[erlang-questions] Patch package OTP 18.3.2 released
Ingela Andin
ingela.andin@REDACTED
Thu Apr 28 22:06:46 CEST 2016
*Hi!*
I am not sure exactly where in the git handling this went wrong, but here
is the patch solves the problem. The solution was already merged to master
and it seems it was an old incorrect version of the branch that was used
for the patch :(
*diff --git a/lib/ssl/src/ssl_cipher.erl b/lib/ssl/src/ssl_ciphe**r.erl*
*index 6ea1bdb..af53d4a 100644*
*--- a/lib/ssl/src/ssl_cipher.erl*
*+++ b/lib/ssl/src/ssl_cipher.erl*
@@ -979,21 +979,21 @@ suite({ecdh_rsa, aes_256_cbc, sha384, sha384}) ->
%% RFC 5288 AES-GCM Cipher Suites
suite({rsa, aes_128_gcm, null, sha256}) ->
?TLS_RSA_WITH_AES_128_GCM_SHA256;
-suite({rsa, aes_256_gcm, null}) ->
+suite({rsa, aes_256_gcm, null, sha384}) ->
?TLS_RSA_WITH_AES_256_GCM_SHA384;
-suite({dhe_rsa, aes_128_gcm, null, sha384}) ->
+suite({dhe_rsa, aes_128_gcm, null, sha256}) ->
?TLS_DHE_RSA_WITH_AES_128_GCM_SHA256;
-suite({dhe_rsa, aes_256_gcm, null, sha256}) ->
+suite({dhe_rsa, aes_256_gcm, null, sha384}) ->
?TLS_DHE_RSA_WITH_AES_256_GCM_SHA384;
-suite({dh_rsa, aes_128_gcm, null, sha384}) ->
+suite({dh_rsa, aes_128_gcm, null, sha256}) ->
?TLS_DH_RSA_WITH_AES_128_GCM_SHA256;
-suite({dh_rsa, aes_256_gcm, null, sha256}) ->
+suite({dh_rsa, aes_256_gcm, null, sha384}) ->
?TLS_DH_RSA_WITH_AES_256_GCM_SHA384;
-suite({dhe_dss, aes_128_gcm, null, sha384}) ->
+suite({dhe_dss, aes_128_gcm, null, sha256}) ->
?TLS_DHE_DSS_WITH_AES_128_GCM_SHA256;
-suite({dhe_dss, aes_256_gcm, null, sha256}) ->
+suite({dhe_dss, aes_256_gcm, null, sha384}) ->
?TLS_DHE_DSS_WITH_AES_256_GCM_SHA384;
-suite({dh_dss, aes_128_gcm, null, sha384}) ->
+suite({dh_dss, aes_128_gcm, null, sha256}) ->
?TLS_DH_DSS_WITH_AES_128_GCM_SHA256;
suite({dh_dss, aes_256_gcm, null, sha384}) ->
?TLS_DH_DSS_WITH_AES_256_GCM_SHA384;
2016-04-27 20:52 GMT+02:00 <vicbaz@REDACTED>:
> Hello,
>
> When I run
>
> https://github.com/ninenines/cowboy/tree/1.0.4/examples/ssl_hello_world
>
> under OTP-18.3.2 I got 'unknown POSIX error' (see below).
>
> Could someone explain to me what happened?
> It works without problem under OTP-18.3.1.
