You are not logged in.
Hi,
Since last sysupdate, I get this message every few minutes in my logs:
postfix/smtpd[38495]: warning: run-time library vs. compile-time header version mismatch: OpenSSL 1.1.1 may not be compatible with OpenSSL 1.1.0
Was postfix compiles against the wrong version of OpenSSL and do I have to wait until this is solved by its maintainer or is there something I can do?
Thanks for any help!
Offline
I suggest you report it on bugzilla, to get postfix recompiled.
Offline
Thanks. I'll do that when I get home.
Offline
It is already there a couple of times. No need for another report.
Offline
I see bug report, closed as "not a bug".
I would be confused as to why the bug report was closed
Offline
I have made a request to re-open it.
Offline
And it was closed again:
Reason for denial:
Warnings are not errors due to the fact that they are warnings. Ask upstream not to add silly warnings, we're not recompiling @world for every package bump of any sort.
I personally don't feel that bugs are defined as something that is logged as error (often bugs aren't logged at all), and I don't think warning against using a different OpenSSL than what it is compiled against is silly (Or is it? Perhaps I'm wrong here?)
Anyway I guess the fact that these warnings are basically flooding my logs (once every connection) is not enough reason for the maintainer to recompile the package and make the update internally consistent
Offline
Well, both sides have a point
Postfix shouldn't be spamming its logs with that (seems ancient).
I suggest creating a patch, to to disable the headers check and logspam.
Edit: The patch already exists, see Ubuntu patches: 10_openssl_version_check.diff
Last edited by brebs (2018-09-18 14:01:45)
Offline
Well, both sides have a point
Postfix shouldn't be spamming its logs with that (seems ancient).
Agreed
Offline
I'd suggest: Check that the patch works, then request to re-open that bug (again), including the patch.
I am surprised that the Arch bug was closed/rejected so quickly.
Offline
WE WILL NOT ADD DOWNSTREAM PATCHES TO DISABLE THIS CHECK.
As I already said: "Ask upstream not to add silly warnings, we're not recompiling @world for every package bump of any sort."
Managing AUR repos The Right Way -- aurpublish (now a standalone tool)
Offline
I personally don't feel that bugs are defined as something that is logged as error (often bugs aren't logged at all), and I don't think warning against using a different OpenSSL than what it is compiled against is silly (Or is it? Perhaps I'm wrong here?)
If something is incorrectly logged as a warning when it is an error, then that is a bug.
If something is incorrectly not logged at all when it is an error, then that is a bug.
If something is logged as a warning, then the fact that it is logged, is not in and of itself any sort of proof that there is a bug. I dispute your notion that *this* warning is real, and therefore I do not see a valid reason to recompile anything.
Anyway I guess the fact that these warnings are basically flooding my logs (once every connection) is not enough reason for the maintainer to recompile the package and make the update internally consistent
With this logic, we will have to rebuild our entire distribution from scratch every time openssl is updated. That's thousands of packages.
EDIT: "with this logic" ==> "the natural end result of this logic if both we and upstream developers of various software begin to consider this a reasonable approach"
If the warnings are flooding your logs and its messy, complain to upstream. The *minimum* requirement for us applying a patch to disable this version check, is for that patch to be accepted upstream.
Last edited by eschwartz (2018-09-18 15:28:27)
Managing AUR repos The Right Way -- aurpublish (now a standalone tool)
Offline
With this logic, we will have to rebuild our entire distribution from scratch every time openssl is updated. That's thousands of packages.
Or the one package that is giving excess warnings...
Offline
With this logic, we will have to rebuild our entire distribution from scratch every time openssl is updated. That's thousands of packages.
EDIT: "with this logic" ==> "the natural end result of this logic if both we and upstream developers of various software begin to consider this a reasonable approach"
Fair enough.
Offline
This isn't the justice system, one ruling does not set a precedent that must forever be followed. So while this really should be addressed upstream (the warning seems prudent, spamming the warning is ridiculous), it can be addressed here by recompiling one package (not all of them) to silence the silliness of upstream until they get their heads on strait(er).
And while it might be nice if the maintainer did that and put it in the repos, anyone who is unhappy with the log spam can just as easily use the ABS to rebuild it themselves and solve the problem with much less time and effort than has been put into this thread.
Last edited by Trilby (2018-09-19 13:49:17)
"UNIX is simple and coherent" - Dennis Ritchie; "GNU's Not Unix" - Richard Stallman
Offline
While most of the time nothing happens, openssl doesn't guarantee 100% ABI compatibility even w/ "micro" releases, see https://abi-laboratory.pro/?view=timeline&l=openssl
So, strictly spoken, the postfix check is correct (though it certainly should not spam the log), the debian patch (of course) bogus and yes, you got to recompile the system w/ every minor openssl bump :-P
src/tls/tls_misc.c
…
void tls_check_version(void)
{
static bool previously_logged = false;
if (previously_logged)
return; // don't spam
previously_logged = true;
…
Online
The *minimum* requirement for us applying a patch to disable this version check, is for that patch to be accepted upstream.
Where does this requirement come from?
For example, taking a patch at random, I don't see xserver-autobind-hotplug.patch in xorg-server git.
Offline
Eschwartz wrote:The *minimum* requirement for us applying a patch to disable this version check, is for that patch to be accepted upstream.
Where does this requirement come from?
AFAIK there is no such requirement, only the general consensus that the practice of applying non-upstream patches should be limited to a minimum. But I let the package maintainers decide if this case warrants an exception
Last edited by phw (2018-09-19 21:36:23)
Offline