Date: Wed, 31 Jul 2002 15:44:11 -0500 From: Christopher Schulte <schulte+freebsd@nospam.schulte.org> To: dirk.meyer@dinoex.sub.org (Dirk Meyer), freebsd-security@FreeBSD.ORG Subject: Re: Are OpenSSL bugs related to OpenSSH ? Message-ID: <5.1.1.6.2.20020731153229.03e9f388@localhost> In-Reply-To: <NsihTOz9%2Bd@dmeyer.dinoex.sub.org> References: <Wx/oYHzdAA@dmeyer.dinoex.sub.org> <1028113366.1406.0.camel@linux> <200207311127.g6VBRWY98818@www.wsf.at> <Wx/oYHzdAA@dmeyer.dinoex.sub.org> <20020731151607.GD26793@madman.nectar.cc>
next in thread | previous in thread | raw e-mail | index | archive | help
At 09:43 PM 7/31/2002 +0200, Dirk Meyer wrote: >The version BUMP makes this clear, even if the API is the same. >Otherwise we have to hack about 200 ports to select. I installed the 0.9.6e openssl port to overwrite base (-DOPENSSL_OVERWRITE_BASE) and relinked my critical apps. I added: NO_OPENSSL= true to /etc/make.conf Now when I want to update to a patched RELENG_4_6, and use the base openssl, should I: 1) deinstall the port 2) remove make.conf declaration 3) cvsup/make world 4) recompile my third party apps again, because /usr/lib/libcrypto.so.3 and /usr/lib/libssl.so.3 are not used by the base openssl I'm only a tad confused with number 4. Was the .2 -> .3 change made just within the port or within openssl itself? Thanks! >kind regards Dirk > >- Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany >- [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org] -- Christopher Schulte http://www.schulte.org/ Do not un-munge my @nospam.schulte.org email address. This address is valid. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.2.20020731153229.03e9f388>