From owner-freebsd-ports@FreeBSD.ORG Fri Aug 22 20:17:31 2014 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C96ABBBA for ; Fri, 22 Aug 2014 20:17:31 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A644F3F72 for ; Fri, 22 Aug 2014 20:17:31 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.9/8.14.9) with ESMTP id s7MKHVVk024166 for ; Fri, 22 Aug 2014 20:17:31 GMT (envelope-from bdrewery@freefall.freebsd.org) Received: (from bdrewery@localhost) by freefall.freebsd.org (8.14.9/8.14.9/Submit) id s7MKHVai024165 for freebsd-ports@freebsd.org; Fri, 22 Aug 2014 20:17:31 GMT (envelope-from bdrewery) Received: (qmail 68413 invoked from network); 22 Aug 2014 15:17:29 -0500 Received: from unknown (HELO ?10.10.0.24?) (freebsd@shatow.net@10.10.0.24) by sweb.xzibition.com with ESMTPA; 22 Aug 2014 15:17:29 -0500 Message-ID: <53F7A552.5050608@FreeBSD.org> Date: Fri, 22 Aug 2014 15:17:22 -0500 From: Bryan Drewery Organization: FreeBSD User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.0 MIME-Version: 1.0 To: mikej , Ports FreeBSD Subject: Re: SAT resolver problem - [CFT] SSP Package Repository available References: <523D79CD.2090302@FreeBSD.org> <53F4CE0E.8040106@FreeBSD.org> <65f72f283578f9e08cb672928bc441e9@mail.mikej.com> In-Reply-To: <65f72f283578f9e08cb672928bc441e9@mail.mikej.com> OpenPGP: id=6E4697CF; url=http://www.shatow.net/bryan/bryan2.asc Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="XeQpn3cIdkxNowLvtRT0nnXua9L2VkVnb" Cc: pkg@freebsd.org, owner-freebsd-current@freebsd.org X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 Aug 2014 20:17:31 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --XeQpn3cIdkxNowLvtRT0nnXua9L2VkVnb Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 8/22/2014 1:16 PM, mikej wrote: > On , Bryan Drewery wrote: >> On 9/21/2013 5:49 AM, Bryan Drewery wrote: >>> Ports now support enabling Stack Protector [1] support on FreeBSD 10 >>> i386 and amd64, and older releases on amd64 only currently. >>> >>> Support may be added for earlier i386 releases once all ports properl= y >>> respect LDFLAGS. >>> >>> To enable, just add WITH_SSP=3Dyes to your make.conf and rebuild all >>> ports. >>> >>> The default SSP_CLFAGS is -fstack-protector, but -fstack-protector-al= l >>> may optionally be set instead. >>> >>> Please help test this on your system. We would like to eventually ena= ble >>> this by default, but need to identify any major ports that have run-t= ime >>> issues due to it. >>> >>> [1] https://en.wikipedia.org/wiki/Buffer_overflow_protection >>> >> >> We have not had any feedback on this yet and want to get it enabled by= >> default for ports and packages. >> >> We now have a repository that you can use rather than the default to >> help test. We need your help to identify any issues before switching t= he >> default. >> >> This repository is available for: >> >> head >> 10.0 >> 9.1,9.2,9.3 >> >> It is not available for 8.4. If someone is willing to test on 8.4 I wi= ll >> build a repository for it. >> >> Place this in /usr/local/etc/pkgs/repos/FreeBSD_ssp.conf: >> >> FreeBSD: { enabled: no } >> FreeBSD_ssp: { >> url: "pkg+http://pkg.FreeBSD.org/${ABI}/ssp", >> mirror_type: "srv", >> signature_type: "fingerprints", >> fingerprints: "/usr/share/keys/pkg", >> enabled: yes >> } >> >> Once that is done you should force reinstall packages from this >> repository: >> >> pkg update >> pkg upgrade -f >> >> Thanks for your help! >> Bryan Drewery >> On behalf of portmgr. >=20 > I have been using this without issue on several machines until today. >=20 > root@firewall:/usr/ports # pkg -v > 1.3.6 > root@firewall:/usr/ports # >=20 >=20 > Repositories: > FreeBSD_ssp: { > url : "pkg+http://pkg.FreeBSD.org/freebsd:10:x86:64/ssp= ", > enabled : yes, > mirror_type : "SRV", > signature_type : "FINGERPRINTS", > fingerprints : "/usr/share/keys/pkg" > } >=20 >=20 > root@firewall:/usr/ports # pkg update -f > Updating repository catalogue > pkg: http://pkg.FreeBSD.org/freebsd:10:x86:64/ssp/meta.txz: Not Found > pkg: repository FreeBSD_ssp has no meta file, using default settings > Fetching digests.txz: 100% of 1 MB > Fetching packagesite.txz: 100% of 5 MB >=20 > Adding new entries: 100% > Incremental update completed, 23305 packages processed: > 0 packages updated, 0 removed and 23305 added. > root@firewall:/usr/ports # pkg install mdnsresponder > Updating repository catalogue > pkg: http://pkg.FreeBSD.org/freebsd:10:x86:64/ssp/meta.txz: Not Found > pkg: repository FreeBSD_ssp has no meta file, using default settings > FreeBSD_ssp repository is up-to-date > All repositories are up-to-date > Checking integrity... done (1 conflicting) > pkg: Cannot solve problem using SAT solver: > cannot install package mDNSResponder~net/mDNSResponder, remove it from > request [Y/n]: y > Checking integrity... done (0 conflicting) > The most recent version of packages are already installed > root@firewall:/usr/ports # uname -a > FreeBSD firewall 10.0-STABLE FreeBSD 10.0-STABLE #0 r269366M: Fri Aug = 1 > 00:35:49 EDT 2014 mikej@firewall:/usr/obj/usr/src/sys/GENERIC amd6= 4 > root@firewall:/usr/ports # date > Fri Aug 22 14:12:30 EDT 2014 > root@firewall:/usr/ports # >=20 > root@firewall:/usr/ports # pkg info | grep mdns > root@firewall:/usr/ports # >=20 > Regards, >=20 > --mikej It looks like the (SSP) freebsd:10:x86:64 freebsd:11:x86:32 repositories are stale from a month ago. Looking into why. Sadly this was not noticed and the instructions effectively will downgrade packages. These 2 repositories have pkg-1.2 still as well. --=20 Regards, Bryan Drewery --XeQpn3cIdkxNowLvtRT0nnXua9L2VkVnb Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iQEcBAEBAgAGBQJT96VSAAoJEDXXcbtuRpfPB0IIAIYLftJd0PK2eyUBX0VuROxr Qq5v9gKmGbGpGhGUiXP204Op0Qp3vtk6HIqnU5KvyaEJGPt9NGq77iiUYH+tgCfg MNch6dzDHnyCjyr+bSz2YCVxoIBFy6yMhS2YLrd2ywJVGwmZMBx9kXRiviFwbpzF W6Z1XCnAzyvBOXdxWiG73bPArxVTWtzEVJPpaU9OSUFemZY+MPAuOuCVhlVaFZUF 66p3+LC/CD+StvVEK+UqsxylQscCuFYbepMpUt/Szm/meoG01dtnV9ptlEjAGGsA U5IXU0pqg8gSg29UevwBKWL02gg6zHOmYIfZpwH2PnGOcgzWkmfgegJ70O/yL9k= =A5JI -----END PGP SIGNATURE----- --XeQpn3cIdkxNowLvtRT0nnXua9L2VkVnb--