From nobody Sat Apr 1 00:36:52 2023 X-Original-To: arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PpJBg4J8zz43Sqy for <arch@mlmmj.nyi.freebsd.org>; Sat, 1 Apr 2023 00:36:59 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PpJBg3cL4z44ls; Sat, 1 Apr 2023 00:36:59 +0000 (UTC) (envelope-from kp@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680309419; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9Iyx5rvNlP3eCJ/7O4ERQfXL9QUP688aKBXuqpeC8KY=; b=X4Vj941yuisgRCq6Xkiyo/7THYEw3SQAoksMjrpKdLETL2Ah1XkOQLAl1sO7zmTttg9hHj dpNrbTrDXQL1zQDSbnjWU/pKxnJLIkweOOaZW1vuedK2rlwHNfQyfio9cIwkZSHWx2ehBQ +5pdD7l1f4KW6FLWbx+Qd5PcGqTLDnIg3ItD83rblhDzDWH71ug9qENkPZ4UFPf8xNgu7d SqgpOD0Qs3I2UgYV7KomkniGFQgqgnMHHtM7NgxaTRmrBWuccaPcusg6PYlG3N4wVfO5hD lC+KJhNQpETW15Y0vPoSWSenXe2Od/0ncsok3ZIy47dwtINOd9nLPCyTXqYw7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680309419; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9Iyx5rvNlP3eCJ/7O4ERQfXL9QUP688aKBXuqpeC8KY=; b=JC7qqkxWOPc+ZJIldmW1fle6yyRUURl42CFQxW+ObU8JauiVXJxrquwHHZywTN73QEOJmO /uEbBQYLACaqV2mQcBD86QJcMVWUbTOrddmSU+6ArJWniwaqKo/N382ukLWbu4Ez9sMmOa eei1DYpkLLAFSB+/WAetCEPzzcuaYckHM2ODn9t4JnSaSx61jix5idsQKVBA1GXjJbCrK/ pP1AmleWJbhMneEdeNj7f9V07ub+YjMe18BfZX33otH03cuwGu8UwVIjGAuvvJeJOKsCS6 uk9jHieoCblR0wKjK3drlzxn4CxnhqTaMUXGxqMMn/ZlhIgUZVqnFuhmNMIGNA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1680309419; a=rsa-sha256; cv=none; b=aCd2XprcFQTj10MRhMs0alqNWp8u+EL7OPRFj9SSJ0zErJQ2ha2TL0UsFFfM5LCVaRzGrc VsjqX0MiqweXDNe+508vQi8Z3O3ifwGgKxBH+ZMZV6otOQHolZYOWRsEgpJK1nyI+ebbhU sRYb+BtkiYwF5hXlEEHSJxnnibYAN7iWgl4+gD32BhpFR85t/LZ03JJO3FWwkmeg69LFwm xInCwegFcNT1tcYlYrLJFfOCBzUy+lh2iJan3paBbMblCG3neMDPOL4iTJHrBWprVRXiQm oiTvbqahinJknyNWgaTfjP2PWUAQN1BJoYWMt/bEsZVVy7NLDbelz+Gb3cx05Q== Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mx1.codepro.be", Issuer "R3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id 4PpJBg1sJVzJNw; Sat, 1 Apr 2023 00:36:59 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id A82ACE811; Sat, 1 Apr 2023 02:36:56 +0200 (CEST) From: Kristof Provost <kp@FreeBSD.org> To: Ruslan Bukin <br@bsdpad.com> Cc: John Baldwin <jhb@freebsd.org>, arch@freebsd.org Subject: Re: Deprecate/remove riscv64sf Date: Sat, 01 Apr 2023 09:36:52 +0900 X-Mailer: MailMate (1.14r5937) Message-ID: <E7D252F3-5500-40A2-8E57-FAAD5237CAEE@FreeBSD.org> In-Reply-To: <ZCc+YcM/iVCC73TK@bsdpad.com> References: <629bf85d-4d48-17f5-cb26-dfd29f7e6ff7@FreeBSD.org> <ZCc+YcM/iVCC73TK@bsdpad.com> List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-ThisMailContainsUnwantedMimeParts: N On 1 Apr 2023, at 5:11, Ruslan Bukin wrote: > On Wed, Mar 29, 2023 at 11:17:21AM -0700, John Baldwin wrote: >> Is anyone using riscv64sf? All of the existing RISC-V boards include = hard-float >> support as well as QEMU. The FPGA cores we use at Cambridge also all = support >> hard-float. My understanding is that glibc doesn't bother supporting = soft-float >> on RV64. If no one is using it (and has no plans to use it), then I p= ropose >> we drop it in 14.0 and save one more buildworld from make tinderbox. >> > > The idea behind this was to support extensibility of architecture (whic= h is one of the key features of RISC-V). So if F,D,Q extension is not imp= lemented, then riscv64sf could be used. It could be that those times some= simulators/emulators did not support these extensions, so riscv64sf crea= ted (I could not remember). > It could be some of new (synthesized) hardware or new emulators won't h= ave support for this straight away. So in research&development perspectiv= e it could be useful, in real life probably not for 64 bit. > That=E2=80=99s pretty much exactly how I used it a few years ago. Given that that was a few years ago and that both hardware and software h= ave moved on a bit since then I=E2=80=99d be inclined to just drop it tho= ugh. Kristof From nobody Wed Apr 19 16:50:59 2023 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q1myW3DWQz46BsB for <freebsd-arch@mlmmj.nyi.freebsd.org>; Wed, 19 Apr 2023 16:51:15 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-lj1-f173.google.com (mail-lj1-f173.google.com [209.85.208.173]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q1myT4CmDz3MxP for <freebsd-arch@freebsd.org>; Wed, 19 Apr 2023 16:51:13 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of carpeddiem@gmail.com designates 209.85.208.173 as permitted sender) smtp.mailfrom=carpeddiem@gmail.com; dmarc=none Received: by mail-lj1-f173.google.com with SMTP id r9so21272263ljp.9 for <freebsd-arch@freebsd.org>; Wed, 19 Apr 2023 09:51:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681923071; x=1684515071; h=content-transfer-encoding:to:subject:message-id:date:from :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=RtD1bevRtfYxAK64XnVi8afTYZXqW12Ui63UcE7GGmo=; b=H6dMlbxs7bAxEpwqySJJhG81s2MgMu7HA+0VBvI2S7wpMoUAsS5tjS79968Q4b1tav Wi6nPZJlNL7j8XG+qO1gdwXwoAI1FqbGEPZm8Qmj0ggalDTuOaMEm42jiZlVnuPwQcEd 34SUzXkeSPoxPoeys1BZPQK2TDmmGPpLWY0kU/6fhNejt3qPKJmrYg19atW8W6va8QX4 dX+DE9YVKPi4JUc+U9dx6rYbun8EPRKBqnnSX6BnRodCpunCYUDqUiYXsZzq1Hhjltcj ZvS1El/pazprpHEmtuLAHnexGN2YZMSVC6dSAMPGZYMldWADFlHXwl5gRJj0U/UnxvaE VD6g== X-Gm-Message-State: AAQBX9dk4VgRI5yYV8oeEy4RFPP3YTU6CXizOXbX+rWItptDs9/Fd2of twYzt+M07mA5QJJbgHSeaPLrfYxyM9DcWVBnckV3dyfoFwU= X-Google-Smtp-Source: AKy350YRC/0zNUtDN5W7Y2GV8z6v0BLaH4PE9d3Yxf0Ok5MzCHtPEgR+YTOWF0MubPoo8tnvJJ7F89Iew5Z/QKV1bKE= X-Received: by 2002:a2e:8788:0:b0:29a:9053:ed21 with SMTP id n8-20020a2e8788000000b0029a9053ed21mr2141744lji.8.1681923070790; Wed, 19 Apr 2023 09:51:10 -0700 (PDT) List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 From: Ed Maste <emaste@freebsd.org> Date: Wed, 19 Apr 2023 12:50:59 -0400 Message-ID: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> Subject: OpenSSL in the FreeBSD base system / FreeBSD 14 To: freebsd-arch <freebsd-arch@freebsd.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spamd-Result: default: False [2.77 / 15.00]; NEURAL_SPAM_MEDIUM(1.00)[1.000]; NEURAL_SPAM_LONG(1.00)[1.000]; NEURAL_SPAM_SHORT(0.77)[0.770]; FORGED_SENDER(0.30)[emaste@freebsd.org,carpeddiem@gmail.com]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_NONE(0.00)[209.85.208.173:from]; MLMMJ_DEST(0.00)[freebsd-arch@freebsd.org]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; RWL_MAILSPIKE_POSSIBLE(0.00)[209.85.208.173:from]; R_DKIM_NA(0.00)[]; FROM_NEQ_ENVFROM(0.00)[emaste@freebsd.org,carpeddiem@gmail.com]; TO_DN_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; FREEFALL_USER(0.00)[carpeddiem]; ARC_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DMARC_NA(0.00)[freebsd.org]; PREVIOUSLY_DELIVERED(0.00)[freebsd-arch@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; TO_DOM_EQ_FROM_DOM(0.00)[] X-Rspamd-Queue-Id: 4Q1myT4CmDz3MxP X-Spamd-Bar: ++ X-ThisMailContainsUnwantedMimeParts: N There have been a few discussions on this topic in different venues, but we should consolidate the discussion on a public mailing list. This email represents a summary of the issues and the current state; we=E2=80=99ll discuss next steps in follow-up mail. FreeBSD 14 is coming soon, and one outstanding task is dealing with OpenSSL in the base system. The base system currently has OpenSSL 1.1.1, and it will be EOL as of 2023-09-11. There are two related issues: - The base system needs to migrate from OpenSSL 1.1.1. - The ports collection currently makes use of OpenSSL provided by the base system by default, with some exceptions. Changing the base system OpenSSL into a privatelib would decouple these two, so that the base system and ports can migrate to OpenSSL 3 (or even to other implementations) on their own schedules. We have a number of privatelibs today, like libevent, that are used by the base system but not by ports. All OpenSSL-using ports will need security/openssl (or another openssl port). A related issue is base system libraries that depend on OpenSSL would also need to be made private. This includes gssapi, heimdal, and libfetch. This leaves the actual task of updating OpenSSL in the base system, which is complicated because we use bespoke build infrastructure in crypto/openssl/ rather than the upstream build bits. For better or worse this is the typical case for all of our contrib software, but OpenSSL is particularly tricky as it makes use of a large number of generated files, and those files are generated using Perl and perhaps other tools that are not available in the FreeBSD base system. Porting this to the base system is not insurmountable, but requires a fairly large amount of tedious work. This should serve as a snapshot of where we are today and a starting point for discussion; we=E2=80=99ll formulate a list of specific tasks in a follow-up. From nobody Wed Apr 19 22:08:42 2023 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q1w0y3PVYz45JDK for <freebsd-arch@mlmmj.nyi.freebsd.org>; Wed, 19 Apr 2023 22:08:50 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q1w0x3h34z3rNm; Wed, 19 Apr 2023 22:08:49 +0000 (UTC) (envelope-from kostikbel@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.17.1/8.17.1) with ESMTPS id 33JM8gFn080594 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 20 Apr 2023 01:08:45 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua 33JM8gFn080594 Received: (from kostik@localhost) by tom.home (8.17.1/8.17.1/Submit) id 33JM8gCN080593; Thu, 20 Apr 2023 01:08:42 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Thu, 20 Apr 2023 01:08:42 +0300 From: Konstantin Belousov <kostikbel@gmail.com> To: Ed Maste <emaste@freebsd.org> Cc: freebsd-arch <freebsd-arch@freebsd.org> Subject: Re: OpenSSL in the FreeBSD base system / FreeBSD 14 Message-ID: <ZEBmahjXXlvtzP-L@kib.kiev.ua> References: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on tom.home X-Rspamd-Queue-Id: 4Q1w0x3h34z3rNm X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N On Wed, Apr 19, 2023 at 12:50:59PM -0400, Ed Maste wrote: > A related issue is base system libraries that depend on OpenSSL would > also need to be made private. This includes gssapi, heimdal, and > libfetch. Does ssh and pam in the base depend on the base openssl? If yes, then it still leaks into the applications despite being private. For instance, /usr/lib/pam_ssh.so.6: libprivatessh.so.5 => /usr/lib/libprivatessh.so.5 (0x80148b000) libpam.so.6 => /usr/lib/libpam.so.6 (0x80154d000) libc.so.7 => /lib/libc.so.7 (0x801083000) libprivateldns.so.5 => /usr/lib/libprivateldns.so.5 (0x80155d000) libcrypto.so.111 => /lib/libcrypto.so.111 (0x801e00000) From nobody Thu Apr 20 13:14:27 2023 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q2J646KRRz463vJ for <freebsd-arch@mlmmj.nyi.freebsd.org>; Thu, 20 Apr 2023 13:14:36 +0000 (UTC) (envelope-from Joerg.Pulz@frm2.tum.de) Received: from mailhost.frm2.tum.de (mailhost.frm2.tum.de [IPv6:2001:4ca0:2403::81bb:b30c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mailhost.frm2.tum.