Date: Tue, 16 Nov 2010 10:28:22 +0300 From: c0re <nr1c0re@gmail.com> To: FreeBSD <freebsd-questions@freebsd.org> Subject: Re: openssl version - how to verify Message-ID: <AANLkTik7fLcRFoM6H4uohexXBVchKHxv4bSgiufTX-dp@mail.gmail.com> In-Reply-To: <20101115122428.294dde4f@scorpio> References: <AANLkTinFoAC=t6-cp7ofphi=X%2BbGwkY-CL3X6B_ChTXH@mail.gmail.com> <20101115090851.237f167b@scorpio> <AANLkTinNd0mzR6x3fnB8xWFqJhX61mv3_EipUwaha6ux@mail.gmail.com> <20101115122428.294dde4f@scorpio>
next in thread | previous in thread | raw e-mail | index | archive | help
Jerry, I'm not about that :) base openssl are OK. But I need proves that it has got no security problems - it's external IT auditors request. And I'm interested how I can know what patchlevel there on base openssl version and prove them (auditors) that freebsd base openssl are not vulnerable. 2010/11/15 Jerry <freebsd.user@seibercom.net>: > On Mon, 15 Nov 2010 18:40:27 +0300 > c0re <nr1c0re@gmail.com> articulated: > >> There are still too many broken ports with openssl from ports, I do >> not like debug it and really like to use base openssl, almost no >> difference. > > Might I suggest that if you are aware of ports that don't work > correctly with the port's version of openssl that you file a PR against > it. I have done so and succeeded in getting several patches issued to > correct the problem. This problem will not go away by itself. > > -- > Jerry =E2=9C=8C > FreeBSD.user@seibercom.net > > Disclaimer: off-list followups get on-list replies or get ignored. > Please do not ignore the Reply-To header. > __________________________________________________________________ > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.o= rg" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTik7fLcRFoM6H4uohexXBVchKHxv4bSgiufTX-dp>