forward to a newer version than 3.0 (for 3.14, that is - prior releases presumably stay where they are)? |
I don't know. I guess we don't need the features added in 3.1. However, from a performance perspective, OpenSSL 3.0 seems to be way much slower compared to OpenSSL 3.1 on Windows builds: https://openssl-library.org/performance.html. However, OpenSSL 3.0 is the "LTS" version of OpenSSL so for Windows it may be better (see https://openssl-library.org/policies/releasestrat/index.html). Now, in 2026, 3.0 would no more be LTS, so we might jump to the next LTS at that moment. WDYT? Otherwise, if there's no more LTS for OpenSSL, we might need to update Python much more frequently once a version becomes out-of-date (non-LTS releases are supported for 2 years, so I don't know how you want to proceed) |
Hmm... yeah... let's stick to their LTS releases then. Presumably they'll have to nominate another LTS release before the current one expires, though it's a bit unfortunate we can't count on any to be supported for the same time as our own release. |
The |
Thanks! I'm sorry but I won't be able to update this until Sunday as I'm going offline for a few days. |
https://docs.python.org/3/using/configure.html says: Shall we bump that 3.0.9 to 3.0.16?
3.1 just went EOL on 2025-03-14, and 1.1.1 has been EOL since 2023-09-11.
Yes, 3.5 (due for release next month, 2025-04-08) will be the next LTS: https://openssl-library.org/post/2025-02-20-openssl-3.5-lts/ And:
What is our policy around dropping EOL OpenSSL? Given there will always be two LTS, can we go as far as only supporting those? |
1.1.1 has been EOL but I don't know about 1.1.1z for instance. It's still receiving updates I think and our build requirements are 1.1.1 at least. I'm not at home yet so I can't check it precisely but I'll investigate this evening of tomorrow |
1.1.1w was the last official 1.1.1 from OpenSSL:
1.1.1z* releases are security backports by a third-party: |
I think we can update the requirements for macOS and Windows as they are already out of date. Concerning the minimal version and the policy for dropping EOL versions (which is partially related):
I don't know why my phone told my that the 1.1.1l release was actually 6 months ago. I can't find it anymore on the web UI so I guess it was a GH bug. |
|
What about building against 1.1.1? (not relevant to this issue - but seems to be part of the conversation)
Why not rip 1.1.1-ish support out entirely? Things like AWS-LC and BoringSSL are 1.1.1-API-ish with a mix of additions/removals and do get used around the world in many critical places with all sorts of software, including CPython. https://discuss.python.org/t/support-building-ssl-and-hashlib-modules-against-aws-lc/44505 Those 1.1.1 forks are not currently part of a tier supported platform to build against. They're best effort at most and I do not believe we build out of the box against those correctly today. People using them still maintain patches against CPython to do so. If users of those want more from us, they need to step up and provide support ala PEP-11 tiers to be officially tested as a tier'd platform. This mostly winds up being "don't RIP out existing conditional compilation bits for aws-lc/boringssl" if you can help it. It isn't used by us, but others use it and occasionally contribute work to minimize the needs of their own CPython patches. ex: #131050 is a reasonable request along those lines for AWS-LC/BoringSSL purposes. |
It's currently working in the CI. What the CI failed to do was related to incorrect mnemonics which were added in 3.x. So I actually didn't touch anything related to 1.1.1.
That I agree.
I would like to point that https://docs.python.org/3/using/configure.html still mentions that "OpenSSL 1.1.1 is the minimum version" and that "OpenSSL 3.0.9 is the recommended minimum version for the ssl and hashlib extension modules" (emphasis mine).
I would have initially answered that it's because of some OSes, but I think I should upgrade my distribution as
So, if we drop 1.1.1, it could annoy some people like me who forgot to upgrade the distribution (or are late in doing it), but otherwise, I think it's probably a good idea to simplify the code (this should be tracked and correctly investigated in a separate issue though). Now, I'm sorry to have said that openssl 1.1.1* still received updates but on my GH mobile app, the 1.1.1p release was marked as "6 months ago" which I found it weird. It might be a cache issue on my side but I can confirm that it's not updated at all :') |
Honestly, it would probably be easier for them to fork the |
The bin tag is 3.0.16.1 because we rebuilt without uplink support to fix pythongh-131804. This PR also prevents making calls that are now unsafe without uplink, and updates the tests to property interpret these failures as unsupported.
How about I give you the Windows part but I keep the Linux part as the mnemonics were updated in 3.4.1? |
Okay yeah, you can keep that PR and I'll stick with the easy one 😆 |
Deal! |
The bin tag is 3.0.16.1 because we rebuilt without uplink support to fix pythongh-131804. This PR also prevents making calls that are now unsafe without uplink, and updates the tests to property interpret these failures as unsupported.
The bin tag is 3.0.16.1 because we rebuilt without uplink support to fix pythongh-131804. This PR also prevents making calls that are now unsafe without uplink, and updates the tests to property interpret these failures as unsupported.
I have another update for Windows on this to use a build made with an older compiler version - one that doesn't have the compiler bug that caused problems with 3.0.16.1 and 3.0.16 (note that the fourth digit is ours, the OpenSSL sources are the same each time). |
…ash (pythonGH-132051) (cherry picked from commit 24decb0) Co-authored-by: Steve Dower <steve.dower@python.org>
OpenSSL v3.4.1 is out and contains some security patches (see https://github.com/openssl/openssl/releases/tag/openssl-3.4.1). There is one high vulnerabilty (CVE-2024-12797) that was fixed.
However, what I'm interested in, are the fixes that allow me to continue working on #128391 (see openssl/openssl#26388). Note that this high vulnerability does not affect the Windows build as the latter is still using OpenSSL 3.0.15 which is only affected by the following low vulnerabilities:
Those low vulnerabilities affect OpenSSL 1.1.1+ and 3.x versions that we currently use and were fixed in the February 2025 release.
Note: I don't think Python is directly affected by the low vulnerabilies and I just want the fixes that were included in those releases for my own work. Since the high vulnerability only affects 3.2+, Windows builds should not be affected.
cc @gpshead
Plan:
Linked PRs
The text was updated successfully, but these errors were encountered: