From owner-svn-src-projects@freebsd.org Fri Nov 27 16:23:13 2020 Return-Path: Delivered-To: svn-src-projects@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 614844ABD91 for ; Fri, 27 Nov 2020 16:23:13 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CjKg52MPJz3jlv; Fri, 27 Nov 2020 16:23:13 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 43C5917BFC; Fri, 27 Nov 2020 16:23:13 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0ARGNDC3068580; Fri, 27 Nov 2020 16:23:13 GMT (envelope-from rmacklem@FreeBSD.org) Received: (from rmacklem@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0ARGNDNw068579; Fri, 27 Nov 2020 16:23:13 GMT (envelope-from rmacklem@FreeBSD.org) Message-Id: <202011271623.0ARGNDNw068579@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rmacklem set sender to rmacklem@FreeBSD.org using -f From: Rick Macklem Date: Fri, 27 Nov 2020 16:23:13 +0000 (UTC) To: src-committers@freebsd.org, svn-src-projects@freebsd.org Subject: svn commit: r368106 - projects/nfs-over-tls X-SVN-Group: projects X-SVN-Commit-Author: rmacklem X-SVN-Commit-Paths: projects/nfs-over-tls X-SVN-Commit-Revision: 368106 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-projects@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the src " projects" tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Nov 2020 16:23:13 -0000 Author: rmacklem Date: Fri Nov 27 16:23:12 2020 New Revision: 368106 URL: https://svnweb.freebsd.org/changeset/base/368106 Log: Update the setup doc. I now have a port to build/install the daemons and they can use the security/openssl-devel port, simplifying setup. Modified: projects/nfs-over-tls/nfs-over-tls-setup.txt Modified: projects/nfs-over-tls/nfs-over-tls-setup.txt ============================================================================== --- projects/nfs-over-tls/nfs-over-tls-setup.txt Fri Nov 27 15:50:20 2020 (r368105) +++ projects/nfs-over-tls/nfs-over-tls-setup.txt Fri Nov 27 16:23:12 2020 (r368106) @@ -5,7 +5,18 @@ This will change once the kernel tls knows how to do 1 Setup for testing. For now, setting up test machine(s) is a bit awkward, but hopefully this lists all the steps. -- Install a recent FreeBSD current system on amd64 system(s). +For those familiar with FreeBSD, the steps are: +- Install a recent FreeBSD13 (head/current) system on amd64, including + sources and ports. +- Build/install a custom kernel with "options KERN_TLS" in the kernel config. +- Install perl5. +- Install security/openssl-devel from ports with KTLS selected. +- Install sysutils/nfs-over-tls from ports. +- Set ktls sysctl(s) and load modules, as required (See "man ktls for more) + +For those not familiar with FreeBSD, here's how I'd do the above steps. +- Install a recent FreeBSD13 (head/current) system on amd64, including + sources and ports. There are many ways to do this, but downloading and installing a snapshot is probably the easiest. Go anonymous ftp onto ftp.freebsd.org @@ -18,76 +29,52 @@ awkward, but hopefully this lists all the steps. are several others.) - Burn the iso onto a DVD (or whatever). - Install it on a 64bit x86 system. + Click on "source" and "ports" selections to add them to what will + be installed. (For here on, you might as well login as root.) -Now, you will need a subversion client on some machine. If you do not -already have one, log into the newly installed FreeBSD system and -# pkg install subversion -- It will probably ask you to install "pkg" first and then it should work. +- Build/install a custom kernel with "options KERN_TLS" in the kernel config. + # cd /usr/src/sys/amd64/conf + - edit GENERIC and add the line + options KERN_TLS + # cd /usr/src + # make buildkernel + # make installkernel + # reboot -If you do not already have them, -you will need to get up-to-date sources via "svn": -# cd /usr/src -# svn checkout http://svn.freebsd.org/base/head . +- Install perl5. + # pkg install perl5 + (It will want to install the pkg system. Type "y" to all prompts.) -Use "svn" to download the modified sources into /usr/nfs-over-tls. -# cd /usr -# mkdir nfs-over-tls -# cd nfs-over-tls -# svn checkout http://svn.freebsd.org/base/projects/nfs-over-tls . +- Install security/openssl-devel from ports with KTLS selected. + # cd /usr/ports/security/openssl-devel + # make + - Click on "KTLS" to select it in the options panel. + # make install -Now, you can build/install the modified kernel. +- Install sysutils/nfs-over-tls from ports. + # cd /usr/ports/sysutils/nfs-over-tls + - If this port does not exist, do the following to add it. + (Hopefully it will be added soon.) + # cd /root + # fetch https://people.freebsd.org/~rmacklem/nfs-over-tls-port.tar + # cd /usr/ports/sysutils + # tar xf /root/nfs-over-tls-port.tar + # cd /usr/ports/sysutils/nfs-over-tls + # make + - Don't worry about warnings related to /etc/make.conf. + # make install -If the src.*.mk files are missing from /usr/share/mk... -# cd /usr/share/mk -# tar xf /usr/nfs-over-tls/sharemk.tar +- Set ktls sysctl(s) and load modules, as required (See "man ktls for more) + - edit /boot/loader.conf and add these line(s) for software ktls + ktls_ocf_load="YES" + and if your hardware supports AESNI + aesni_load="YES" + - edit /etc/sysctl.conf and add these lines + kern.ipc.tls.enable=1 + kern.ipc.mb_use_ext_pgs=1 + # reboot -Set up the kernel source tree. -# cd /usr/src/sys/amd64/conf -- edit GENERIC and add a line -options KERN_TLS -to it. -# cd /usr/src -# make buildkernel -# make installkernel - -Now, you will need a recent openssl3 source tree, which has been patched -for ktls. -I downloaded the openssl-3.0.0-alpha7.tar.gz tarball from www.openssl.org. -- You will need perl5. -# pkg install perl5 -# cd /usr -# zcat openssl-3.0.0-alpha7.tar.gz | tar xBf - -# cd openssl-3.0.0-alpha7 -# mkdir obj -# cd obj -# ../config --prefix=/usr/ktls --openssldir=/usr/ktls enable-ktls -# make -# make install -- This installs the patched openssl3 under /usr/ktls. I only use this - stuff for linking the daemons and use the regular openssl1.1.1 otherwise. - -And now you should be able to build/install the utilities. -First, make a symlink to your kernel sources in /usr/nfs-over-tls. -# cd /usr/nfs-over-tls -# ln -s /usr/src/sys sys -Then the makes should work. -# cd /usr/nfs-over-tls/usr.sbin/rpc.tlsservd -# make SRCTOP=/usr/nfs-over-tls -# cp rpc.tlsservd /usr/sbin -# cp rpc.tlsservd.8.gz /usr/share/man/man8 -# cd ../rpc.tlsclntd -# make SRCTOP=/usr/nfs-over-tls -# cp rpc.tlsclntd /usr/sbin -# cp rpc.tlsclntd.8.gz /usr/share/man/man8 - -You can copy the rc.d scripts as follows: -# cd /usr/nfs-over-tls/rc.d -# cp tlsclntd tlsservd ktls /etc/rc.d -# chmod 555 /etc/rc.d/tlsclntd /etc/rc.d/tlsservd /etc/rc.d/ktls - -Then reboot the system. - You should now be finally ready to configure and run a TLS mount. (If you have problems or I forgot any steps, feel free to email me at rmacklem@uoguelph.ca.) @@ -98,8 +85,11 @@ as amd64 (not i386). Then daemons must be running on the NFS server(s) and NFS client(s) for NFS-over-TLS to work. rpc.tlsservd(8) for the server(s) and rpc.tlsclntd(8) for the client(s). -Then you will have to create a x509 certificate for at least the NFS +Then you will have to create a x509v3 certificate for at least the NFS server(s) and, optionally, some or all of the NFS clients. +These certificates must each be a pair of files called "cert.pem" and "key.pem". +Once created, they need to be copied into a directory called +"/etc/rpc.tlsclntd" on the client(s) and "/etc/rpc.tlsservd" on the server(s). There are many ways to create signed certificates for TLS, but here is the simple method I've used for a site local CA, using only the @@ -108,6 +98,8 @@ I am far from an expert in this area, so there are alm better ways to do this. (Some have mentioned easyrsa in the openVPN software package, but I haven't tried it.) +I've been using the openssl1.1.1 shipped with FreeBSD and not the +openssl3 installed under /usr/local by /usr/ports/security/openssl-devel. I have only applied this one simple patch to /etc/ssl/openssl.cnf: --- openssl.cnf.sav 2020-03-31 07:41:12.545812000 -0700 +++ openssl.cnf 2020-04-01 10:55:31.682616000 -0700 @@ -263,10 +255,7 @@ options, but here are a few examples. For an NFS server: (Although these examples show the daemons started via a command line, the options should normally be specified via the tls[clnt|serv]d_flags line - in /etc/rc.conf and then they are started upon boot. - To start them without use of the /etc/rc.d scripts, you will need to - add "/usr/ktls/lib" to your ldconfig_paths via rc.conf or similar. - Otherwise it will complain it cannot find the correct ssl library.) + in /etc/rc.conf and then they are started upon boot.) - An NFS server where no clients have certificates. # rpc.tlsservd @@ -326,16 +315,12 @@ it will log a lot of other stuff, as well. Once you have set things up, you can add line(s) to your /etc/rc.conf for the daemon(s): For the client: -ktls_enable="YES" -ktls_aesni_enable="YES" tlsclntd_enable="YES" -tlsclntd_env="LD_LIBRARY_PATH=/usr/ktls/lib" For the server: -ktls_enable="YES" -ktls_aesni_enable="YES" tlsservd_enable="YES" -tlsservd_env="LD_LIBRARY_PATH=/usr/ktls/lib" - plus tlsclntd_flags and/or tlsservd_flags if you are using command line - options for these (see below). + options for these. +For example: +tlsclntd_flags="-v -m" From owner-svn-src-projects@freebsd.org Fri Nov 27 16:29:55 2020 Return-Path: Delivered-To: svn-src-projects@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CC0504ABD68 for ; Fri, 27 Nov 2020 16:29:55 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CjKpq5VSVz3k0c; Fri, 27 Nov 2020 16:29:55 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AFF711844A; Fri, 27 Nov 2020 16:29:55 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0ARGTt0k068904; Fri, 27 Nov 2020 16:29:55 GMT (envelope-from rmacklem@FreeBSD.org) Received: (from rmacklem@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0ARGTtb3068903; Fri, 27 Nov 2020 16:29:55 GMT (envelope-from rmacklem@FreeBSD.org) Message-Id: <202011271629.0ARGTtb3068903@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rmacklem set sender to rmacklem@FreeBSD.org using -f From: Rick Macklem Date: Fri, 27 Nov 2020 16:29:55 +0000 (UTC) To: src-committers@freebsd.org, svn-src-projects@freebsd.org Subject: svn commit: r368107 - projects/nfs-over-tls/rc.d X-SVN-Group: projects X-SVN-Commit-Author: rmacklem X-SVN-Commit-Paths: projects/nfs-over-tls/rc.d X-SVN-Commit-Revision: 368107 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-projects@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the src " projects" tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Nov 2020 16:29:55 -0000 Author: rmacklem Date: Fri Nov 27 16:29:54 2020 New Revision: 368107 URL: https://svnweb.freebsd.org/changeset/base/368107 Log: I decided that the ktls startup script was unnecessary, so delete it. Ktls configuration can be done with /boot/loader.conf and /etc/sysctl.conf. Deleted: projects/nfs-over-tls/rc.d/ktls Modified: projects/nfs-over-tls/rc.d/tlsclntd projects/nfs-over-tls/rc.d/tlsservd Modified: projects/nfs-over-tls/rc.d/tlsclntd ============================================================================== --- projects/nfs-over-tls/rc.d/tlsclntd Fri Nov 27 16:23:12 2020 (r368106) +++ projects/nfs-over-tls/rc.d/tlsclntd Fri Nov 27 16:29:54 2020 (r368107) @@ -4,7 +4,7 @@ # # PROVIDE: tlsclntd -# REQUIRE: NETWORKING root mountcritlocal ktls +# REQUIRE: NETWORKING root mountcritlocal sysctl # KEYWORD: nojail shutdown . /etc/rc.subr Modified: projects/nfs-over-tls/rc.d/tlsservd ============================================================================== --- projects/nfs-over-tls/rc.d/tlsservd Fri Nov 27 16:23:12 2020 (r368106) +++ projects/nfs-over-tls/rc.d/tlsservd Fri Nov 27 16:29:54 2020 (r368107) @@ -4,7 +4,7 @@ # # PROVIDE: tlsservd -# REQUIRE: NETWORKING root mountcritlocal ktls +# REQUIRE: NETWORKING root mountcritlocal sysctl # KEYWORD: nojail shutdown . /etc/rc.subr From owner-svn-src-projects@freebsd.org Fri Nov 27 16:50:14 2020 Return-Path: Delivered-To: svn-src-projects@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C81964AB7FD for ; Fri, 27 Nov 2020 16:50:14 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CjLGG53M7z3kdb; Fri, 27 Nov 2020 16:50:14 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id A0684188B5; Fri, 27 Nov 2020 16:50:14 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0ARGoEK6081008; Fri, 27 Nov 2020 16:50:14 GMT (envelope-from rmacklem@FreeBSD.org) Received: (from rmacklem@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0ARGoEGJ081007; Fri, 27 Nov 2020 16:50:14 GMT (envelope-from rmacklem@FreeBSD.org) Message-Id: <202011271650.0ARGoEGJ081007@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rmacklem set sender to rmacklem@FreeBSD.org using -f From: Rick Macklem Date: Fri, 27 Nov 2020 16:50:14 +0000 (UTC) To: src-committers@freebsd.org, svn-src-projects@freebsd.org Subject: svn commit: r368109 - in projects/nfs-over-tls/usr.sbin: rpc.tlsclntd rpc.tlsservd X-SVN-Group: projects X-SVN-Commit-Author: rmacklem X-SVN-Commit-Paths: in projects/nfs-over-tls/usr.sbin: rpc.tlsclntd rpc.tlsservd X-SVN-Commit-Revision: 368109 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-projects@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the src " projects" tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Nov 2020 16:50:14 -0000 Author: rmacklem Date: Fri Nov 27 16:50:14 2020 New Revision: 368109 URL: https://svnweb.freebsd.org/changeset/base/368109 Log: Update the man pages to reference the ktls(4) man page. Modified: projects/nfs-over-tls/usr.sbin/rpc.tlsclntd/rpc.tlsclntd.8 projects/nfs-over-tls/usr.sbin/rpc.tlsservd/rpc.tlsservd.8 Modified: projects/nfs-over-tls/usr.sbin/rpc.tlsclntd/rpc.tlsclntd.8 ============================================================================== --- projects/nfs-over-tls/usr.sbin/rpc.tlsclntd/rpc.tlsclntd.8 Fri Nov 27 16:35:43 2020 (r368108) +++ projects/nfs-over-tls/usr.sbin/rpc.tlsclntd/rpc.tlsclntd.8 Fri Nov 27 16:50:14 2020 (r368109) @@ -26,7 +26,7 @@ .\" $FreeBSD$ .\" .\" Modified from gssd.8 for rpc.tlsclntd.8 by Rick Macklem. -.Dd September 16, 2020 +.Dd Novamber 27, 2020 .Dt RPC.TLSCLNTD 8 .Os .Sh NAME @@ -52,7 +52,9 @@ This daemon requires that the kernel be built with .Dq options KERNEL_TLS and be running on an architecture such as .Dq amd64 -that supports a direct map (not i386). +that supports a direct map (not i386) with +.Xr ktls 4 +enabled. .Pp If either of the .Fl l @@ -161,6 +163,7 @@ option has also been specified. .Ex -std .Sh SEE ALSO .Xr openssl 1 , +.Xr ktls 4 , .Xr mount_nfs 8 , .Xr rpc.tlsservd 8 , .Xr syslogd 8 Modified: projects/nfs-over-tls/usr.sbin/rpc.tlsservd/rpc.tlsservd.8 ============================================================================== --- projects/nfs-over-tls/usr.sbin/rpc.tlsservd/rpc.tlsservd.8 Fri Nov 27 16:35:43 2020 (r368108) +++ projects/nfs-over-tls/usr.sbin/rpc.tlsservd/rpc.tlsservd.8 Fri Nov 27 16:50:14 2020 (r368109) @@ -26,7 +26,7 @@ .\" $FreeBSD$ .\" .\" Modified from gssd.8 for rpc.tlsservd.8 by Rick Macklem. -.Dd September 16, 2020 +.Dd November 27, 2020 .Dt RPC.TLSSERVD 8 .Os .Sh NAME @@ -58,7 +58,9 @@ This daemon requires that the kernel be built with .Dq options KERNEL_TLS and be running on an architecture such as .Dq amd64 -that supports a direct map (not i386). +that supports a direct map (not i386) with +.Xr ktls 4 +enabled. Note that the .Fl tls option in the @@ -315,6 +317,7 @@ options is allowed. .Ex -std .Sh SEE ALSO .Xr openssl 1 , +.Xr ktls 4 , .Xr exports 5 , .Xr mount_nfs 8 , .Xr nfsuserd 8 , From owner-svn-src-projects@freebsd.org Fri Nov 27 16:51:59 2020 Return-Path: Delivered-To: svn-src-projects@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0CF204ABDDD for ; Fri, 27 Nov 2020 16:51:59 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CjLJG6kT1z3kj3; Fri, 27 Nov 2020 16:51:58 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D079B18A14; Fri, 27 Nov 2020 16:51:58 +0000 (UTC) (envelope-from rmacklem@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0ARGpwcA082627; Fri, 27 Nov 2020 16:51:58 GMT (envelope-from rmacklem@FreeBSD.org) Received: (from rmacklem@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0ARGpwg5082626; Fri, 27 Nov 2020 16:51:58 GMT (envelope-from rmacklem@FreeBSD.org) Message-Id: <202011271651.0ARGpwg5082626@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rmacklem set sender to rmacklem@FreeBSD.org using -f From: Rick Macklem Date: Fri, 27 Nov 2020 16:51:58 +0000 (UTC) To: src-committers@freebsd.org, svn-src-projects@freebsd.org Subject: svn commit: r368110 - projects/nfs-over-tls X-SVN-Group: projects X-SVN-Commit-Author: rmacklem X-SVN-Commit-Paths: projects/nfs-over-tls X-SVN-Commit-Revision: 368110 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-projects@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the src " projects" tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Nov 2020 16:51:59 -0000 Author: rmacklem Date: Fri Nov 27 16:51:58 2020 New Revision: 368110 URL: https://svnweb.freebsd.org/changeset/base/368110 Log: Delete sharemk.tar since it is no longer needed. Deleted: projects/nfs-over-tls/sharemk.tar