]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
Better GnuTLS warning as suggested by Matt Nordhoff 11324/head
authorRemi Gacogne <github@coredump.fr>
Mon, 14 Feb 2022 18:03:24 +0000 (19:03 +0100)
committerGitHub <noreply@github.com>
Mon, 14 Feb 2022 18:03:24 +0000 (19:03 +0100)
Co-authored-by: Matt Nordhoff <mnordhoff@mattnordhoff.com>
pdns/tcpiohandler.cc

index 8bdad5c0fcb25bab1d9d2e95060588e15dcd7223..9e47fe2b3bd824548e4bfdb739dc4b804dba9c54 100644 (file)
@@ -1576,7 +1576,7 @@ public:
       if (params.d_caStore.empty()) {
 #if GNUTLS_VERSION_NUMBER >= 0x030700 && GNUTLS_VERSION_NUMBER < 0x030703
         /* see https://gitlab.com/gnutls/gnutls/-/issues/1277 */
-        std::cerr<<"Warning: GnuTLS >= 3.7.0 has a known memory leak when validating server certificates in some configurations (PKCS11 support enabled, and a default PKCS11 trust store), please consider using the OpenSSL provider for outgoing connections instead, or explicitely setting a CA store"<<std::endl;
+        std::cerr<<"Warning: GnuTLS 3.7.0 - 3.7.2 have a memory leak when validating server certificates in some configurations (PKCS11 support enabled, and a default PKCS11 trust store), please consider upgrading GnuTLS, using the OpenSSL provider for outgoing connections, or explicitly setting a CA store"<<std::endl;
 #endif /* GNUTLS_VERSION_NUMBER >= 0x030700 && GNUTLS_VERSION_NUMBER < 0x030703 */
         rc = gnutls_certificate_set_x509_system_trust(d_creds.get());
         if (rc < 0) {