From owner-freebsd-ports@FreeBSD.ORG Thu Oct 17 20:42:40 2013 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id E939C1FF for ; Thu, 17 Oct 2013 20:42:40 +0000 (UTC) (envelope-from rfg@tristatelogic.com) Received: from outgoing.tristatelogic.com (segfault.tristatelogic.com [69.62.255.118]) by mx1.freebsd.org (Postfix) with ESMTP id C917A2160 for ; Thu, 17 Oct 2013 20:42:40 +0000 (UTC) Received: from segfault-nmh-helo.tristatelogic.com (localhost [127.0.0.1]) by segfault.tristatelogic.com (Postfix) with ESMTP id 7CBC03AD63; Thu, 17 Oct 2013 13:42:40 -0700 (PDT) From: "Ronald F. Guilmette" To: Michael Gmelin Subject: Re: Port build failure -- security/hydra In-Reply-To: <20131014184048.278514bb@bsd64.grem.de> Date: Thu, 17 Oct 2013 13:42:40 -0700 Message-ID: <2136.1382042560@server1.tristatelogic.com> Cc: freebsd-ports@freebsd.org, Ruslan Makhmatkhanov X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 Oct 2013 20:42:41 -0000 In message <20131014184048.278514bb@bsd64.grem.de>, you wrote: >On Mon, 14 Oct 2013 20:13:51 +0400 >Ruslan Makhmatkhanov wrote: > >> Ronald F. Guilmette wrote on 06.10.2013 01:34: >> > >> >> make -V FETCH_CMD >> > >> > Results: >> > >> > /usr/bin/fetch -AFpr >> > >> >> on your system? What FreeBSD version you are using? >> > >> > FreeBSD segfault.tristatelogic.com 9.1-RELEASE FreeBSD 9.1-RELEASE >> > #0 r243825: Tue Dec 4 09:23:10 UTC 2012 >> > root@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64 >> >> Yes, I now see the issue. If I understand correctly /usr/bin/fetch >> got SSL support since FreeBSD 9.2, so is why it isn't work to you. >> > >Fetch had basic SSL support for many years, what changed is that in >10-CURRENT and 9-STABLE proper checking of certificates has been >implemented, which is disabled for the ports system though (since it's >using checksums and size checks anyway). So this is not the problem. So I am the only person for whom the fetch of the tarball for security/hydra has failed?