From owner-freebsd-ports@freebsd.org Tue Apr 14 14:24:03 2020 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 920592C1C4F for ; Tue, 14 Apr 2020 14:24:03 +0000 (UTC) (envelope-from peo@nethead.se) Received: from ns1.nethead.se (ns1.nethead.se [5.150.237.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "ns1.nethead.se", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 491nmL4ynlz4H2x for ; Tue, 14 Apr 2020 14:24:02 +0000 (UTC) (envelope-from peo@nethead.se) X-Virus-Scanned: amavisd-new at Nethead AB DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nethead.se; s=NETHEADSE; t=1586874230; bh=ClHyUunhR+sddbSZL5yKj9t71zXqOHhJZn3Ep1m+p6o=; h=Subject:To:References:From:Date:In-Reply-To; b=O4SzIpSWXDmniPZMxncjuB8wsm6wsc1uJHNac2EHso37EYnf23a8s2DedeX8w9JDq Q/pEPBLK9Vuu5/gLSlb8e5rpws2gqsmbwyR8Kj3HXnmNq0i9stld334HO6ohpruwPM PGkeq3Hon83nK48PAHk93m4ohsuO8RipKE4x5QQQ= Subject: Re: openssl problem after 11 -> 12 To: freebsd-ports@freebsd.org References: <1b820dcf-34ad-b7af-d25c-ea337f9376b2@nethead.se> From: Per olof Ljungmark Message-ID: Date: Tue, 14 Apr 2020 16:23:47 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 491nmL4ynlz4H2x X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=nethead.se header.s=NETHEADSE header.b=O4SzIpSW; dmarc=pass (policy=none) header.from=nethead.se; spf=pass (mx1.freebsd.org: domain of peo@nethead.se designates 5.150.237.139 as permitted sender) smtp.mailfrom=peo@nethead.se X-Spamd-Result: default: False [-5.86 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[nethead.se:s=NETHEADSE]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:5.150.237.139]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCPT_COUNT_ONE(0.00)[1]; DKIM_TRACE(0.00)[nethead.se:+]; DMARC_POLICY_ALLOW(-0.50)[nethead.se,none]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-2.86)[ip: (-9.77), ipnet: 5.150.192.0/18(-4.88), asn: 8473(0.39), country: SE(-0.03)]; ASN(0.00)[asn:8473, ipnet:5.150.192.0/18, country:SE]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 14 Apr 2020 14:24:03 -0000 On 2020-04-14 13:52, Eugene Grosbein wrote: > 14.04.2020 16:58, Per olof Ljungmark wrote: > >> I am at loss right now on how I could teach the FBSD-12 system to use the older ciphers, it still works fine from 11. > > Easiest way would be untar'ing FreeBSD 11 base.txz into chroot area and copy your script there, too. > Then use chroot to pkg install perl5 to be able run the script inside chroot. > But it should be possible to use OpenSSL from port with weak ciphers enabled? Doing a portmaster -dfa right now to see if that helps. Per