Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jul 2002 15:44:11 -0500
From:      Christopher Schulte <schulte+freebsd@nospam.schulte.org>
To:        dirk.meyer@dinoex.sub.org (Dirk Meyer), freebsd-security@FreeBSD.ORG
Subject:   Re: Are OpenSSL bugs related to OpenSSH ?
Message-ID:  <5.1.1.6.2.20020731153229.03e9f388@localhost>
In-Reply-To: <NsihTOz9%2Bd@dmeyer.dinoex.sub.org>
References:  <Wx/oYHzdAA@dmeyer.dinoex.sub.org> <1028113366.1406.0.camel@linux> <200207311127.g6VBRWY98818@www.wsf.at> <Wx/oYHzdAA@dmeyer.dinoex.sub.org> <20020731151607.GD26793@madman.nectar.cc>

next in thread | previous in thread | raw e-mail | index | archive | help
At 09:43 PM 7/31/2002 +0200, Dirk Meyer wrote:
>The version BUMP makes this clear, even if the API is the same.
>Otherwise we have to hack about 200 ports to select.

I installed the 0.9.6e openssl port to overwrite base 
(-DOPENSSL_OVERWRITE_BASE)
and relinked my critical apps.  I added:

NO_OPENSSL=     true

to /etc/make.conf

Now when I want to update to a patched RELENG_4_6, and use the base openssl,
should I:

1) deinstall the port
2) remove make.conf declaration
3) cvsup/make world
4) recompile my third party apps again, because /usr/lib/libcrypto.so.3 and
/usr/lib/libssl.so.3 are not used by the base openssl

I'm only a tad confused with number 4.  Was the .2 -> .3 change made just 
within
the port or within openssl itself?  Thanks!

>kind regards Dirk
>
>- Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany
>- [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org]

--
Christopher Schulte
http://www.schulte.org/
Do not un-munge my @nospam.schulte.org
email address.  This address is valid.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.2.20020731153229.03e9f388>