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q2J635FM4z3JVq for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 13:14:35 +0000 (UTC) (envelope-from Joerg.Pulz@frm2.tum.de) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=frm2.tum.de header.s=s2048 header.b=Ce9j7Qc9; spf=pass (mx1.freebsd.org: domain of Joerg.Pulz@frm2.tum.de designates 2001:4ca0:2403::81bb:b30c as permitted sender) smtp.mailfrom=Joerg.Pulz@frm2.tum.de; dmarc=pass (policy=none) header.from=tum.de Received: from mailhost.frm2.tum.de (localhost [127.0.0.1]) by mailhost.frm2.tum.de (8.16.1/8.15.2) with ESMTP id 33KDE91k049012 for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 15:14:32 +0200 (CEST) (envelope-from Joerg.Pulz@frm2.tum.de) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=frm2.tum.de; s=s2048; t=1681996472; bh=ggvzLTirRKGHk44em9JOfPvdNXxn08mOOJAq98ckQ9U=; h=Date:From:To:Subject:In-Reply-To:References; b=Ce9j7Qc9YyhcYl2NlCtH7Njt/9I/nTKJlWOjJE7l3JxmsW2PaefxFupSZpisNsL2b h7NGNqP102/j6++P6ZCZqh6k7xaqWnYA6YX7R0QeNElR/hN3z1mQs5/0MD0y6q5ebk KYwsZC5YXjTTEYR/HEaQS7H5vs4DlvrWf9YsrEm86plM7GFoqRYXc+5oGWrl0cZbWR xBi0tXWtidKOw9IEVxiRQJqjFp4H9x8+6+x5YnfZJDGo7qOeFwsEmsd/f20lhUAZNO XMuIK4jEW6ceJZaNgE8YaKXqsU+mIwyZceNbqEJpdOmmoQFvK5s9Ske23o5cITQuGw 5Dp3fDx2+YTCA== X-Virus-Scanned: at mailhost.frm2.tum.de Received: from hades.admin.frm2.tum.de (hades.admin.frm2.tum.de [172.25.1.10]) (authenticated bits=0) by mailhost.frm2.tum.de (8.16.1/8.15.2) with ESMTPSA id 33KDERqY049064 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT) for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 15:14:27 +0200 (CEST) (envelope-from Joerg.Pulz@frm2.tum.de) Date: Thu, 20 Apr 2023 15:14:27 +0200 (CEST) From: Joerg Pulz <Joerg.Pulz@frm2.tum.de> To: freebsd-arch <freebsd-arch@freebsd.org> Subject: Re: OpenSSL in the FreeBSD base system / FreeBSD 14 In-Reply-To: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> Message-ID: <nycvar.OFS.7.77.840.2304201411080.78141@unqrf.nqzva.sez2.ghz.qr> References: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="3469798045-263270738-1681996467=:78141" X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.4 (mailhost.frm2.tum.de [129.187.179.12]); Thu, 20 Apr 2023 15:14:27 +0200 (CEST) X-Spamd-Result: default: False [-7.10 / 15.00]; SIGNED_SMIME(-2.00)[]; DWL_DNSWL_LOW(-1.00)[tum.de:dkim]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; DMARC_POLICY_ALLOW(-0.50)[tum.de,none]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; R_SPF_ALLOW(-0.20)[+ip6:2001:4ca0:2403::81bb:b30c]; R_DKIM_ALLOW(-0.20)[frm2.tum.de:s=s2048]; RCVD_IN_DNSWL_NONE(0.00)[2001:4ca0:2403::81bb:b30c:from]; RCVD_VIA_SMTP_AUTH(0.00)[]; MLMMJ_DEST(0.00)[freebsd-arch@freebsd.org]; DKIM_TRACE(0.00)[frm2.tum.de:+]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_EQ_ENVFROM(0.00)[]; TO_DN_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-arch@freebsd.org]; HAS_ATTACHMENT(0.00)[]; ASN(0.00)[asn:12816, ipnet:2001:4ca0::/32, country:DE] X-Rspamd-Queue-Id: 4Q2J635FM4z3JVq X-Spamd-Bar: ------- X-ThisMailContainsUnwantedMimeParts: N This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --3469798045-263270738-1681996467=:78141 Content-Type: text/plain; charset=US-ASCII; format=flowed On Wed, 19 Apr 2023, Ed Maste wrote: > There have been a few discussions on this topic in different venues, > but we should consolidate the discussion on a public mailing list. > This email represents a summary of the issues and the current state; > we?ll discuss next steps in follow-up mail. > > FreeBSD 14 is coming soon, and one outstanding task is dealing with > OpenSSL in the base system. The base system currently has OpenSSL > 1.1.1, and it will be EOL as of 2023-09-11. > > There are two related issues: > > - The base system needs to migrate from OpenSSL 1.1.1. > - The ports collection currently makes use of OpenSSL provided by the > base system by default, with some exceptions. > > Changing the base system OpenSSL into a privatelib would decouple > these two, so that the base system and ports can migrate to OpenSSL 3 > (or even to other implementations) on their own schedules. We have a > number of privatelibs today, like libevent, that are used by the base > system but not by ports. All OpenSSL-using ports will need > security/openssl (or another openssl port). > > A related issue is base system libraries that depend on OpenSSL would > also need to be made private. This includes gssapi, heimdal, and > libfetch. > > This leaves the actual task of updating OpenSSL in the base system, > which is complicated because we use bespoke build infrastructure in > crypto/openssl/ rather than the upstream build bits. For better or > worse this is the typical case for all of our contrib software, but > OpenSSL is particularly tricky as it makes use of a large number of > generated files, and those files are generated using Perl and perhaps > other tools that are not available in the FreeBSD base system. Porting > this to the base system is not insurmountable, but requires a fairly > large amount of tedious work. > > This should serve as a snapshot of where we are today and a starting > point for discussion; we?ll formulate a list of specific tasks in a > follow-up. Would the OpenSSL privatelib change mean that it's no longer possible to build and link base software against libs from ports given that those libs are linked to OpenSSL from ports then? e.g. link base Sendmail (with OpenSSL privatelib) with libsasl from security/cyrus-sasl2 and libldap from net/openldap26-client which are then linked with libssl an libcrypto from security/openssl or link base Heimdal (with OpenSSL privatelib) with libldap from net/openldap26-client which is then linked with libssl an libcrypto from security/openssl Both examples above are maybe not common but in use by myself since "ages". If such setups will no longer work with OpenSSL privatelib and updating