From owner-freebsd-ports@freebsd.org Thu Feb 27 19:25:44 2020 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 906D624BB0D for ; Thu, 27 Feb 2020 19:25:44 +0000 (UTC) (envelope-from SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 48T2h706LSz3xqD for ; Thu, 27 Feb 2020 19:25:42 +0000 (UTC) (envelope-from SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz) Received: by mailman.nyi.freebsd.org (Postfix) id 97F9C24BB03; Thu, 27 Feb 2020 19:25:42 +0000 (UTC) Delivered-To: ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9773D24BB02 for ; Thu, 27 Feb 2020 19:25:42 +0000 (UTC) (envelope-from SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48T2h44Gg8z3xlp for ; Thu, 27 Feb 2020 19:25:40 +0000 (UTC) (envelope-from SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id C251928417; Thu, 27 Feb 2020 20:25:37 +0100 (CET) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 9357128416; Thu, 27 Feb 2020 20:25:36 +0100 (CET) Subject: Re: About protocols in openssl To: Willem Jan Withagen , "ports@freebsd.org" References: From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: Date: Thu, 27 Feb 2020 20:25:36 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.3 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 48T2h44Gg8z3xlp X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz has no SPF policy when checking 94.124.105.4) smtp.mailfrom=SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz X-Spamd-Result: default: False [3.99 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; IP_SCORE(0.84)[ip: (0.31), ipnet: 94.124.104.0/21(0.16), asn: 42000(3.65), country: CZ(0.09)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[quip.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.95)[0.947,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[4.105.124.94.list.dnswl.org : 127.0.10.0]; NEURAL_SPAM_LONG(1.00)[0.998,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[000.fbsd@quip.cz,SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42000, ipnet:94.124.104.0/21, country:CZ]; FROM_NEQ_ENVFROM(0.00)[000.fbsd@quip.cz,SRS0=7Zvp=4P=quip.cz=000.fbsd@elsa.codelab.cz]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Feb 2020 19:25:44 -0000 Willem Jan Withagen wrote on 2020/02/27 20:00: > Hi, > > My ceph ports uses all kinds of python stuff, and now the trouble is > that I'm getting > an error on missing: >     SSLv3_client_method > > Which i guess, is because in the current openssl libs SSLv3 is disabled. > And I sort of get this, SSLv3 is unsafe. > > But I need it to be able to run parts of the ceph port. > > So how do I get a openssl lib dependancy that has SSLv3 enabled. You can build OpenSSL 1.1.1 from the ports where you can enable SSLv3 in the options dialog. https://www.freshports.org/security/openssl/ The defaults are: ====> Protocol Support NEXTPROTONEG=on: Next Protocol Negotiation (SPDY) SCTP=on: SCTP (Stream Control Transmission) SSL3=off: SSLv3 (unsafe) TLS1=on: TLSv1.0 (requires TLS1_1, TLS1_2) TLS1_1=on: TLSv1.1 (requires TLS1_2) TLS1_2=on: TLSv1.2 Miroslav Lachman