>
> $ ./_rel/ssl_hello_world_example/bin/ssl_hello_world_example console
> Exec:
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/erts-7.3.1/bin/erlexec
> -boot
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/ssl_hello_world_example
> -mode embedded -boot_var ERTS_LIB_DIR
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/erts-7.3.1/../lib
> -config
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/sys.config
> -args_file
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/vm.args
> -- console
> Root:
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example
>
> /home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example
> Erlang/OTP 18 [erts-7.3.1] [source] [64-bit] [smp:2:2] [async-threads:10]
> [hipe] [kernel-poll:false]
>
>
> =ERROR REPORT==== 27-Apr-2016::21:43:11 ===
> Failed to start Ranch listener https in ranch_ssl:listen([{port,8443},
> {cacertfile,
>
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt"},
> {certfile,
>
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt"},
> {keyfile,
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key"}])
> for reason {options,
>
>
> {ciphers,
>
>
> [{ecdhe_ecdsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {ecdhe_rsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {ecdhe_ecdsa,
>
>
> aes_256_cbc,
>
>
> sha384,
>
>
> sha384},
>
>
> {ecdhe_rsa,
>
>
> aes_256_cbc,
>
>
> sha384,
>
>
> sha384},
>
>
> {ecdh_ecdsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {ecdh_rsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {ecdh_ecdsa,
>
>
> aes_256_cbc,
>
>
> sha384,
>
>
> sha384},
>
>
> {ecdh_rsa,
>
>
> aes_256_cbc,
>
>
> sha384,
>
>
> sha384},
>
>
> {dhe_rsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {dhe_dss,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {dhe_rsa,
>
>
> aes_256_cbc,
>
>
> sha256},
>
>
> {dhe_dss,
>
>
> aes_256_cbc,
>
>
> sha256},
>
>
> {rsa,
>
>
> aes_256_gcm,
>
>
> null,
>
>
> sha384},
>
>
> {rsa,
>
>
> aes_256_cbc,
>
>
> sha256},
>
>
> {ecdhe_ecdsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {ecdhe_rsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {ecdhe_ecdsa,
>
>
> aes_128_cbc,
>
>
> sha256,
>
>
> sha256},
>
>
> {ecdhe_rsa,
>
>
> aes_128_cbc,
>
>
> sha256,
>
>
> sha256},
>
>
> {ecdh_ecdsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {ecdh_rsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {ecdh_ecdsa,
>
>
> aes_128_cbc,
>
>
> sha256,
>
>
> sha256},
>
>
> {ecdh_rsa,
>
>
> aes_128_cbc,
>
>
> sha256,
>
>
> sha256},
>
>
> {dhe_rsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {dhe_dss,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {dhe_rsa,
>
>
> aes_128_cbc,
>
>
> sha256},
>
>
> {dhe_dss,
>
>
> aes_128_cbc,
>
>
> sha256},
>
>
> {rsa,
>
>
> aes_128_gcm,
>
>
> null,
>
>
> sha256},
>
>
> {rsa,
>
>
> aes_128_cbc,
>
>
> sha256},
>
>
> {ecdhe_ecdsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {ecdhe_rsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {dhe_rsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {dhe_dss,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {ecdh_ecdsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {ecdh_rsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {rsa,
>
>
> aes_256_cbc,
>
>
> sha},
>
>
> {ecdhe_ecdsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {ecdhe_rsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {dhe_rsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {dhe_dss,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {ecdh_ecdsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {ecdh_rsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {rsa,
>
>
> '3des_ede_cbc',
>
>
> sha},
>
>
> {ecdhe_ecdsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {ecdhe_rsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {dhe_rsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {dhe_dss,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {ecdh_ecdsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {ecdh_rsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {rsa,
>
>
> aes_128_cbc,
>
>
> sha},
>
>
> {dhe_rsa,
>
>
> des_cbc,
>
>
> sha},
>
>
> {rsa,
>
>
