Commit Graph

85 Commits

Author SHA1 Message Date
Eric Anderson a77e1a240a Downgrade Netty to 4.1.93-Final
Our benchmarks saw a serious performance decrease with the upgrade from
Netty 4.1.88 to 4.1.94. The problem was tracked down to a single PR in
4.1.94, so we avoid 4.1.94 for now.

Fixes #10401
2023-07-21 17:41:41 -07:00
Eric Anderson 361616ae7c Upgrade Netty to 4.1.94-Final 2023-07-06 08:46:45 -07:00
Eric Anderson 5754518914 Upgrade netty-tcnative to 2.0.61.Final
This updates the version of boringssl and removes the dependency on APR.
netty-tcnative 2.0.56.Final uses APR 1.7.0, so is in scope for
CVE-2021-35940, CVE-2022-28331, and CVE-2022-24963. netty-tcnative is
not actually vulnerable. The binary does not include apr_socket_sendv(),
apr_encode_*(), apr_pencode_*(), apr_decode_*(), apr_pdecode_*(). The
binary does include apr_time_exp_*() but it is unused code.
Unfortunately --gc-sections wasn't used during compilation.
apr_time_now() is used, but that just calls gettimeofday() and is not
vulnerable.

There's no panic here, but this updates netty-tcnative just a few weeks
before we would have ordinarily done so. Bumping the version makes life
easier for everyone.
2023-06-12 11:01:06 -07:00
Eric Anderson 8aa25476e9
SECURITY.md: Update/modernize docs
There's still plenty more that could be done, but I want to keep this on
the simpler/less-invasive side and it'd just delay these changes for no
real benefit.
2023-04-20 08:20:52 -07:00
Larry Safran b8d23a3c2c
netty:Upgrade Netty from 4.1.79 to 4.1.87, tcnative from 2.0.54 to 2.0.56 (#9784)
* Upgrade Netty from 4.1.79 to 4.1.87 and tcnative from 2.0.54 to 2.0.56
2023-02-06 17:54:28 -08:00
Eric Anderson 51913f6e9e Bump os-maven-plugin to 1.7.1 2023-02-02 18:30:32 -08:00
yifeizhuang 0a699ad694
netty: upgrade netty from 4.1.77.Final to 4.1.29.Final and tcnative from 2.0.53 to 2.0.54 (#9451) 2022-08-31 16:02:27 -07:00
Terry Wilson 7bd0797496
all: Update netty to 4.1.77.Final and netty_tcnative to 2.0.53.Final (#9027)
all: Update netty to 4.1.77.Final and netty_tcnative to 2.0.53.Final

Also switches to a non-release version of rules_jvm_external to allow Bazel build to work with artifact classifiers.
2022-06-24 10:47:27 -07:00
Eric Anderson 8996702715 SECURITY.md: grpc version table should include future versions 2022-06-22 09:04:32 -07:00
sanjaypujare d7f951a9d8
all: update netty to 4.1.72.Final and tcnative to 2.0.46.Final (#8780) 2022-01-07 15:34:59 -08:00
ZHANG Dapeng 25022f6846
dep: bump netty to 4.1.63.Final and tcnative to 2.0.38.Final (#8167)
Upgrade Netty. This should also resolve #7830.
2021-09-21 09:14:54 -07:00
Leonardo Pistone 1a655622c7
Document that xds uses grpc-netty-shaded (#7877) 2021-05-11 19:19:40 -07:00
Srini Polavarapu 2a62de0559
Add link to CVE process (#7832) 2021-01-22 12:42:05 -08:00
Eric Anderson 8359d0b710
netty: Upgrade to Netty 4.1.52 and tcnative 2.0.34
The tiny cache size was removed from the bytebuf allocator and so was
deprecated. TLSv1.3 was enabled by the upgrade, which fails mTLS
connections at different times. Conscrypt is incompatible with the
default TrustManager when TLSv1.3 is enabled so we explicitly disable
TLSv1.3 when Conscrypt is used for the moment.
2020-12-29 15:20:46 -08:00
Chengyuan Zhang eb871698e3
Revert "SECURITY.md: add instruction for disabling Conscrypt's default TrustManager (#6962)" (#7428)
This reverts commit e089ceaadc.
2020-09-16 10:07:52 -07:00
Eric Anderson 720df64fd2 Upgrade to Netty 4.1.51 and tcnative 2.0.31 2020-08-25 14:52:21 -07:00
Chengyuan Zhang e089ceaadc
SECURITY.md: add instruction for disabling Conscrypt's default TrustManager (#6962) 2020-04-22 11:28:24 -07:00
Jihun Cho bf12157fc4
build: bump netty to 4.1.48.Final, bump tcnative to 2.0.30.Final (#6845) 2020-03-24 11:54:59 -07:00
ZhenLian 557da62305
netty: Upgrade Netty (4.1.45.Final) & tcnative (2.0.28.Final) 2020-02-06 10:03:14 -08:00
ST-DDT 2afe13487c api: Fix javadoc for ManagedChannelBuilder#forTarget(String)
The dns scheme is only the default scheme with grpc-java. Other
libraries could add more NameResolvers and thus change the default. For
compatibility reasons, the schema should therefore be specified
explicitly.
2019-12-16 15:51:53 -08:00
Przemek Piotrowski 9668102f05 netty: bump to 4.1.42 (#6175)
netty: bump to 4.1.42
2019-10-01 13:41:06 -07:00
ST-DDT d5b63e9c68 docs, examples: Update the maven plugins version (#6065) 2019-08-20 14:35:03 -07:00
Carl Mastrangelo 06e9b88147
netty: bump to 4.1.38
* netty: bump to 4.1.38
2019-07-24 14:29:26 -07:00
Carl Mastrangelo 2548bcd7c7
netty: bump to 4.1.37 2019-06-28 11:40:56 -07:00
Sebastian Schmidt e4b666aaeb Fixing typo in SECURITY.md
See https://en.wikipedia.org/wiki/Cipher_suite
2019-06-11 22:33:30 -07:00
Chengyuan Zhang f81201024e
upgrade netty version to 4.1.35 and netty-tcnative version to 2.0.25 (#5818) 2019-06-03 11:40:59 -07:00
Eric Anderson 2b7269b68c SECURITY.md: Add Fedora 30 package installation instructions
Fixes #5688
2019-05-14 15:37:43 -07:00
Jihun Cho aed4e40b60
netty: bump netty version to 4.1.34.Final (#5449) 2019-03-08 15:58:48 -08:00
Eric Anderson 2dc00cec4a SECURITY.md: Fix syntax and typos in mutual TLS interceptor example
Fixes #4905
2019-03-07 16:53:34 -07:00
Nguyen Quang Huy 05d5e4802a doc: Change http to https for security links
For security, we should change http into https links.

