Date: Sat, 17 Apr 2010 11:12:03 -0400 From: APseudoUtopia <apseudoutopia@gmail.com> To: Tim Gustafson <tjg@soe.ucsc.edu> Cc: freebsd-security@freebsd.org Subject: Re: OpenSSL 0.9.8k -> 0.9.8l Message-ID: <v2x27ade5281004170812s6250d4acke6c7059c752d9456@mail.gmail.com> In-Reply-To: <1849729321.700021271515794985.JavaMail.root@mail-01.cse.ucsc.edu> References: <1849729321.700021271515794985.JavaMail.root@mail-01.cse.ucsc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Apr 17, 2010 at 10:49 AM, Tim Gustafson <tjg@soe.ucsc.edu> wrote: > Hi, > > I run a few web servers with need to be PCI compliant. =C2=A0Apparently t= here's a problem with OpenSSL 0.9.8k that requires us to upgrade to 0.9.8l = for us to maintain our compliance level. > > I've csup'd to RELENG_8_0 and did a build/install cycle and OpenSSL is st= ill at 0.9.8k. =C2=A0Using RELENG_8 isn't really an option for me because t= he last I upgraded to that level, ipfw was broken and I'm not sure that the= problem with ipfw has been fixed (Luigi tells me that it has, but I haven'= t had time to test it yet). > > Is there any movement to patch RELENG_8_0 with OpenSSL 0.9.8l? =C2=A0Or w= ill I be stuck with 0.9.8k until I move to RELENG_8? > > Tim Gustafson This isn't an answer to your question, but you could always use OpenSSL from the ports tree. http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssl/ It's at version 1.0.0.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?v2x27ade5281004170812s6250d4acke6c7059c752d9456>