<div dir="ltr"><div>Hi!</div><div><br></div><div>This is a configuration problem I suggest solutions in the ERL-823. <br></div><div><br></div><div>Regards Ingela Erlang/OTP team<br></div></div><br><div class="gmail_quote"><div dir="ltr">Den tors 3 jan. 2019 kl 21:18 skrev Nicholas Lundgaard <<a href="mailto:nalundgaard@gmail.com">nalundgaard@gmail.com</a>>:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
I wanted to call ERL-823 (<a href="https://bugs.erlang.org/browse/ERL-823" rel="noreferrer" target="_blank">https://bugs.erlang.org/browse/ERL-823</a>) to this list's attention. My company operates Erlang microservices in AWS on a kerl-built OTP installation on Amazon Linux (RedHat/CentOS-based), and we've encountered a serious challenge to upgrading to OTP 21: When you disable OpenSSL EC ciphers during an OTP build, which is necessary to build an OTP installation that doesn't erroneously think it has a bunch of EC ciphers that aren't built into the underlying OpenSSL, you're no longer able to connect to <a href="http://google.com" rel="noreferrer" target="_blank">google.com</a> via https (not to mention many, many other web properties, like much of AWS infrastructure).<br>
<br>
It confuses me that there is not a simpler way to align the Erlang crypto/ssl cipher support with the underlying openssl installation it's linked to, but that notwithstanding, It would be really helpful to have a flag to build OTP with support for RedHat/Fedora's EC cipher subset, or something similar to this. <br>
<br>
Thanks,<br>
—Nicholas Lundgaard<br>
_______________________________________________<br>
erlang-questions mailing list<br>
<a href="mailto:erlang-questions@erlang.org" target="_blank">erlang-questions@erlang.org</a><br>
<a href="http://erlang.org/mailman/listinfo/erlang-questions" rel="noreferrer" target="_blank">http://erlang.org/mailman/listinfo/erlang-questions</a><br>
</blockquote></div>