From owner-freebsd-ports@freebsd.org Mon Nov 12 14:07:45 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F2A0F1106D4A for ; Mon, 12 Nov 2018 14:07:44 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2B9BA7017D for ; Mon, 12 Nov 2018 14:07:44 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by home.opsec.eu with local (Exim 4.91 (FreeBSD)) (envelope-from ) id 1gMCsT-0008A4-Aw; Mon, 12 Nov 2018 15:07:45 +0100 Date: Mon, 12 Nov 2018 15:07:45 +0100 From: Kurt Jaeger To: Dirk Engling Cc: freebsd-ports Subject: Re: Broken port qmail-tls, upstream dead Message-ID: <20181112140745.GJ1940@home.opsec.eu> References: <20181112062019.GH1940@home.opsec.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 2B9BA7017D X-Spamd-Result: default: False [-104.87 / 200.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; ALLOW_DOMAIN_WHITELIST(-100.00)[freebsd.org]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[freebsd.org]; R_SPF_SOFTFAIL(0.00)[~all]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[cached: mx66.freebsd.org]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; IP_SCORE(-1.76)[ipnet: 2001:14f8::/32(-4.89), asn: 12502(-3.91), country: DE(-0.01)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:12502, ipnet:2001:14f8::/32, country:DE]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Nov 2018 14:07:45 -0000 Hi! > On 12.11.18 07:20, Kurt Jaeger wrote: > > > Which feature breaks ? > > Relaying after auth with client certs. The patch manually resets > openssl's ssl context state to trigger a second handshake after reneg > and those fields are now opaque in openssl. > > > Patches can be applied conditionally (e.g. only for 12). > > If you provide the patch in a way that fixes the build only for 12 ? > > Any pointers for that? Put the 12er patch into files/extra-patch-fbsd12 and add this to the Makefile: .if ${OPSYS} == FreeBSD && ${OSVERSION} >= 1200000 EXTRA_PATCHES=extra-patch-fbsd12 .endif > > Migrate to exim 8-) ? If upstream is dead, maybe it's a signal > > to migrate away ? > Well netqmail is well and kicking, it's just that the tls implementation > is a little rough arund the edges and needs some brushing ;) Yes, I would not want to migrate, either 8-) -- pi@opsec.eu +49 171 3101372 2 years to go !