From owner-freebsd-ports@freebsd.org Fri Jan 13 21:39:01 2017 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D2C3FCAEA05 for ; Fri, 13 Jan 2017 21:39:01 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id AD5381D9E for ; Fri, 13 Jan 2017 21:39:01 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id A972ECAEA00; Fri, 13 Jan 2017 21:39:01 +0000 (UTC) Delivered-To: ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A90CACAE9FF for ; Fri, 13 Jan 2017 21:39:01 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6904A1D99; Fri, 13 Jan 2017 21:39:01 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mail.xzibition.com (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id A68D872E7; Fri, 13 Jan 2017 21:39:00 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mail.xzibition.com (localhost [172.31.3.2]) by mail.xzibition.com (Postfix) with ESMTP id DC0D42B75E; Fri, 13 Jan 2017 21:38:59 +0000 (UTC) X-Virus-Scanned: amavisd-new at mail.xzibition.com Received: from mail.xzibition.com ([172.31.3.2]) by mail.xzibition.com (mail.xzibition.com [172.31.3.2]) (amavisd-new, port 10026) with LMTP id ZcjCDB9BN9Sg; Fri, 13 Jan 2017 21:38:27 +0000 (UTC) Subject: Re: [ports/security/openssh-portable] Fix SCTP patch DKIM-Filter: OpenDKIM Filter v2.9.2 mail.xzibition.com 8B48F2B758 To: soralx@cydem.org, ports@FreeBSD.ORG References: <20161227213948.694232fa@mscad14> From: Bryan Drewery Organization: FreeBSD Message-ID: <8a30008b-f9f1-c8c6-0c39-b7891dd8f87b@FreeBSD.org> Date: Fri, 13 Jan 2017 13:38:11 -0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="NPgSiMTIlD5NkJmT3uQMbCqthJAIqSwub" X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Jan 2017 21:39:01 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --NPgSiMTIlD5NkJmT3uQMbCqthJAIqSwub Content-Type: multipart/mixed; boundary="31thGWpidMs2whkwxT3o2sr7a1blwel3g"; protected-headers="v1" From: Bryan Drewery To: soralx@cydem.org, ports@FreeBSD.ORG Message-ID: <8a30008b-f9f1-c8c6-0c39-b7891dd8f87b@FreeBSD.org> Subject: Re: [ports/security/openssh-portable] Fix SCTP patch References: <20161227213948.694232fa@mscad14> In-Reply-To: --31thGWpidMs2whkwxT3o2sr7a1blwel3g Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 1/13/17 1:31 PM, Bryan Drewery wrote: > On 12/27/16 9:39 PM, soralx@cydem.org wrote: >> >> Howdy! >> >> Could someone update the SCTP patch for ports/security/openssh-portab= le? >> Fixed version attached (very basic changes: account for "oIdentityAge= nt" >> config option and "-J" flag that appeared in openssh-7.3). >=20 > The proper place to send this patch is to the upstream bug tracker wher= e > the patch originated from: https://bugzilla.mindrot.org/show_bug.cgi?id= =3D1604 >=20 > I will review and commit it though. >=20 Thanks too. I am about to update the port to 7.4 and there are other conflicts now as well (before your 2 fixes): 1 out of 5 hunks failed--saving rejects to readconf.c.rej 2 out of 9 hunks failed--saving rejects to servconf.c.rej 1 out of 2 hunks failed--saving rejects to servconf.h.rej 1 out of 3 hunks failed--saving rejects to ssh.c.rej 1 out of 1 hunks failed--saving rejects to ssh_config.5.rej 1 out of 4 hunks failed--saving rejects to sshd.c.rej 1 out of 1 hunks failed--saving rejects to sshd_config.5.rej >> >> I use SCTP all the time (makes a _huge_ difference on fast but crappy= >> connections with packet loss), so having the port fixed would be much= >> appreciated. >> >=20 > Letting upstream know how useful it is would be great. >=20 >> BTW, I wonder why noone bothered to add SCTP to base system's OpenSSH= ? >> Right now there is not a single program that uses SCTP in FreeBSD, wh= ile >> the protocol itself is quite nice and useful. >> >> SHA256 (openssh-7.3_p1-sctp.patch.gz) =3D 0bfa4769db0982e81ac808e7bfb6= 904a86a10a251735f8b81f4e6a1430cd9b20 >> SIZE (openssh-7.3_p1-sctp.patch.gz) =3D 8507 >> >=20 >=20 --=20 Regards, Bryan Drewery --31thGWpidMs2whkwxT3o2sr7a1blwel3g-- --NPgSiMTIlD5NkJmT3uQMbCqthJAIqSwub Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQEcBAEBCgAGBQJYeUjDAAoJEDXXcbtuRpfPL6UIAJ0BGfgVMpvAwO3JJPXz6Y7h KBdIaEas82MEP+fFRBOE9LBKn7zncrlEyT3xYpj0kjdXxpIeG0exlI6QOChGzqFJ eG2ogwEfftJW1y+MQdmrJ8jJ8wQsoLK39BhMBj54ZblLApepBqz+Gpd8Bfl97pZc s2UTSv4p5qIuEOyltEs1P6/u7LryVzuXni7tMRy2ErlFxwJmWP2+Gwcc93d+xM28 KtMx6LVe2/BfKf73tKsXog47pbuU0UzE734qqCKNstc4RgJ+aV9kUvvrBCnSTZYZ MdzOeh9lsHBayk2P44p+BqcMsmh7PJ2hWl6xgadj2CVToBfOXQAqoT1whErcS1A= =8Ul4 -----END PGP SIGNATURE----- --NPgSiMTIlD5NkJmT3uQMbCqthJAIqSwub--