OpenSSL in base is such a complicated, heavy and time consuming task, one could ask - why use OpenSSL instead of one other SSL implementation in base at all? This is not a rant against OpenSSL but if any other implementation provides the same as OpenSSL for base with a compatible license and an easier update path for the long term why not switch completely? If it's then private in base (and of no use outside) anyway nobody outside base should care what it is. Joerg -- The beginning is the most important part of the work. -Plato --3469798045-263270738-1681996467=:78141 Content-Type: application/pkcs7-signature; name=smime.p7s Content-Transfer-Encoding: BASE64 Content-Description: S/MIME Cryptographic Signature Content-Disposition: attachment; filename=smime.p7s MIIUKAYJKoZIhvcNAQcCoIIUGTCCFBUCAQExDzANBglghkgBZQMEAgEFADAL BgkqhkiG9w0BBwGgghE7MIIFrDCCBJSgAwIBAgIHG2O60B4sPTANBgkqhkiG 9w0BAQsFADCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZlcmVpbiB6dXIg Rm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHplcyBl LiBWLjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVpbiBD ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAyMB4XDTE2MDUyNDExMzg0MFoXDTMx MDIyMjIzNTk1OVowgY0xCzAJBgNVBAYTAkRFMUUwQwYDVQQKDDxWZXJlaW4g enVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVuZ3NuZXR6 ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNVBAMMHERGTi1WZXJl aW4gR2xvYmFsIElzc3VpbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQCdO3kcR94fhsvGadcQnjnX2aIw23IcBX8pX0to8a0Z1kzhaxux C3+hq+B7i4vYLc5uiDoQ7lflHn8EUTbrunBtY6C+li5A4dGDTGY9HGRp5Zuk rXKuaDlRh3nMF9OuL11jcUs5eutCp5eQaQW/kP+kQHC9A+e/nhiIH5+ZiE0O R41IX2WZENLZKkntwbktHZ8SyxXTP38eVC86rpNXp354ytVK4hrl7UF9U1/I syr1ijCs7RcFJD+2oAsH/U0amgNSoDac3iSHZeTn+seWcyQUzdDoG2ieGFmu dn730Qp4PIdLsDfPU8o6OBDzy0dtjGQ9PFpFSrrKgHy48+enTEzNAgMBAAGj ggIFMIICATASBgNVHRMBAf8ECDAGAQH/AgEBMA4GA1UdDwEB/wQEAwIBBjAp BgNVHSAEIjAgMA0GCysGAQQBga0hgiweMA8GDSsGAQQBga0hgiwBAQQwHQYD VR0OBBYEFGs6mIv58lOJ2uCtsjIeCR/oqjt0MB8GA1UdIwQYMBaAFJPj2DIm 2tXxSqWRSuDqS+KiDM/hMIGPBgNVHR8EgYcwgYQwQKA+oDyGOmh0dHA6Ly9j ZHAxLnBjYS5kZm4uZGUvZ2xvYmFsLXJvb3QtZzItY2EvcHViL2NybC9jYWNy bC5jcmwwQKA+oDyGOmh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZ2xvYmFsLXJv b3QtZzItY2EvcHViL2NybC9jYWNybC5jcmwwgd0GCCsGAQUFBwEBBIHQMIHN MDMGCCsGAQUFBzABhidodHRwOi8vb2NzcC5wY2EuZGZuLmRlL09DU1AtU2Vy dmVyL09DU1AwSgYIKwYBBQUHMAKGPmh0dHA6Ly9jZHAxLnBjYS5kZm4uZGUv Z2xvYmFsLXJvb3QtZzItY2EvcHViL2NhY2VydC9jYWNlcnQuY3J0MEoGCCsG AQUFBzAChj5odHRwOi8vY2RwMi5wY2EuZGZuLmRlL2dsb2JhbC1yb290LWcy LWNhL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDANBgkqhkiG9w0BAQsFAAOCAQEA gXhFpE6kfw5V8Amxaj54zGg1qRzzlZ4/8/jfazh3iSyNta0+x/KUzaAGrrrM qLGtMwi2JIZiNkx4blDw1W5gjU9SMUOXRnXwYuRuZlHBQjFnUOVJ5zkey5/K hkjeCBT/FUsrZpugOJ8Azv2n69F/Vy3ITF/cEBGXPpYEAlyEqCk5bJT8EJIG e57u2Ea0G7UDDDjZ3LCpP3EGC7IDBzPCjUhjJSU8entXbveKBTjvuKCuL/Tb B9VbhBjBqbhLzmyQGoLkuT36d/HSHzMCv1PndvncJiVBby+mG/qkE5D6fH7Z C2Bd7L/KQaBh+xFJKdioLXUV2EoY6hbvVTQiGhONBjCCBRIwggP6oAMCAQIC CQDjC9X4ryXZgTANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUxKzAp BgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVs ZVNlYyBHbG9iYWxSb290IENsYXNzIDIwHhcNMTYwMjIyMTMzODIyWhcNMzEw MjIyMjM1OTU5WjCBlTELMAkGA1UEBhMCREUxRTBDBgNVBAoTPFZlcmVpbiB6 dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4gRm9yc2NodW5nc25ldHpl cyBlLiBWLjEQMA4GA1UECxMHREZOLVBLSTEtMCsGA1UEAxMkREZOLVZlcmVp biBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAyMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAy2DX/2ahQc3S+oeXinOrmU3qZzlaoWCARxVOjJWy 5c/O01dLjc74VmwVVXYH6kb9yANFYz5w1KtUgLEjnL43KKkJ/wVdGA/EmJk3 syD2ZngXh8KdDsxKMucWna4OjSl5BwAgVNwVX0qW13i2NNPBdLWd6b/Ad03q vVkH4FovbDylANw1vWUNj38ybfJaaktiAe6sODRZRTZJBdp4ymptW8CBaxHM 0jyoi/hxGso74oDdFrRneos26k6RKT2zUVytqAy+nTTj0Q0Xg3XEOR6wlAsS 8dVpjiX0uD0rv8COwx47pb9VEKsqrheXXjPOyPP0CQfjAoYxRmsBxRAMEcdZ 6QIDAQABo4IBdDCCAXAwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBST49gy JtrV8UqlkUrg6kviogzP4TAfBgNVHSMEGDAWgBS/WSA2AHmgoCJrjNXyYdK4 LMuCSjASBgNVHRMBAf8ECDAGAQH/AgECMDMGA1UdIAQsMCowDwYNKwYBBAGB rSGCLAEBBDANBgsrBgEEAYGtIYIsHjAIBgZngQwBAgIwTAYDVR0fBEUwQzBB oD+gPYY7aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9ybC9UZWxlU2VjX0ds b2JhbFJvb3RfQ2xhc3NfMi5jcmwwgYYGCCsGAQUFBwEBBHoweDAsBggrBgEF BQcwAYYgaHR0cDovL29jc3AwMzM2LnRlbGVzZWMuZGUvb2NzcHIwSAYIKwYB BQUHMAKGPGh0dHA6Ly9wa2kwMzM2LnRlbGVzZWMuZGUvY3J0L1RlbGVTZWNf R2xvYmFsUm9vdF9DbGFzc18yLmNlcjANBgkqhkiG9w0BAQsFAAOCAQEAhwv/ PgKbZchWLdY7mpiLcU/auimqIflGLvWypA+uETh5OLMOdLp2XZ7oGIKWYttM M+jd+WrfMr0sTEdgVX/ndGu0LIPYeWu2t01QC2YHte2zl63q7n8w5pn9IuJy TT6EW+75z5nqf9dSOS6smABEfmk7v3Xu0As7Gs3l9w8ibEeE9qVHoP3QGjR9 rdI9d7Pu9NdN/8Po5ZJPWT6QRxBKsIVYwG9/+K7tCEKeHtTfFC5Nj7yelMPn 7fYY+DxJ5yaopzbYLN4izYuC2Nl44lUSozuHRLYRC9UMUq9pjA8G39CiU4tX mHvP/Qck9Py9w/1KkgKXG/K3ts9lihqitXIZOTCCBnEwggVZoAMCAQICDCMa UN4einMCRUHbtTANBgkqhkiG9w0BAQsFADCBjTELMAkGA1UEBhMCREUxRTBD BgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4g Rm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTElMCMG A1UEAwwcREZOLVZlcmVpbiBHbG9iYWwgSXNzdWluZyBDQTAeFw0yMDA2MzAw NTUzMjBaFw0yMzA2MzAwNTUzMjBaMIHrMQswCQYDVQQGEwJERTEPMA0GA1UE CAwGQmF5ZXJuMREwDwYDVQQHDAhNdWVuY2hlbjEpMCcGA1UECgwgVGVjaG5p c2NoZSBVbml2ZXJzaXRhZXQgTXVlbmNoZW4xQTA/BgNVBAsMOEZvcnNjaHVu Z3MtTmV1dHJvbmVucXVlbGxlIEhlaW56IE1haWVyLUxlaWJuaXR6IChGUk0g SUkpMQ4wDAYDVQQLDAViSVRUUzETMBEGA1UEAwwKSm9lcmcgUHVsejElMCMG CSqGSIb3DQEJARYWSm9lcmcuUHVsekBmcm0yLnR1bS5kZTCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAN1rXukpQBGvzfx1S+9NthDG5SGTdVSx cgiOpZ7i90iMn6edz1LHHCwKzPRk9DtbC3XsB+frkxxUGavAjhWnX0tp/oV+ zgwsF6G0pa2iedw0aMqqakHRo/2i0/x3l7o23hTL48Tmeq3KXPyKKsTZqOGP