From owner-freebsd-security@freebsd.org Mon Jul 11 19:55:51 2016 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C82D1B92227; Mon, 11 Jul 2016 19:55:51 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from zxy.spb.ru (zxy.spb.ru [195.70.199.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 89FBA13BB; Mon, 11 Jul 2016 19:55:51 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from slw by zxy.spb.ru with local (Exim 4.86 (FreeBSD)) (envelope-from ) id 1bMhJA-000HP0-7r; Mon, 11 Jul 2016 22:56:00 +0300 Date: Mon, 11 Jul 2016 22:56:00 +0300 From: Slawa Olhovchenkov To: Jung-uk Kim Cc: Andrey Chernov , Mathieu Arnold , FreeBSD-current , freebsd-security Subject: Re: GOST in OPENSSL_BASE Message-ID: <20160711195600.GQ46309@zxy.spb.ru> References: <20160710133019.GD20831@zxy.spb.ru> <20160711184122.GP46309@zxy.spb.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: slw@zxy.spb.ru X-SA-Exim-Scanned: No (on zxy.spb.ru); SAEximRunCond expanded to false X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jul 2016 19:55:51 -0000 On Mon, Jul 11, 2016 at 03:00:39PM -0400, Jung-uk Kim wrote: > On 07/11/16 02:41 PM, Slawa Olhovchenkov wrote: > > On Mon, Jul 11, 2016 at 02:28:45PM -0400, Jung-uk Kim wrote: > > > >> On 07/10/16 10:10 AM, Andrey Chernov wrote: > >>> On 10.07.2016 16:30, Slawa Olhovchenkov wrote: > >>>> I am surprised lack of support GOST in openssl-base. > >>>> Can be this enabled before 11.0 released? > >>> > >>> AFAIK openssl maintainers says something like they can't support this > >>> code and it will become rotten shortly with new changes, so they drop it. > >> > >> [OpenSSL-maintainer-for-the-base hat on] > >> > >> GOST is supported on FreeBSD 10.x and 11.x. We will not drop it on > >> these branches unless secteam explicitly ask us to do so. However, we > >> *may* drop it from 12.0 *iff* we import OpenSSL 1.1.0 branch. > >> > >> [OpenSSL-maintainer-for-the-base hat off] > >> > >> Jung-uk Kim > >> > > > > Thanks! > > > > May be need file PR for dns/bind910? > > > > # grep -3 BROK /poudriere/ports/default/dns/bind910/Makefile > > .include > > > > .if ( ${PORT_OPTIONS:MGOST} || ${PORT_OPTIONS:MGOST_ASN1} ) && ${SSL_DEFAULT} == base > > BROKEN= OpenSSL from the base system does not support GOST, add \ > > DEFAULT_VERSIONS+=ssl=openssl to your /etc/make.conf and rebuild everything \ > > that needs SSL. > > .endif > > FreeBSD 9.3 is still supported but GOST is not available there. It Thanks for clarifications. > seems the ports maintainer didn't want to break it on 9.3 (CC added). > Version check may be needed there. Thanks! > Jung-uk Kim >