From owner-freebsd-current@FreeBSD.ORG Wed Jul 31 14:45:39 2013 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id A3EE0AAE for ; Wed, 31 Jul 2013 14:45:39 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 6D02F261E for ; Wed, 31 Jul 2013 14:45:39 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6VEjdPV006581 for ; Wed, 31 Jul 2013 14:45:39 GMT (envelope-from bdrewery@freefall.freebsd.org) Received: (from bdrewery@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6VEjdb9006579 for freebsd-current@freebsd.org; Wed, 31 Jul 2013 14:45:39 GMT (envelope-from bdrewery) Received: (qmail 10137 invoked from network); 31 Jul 2013 09:45:37 -0500 Received: from unknown (HELO ?192.168.98.125?) (freebsd@shatow.net@50.203.178.2) by sweb.xzibition.com with ESMTPA; 31 Jul 2013 09:45:37 -0500 Message-ID: <51F9230D.3070903@FreeBSD.org> Date: Wed, 31 Jul 2013 07:45:33 -0700 From: Bryan Drewery Organization: FreeBSD User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130620 Thunderbird/17.0.7 MIME-Version: 1.0 To: "O. Hartmann" Subject: Re: CURRENT > r253690: fetch(1) fails with: Certificate verification failed for ... References: <20130731121629.4c2b7a92@thor.walstatt.dyndns.org> In-Reply-To: <20130731121629.4c2b7a92@thor.walstatt.dyndns.org> X-Enigmail-Version: 1.5.2 OpenPGP: id=3C9B0CF9; url=http://www.shatow.net/bryan/bryan.asc Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="qSK8vwjKaAaFa5EqlghARC4f1AKHT4G8S" Cc: FreeBSD CURRENT X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 31 Jul 2013 14:45:39 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --qSK8vwjKaAaFa5EqlghARC4f1AKHT4G8S Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable On 7/31/2013 3:16 AM, O. Hartmann wrote: >=20 > Updating several ports on CURRENT fails with a fetch error, which > expresses itself via >=20 > [math/eigen3] This should be fixed now. SSL Certificate Verification has been disabled in ports since the distinfo is already fetched securely and used to check the checksum of the downloaded distfile. --=20 Regards, Bryan Drewery --qSK8vwjKaAaFa5EqlghARC4f1AKHT4G8S Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBAgAGBQJR+SMNAAoJEG54KsA8mwz5jLoQALxK9aF1VaX5k4N+9bety5g7 ZMooo5WSjTrbBUGjtrKzBCS6Ds4Wjzmvwg36sHUPuGuiCzmcjoCMsuZR/nNgIB7J v5KPg6ePrkwIxIkmplFUKvdxLsTSy41IPIVaYFTG9ncJgPEosAXCd+24KPRJDUa4 NRg1hF/WcOv3C4ADpLQeBXz7e1FmzNzSjIAY8Vw2c2DZ3wn7lt3ql2g3rIQ4AoLW b7dI9/dFQfBZRa4+cYRYF2ptGnpdkJNgPmvgFpVY9lM8Z9K5V2w7tspfRKys/Txn 3IrFJX2eE2Z98oPrNROnzs2jsb4gLn1EG8yFUj8TcQ9d01EnSuhBAKhZJGC7LU+c hIw7yAxvaOYrqPALnCXspsDNe0AEUXPJOZRWgje3lXfDmz5lLTogAd9K58Zl6Ug0 fYM8BMYCj5FTVQkl3102ym/exQGs93NMoVbbDtXOMOHOLU6pm71iIOh8EJdOhDwv IWG0N9IvKVs/X4YJW7lMcoCsStMeE6KlN58JD6WzcRQ26jdU+vovCM9ePpo2NarI SPBc+nQCqXla4NFNXJnDq9h+6tn1xsOf1/XKKU+hmCZthbO55AReIP4hk2nTvmx4 BH4s/pxmEjh9wQNHHI/ZELNV0xpyKUdPm9DiHDdPZfGO2ewI/PG/WQz+ljPNYTPH g+lYrNfGczQoKv9bqwo1 =iAyW -----END PGP SIGNATURE----- --qSK8vwjKaAaFa5EqlghARC4f1AKHT4G8S--