YidIfyUILqyhizYwpKY1dpRVpYj92M7ULbNCghMw8uKtEXMz9cwG0ZxyPh0Z 2ipItdFBQO7rZr3iS2xpgCm1at3tJ9NX4MyXc7I6mLI4JW3hUSCTZp/smtMg ztk4MzMoKKqGsWICK8C9V3hEhM8rFxJnf2z8FOMs74jpYspOLslI+mY5OlZS tL0MRvtlItMCAwEAAaOCAm8wggJrMD4GA1UdIAQ3MDUwDwYNKwYBBAGBrSGC LAEBBDAQBg4rBgEEAYGtIYIsAQEEBzAQBg4rBgEEAYGtIYIsAgEEBzAJBgNV HRMEAjAAMA4GA1UdDwEB/wQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYI KwYBBQUHAwQwHQYDVR0OBBYEFJTuHcZtF06pQ9pQdYSDZXYytRFVMB8GA1Ud IwQYMBaAFGs6mIv58lOJ2uCtsjIeCR/oqjt0MEEGA1UdEQQ6MDiBFkpvZXJn LlB1bHpAZnJtMi50dW0uZGWBHkpvZXJnLlB1bHpAZnJtMi50dS1tdWVuY2hl bi5kZTCBjQYDVR0fBIGFMIGCMD+gPaA7hjlodHRwOi8vY2RwMS5wY2EuZGZu LmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHViL2NybC9jYWNybC5jcmwwP6A9oDuG OWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIv Y3JsL2NhY3JsLmNybDCB2wYIKwYBBQUHAQEEgc4wgcswMwYIKwYBBQUHMAGG J2h0dHA6Ly9vY3NwLnBjYS5kZm4uZGUvT0NTUC1TZXJ2ZXIvT0NTUDBJBggr BgEFBQcwAoY9aHR0cDovL2NkcDEucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFs LWcyL3B1Yi9jYWNlcnQvY2FjZXJ0LmNydDBJBggrBgEFBQcwAoY9aHR0cDov L2NkcDIucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jYWNlcnQv Y2FjZXJ0LmNydDANBgkqhkiG9w0BAQsFAAOCAQEAMakvj2oaj3AZR4Y7NrOt tDX/9/CF+w4bYT3U37cex1lQ7QVn/1zfeicAjwhCHN8ujFFjXT6eVvG0wUZi ofGM9bvBQTlbj6NuZ0mpQwJ1henC28W10nKDZdFZGBIkLlRy4MtHr4c95+b/ Xmp795t1hwsutxUxgbzW1UwzVzmw2QveMIbeXvibxNXBDsBTkwTi3444+LVI ot43ccvunvz9WM9RicWKfO5eK3dTpJVsUYexcljGwOJlRet971cevOxqq5Z9 lH6+8yQL4IOAXvu7zMl+qUZE1/4mPpiNlsJxbpTqsWbHYumI9PqZo3vxUVjw moEqkg96xTj0lDJwzkmzMjGCArEwggKtAgEBMIGeMIGNMQswCQYDVQQGEwJE RTFFMEMGA1UECgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRz Y2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJ MSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1aW5nIENBAgwjGlDe HopzAkVB27UwDQYJYIZIAWUDBAIBBQCggeQwGAYJKoZIhvcNAQkDMQsGCSqG SIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjMwNDIwMTMxNDI3WjAvBgkqhkiG 9w0BCQQxIgQg34CgL3T3N5MVWrIBIXQzWtTpkjDGwqtgU6RDVgUozXAweQYJ KoZIhvcNAQkPMWwwajALBglghkgBZQMEASowCwYJYIZIAWUDBAEWMAsGCWCG SAFlAwQBAjAKBggqhkiG9w0DBzAOBggqhkiG9w0DAgICAIAwDQYIKoZIhvcN AwICAUAwBwYFKw4DAgcwDQYIKoZIhvcNAwICASgwDQYJKoZIhvcNAQEBBQAE ggEAoM7XPJqAwq79G5fafd/9hKzVtVUthsJNcnOeZAx2UaZHR03ROlOEmxsU PYLTPQwTESbWceTyIn+JXSTuVrFOHiO8Ih6oMduBMnFFjV+H8rwKWvQ5OYKf PEBgbE0J1NtCZBySjPANOYNLCWsMtsNaQkFX/lD36ct1PTX3ZkT1bzQOFSo/ MT2si0J5A/Acz0y2Wk/7kdre4RZ764d89+7M2BMYF30p59bcbTjUGapxUH+5 V1XmlzEKPyCJjOLgNVUpApBh0rIHfKol2wpvyNx55PJm3BoXUgxTt1V10vX4 ZR1/KxF3evnvw0HnAbT3i1O/zXMqc+v5KKo/Q6N2enJNXA== --3469798045-263270738-1681996467=:78141-- From nobody Thu Apr 20 18:46:08 2023 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q2RSt6Nc8z46RW0 for <freebsd-arch@mlmmj.nyi.freebsd.org>; Thu, 20 Apr 2023 18:46:22 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-lj1-f173.google.com (mail-lj1-f173.google.com [209.85.208.173]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q2RSt36Kkz4Nx1 for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 18:46:22 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-lj1-f173.google.com with SMTP id y24so3889402ljm.6 for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 11:46:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682016381; x=1684608381; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=IfuOu1kRRts21FqgJy58QPNclJlbnWa+vs1Mqo1ROzk=; b=DiVJXEacyYNmJqGmPHn7GAxeh+j2XR1u1yMOgRShpmZ/jc/IOPbZpEf85Z5NDeGRnZ YYgCXHf1/z6YMfDwuUmfQc2/wuSjEc+FtKrNRnXxb5IIqhD0m3Dr41yExlZTTp91cJXR LpXqxhkspQ9yaIuFFJn778voePiX8MdE96EE3/6j9S6cZWL9xws4MSrIyP2o05YekM3+ dXhaKuJtP8dXdqxwOA3S51CYH4jxGdSm7lU/crijhgTKA1SkhmuYy814G09jwpUbIRWn GkgDl7NOvCKHAId5zcfEQxIlgAzs7ClXN4eEXgH+VAW/1OS/CPlapy7Yw82aXqv41+No XakA== X-Gm-Message-State: AAQBX9eS4FHcQzQhFGBmkNguhUYmsj5r3IfwmxJ2IlaIwcz0nX252lW6 umu7A1+a4u3zVbU1UcCmkUMgAw741Dokxnq81umOImyO X-Google-Smtp-Source: AKy350YIu1hsIM0qtycmINH5ijcpfMmg0pePKfbiXj8FUx0GDIo4/N1Cp6CFBLLjFqGNC8jbJFFVXmeYmUPc0iKceq0= X-Received: by 2002:a2e:3511:0:b0:298:6ffd:e856 with SMTP id z17-20020a2e3511000000b002986ffde856mr651722ljz.8.1682016380586; Thu, 20 Apr 2023 11:46:20 -0700 (PDT) List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 References: <CAPyFy2Afao5tnujFtwiF6avdkqAXRGDOTSq-JSCkHvvbfUvhaA@mail.gmail.com> <nycvar.OFS.7.77.840.2304201411080.78141@unqrf.nqzva.sez2.ghz.qr> In-Reply-To: <nycvar.OFS.7.77.840.2304201411080.78141@unqrf.nqzva.sez2.ghz.qr> From: Ed Maste <emaste@freebsd.org> Date: Thu, 20 Apr 2023 14:46:08 -0400 Message-ID: <CAPyFy2DQsNLXmELTun6n590opjcAom-3MQE_jKda7AU4LdcGGg@mail.gmail.com> Subject: Re: OpenSSL in the FreeBSD base system / FreeBSD 14 To: Joerg Pulz <Joerg.Pulz@frm2.tum.de> Cc: freebsd-arch <freebsd-arch@freebsd.org> Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 4Q2RSt36Kkz4Nx1 X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N On Thu, 20 Apr 2023 at 09:14, Joerg Pulz <Joerg.Pulz@frm2.tum.de> wrote: > > Would the OpenSSL privatelib change mean that it's no longer possible to > build and link base software against libs from ports given that those libs > are linked to OpenSSL from ports then? > > e.g. link base Sendmail (with OpenSSL privatelib) with libsasl from > security/cyrus-sasl2 and libldap from net/openldap26-client which are then > linked with libssl an libcrypto from security/openssl > > or > > link base Heimdal (with OpenSSL privatelib) with libldap from > net/openldap26-client which is then linked with libssl an libcrypto > from security/openssl > > Both examples above are maybe not common but in use by myself since > "ages". Yes, I believe privatelib would preclude use cases like this. The problem is that we have conflicting constraints: OpenSSL 1.1.1 is EOL shortly after 