LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Server
User Name
Password
Linux - Server This forum is for the discussion of Linux Software used in a server related context.

Notices


Reply
  Search this Thread
Old 04-29-2019, 09:37 AM   #1
thunder44
LQ Newbie
 
Registered: Oct 2007
Posts: 13

Rep: Reputation: 1
Postgresql's ssl setup conflicts with php's ssl setup


Hello,

I initially installed postgresql-11.2 on centos 7 server using yum.
After that, I compiled php 7.3.4 on centos 7 server with the following commands:
a) ./configure --with-apxs2=/usr/local/apache2/bin/apxs \
--with-bz2 \
--with-zlib \
--with-openssl=/usr/local/openssl \
--with-curl \
--with-freetype-dir=/usr/local/include/freetype2/freetype \
--with-gd \
--enable-mbstring \
--with-mysqli \
--enable-ftp \
--with-pgsql \
--with-pdo-pgsql=/usr/pgsql-11/bin \
--enable-soap \
--enable-bcmath

b) make clean
c) make
d) make test
e) make install

I got the following errors while doing c):
1) /usr/bin/ld: warning: libssl.so.10, needed by /usr/pgsql-11/lib/libpq.so, may conflict with libssl.so.1.1
2) /usr/bin/ld: warning: libcrypto.so.10, needed by /usr/pgsql-11/lib/libpq.so, may conflict with libcrypto.so.1.1

How do I solve this problem?

Best Regards
Thayalan
 
Old 04-29-2019, 12:41 PM   #2
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
The php available for RHEL7/CentOS7 from default repositories is php 5.4.16-46.el7.

Why do you think you need php 7.3.4 rather than that version?

On our RHEL7 Postgres 11.x server we don't even have php installed at all.

You have to understand that RHEL/CentOS is designed as a collection of software that has been vetted to work together. When installing other packages you need to consider what they require. Ultimately dependencies could force you to change the underlying openssl or libc at which point it isn't really RHEL7/CentOS7 any longer. Rather than going down that path you'd be better off going down a path that allows you to use the latest of everything such as the latest Fedora. The downside of that is you have to upgrade at least once a year to a new major release of Fedora. With RHEL/CentOS on the other hand you can update packages without doing a major release (i.e. to RHEL8/CentOS8) for several years. It is a question of stability vs bleeding edge. RHEL/CentOS are designed for Production use whereas Fedora and similar distros recommend you not use it for Production.
 
Old 04-29-2019, 02:23 PM   #3
thunder44
LQ Newbie
 
Registered: Oct 2007
Posts: 13

Original Poster
Rep: Reputation: 1
Hello Mensa Water,

I wanted to use the latest stable available packages for production.
I initially had openssl 1.0.2k. I then installed the latest stable openssl 1.1.1b. I can't change the initial openssl version 1.0.2k completely because it is used by yum and some other system packages. Therefore, now some packages use openssl 1.0.2k whereas others use openssl 1.1.1b from location, /usr/local/openssl.

But, I guess that the errors:
1) /usr/bin/ld: warning: libssl.so.10, needed by /usr/pgsql-11/lib/libpq.so, may conflict with libssl.so.1.1
2) /usr/bin/ld: warning: libcrypto.so.10, needed by /usr/pgsql-11/lib/libpq.so, may conflict with libcrypto.so.1.1

are quite common. If so, in general what should i do? I tried the following:
i) ln -s /usr/local/openssl/bin/libssl.so.1.1 /usr/lib64/libssl.so.1.1
ii) ln -s /usr/local/openssl/bin/libssl.crypto.1.1 /usr/lib64/libcrypto.so.1.1

but to no avail. Therefore do you have any suggestions as to how I should proceed?
 
Old 04-29-2019, 03:06 PM   #4
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
Not really. As I mentioned openssl and libc are two very basic packages in any install and trying to use anything other than the ones provided by the RHEL/CentOS distros leads you into dependency hell. You'd end up need to essentially create most packages in /usr/local to support the openssl you installed there.

I went down that rabbit hole on RHEL5 because I wanted a curl version that supported TLS v1.1 or higher (the repository provided one only did TLS 1.0). The amount of effort it took just to get all the packages to allow that upstream version of curl to install was incredible. Even though I got the new upstream curl installed it immediately failed because the underlying openssl didn't support the higher TLS versions. I gave up at that point because of the conversation I'd had with RedHat support as to why they didn't offer a newer upstream openssl.

