Means we fixed the issue. This is a different message. I assume there entire heartbeat detection is broken after all the changes since 2014, and this is now a false positive.
Haproxy was build with 1.0.1e and runs with 1.0.1e is what this means. What rpm thinks is installed locally does not really matter, the output shows what actually happens.
Why this is depends on what has been previously done with the system. I also see that zlib and PCRE release don’t match, PCRE is even a different major release. I assume there are some issues with this system, maybe libraries have been upgraded on the system manually, but without taking proper care.
No, this does not seem to be an SSL issue at all. Please open a new thread for this.
Haproxy was built on another machine with CentOS 6 while running on Amazon Linux 1 (1.9.5 was built on the same CentOS host as well). I’m sure the libraries weren’t upgraded or downgraded manually - everything is installed from rpm.
I’m saying we have to review this particular behavior.
Check libssl in addition to libcrypto, but I don’t know what Amazon Linux is and I don’t know the detailed inner workings of rpm. The fact of the matter is that the library on your system returns 1.0.1e as version string, but I’m unable to give you any support in that regard.
I’ll have to take a closer look at this ("running version … " output) also.
However if you build haproxy with openssl 1.0.1, and then run on 1.0.2, no 1.0.2 specific features and code paths will be available, so haproxy will act like you are using 1.0.1.