14.0 releases, and there are ports that do not yet build against OpenSSL 3. I am not sure how much will be broken if we update the base system to OpenSSL 3 but leave the privatelib aside (i.e., have the base system provide OpenSSL 3 to ports). > If such setups will no longer work with OpenSSL privatelib and updating > OpenSSL in base is such a complicated, heavy and time consuming task, one > could ask - why use OpenSSL instead of one other SSL implementation in > base at all? This is a good question, and is something that's been discussed on occasion. The base system has some components that depend on OpenSSL right now. If we switch to privatelib it is quite possible that we'll migrate those to something else over time. From nobody Thu Apr 20 20:20:32 2023 X-Original-To: freebsd-arch@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q2TYk5FL6z46XR6 for <freebsd-arch@mlmmj.nyi.freebsd.org>; Thu, 20 Apr 2023 20:20:42 +0000 (UTC) (envelope-from Joerg.Pulz@frm2.tum.de) Received: from mailhost.frm2.tum.de (mailhost.frm2.tum.de [IPv6:2001:4ca0:2403::81bb:b30c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mailhost.frm2.tum.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q2TYj55YLz4Fpc for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 20:20:41 +0000 (UTC) (envelope-from Joerg.Pulz@frm2.tum.de) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=frm2.tum.de header.s=s2048 header.b=HdfBQkIN; spf=pass (mx1.freebsd.org: domain of Joerg.Pulz@frm2.tum.de designates 2001:4ca0:2403::81bb:b30c as permitted sender) smtp.mailfrom=Joerg.Pulz@frm2.tum.de; dmarc=pass (policy=none) header.from=tum.de Received: from mailhost.frm2.tum.de (localhost [127.0.0.1]) by mailhost.frm2.tum.de (8.16.1/8.15.2) with ESMTP id 33KKKXTg072494 for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 22:20:33 +0200 (CEST) (envelope-from Joerg.Pulz@frm2.tum.de) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=frm2.tum.de; s=s2048; t=1682022033; bh=mI9B/+3zi6KNguT613cUKbkkpcJkKOiYLddSdSH3ArI=; h=Date:From:To:Subject; b=HdfBQkINtCd48GU2dQbDMiaq5/9iDqjo3x+pslVyO7bxPal42fmWx6vqbkhXz/+/g uF3k9Nrau9ewoETNIaK53cl8Ols6is6OIN6NjtBnp4X8/z3Jf7tWqaXRQrNGxqBNH6 RWEfZJaCcwz4FnuwM01Gml/m1ysR5+09oVjbHGein19HW8FZVZC/SrzqpwtB3B0ozM ivOx6JKBtLWVY0TBaqUovacx5J08PzuE+YzUUAO5/I7BYRY1hOCvnc+Llh4zO8sjwT veuM9F0HfNM3H1GceappoVAKug9oTCTo6fxa0oK/7SAyfHuUjXBnQrIOmldJ7Vegop hLJ2iK93yveeQ== X-Virus-Scanned: at mailhost.frm2.tum.de Received: from be-hermes.frm2.tum.de (be-hermes.frm2.tum.de [129.187.179.150]) (authenticated bits=0) by mailhost.frm2.tum.de (8.16.1/8.15.2) with ESMTPSA id 33KKKWF0072486 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <freebsd-arch@freebsd.org>; Thu, 20 Apr 2023 22:20:32 +0200 (CEST) (envelope-from Joerg.Pulz@frm2.tum.de) Received: from p200300E62F0Abc00050D940A9ADe10B8.dip0.t-ipconnect.de (p200300E62F0Abc00050D940A9ADe10B8.dip0.t-ipconnect.de [2003:e6:2f0a:bc00:50d:940a:9ade:10b8]) by hermes.frm2.tum.de (Horde Framework) with HTTP; Thu, 20 Apr 2023 22:20:32 +0200 Date: Thu, 20 Apr 2023 22:20:32 +0200 Message-ID: <20230420222032.Horde.TjfVLV5zjaBVDFUN8c4quQ1@hermes.frm2.tum.de> From: "Pulz, Joerg" <Joerg.Pulz@frm2.tum.de> To: freebsd-arch@freebsd.org Subject: Re: OpenSSL in the FreeBSD base system / FreeBSD 14 User-Agent: Horde Application Framework 5 Content-Type: multipart/signed; boundary="=_ou2VcL1qBUBk3ljp3BSBmg1"; protocol="application/pkcs7-signature"; micalg=sha-1 List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Archive: https://lists.freebsd.org/archives/freebsd-arch List-Help: <mailto:freebsd-arch+help@freebsd.org> List-Post: <mailto:freebsd-arch@freebsd.org> List-Subscribe: <mailto:freebsd-arch+subscribe@freebsd.org> List-Unsubscribe: <mailto:freebsd-arch+unsubscribe@freebsd.org> Sender: owner-freebsd-arch@freebsd.org MIME-Version: 1.0 X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.4 (mailhost.frm2.tum.de [129.187.179.12]); Thu, 20 Apr 2023 22:20:32 +0200 (CEST) X-Spamd-Result: default: False [-6.09 / 15.00]; SIGNED_SMIME(-2.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FAKE_REPLY(1.00)[]; DWL_DNSWL_LOW(-1.00)[tum.de:dkim]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.99)[-0.987]; DMARC_POLICY_ALLOW(-0.50)[tum.de,none]; R_DKIM_ALLOW(-0.20)[frm2.tum.de:s=s2048]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; R_SPF_ALLOW(-0.20)[+ip6:2001:4ca0:2403::81bb:b30c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; FROM_HAS_DN(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-arch@freebsd.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; ASN(0.00)[asn:12816, ipnet:2001:4ca0::/32, country:DE]; RCVD_TLS_LAST(0.00)[]; RCVD_COUNT_THREE(0.00)[4]; TO_DN_NONE(0.00)[]; HAS_ATTACHMENT(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; DKIM_TRACE(0.00)[frm2.tum.de:+]; MIME_TRACE(0.00)[0:+,1:+,2:~]; MLMMJ_DEST(0.00)[freebsd-arch@freebsd.org] X-Rspamd-Queue-Id: 4Q2TYj55YLz4Fpc X-Spamd-Bar: ------ X-ThisMailContainsUnwantedMimeParts: N This is a cryptographically signed message in MIME format. --=_ou2VcL1qBUBk3ljp3BSBmg1 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, 20 Apr 2023 14:46:08 -0400, Ed Maste <emaste@freebsd.org> wrote: > On Thu, 20 Apr 2023 at 09:14, Joerg Pulz <Joerg.Pulz@frm2.tum.de> wrote: >> >> Would the OpenSSL privatelib change mean that it's no longer possible to >> build and link base software against libs from ports given that those li= bs >> are linked to OpenSSL from ports then? >> >> e.g. link base Sendmail (with OpenSSL privatelib) with libsasl from >> security/cyrus-sasl2 and libldap from net/openldap26-client which are th= en >> linked with libssl an libcrypto from security/openssl >> >> or >> >> link base Heimdal (with OpenSSL privatelib) with libldap from >> net/openldap26-client which is then linked with libssl an libcrypto >> from security/openssl >> >> Both examples above are maybe not common but in use by myself since >> "ages". > > Yes, I believe privatelib would preclude use cases like this. > > The problem is that we have conflicting constraints: OpenSSL 1.1.1 is > EOL shortly after 14.0 releases, and there are ports that do not yet > build against OpenSSL 3. I am not sure how much will be broken if we > update the base system to OpenSSL 3 but leave the privatelib aside > (i.e., have the base system provide OpenSSL 3 to ports). > >> If such setups will no longer work with OpenSSL privatelib and updating >> OpenSSL in base is such a complicated, heavy and time consuming task, on= e >> could ask - why use OpenSSL instead of one other SSL implementation in >> base at all? > > This is a good question, and is something that's been discussed on > occasion. The base system has some components that depend on OpenSSL > right now. If we switch to privatelib it is quite possible that we'll > migrate those to something else over time. Due to the EOL of OpenSSL 1.1.1 I see only one "quick" solution for=20=20 base=20- update base to the next OpenSSL LTS release 3.0 supported until=20= =20 7th=20September 2026. There is not that much time left for this task,=20=20 right? Ports=20incompatible with OpenSSL 3.0 will break anyway or is there a=20=20 plan=20to keep the EOLed and then unsupported OpenSSL 1.1.1 in ports=20=20 just=20to keep everything building? That would be a strange decision. Shouldn't other vendors using OpenSSL (e.g. Linux distro's) suffer=20=20 from=20the same situation - forced to update OpenSSL but third-party=20=20 software/packages=20not ready for this? IMO primarily upstream of the affected ports has to fix it's stuff to=20=20 build=20against a supported (not EOLed) OpenSSL version. Are there "exp-run for OpenSSL 3" results somewhere for an overview=20=20 about=20all then broken ports? I for myself would postpone the privatelib step to a later=20=20 point/release=20(15?). Early in the development phase for 15 there should be a discussion and=20= =20 decision=20about keeping OpenSSL at all in base or switch to something=20= =20 else=20better maintainable. Joerg --=20 J=C3=B6rg Pulz Gruppenleiter - IT Infrastruktur (bITTS) Technische Universit=C3=A4t M=C3=BCnchen Forschungs-Neutronenquelle Heinz Maier-Leibnitz (FRM II) Lichtenbergstrasse 1 85748 Garching Tel. +49 89 289 14708 Fax +49 89 289 14666 Joerg.Pulz@frm2.tum.de https://www.frm2.tum.de/ --=_ou2VcL1qBUBk3ljp3BSBmg1 Content-Type: application/pkcs7-signature; name=smime.p7s Content-Description: S/MIME Signature Content-Disposition: attachment; filename=smime.p7s Content-Transfer-Encoding: base64 MIIXtAYJKoZIhvcNAQcCoIIXpTCCF6ECAQExCzAJBgUrDgMCGgUAMAsGCSqGSIb3DQEHAaCCFQIw ggZxMIIFWaADAgECAgwjGlDeHopzAkVB27UwDQYJKoZIhvcNAQELBQAwgY0xCzAJBgNVBAYTAkRF MUUwQwYDVQQKDDxWZXJlaW4genVyIEZvZXJkZXJ1bmcgZWluZXMgRGV1dHNjaGVuIEZvcnNjaHVu Z3NuZXR6ZXMgZS4gVi4xEDAOBgNVBAsMB0RGTi1QS0kxJTAjBgNVBAMMHERGTi1WZXJlaW4gR2xv YmFsIElzc3VpbmcgQ0EwHhcNMjAwNjMwMDU1MzIwWhcNMjMwNjMwMDU1MzIwWjCB6zELMAkGA1UE BhMCREUxDzANBgNVBAgMBkJheWVybjERMA8GA1UEBwwITXVlbmNoZW4xKTAnBgNVBAoMIFRlY2hu aXNjaGUgVW5pdmVyc2l0YWV0IE11ZW5jaGVuMUEwPwYDVQQLDDhGb3JzY2h1bmdzLU5ldXRyb25l bnF1ZWxsZSBIZWlueiBNYWllci1MZWlibml0eiAoRlJNIElJKTEOMAwGA1UECwwFYklUVFMxEzAR BgNVBAMMCkpvZXJnIFB1bHoxJTAjBgkqhkiG9w0BCQEWFkpvZXJnLlB1bHpAZnJtMi50dW0uZGUw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDda17pKUARr838dUvvTbYQxuUhk3VUsXII jqWe4vdIjJ+nnc9SxxwsCsz0ZPQ7Wwt17Afn65McVBmrwI4Vp19Laf6Ffs4MLBehtKWtonncNGjK qmpB0aP9otP8d5e6Nt4Uy+PE5nqtylz8iirE2ajhj2InSH8lCC6soYs2MKSmNXaUVaWI/djO1C2z QoITMPLirRFzM/XMBtGccj4dGdoqSLXRQUDu62a94ktsaYAptWrd7SfTV+DMl3OyOpiyOCVt4VEg k2af7JrTIM7ZODMzKCiqhrFiAivAvVd4RITPKxcSZ39s/BTjLO+I6WLKTi7JSPpmOTpWUrS9DEb7 ZSLTAgMBAAGjggJvMIICazA+BgNVHSAENzA1MA8GDSsGAQQBga0hgiwBAQQwEAYOKwYBBAGBrSGC LAEBBAcwEAYOKwYBBAGBrSGCLAIBBAcwCQYDVR0TBAIwADAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0l BBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMB0GA1UdDgQWBBSU7h3GbRdOqUPaUHWEg2V2MrURVTAf BgNVHSMEGDAWgBRrOpiL+fJTidrgrbIyHgkf6Ko7dDBBBgNVHREEOjA4gRZKb2VyZy5QdWx6QGZy bTIudHVtLmRlgR5Kb2VyZy5QdWx6QGZybTIudHUtbXVlbmNoZW4uZGUwgY0GA1UdHwSBhTCBgjA/ oD2gO4Y5aHR0cDovL2NkcDEucGNhLmRmbi5kZS9kZm4tY2EtZ2xvYmFsLWcyL3B1Yi9jcmwvY2Fj cmwuY3JsMD+gPaA7hjlodHRwOi8vY2RwMi5wY2EuZGZuLmRlL2Rmbi1jYS1nbG9iYWwtZzIvcHVi L2NybC9jYWNybC5jcmwwgdsGCCsGAQUFBwEBBIHOMIHLMDMGCCsGAQUFBzABhidodHRwOi8vb2Nz cC5wY2EuZGZuLmRlL09DU1AtU2VydmVyL09DU1AwSQYIKwYBBQUHMAKGPWh0dHA6Ly9jZHAxLnBj YS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY2FjZXJ0L2NhY2VydC5jcnQwSQYIKwYBBQUH MAKGPWh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUvZGZuLWNhLWdsb2JhbC1nMi9wdWIvY2FjZXJ0L2Nh Y2VydC5jcnQwDQYJKoZIhvcNAQELBQADggEBADGpL49qGo9wGUeGOzazrbQ1//fwhfsOG2E91N+3 HsdZUO0FZ/9c33onAI8IQhzfLoxRY10+nlbxtMFGYqHxjPW7wUE5W4+jbmdJqUMCdYXpwtvFtdJy g2XRWRgSJC5UcuDLR6+HPefm/15qe/ebdYcLLrcVMYG81tVMM1c5sNkL3jCG3l74m8TVwQ7AU5ME 4t+OOPi1SKLeN3HL7p78/VjPUYnFinzuXit3U6SVbFGHsXJYxsDiZUXrfe9XHrzsaquWfZR+vvMk C+CDgF77u8zJfqlGRNf+Jj6YjZbCcW6U6rFmx2LpiPT6maN78VFY8JqBKpIPesU49JQycM5JszIw ggWsMIIElKADAgECAgcbY7rQHiw9MA0GCSqGSIb3DQEBCwUAMIGVMQswCQYDVQQGEwJERTFFMEMG A1UEChM8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0 emVzIGUuIFYuMRAwDgYDVQQLEwdERk4tUEtJMS0wKwYDVQQDEyRERk4tVmVyZWluIENlcnRpZmlj YXRpb24gQXV0aG9yaXR5IDIwHhcNMTYwNTI0MTEzODQwWhcNMzEwMjIyMjM1OTU5WjCBjTELMAkG