> des_cbc,
>
>
> sha}]}} (unknown
> POSIX error)
> Eshell V7.3.1 (abort with ^G)
> (ssl_hello_world_example@REDACTED)1>
> =INFO REPORT==== 27-Apr-2016::21:43:11 ===
> application: ssl_hello_world
> exited: {bad_return,
> {{ssl_hello_world_app,start,[normal,[]]},
> {'EXIT',
> {{badmatch,
> {error,
> {{shutdown,
> {failed_to_start_child,ranch_acceptors_sup,
> {listen_error,https,
> {options,
> {ciphers,
> [{ecdhe_ecdsa,aes_256_gcm,null,sha384},
> {ecdhe_rsa,aes_256_gcm,null,sha384},
> {ecdhe_ecdsa,aes_256_cbc,sha384,sha384},
> {ecdhe_rsa,aes_256_cbc,sha384,sha384},
> {ecdh_ecdsa,aes_256_gcm,null,sha384},
> {ecdh_rsa,aes_256_gcm,null,sha384},
> {ecdh_ecdsa,aes_256_cbc,sha384,sha384},
> {ecdh_rsa,aes_256_cbc,sha384,sha384},
> {dhe_rsa,aes_256_gcm,null,sha384},
> {dhe_dss,aes_256_gcm,null,sha384},
> {dhe_rsa,aes_256_cbc,sha256},
> {dhe_dss,aes_256_cbc,sha256},
> {rsa,aes_256_gcm,null,sha384},
> {rsa,aes_256_cbc,sha256},
> {ecdhe_ecdsa,aes_128_gcm,null,sha256},
> {ecdhe_rsa,aes_128_gcm,null,sha256},
> {ecdhe_ecdsa,aes_128_cbc,sha256,sha256},
> {ecdhe_rsa,aes_128_cbc,sha256,sha256},
> {ecdh_ecdsa,aes_128_gcm,null,sha256},
> {ecdh_rsa,aes_128_gcm,null,sha256},
> {ecdh_ecdsa,aes_128_cbc,sha256,sha256},
> {ecdh_rsa,aes_128_cbc,sha256,sha256},
> {dhe_rsa,aes_128_gcm,null,sha256},
> {dhe_dss,aes_128_gcm,null,sha256},
> {dhe_rsa,aes_128_cbc,sha256},
> {dhe_dss,aes_128_cbc,sha256},
> {rsa,aes_128_gcm,null,sha256},
> {rsa,aes_128_cbc,sha256},
> {ecdhe_ecdsa,aes_256_cbc,sha},
> {ecdhe_rsa,aes_256_cbc,sha},
> {dhe_rsa,aes_256_cbc,sha},
> {dhe_dss,aes_256_cbc,sha},
> {ecdh_ecdsa,aes_256_cbc,sha},
> {ecdh_rsa,aes_256_cbc,sha},
> {rsa,aes_256_cbc,sha},
> {ecdhe_ecdsa,'3des_ede_cbc',sha},
> {ecdhe_rsa,'3des_ede_cbc',sha},
> {dhe_rsa,'3des_ede_cbc',sha},
> {dhe_dss,'3des_ede_cbc',sha},
> {ecdh_ecdsa,'3des_ede_cbc',sha},
> {ecdh_rsa,'3des_ede_cbc',sha},
> {rsa,'3des_ede_cbc',sha},
> {ecdhe_ecdsa,aes_128_cbc,sha},
> {ecdhe_rsa,aes_128_cbc,sha},
> {dhe_rsa,aes_128_cbc,sha},
> {dhe_dss,aes_128_cbc,sha},
> {ecdh_ecdsa,aes_128_cbc,sha},
> {ecdh_rsa,aes_128_cbc,sha},
> {rsa,aes_128_cbc,sha},
> {dhe_rsa,des_cbc,sha},
> {rsa,des_cbc,sha}]}}}}},
> {child,undefined,
> {ranch_listener_sup,https},
> {ranch_listener_sup,start_link,
> [https,100,ranch_ssl,
> [{port,8443},
> {cacertfile,
>
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt"},
> {certfile,
>
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt"},
> {keyfile,
>
>
> "/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key"}],
> cowboy_protocol,
> [{env,
> [{dispatch,
> [{'_',[],[{[],[],toppage_handler,[]}]}]}]}]]},
> permanent,infinity,supervisor,
> [ranch_listener_sup]}}}},
> [{ssl_hello_world_app,start,2,
> [{file,"src/ssl_hello_world_app.erl"},{line,20}]},
> {application_master,start_it_old,4,
> [{file,"application_master.erl"},{line,273}]}]}}}}
> type: permanent
> {"Kernel pid
> terminated",application_controller,"{application_start_failure,ssl_hello_world,{bad_return,{{ssl_hello_world_app,start,[normal,[]]},{'EXIT',{{badmatch,{error,{{shutdown,{failed_to_start_child,ranch_acceptors_sup,{listen_error,https,{options,{ciphers,[{ecdhe_ecdsa,aes_256_gcm,null,sha384},{ecdhe_rsa,aes_256_gcm,null,sha384},{ecdhe_ecdsa,aes_256_cbc,sha384,sha384},{ecdhe_rsa,aes_256_cbc,sha384,sha384},{ecdh_ecdsa,aes_256_gcm,null,sha384},{ecdh_rsa,aes_256_gcm,null,sha384},{ecdh_ecdsa,aes_256_cbc,sha384,sha384},{ecdh_rsa,aes_256_cbc,sha384,sha384},{dhe_rsa,aes_256_gcm,null,sha384},{dhe_dss,aes_256_gcm,null,sha384},{dhe_rsa,aes_256_cbc,sha256},{dhe_dss,aes_256_cbc,sha256},{rsa,aes_256_gcm,null,sha384},{rsa,aes_256_cbc,sha256},{ecdhe_ecdsa,aes_128_gcm,null,sha256},{ecdhe_rsa,aes_128_gcm,null,sha256},{ecdhe_ecdsa,aes_128_cbc,sha256,sha256},{ecdhe_rsa,aes_128_cbc,sha256,sha256},{ecdh_ecdsa,aes_128_gcm,null,sha256},{ecdh_rsa,aes_128_gcm,null,sha256},{ecdh_ecdsa,aes_128_cbc,sha256,sha
> 256},{ec
> d
>