Co-Authored-By: Nguyen Van Trung [trungnvfet@outlook.com](mailto:trungnvfet@outlook.com)
Signed-off-by: Nguyen Quang Huy [huynq0911@gmail.com](mailto:huynq0911@gmail.com)
2019-02-27 17:25:42 -08:00
Eric Anderson 0d97507919
SECURITY.md: Don't suggest users to use Jetty ALPN
I fixed many of these elsewhere in the document via 4ba168f28, but I
didn't update the troubleshooting section previously.
2019-02-27 16:32:59 -07:00
Eric Anderson 1da3f65e7b SECURITY.md: tcnative/ALPN works on Alpine
In testing, I discovered that Alpine does in fact work. Update the
documentation with the error you might see if you are simply missing a
package (for Googling) as well as fixes.
2019-02-27 15:19:49 -07:00
ZHANG Dapeng d0ecc08705
all: fix lint 2019-01-31 09:31:13 -08:00
Eric Anderson 4ba168f28a
SECURITY.md: Rewrite/reflow our recommendations
Much of these sections pre-dated gRPC 1.0 and Java 9. Modernize them to be more
on-point and clear.
2019-01-28 16:26:44 -08:00
Carl Mastrangelo edede01da6
netty: bump to 4.1.32 and tcnative 2.0.20 2018-12-05 14:41:30 -08:00
ZHANG Dapeng e9ba65a42e
all: sync tcnative version
The helloworld TLS example can not run properly with the outdated examples/build.gradle.
2018-12-03 13:19:17 -08:00
Carl Mastrangelo 5362017c5a
netty: update to 4.1.30 and tcn 2.0.17 2018-10-11 16:31:14 -07:00
Carl Mastrangelo 7d455964f6
all: update to netty 4.1.27 and tcnative 2.0.12 2018-07-20 16:36:00 -07:00
DmPanov 49d7e5fd0b examples: replace client certificate in trust store in 'Hello world example with TLS with mutual auth'
... with proper CA certificate to fix SSLV3_ALERT_HANDSHAKE_FAILURE in two host with different IPs setup, switch to required client auth to fail on incorrect configuration
2018-06-13 12:30:57 -07:00
Carl Mastrangelo 4388d901c8
netty: update to 4.1.25
Updates #4495
2018-05-23 17:16:45 -07:00
Stephane Maarek 277c33c37f SECURITY.md: updated netty from 2.0.6 to 2.0.7
Master currently is for grpc >= 0.11 so it doesn't make sense that the SECURITY.md instructs to use the 2.0.6 (which triggers an error) - see https://github.com/grpc/grpc-java/issues/3989
2018-05-14 10:48:34 -07:00
Eric Anderson 41e98ef72b SECURITY.md: Add reference to grpc-netty-shaded
Many people going to the troubleshooting section would be fixed by
swapping to grpc-netty-shaded, so we should call that out.
2018-04-03 08:45:03 -07:00
Ray Tsang ae42d666ad SECURITY.md: Added more troubleshooting instructions 2018-03-23 11:05:57 -07:00
Eric Anderson cb2f62bbbf SECURITY.md: Update "known combinations" table for Netty bump 2018-03-07 13:39:47 -08:00
Eric Anderson 8c51683af1 SECURITY.md: Mention netty-handler instead of codec-http2
netty-handler has SslHandler which is really the piece that needs to
agree with netty-tcnative. But as I mention, all of netty should be a
consistent version, otherwise it may randomly break due to internal API
changes.
2018-02-14 14:52:04 -08:00
Eric Gribkoff 722d6f0bea
okhttp: support Conscrypt security provider 2018-01-31 10:45:27 -08:00
Garrett Jones 7cdd35c270 SECURITY.md: Fix netty-codec-http2 typo 2017-12-01 12:48:46 -08:00
Carl Mastrangelo 09307ce191
netty: update to 4.1.17-Final 2017-11-28 13:52:23 -08:00
Eric Anderson 47821fa74e SECURITY.md: Avoid needing to update tcnative table every release
This also fixes an oversight for the 1.0.2+ releases, since they had a
different netty version.
2017-11-17 13:16:14 -08:00
Ray Tsang 80a8c8f3d7 netty: Updated ALPN error message and added troubleshooting procedures 2017-11-01 13:01:43 -07:00