A1UEBhMCREUxRTBDBgNVBAoMPFZlcmVpbiB6dXIgRm9lcmRlcnVuZyBlaW5lcyBEZXV0c2NoZW4g Rm9yc2NodW5nc25ldHplcyBlLiBWLjEQMA4GA1UECwwHREZOLVBLSTElMCMGA1UEAwwcREZOLVZl cmVpbiBHbG9iYWwgSXNzdWluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ07 eRxH3h+Gy8Zp1xCeOdfZojDbchwFfylfS2jxrRnWTOFrG7ELf6Gr4HuLi9gtzm6IOhDuV+UefwRR Nuu6cG1joL6WLkDh0YNMZj0cZGnlm6Stcq5oOVGHecwX064vXWNxSzl660Knl5BpBb+Q/6RAcL0D 57+eGIgfn5mITQ5HjUhfZZkQ0tkqSe3BuS0dnxLLFdM/fx5ULzquk1enfnjK1UriGuXtQX1TX8iz KvWKMKztFwUkP7agCwf9TRqaA1KgNpzeJIdl5Of6x5ZzJBTN0OgbaJ4YWa52fvfRCng8h0uwN89T yjo4EPPLR22MZD08WkVKusqAfLjz56dMTM0CAwEAAaOCAgUwggIBMBIGA1UdEwEB/wQIMAYBAf8C AQEwDgYDVR0PAQH/BAQDAgEGMCkGA1UdIAQiMCAwDQYLKwYBBAGBrSGCLB4wDwYNKwYBBAGBrSGC LAEBBDAdBgNVHQ4EFgQUazqYi/nyU4na4K2yMh4JH+iqO3QwHwYDVR0jBBgwFoAUk+PYMiba1fFK pZFK4OpL4qIMz+EwgY8GA1UdHwSBhzCBhDBAoD6gPIY6aHR0cDovL2NkcDEucGNhLmRmbi5kZS9n bG9iYWwtcm9vdC1nMi1jYS9wdWIvY3JsL2NhY3JsLmNybDBAoD6gPIY6aHR0cDovL2NkcDIucGNh LmRmbi5kZS9nbG9iYWwtcm9vdC1nMi1jYS9wdWIvY3JsL2NhY3JsLmNybDCB3QYIKwYBBQUHAQEE gdAwgc0wMwYIKwYBBQUHMAGGJ2h0dHA6Ly9vY3NwLnBjYS5kZm4uZGUvT0NTUC1TZXJ2ZXIvT0NT UDBKBggrBgEFBQcwAoY+aHR0cDovL2NkcDEucGNhLmRmbi5kZS9nbG9iYWwtcm9vdC1nMi1jYS9w dWIvY2FjZXJ0L2NhY2VydC5jcnQwSgYIKwYBBQUHMAKGPmh0dHA6Ly9jZHAyLnBjYS5kZm4uZGUv Z2xvYmFsLXJvb3QtZzItY2EvcHViL2NhY2VydC9jYWNlcnQuY3J0MA0GCSqGSIb3DQEBCwUAA4IB AQCBeEWkTqR/DlXwCbFqPnjMaDWpHPOVnj/z+N9rOHeJLI21rT7H8pTNoAauusyosa0zCLYkhmI2 THhuUPDVbmCNT1IxQ5dGdfBi5G5mUcFCMWdQ5UnnOR7Ln8qGSN4IFP8VSytmm6A4nwDO/afr0X9X LchMX9wQEZc+lgQCXISoKTlslPwQkgZ7nu7YRrQbtQMMONncsKk/cQYLsgMHM8KNSGMlJTx6e1du 94oFOO+4oK4v9NsH1VuEGMGpuEvObJAaguS5Pfp38dIfMwK/U+d2+dwmJUFvL6Yb+qQTkPp8ftkL YF3sv8pBoGH7EUkp2KgtdRXYShjqFu9VNCIaE40GMIIFEjCCA/qgAwIBAgIJAOML1fivJdmBMA0G CSqGSIb3DQEBCwUAMIGCMQswCQYDVQQGEwJERTErMCkGA1UECgwiVC1TeXN0ZW1zIEVudGVycHJp c2UgU2VydmljZXMgR21iSDEfMB0GA1UECwwWVC1TeXN0ZW1zIFRydXN0IENlbnRlcjElMCMGA1UE AwwcVC1UZWxlU2VjIEdsb2JhbFJvb3QgQ2xhc3MgMjAeFw0xNjAyMjIxMzM4MjJaFw0zMTAyMjIy MzU5NTlaMIGVMQswCQYDVQQGEwJERTFFMEMGA1UEChM8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVp bmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVzIGUuIFYuMRAwDgYDVQQLEwdERk4tUEtJMS0w KwYDVQQDEyRERk4tVmVyZWluIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDIwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQDLYNf/ZqFBzdL6h5eKc6uZTepnOVqhYIBHFU6MlbLlz87TV0uN zvhWbBVVdgfqRv3IA0VjPnDUq1SAsSOcvjcoqQn/BV0YD8SYmTezIPZmeBeHwp0OzEoy5xadrg6N KXkHACBU3BVfSpbXeLY008F0tZ3pv8B3Teq9WQfgWi9sPKUA3DW9ZQ2PfzJt8lpqS2IB7qw4NFlF NkkF2njKam1bwIFrEczSPKiL+HEayjvigN0WtGd6izbqTpEpPbNRXK2oDL6dNOPRDReDdcQ5HrCU CxLx1WmOJfS4PSu/wI7DHjulv1UQqyquF5deM87I8/QJB+MChjFGawHFEAwRx1npAgMBAAGjggF0 MIIBcDAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJPj2DIm2tXxSqWRSuDqS+KiDM/hMB8GA1Ud IwQYMBaAFL9ZIDYAeaCgImuM1fJh0rgsy4JKMBIGA1UdEwEB/wQIMAYBAf8CAQIwMwYDVR0gBCww KjAPBg0rBgEEAYGtIYIsAQEEMA0GCysGAQQBga0hgiweMAgGBmeBDAECAjBMBgNVHR8ERTBDMEGg P6A9hjtodHRwOi8vcGtpMDMzNi50ZWxlc2VjLmRlL3JsL1RlbGVTZWNfR2xvYmFsUm9vdF9DbGFz c18yLmNybDCBhgYIKwYBBQUHAQEEejB4MCwGCCsGAQUFBzABhiBodHRwOi8vb2NzcDAzMzYudGVs ZXNlYy5kZS9vY3NwcjBIBggrBgEFBQcwAoY8aHR0cDovL3BraTAzMzYudGVsZXNlYy5kZS9jcnQv VGVsZVNlY19HbG9iYWxSb290X0NsYXNzXzIuY2VyMA0GCSqGSIb3DQEBCwUAA4IBAQCHC/8+Aptl yFYt1juamItxT9q6Kaoh+UYu9bKkD64ROHk4sw50unZdnugYgpZi20wz6N35at8yvSxMR2BVf+d0 a7Qsg9h5a7a3TVALZge17bOXrerufzDmmf0i4nJNPoRb7vnPmep/11I5LqyYAER+aTu/de7QCzsa zeX3DyJsR4T2pUeg/dAaNH2t0j13s+70103/w+jlkk9ZPpBHEEqwhVjAb3/4ru0IQp4e1N8ULk2P vJ6Uw+ft9hj4PEnnJqinNtgs3iLNi4LY2XjiVRKjO4dEthEL1QxSr2mMDwbf0KJTi1eYe8/9ByT0 /L3D/UqSApcb8re2z2WKGqK1chk5MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjEL MAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgx HzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9i YWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1OTU5WjCBgjELMAkGA1UE BhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNV BAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290 IENsYXNzIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl 82hVYAUdAqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiCFoT6 ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi1hKTXrcxlkIF+3an HqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6IavqjnKgP6TeMFvvhk1qlVtDRKgQFRzl AVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZwI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14 np+GPgNeGYtEotXHAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G A1UdDgQWBBS/WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPACuvxhI+YzmzB6 azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVwIEoHNN/q/xWA5brXethbdXwF eilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhj dFjASBgMmTnrpMwatXlajRWc2BQN9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bku qjzx+zOAduTNrRlPBSeOE6FuwjGCAnowggJ2AgEBMIGeMIGNMQswCQYDVQQGEwJERTFFMEMGA1UE Cgw8VmVyZWluIHp1ciBGb2VyZGVydW5nIGVpbmVzIERldXRzY2hlbiBGb3JzY2h1bmdzbmV0emVz IGUuIFYuMRAwDgYDVQQLDAdERk4tUEtJMSUwIwYDVQQDDBxERk4tVmVyZWluIEdsb2JhbCBJc3N1 aW5nIENBAgwjGlDeHopzAkVB27UwCQYFKw4DAhoFAKCBsTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcN AQcBMBwGCSqGSIb3DQEJBTEPFw0yMzA0MjAyMDIwMzJaMCMGCSqGSIb3DQEJBDEWBBQXWZmHcg7K gztumt/9kcNchnoAPzBSBgkqhkiG9w0BCQ8xRTBDMAoGCCqGSIb3DQMHMA4GCCqGSIb3DQMCAgIA gDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDANBgkqhkiG9w0BAQEFAASC AQBxjVWy4SwUqA3mK+a3h40b9Eks3HMKiaHkOMp1QwfwvIP6vKvGoFwQTSyTIuiYFBOIKlcIZRhX ZjQy5fz0iWl6e3FQgH4i+4zAgjyxHs1a7R0lweRWyVaYvXePbgwGU2kh6E/ehNVQdbbUBdXoaUvR H+AaWAMkm9i/z5TewSk8NT/9kXEJEZ7Jx9QoXiE8Ad8xYdVrg694lrJQIKBFDeHQgbgXPVQSd4qf nJIOEysMLNboQ1Vkj9W5GwXu2SeYrEO4IWRXCZBBisGAGIiffutTEHtho+Pp13et0ErRMnM5wrXU wKsI/wybcXqmj7EYuQd9ozFrBb2aJCbInPfC5QM6 --=_ou2VcL1qBUBk3ljp3BSBmg1--