> h_rsa,aes_128_cbc,sha256,sha256},{dhe_rsa,aes_128_gcm,null,sha256},{dhe_dss,aes_128_gcm,null,sha256},{dhe_rsa,aes_128_cbc,sha256},{dhe_dss,aes_128_cbc,sha256},{rsa,aes_128_gcm,null,sha256},{rsa,aes_128_cbc,sha256},{ecdhe_ecdsa,aes_256_cbc,sha},{ecdhe_rsa,aes_256_cbc,sha},{dhe_rsa,aes_256_cbc,sha},{dhe_dss,aes_256_cbc,sha},{ecdh_ecdsa,aes_256_cbc,sha},{ecdh_rsa,aes_256_cbc,sha},{rsa,aes_256_cbc,sha},{ecdhe_ecdsa,'3des_ede_cbc',sha},{ecdhe_rsa,'3des_ede_cbc',sha},{dhe_rsa,'3des_ede_cbc',sha},{dhe_dss,'3des_ede_cbc',sha},{ecdh_ecdsa,'3des_ede_cbc',sha},{ecdh_rsa,'3des_ede_cbc',sha},{rsa,'3des_ede_cbc',sha},{ecdhe_ecdsa,aes_128_cbc,sha},{ecdhe_rsa,aes_128_cbc,sha},{dhe_rsa,aes_128_cbc,sha},{dhe_dss,aes_128_cbc,sha},{ecdh_ecdsa,aes_128_cbc,sha},{ecdh_rsa,aes_128_cbc,sha},{rsa,aes_128_cbc,sha},{dhe_rsa,des_cbc,sha},{rsa,des_cbc,sha}]}}}}},{child,undefined,{ranch_listener_sup,https},{ranch_listener_sup,start_link,[https,100,ranch_ssl,[{port,8443},{cacertfile,\"/home/victor/src/cowbo
> y/exampl
> e
>
> s/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt\"},{certfile,\"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt\"},{keyfile,\"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key\"}],cowboy_protocol,[{env,[{dispatch,[{'_',[],[{[],[],toppage_handler,[]}]}]}]}]]},permanent,infinity,supervisor,[ranch_listener_sup]}}}},[{ssl_hello_world_app,start,2,[{file,\"src/ssl_hello_world_app.erl\"},{line,20}]},{application_master,start_it_old,4,[{file,\"application_master.erl\"},{line,273}]}]}}}}}"}
>
> Crash dump is being written to: erl_crash.dump...done
>
>
> On 27/04/16 11:34, Henrik Nord X wrote:
>
>> Patch Package: OTP 18.3.2
>> Git Tag: OTP-18.3.2
>> Date: 2016-04-27
>> Trouble Report Id: OTP-13261, OTP-13510, OTP-13511
>> Seq num:
>> System: OTP
>> Release: 18
>> Application: inets-6.2.2, ssl-7.3.1
>> Predecessor: OTP 18.3.1
>>
>> Check out the git tag OTP-18.3.2, and build a full OTP system
>> including documentation. Apply one or more applications from this
>> build as patches to your installation using the 'otp_patch_apply'
>> tool. For information on install requirements, see descriptions for
>> each application version below.
>>
>> ---------------------------------------------------------------------
>> --- inets-6.2.2 -----------------------------------------------------
>> ---------------------------------------------------------------------
>>
>> The inets-6.2.2 application can be applied independently of other
>> applications on a full OTP 18 installation.
>>
>> --- Improvements and New Features ---
>>
>> OTP-13510 Application(s): inets
>>
>> Add environment information item peer_cert to mod_esi
>>
>>
>> Full runtime dependencies of inets-6.2.2: erts-6.0, kernel-3.0,
>> mnesia-4.12, runtime_tools-1.8.14, ssl-5.3.4, stdlib-2.0
>>
>>
>> ---------------------------------------------------------------------
>> --- ssl-7.3.1 -------------------------------------------------------
>> ---------------------------------------------------------------------
>>
>> The ssl-7.3.1 application can be applied independently of other
>> applications on a full OTP 18 installation.
>>
>> --- Fixed Bugs and Malfunctions ---
>>
>> OTP-13511 Application(s): ssl
>>
>> Corrections to cipher suite handling using the 3 and 4
>> tuple format in addition to commit
>> 89d7e21cf4ae988c57c8ef047bfe85127875c70c
>>
>>
>> --- Improvements and New Features ---
>>
>> OTP-13261 Application(s): ssl
>>
>> Make values for the TLS-1.2 signature_algorithms
>> extension configurable
>>
>>
>> Full runtime dependencies of ssl-7.3.1: crypto-3.3, erts-7.0,
>> inets-5.10.7, kernel-3.0, public_key-1.0, stdlib-2.0
>>
>>
>> ---------------------------------------------------------------------
>> ---------------------------------------------------------------------
>> ---------------------------------------------------------------------
>>
>> _______________________________________________
>> erlang-questions mailing list
>> erlang-questions@REDACTED
>> http://erlang.org/mailman/listinfo/erlang-questions
>>
> _______________________________________________
> erlang-questions mailing list
> erlang-questions@REDACTED
> http://erlang.org/mailman/listinfo/erlang-questions
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://erlang.org/pipermail/erlang-questions/attachments/20160428/f16a5602/attachment.htm>
More information about the erlang-questions
mailing list