From: Matthias Fischer <matthias.fischer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [Fwd: [squid-announce] Squid 4.1 is available]
Date: Thu, 05 Jul 2018 16:55:19 +0200 [thread overview]
Message-ID: <1cc95aa3-7bb0-230d-dc24-76b0f8b20e4a@ipfire.org> (raw)
In-Reply-To: <9aa23d5a-0f10-2508-a2c5-707b78193f9d@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 3799 bytes --]
Hi,
Found something, see below.
On 04.07.2018 20:52, Matthias Fischer wrote:
> On 04.07.2018 18:43, Michael Tremer wrote:
>> On Wed, 2018-07-04 at 17:04 +0200, Matthias Fischer wrote:
>>> On 04.07.2018 16:57, Michael Tremer wrote:
>>> > On Wed, 2018-07-04 at 16:54 +0200, Matthias Fischer wrote:
>>> > > Hi,
>>> > >
>>> > > On 04.07.2018 11:12, Michael Tremer wrote:
>>> > > > Squid 4.1 has been released.
>>> > >
>>> > > Yep.
>>> > >
>>> > > > @Matthias: As far as I remember, you have been working on updating squid
>>> > > > before.
>>> > > > Will you have a look at this?
>>> > >
>>> > > I'm "looking at it" right now. ;-)
>>> > >
>>> > > When I came home, Devel was ready.
>>> > >
>>> > > First compiled version (32bit) is running here. No seen problems.
>>> > >
>>> > > But today they released the first patch
>>> > > (http://www.squid-cache.org/Versions/v4/changesets/squid-4-01fd74072310c3b
>>> > > 018f
>>> > > 4b6a5b5c6be4816f72166.patch).
>>> > > Great...
>>> > >
>>> > > I think we're not affected ("There is a Segfault when opening long URLs
>>> > > if Bump is enabled and the on_unsupported_protocol option is set. Proxy
>>> > > mode is transparent.") but to be complete, I'd like to include this one.
>>> > >
>>> > > This requires a clean build (~5:30 hours). Patched version will be ready
>>> > > tomorrow. Ok?
>>> >
>>> > No hurry at all. I guess this already shows us that we should not migrate to
>>> > squid 4, yet. There are still many bugs in it. But what we need to do is to
>>> > review the proxy.cgi and see if the configuration file is valid and make
>>> > changes
>>> > if required.
>>>
>>> Im testing the squid4-branch since ~4.0.22, 'squid -k parse' hasn't
>>> shown an error since then, except this one - and I can't find the reason:
>>>
>>> "WARNING: Ignoring error setting default trusted CA : An unimplemented
>>> or disabled feature has been requested."
>>
>> Did you go through the changelog to identify any configuration options that you
>> might not be using and which have been discontinued?
>
> Yes, but I didn't find an option or something in the squid conf - with
> MY eyes - that could me to the culprit.
>
> What I found:
> That warning is triggered by 'PeerOptions.cc':
>
> ...
> if (!flags.tlsDefaultCa)
> return;
>
> if (const char *err = loadSystemTrustedCa(ctx)) {
> debugs(83, DBG_IMPORTANT, "WARNING: Ignoring error setting
> default trusted CA : " << err);
> }
> ...
>
> Which leads me to:
>
> ...
> loadSystemTrustedCa(Security::ContextPointer &ctx)
> {
> debugs(83, 8, "Setting default system Trusted CA. ctx=" <<
> (void*)ctx.get());
> #if USE_OPENSSL
> if (SSL_CTX_set_default_verify_paths(ctx.get()) == 0)
> return Security::ErrorString(ERR_get_error());
>
> #elif USE_GNUTLS
> auto x = gnutls_certificate_set_x509_system_trust(ctx.get());
> if (x < 0)
> return Security::ErrorString(x);
> ...
>
> Perhaps we should add ---without-gnutls'?
>
> Since SSL is already disabled that is the only option I can think of and
> it clearly is found by 'squid':
>
> ...
> checking for LIBGNUTLS... yes
> checking gnutls/gnutls.h usability... yes
> checking gnutls/gnutls.h presence... yes
> checking for gnutls/gnutls.h... yes
> checking gnutls/x509.h usability... yes
> checking gnutls/x509.h presence... yes
> checking for gnutls/x509.h... yes
> checking gnutls/abstract.h usability... yes
> checking gnutls/abstract.h presence... yes
> checking for gnutls/abstract.h... yes
> configure: GnuTLS library support: auto -lgnutls
> ...
>
After adding 'without-gnutls' and another clean build, warning is gone.
New version is running.
Best,
Matthias
next prev parent reply other threads:[~2018-07-05 14:55 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <c8f9202f-47b1-c34e-5480-8191d57f8a2b@treenet.co.nz>
2018-07-04 9:12 ` Michael Tremer
2018-07-04 14:54 ` Matthias Fischer
2018-07-04 14:57 ` Michael Tremer
2018-07-04 15:04 ` Matthias Fischer
2018-07-04 16:43 ` Michael Tremer
2018-07-04 18:52 ` Matthias Fischer
2018-07-05 14:55 ` Matthias Fischer [this message]
2018-07-05 16:57 ` Matthias Fischer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1cc95aa3-7bb0-230d-dc24-76b0f8b20e4a@ipfire.org \
--to=matthias.fischer@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox