Cannot configure openssl 1.3 ciphersuits in nginx on ubuntu 22.04
Bug #2007744 reported by
DEXTER
This bug report will be marked for expiration in 37 days if no further activity occurs. (find out why)
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
nginx (Ubuntu) |
Incomplete
|
Wishlist
|
Unassigned |
Bug Description
Nginx's version is too old in Ubuntu 22.04 and cannot configure TLSv1.3 ciphersuites.
The way it has to be configured is through the config called: "ssl_conf_command" - https:/
which is only available in nginx version 1.19.4.
Ubuntu 22.04 has nginx version 1.18.0.
Nginx must be upgraded to at least version 1.19.4 to be able to adjust TLSv1.3 ciphersuites.
tags: | added: server-triage-discuss |
tags: |
added: server-team-discuss removed: server-triage-discuss |
tags: |
added: server-triage-discuss removed: server-team-discuss |
Changed in nginx (Ubuntu): | |
importance: | Undecided → Wishlist |
tags: | removed: server-triage-discuss |
To post a comment you must log in.
Hi Dexter,
Ubuntu by policy keeps LTS releases stable, which means only bugfixes, not new upstream releases, are deployed to users. There are some exceptions made for certain packages, but nginx is not in that list (at least not yet). (I will talk to my team on the off chance if an exception is worth pursuing for nginx, but even best case the timeframe for getting such an exception analyzed and approved can be months or years.)
I would recommend you resolve the issue you've run into by uploading nginx 1.22.0 from kinetic into a PPA, but retargeted to jammy. Assuming it has built successfully, you can then install this on your systems and access the newer functionality.
Alternatively, if you think this is an important feature for Ubuntu to provide for all users, you could help by identifying the patch(es) needed from the upstream git tree to implement it, which could then be evaluated for jammy-updates. We generally do not cherrypick features for backport to LTS releases, but since TLSv1.3 is pretty important this may be a situation where this could be done. (Be forewarned though that often new features are implemented via numerous commits, so cherrypicking and backporting them can be infeasible or too risky for introducing regressions.)