From owner-freebsd-security@FreeBSD.ORG Tue Apr 8 23:03:47 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B2CAEEB1 for ; Tue, 8 Apr 2014 23:03:47 +0000 (UTC) Received: from anubis.delphij.net (anubis.delphij.net [64.62.153.212]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "anubis.delphij.net", Issuer "StartCom Class 1 Primary Intermediate Server CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 97FFD121B for ; Tue, 8 Apr 2014 23:03:47 +0000 (UTC) Received: from zeta.ixsystems.com (unknown [69.198.165.132]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by anubis.delphij.net (Postfix) with ESMTPSA id B154813EA5; Tue, 8 Apr 2014 16:03:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=delphij.net; s=anubis; t=1396998224; bh=mHsJ7xeY5sWbBFeZHjymlMK/YX8fLsFSJvkVLgq+Bqc=; h=Date:From:Reply-To:To:Subject:References:In-Reply-To; b=1oCXeNJb37wtFTO41oYRcT1omk6otxUtShMkQG7GYTPzFNtNvRlFq4WiZ37LHD1wD gEoy+anzxN4PYGyhapw/5X72nkB8lAA6bMp7PNblfnib+REDbB7BnbJaHTPf1iXXAy WLJ0uPsoTiH6k+kOCmRdczqG3HeJmMwJHpEKucok= Message-ID: <53448050.9010802@delphij.net> Date: Tue, 08 Apr 2014 16:03:44 -0700 From: Xin Li Organization: The FreeBSD Project MIME-Version: 1.0 To: Chris Nehren , freebsd-security@freebsd.org Subject: Re: Heartbleed / r264266 / openssl version References: <20140408212917.GA9914@graf.pompo.net> <53447C81.6040106@delphij.net> <20140408225846.GB5433@behemoth> In-Reply-To: <20140408225846.GB5433@behemoth> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: d@delphij.net List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Apr 2014 23:03:47 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 04/08/14 15:58, Chris Nehren wrote: > On Tue, Apr 08, 2014 at 15:47:29 -0700, Xin Li wrote: >> What would be the preferable way of representing the patchlevel? >> We can do it as part of a EN batch at later time. (Note though, >> even without this the user or an application can still use >> freebsd-version(1) on FreeBSD 10.0-RELEASE and up to find out >> the patchlevel for userland). > > On an updated system: > > [(18:56:41) apeiron@behemoth ~] freebsd-version 10.0-STABLE > [(18:56:42) apeiron@behemoth ~] freebsd-version -k 10.0-STABLE > [(18:56:43) apeiron@behemoth ~] freebsd-version -u 10.0-STABLE > [(18:56:47) apeiron@behemoth ~] > > I can't say this is very useful. Is this only supposed to work for > -RELEASE? Only for -RELEASE (note that 10.0-STABLE will be fully updated to a newer OpenSSL release soon so I'm not going to change anything there). Cheers, - -- Xin LI https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (FreeBSD) iQIcBAEBCgAGBQJTRIBQAAoJEJW2GBstM+nsR4AP/0MQ506KSLfzk9yPv/xTCBe3 vO9grcXPvjNieIZj7unhUJeHjgUoJju9CNZJ6Ee6vNACPAOpa3k1S63YbVCLZWhb Xv2N6TccWsY7Ioju4Mj+6IOOGS6R4yPmMFbd5/vFVTedZcgw5wZOFO+uLGXo05yG sTp9duMM40y3LaUGWje9BAa3Rc2CsrFkedsOgEJGoolpctq9xCGfdD4mKh8hhpQu Jdaz72+Tg0dthNSxpAYPXTGqSjYexPJWqVDm7+pQ7m4kU2otJqCkHH34OqcFRnCB UdDFhzX3hYHL569OW+uwNFguLko5iZ38I0fcRRhDs5M7bF84JzKuBCSjTaoQx2t+ xNSLvpuIW7PhhQQd4Ok9mHfocP1LBnisi3y/oL2mjDF6jlFH4hOS9gc14SPsGAHE jZLUy/H3MODC9vXelOlSYJEqkARRly8aAR6ils4NaOVLapOZAC3pjXr2nAMU0acS sgoCpysvWnx7MaNkBO9ZHT0bmSGmQH8jr29yzzBnZ9Tt4XZBtcGbX+Z0p1WgmUod wlB9IMI6qECEuPqgmkLCE4RPiIyJiFYzqwXPFI9m4+YkbVRpQTEFmzq8HL+ILqQ2 DA6BAfK0xNYZ3cGgKHfo8HvD6ffGfnG5rwGB5hS9MKAv1yaO1Y72H8LxhGyGq3ZR 6l81ijSaeHKsqUGDD9vw =D/V9 -----END PGP SIGNATURE-----