If you really feel you must use the latest upstream openssl and other packages you need to move to a different distro like Fedora that allows for it.
 
Old 04-30-2019, 08:24 PM   #5
thunder44
LQ Newbie
 
Registered: Oct 2007
Posts: 13

Original Poster
Rep: Reputation: 1
To get PCI (Payment Card Industry) certified (a security certification), I do need to get the latest packages installed mostly w.r.t openssh, apache and php. This means that these packages need to get the latest version of openssl involved. That is why, I am doing these things as mentioned earlier. Does anyone have any ideas as to how I should tackle the issue mentioned in the first thread?
 
Old 05-01-2019, 09:42 AM   #6
bathory
LQ Guru
 
Registered: Jun 2004
Location: Piraeus
Distribution: Slackware
Posts: 13,163
Blog Entries: 1

Rep: Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032Reputation: 2032
Quote:
Originally Posted by thunder44 View Post
To get PCI (Payment Card Industry) certified (a security certification), I do need to get the latest packages installed mostly w.r.t openssh, apache and php. This means that these packages need to get the latest version of openssl involved. That is why, I am doing these things as mentioned earlier. Does anyone have any ideas as to how I should tackle the issue mentioned in the first thread?
I also agree with MensaWater that you should use your distro's official packages, in order to receive the necessary updates.
If you're sure you want the latest php, you can get it from a third party repository.

Regards
 
2 members found this post helpful.
Old 05-01-2019, 10:54 AM   #7
MensaWater
LQ Guru
 
Registered: May 2005
Location: Atlanta Georgia USA
Distribution: Redhat (RHEL), CentOS, Fedora, CoreOS, Debian, FreeBSD, HP-UX, Solaris, SCO
Posts: 7,831
Blog Entries: 15

Rep: Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669Reputation: 1669
Quote:
Originally Posted by thunder44 View Post
To get PCI (Payment Card Industry) certified (a security certification), I do need to get the latest packages installed mostly w.r.t openssh, apache and php. This means that these packages need to get the latest version of openssl involved. That is why, I am doing these things as mentioned earlier. Does anyone have any ideas as to how I should tackle the issue mentioned in the first thread?
No they don't. We're PCI compliant and do not use the latest upstream. We simply answer the scans showing the patched versions of RHEL provided packages address any specific CVE they list. There is one item we've been answering for several years because they always say Apache 2.2 is vulnerable. The specific CVE they list is from 2011.

Scanners used to determine compliance and security including those by PCI auditing companies are brain dead. They determine only the base upstream version you are using and ignore extended versioning. The RHEL model is to always use the same upstream version of a package through the life of the major RHEL release. They then backport bug and security fixes from later upstream versions into their base version and change the extended version. For the Apache 2.2 CVE they list we verified long ago the extended RHEL version we have was patched so is not vulnerable.

You can also save yourself a lot of grief by simply disabling reporting of the exact version of packages you are using like php. Since the scanners are brain dead they pass you simply because they can't determine the version.

Last edited by MensaWater; 05-01-2019 at 10:56 AM.
 
1 members found this post helpful.
Old 05-02-2019, 06:00 AM   #8
thunder44
LQ Newbie
 
Registered: Oct 2007
Posts: 13

Original Poster
Rep: Reputation: 1
Hello bathory and MensaWater,

Your answers were helpful.
Thank you very much!
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Difference Between PostgreSQL And MySQL And How To Migrate From MySQL To PostgreSQL LXer Syndicated Linux News 0 05-27-2017 08:26 PM
LXer: The PostgreSQL Global Development Group's PostgreSQL LXer Syndicated Linux News 0 03-31-2016 07:35 PM
kernel26-firmware conflicts with linux-firmware conflicts with nvidia-96xx Bratmon Arch 3 06-26-2010 07:42 PM
Conflicts, dependencies: PostgreSQL 8.2.3 on RHEL4 / U4 makyo Linux - Server 6 05-06-2007 04:18 PM
postgresql -odbc & postgresql-jdbc installation kjsubbu Linux - Software 0 06-19-2003 02:50 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Server

All times are GMT -5. The time now is 11:39 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration