From owner-freebsd-ports@freebsd.org Wed May 12 16:00:09 2021 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6688864400B for ; Wed, 12 May 2021 16:00:09 +0000 (UTC) (envelope-from freebsd@monkeyspunk.net) Received: from mail.monkeyspunk.net (host-72-175-249-138.static.bresnan.net [72.175.249.138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "*.monkeyspunk.net", Issuer "Monkeyspunk 2021 Root CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4FgKHr2tNSz4n2X for ; Wed, 12 May 2021 16:00:07 +0000 (UTC) (envelope-from freebsd@monkeyspunk.net) Received: from satan.monkeyspunk.net (satan.monkeyspunk.net [IPv6:2001:470:1f10:f0a::c0a8:4506]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.monkeyspunk.net (Postfix) with ESMTPS id 47F5A13991E for ; Wed, 12 May 2021 09:59:59 -0600 (MDT) Message-ID: <9c3d36da5ec70c22f1a35fa9d5e7ae02134c8030.camel@monkeyspunk.net> Subject: security/passivedns maintainer timeout? From: Shawn Michael To: freebsd-ports@freebsd.org Date: Wed, 12 May 2021 09:59:59 -0600 MIME-Version: 1.0 User-Agent: Evolution 3.36.4-0ubuntu1 X-Rspamd-Queue-Id: 4FgKHr2tNSz4n2X X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of freebsd@monkeyspunk.net has no SPF policy when checking 72.175.249.138) smtp.mailfrom=freebsd@monkeyspunk.net X-Spamd-Result: default: False [0.07 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; HFILTER_HOSTNAME_2(1.00)[host-72-175-249-138.static.bresnan.net]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-ports@freebsd.org]; TO_DN_NONE(0.00)[]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[72.175.249.138:from:127.0.2.255]; DMARC_NA(0.00)[monkeyspunk.net]; RBL_DBL_DONT_QUERY_IPS(0.00)[72.175.249.138:from]; NEURAL_HAM_SHORT(-0.83)[-0.833]; NEURAL_HAM_MEDIUM(-1.00)[-0.999]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:33588, ipnet:72.174.0.0/15, country:US]; SUBJECT_ENDS_QUESTION(1.00)[]; MAILMAN_DEST(0.00)[freebsd-ports]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.34 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 May 2021 16:00:09 -0000 I've got two patches sitting in bugzilla for security/passivedns. One has been sitting there since March 22, the other since May 4. So far there has been no movement from the maintainer on those bugs, to the point I'm wondering if the maintainer is watching for issues. https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=255599 (Allow build on FreeBSD 13 and maybe 14) https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254435 (enable option for JSON output) Would it be possible for someone else to look at those bug reports? Shawn