Skip to content
Snippets Groups Projects
Unverified Commit 0f6f26aa authored by Stan Hu's avatar Stan Hu Committed by GitLab
Browse files

Merge branch 'sh-backport-openssl-3-docs-17-3' into '17-3-stable-ee'

Improve OpenSSL 3 upgrading warning notes

See merge request https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165585



Merged-by: default avatarStan Hu <stanhu@gmail.com>
Approved-by: default avatarAchilleas Pipinellis <axil@gitlab.com>
Approved-by: default avatarEduardo Sanz García <esanz-garcia@gitlab.com>
parents e7788a70 4c0b620a
No related branches found
No related tags found
No related merge requests found
- title: 'Support for OpenSSL version 1' # (required) Clearly explain the change, or planned change. For example, "The `confidential` field for a `Note` is deprecated" or "CI/CD job names will be limited to 250 characters."
- title: 'TLS 1.0 and 1.1 are deprecated' # (required) Clearly explain the change, or planned change. For example, "The `confidential` field for a `Note` is deprecated" or "CI/CD job names will be limited to 250 characters."
announcement_milestone: '17.4' # (required) The milestone when this feature was first announced as deprecated.
removal_milestone: '17.5' # (required) The milestone when this feature is planned to be removed
breaking_change: false # (required) Change to false if this is not a breaking change.
Loading
Loading
@@ -6,7 +6,11 @@
stage: systems # (required) String value of the stage that the feature was created in. e.g., Growth
issue_url: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164512
body: | # (required) Do not modify this line, instead modify the lines below.
Long term support (LTS) for [OpenSSL version 1.1.1 ended in September 2023](https://endoflife.date/openssl).
Long term support (LTS) for [OpenSSL version 1.1.1 ended in September 2023](https://endoflife.date/openssl). Therefore, OpenSSL 3 will be the default in GitLab 17.5.
 
Therefore, we have deprecated support for incoming OpenSSL version 1 (TLS 1.0 or 1.1) connections to GitLab and will remove support in GitLab 17.5.
External integrations such as LDAP servers and webhooks must use OpenSSL version 3 (TLS 1.2).
With the upgrade to OpenSSL 3:
- GitLab requires TLS 1.2 or higher for all outgoing and incoming TLS connections.
- TLS/SSL certificates must have at least 112 bits of security. RSA, DSA, and DH keys shorter than 2048 bits, and ECC keys shorter than 224 bits are prohibited.
See the [GitLab 17.5 changes](https://docs.gitlab.com/ee/update/versions/gitlab_17_changes.html#1750) for more details.
Loading
Loading
@@ -922,7 +922,7 @@ Debian 11 or Debian 12 for continued support.
 
<div class="deprecation " data-milestone="17.5">
 
### Support for OpenSSL version 1
### TLS 1.0 and 1.1 are deprecated
 
<div class="deprecation-notes">
 
Loading
Loading
@@ -932,10 +932,14 @@ Debian 11 or Debian 12 for continued support.
 
</div>
 
Long term support (LTS) for [OpenSSL version 1.1.1 ended in September 2023](https://endoflife.date/openssl).
Long term support (LTS) for [OpenSSL version 1.1.1 ended in September 2023](https://endoflife.date/openssl). Therefore, OpenSSL 3 will be the default in GitLab 17.5.
 
Therefore, we have deprecated support for incoming OpenSSL version 1 (TLS 1.0 or 1.1) connections to GitLab and will remove support in GitLab 17.5.
External integrations such as LDAP servers and webhooks must use OpenSSL version 3 (TLS 1.2).
With the upgrade to OpenSSL 3:
- GitLab requires TLS 1.2 or higher for all outgoing and incoming TLS connections.
- TLS/SSL certificates must have at least 112 bits of security. RSA, DSA, and DH keys shorter than 2048 bits, and ECC keys shorter than 224 bits are prohibited.
See the [GitLab 17.5 changes](https://docs.gitlab.com/ee/update/versions/gitlab_17_changes.html#1750) for more details.
 
</div>
</div>
Loading
Loading
Loading
Loading
@@ -119,7 +119,24 @@ For more information, see the:
 
## 17.5.0
 
- OpenSSL version 3 (TLS 1.2) is required for all incoming connections to GitLab, such as from LDAP servers and webhooks.
With the upgrade to OpenSSL version 3:
- GitLab requires TLS 1.2 or higher for all outgoing and incoming TLS connections.
- TLS/SSL certificates must have at least 112 bits of security. RSA, DSA, and DH keys shorter than 2048 bits, and ECC keys shorter than 224 bits are prohibited.
Older services, such as LDAP and Webhook servers, may still use TLS
1.1. However, TLS 1.0 and 1.1 have reached end-of-life and are no longer
considered secure. GitLab will fail to connect to services using TLS
1.0 or 1.1 with a `no protocols available` error message.
In addition, OpenSSL 3 increased the [default security level from level 1 to 2](https://docs.openssl.org/3.0/man3/SSL_CTX_set_security_level/#default-callback-behaviour),
raising the number of bits of security from 80 to 112. For example,
a certificate signed with an RSA key can use RSA-2048 but not RSA-1024. GitLab
will fail to connect to a service that uses a certificate signed with insufficient
bits with a `certificate key too weak` error message.
Check the [GitLab documentation on securing your installation](../../security/index.md).
for more details.
 
## 17.3.0
 
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment