From owner-freebsd-ports@freebsd.org Thu Oct 10 05:22:54 2019 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 068C3145E0D for ; Thu, 10 Oct 2019 05:22:54 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 46pfcF4Hmbz4Zjp; Thu, 10 Oct 2019 05:22:53 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by home.opsec.eu with local (Exim 4.92.3 (FreeBSD)) (envelope-from ) id 1iIQuR-000E37-8D; Thu, 10 Oct 2019 07:22:43 +0200 Date: Thu, 10 Oct 2019 07:22:43 +0200 From: Kurt Jaeger To: Jan Beich Cc: freebsd-ports@freebsd.org Subject: Re: [HEADS UP] Binary packages for FreeBSD 11 to require 11.3 soon Message-ID: <20191010052243.GA37504@home.opsec.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 46pfcF4Hmbz4Zjp X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.00 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.996,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Oct 2019 05:22:54 -0000 Hi! > FreeBSD 11.3 was released on 2019-07-09. After adding 3 months support > overlap it'd be 2019-10-09 (yesterday). https://www.freebsd.org/security/security.html#sup says that 11.2 is supported until 31.10.2019. -- pi@opsec.eu +49 171 3101372 One year to go !