From owner-freebsd-questions@freebsd.org Mon Mar 4 16:04:41 2019 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E526715182E5 for ; Mon, 4 Mar 2019 16:04:40 +0000 (UTC) (envelope-from kremels@kreme.com) Received: from mail.covisp.net (mail.covisp.net [65.121.55.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CDC54708CE for ; Mon, 4 Mar 2019 16:04:39 +0000 (UTC) (envelope-from kremels@kreme.com) Subject: Re: OpenSSL111 Content-Type: text/plain; charset=utf-8 From: "@lbutlr" In-Reply-To: Date: Mon, 4 Mar 2019 09:04:31 -0700 X-Random-Signature: Apple Broke Applescrip[t access to signatures, random sigs now powered by Keyboard Maestro Pro X-Face: )^b5"R:T7U>9~:PEn3YkzMfW*[b1qKeU.fP9C8~8HpU9}lA&6`bH1 Message-Id: <684E88FA-DA55-47FB-9D14-1028FE5F88CD@kreme.com> Content-Transfer-Encoding: quoted-printable References: To: freebsd-questions@freebsd.org X-Mailer: Apple Mail (2.3445.102.3) X-Rspamd-Queue-Id: CDC54708CE X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of kremels@kreme.com designates 65.121.55.42 as permitted sender) smtp.mailfrom=kremels@kreme.com X-Spamd-Result: default: False [1.75 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MISSING_MIME_VERSION(2.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[kreme.com]; NEURAL_SPAM_MEDIUM(0.01)[0.006,0]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.13)[-0.127,0]; IP_SCORE(-0.02)[asn: 209(-0.01), country: US(-0.07)]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MX_GOOD(-0.01)[mail.covisp.net]; NEURAL_SPAM_SHORT(0.29)[0.294,0]; RCVD_COUNT_ZERO(0.00)[0]; RCVD_IN_DNSWL_LOW(-0.10)[42.55.121.65.list.dnswl.org : 127.0.5.1]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209, ipnet:65.112.0.0/12, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 Mar 2019 16:04:41 -0000 On 03 Mar 2019, at 02:40, Odhiambo Washington = wrote: > On Sat, 2 Mar 2019 at 21:46, @lbutlr wrote: >> What is the current port status of moving to OpenSSL111 over 1.0.2r? >=20 > There is /usr/ports/security/openssl111/ That isn=E2=80=99t at all relevant to my question though. I=E2=80=99m = not asking about OpenSSL 1.1.1, I=E2=80=99m asking about the status of = ports moving to it (since it cannot co-exist with 1.0.2) >> Is there an easy way to check if any ports I have are still not able = to >> use OpenSSL 1.1.1? >=20 > Since you install the ports yourself, you must check with their = respective > support channels/mailing lists to > know how they interact with or support ver.111. That's what I think as = a > Sysadmin. > It also depends on why you really need ver111 =F0=9F=98=83 Since 1.0.2 has an EOL date of December and some ports are no longer = supporting it it would be useful to know what the progress is for the = ports tree the than checking dozens (or hundred) of individual packages. --=20 Does the name Pavlov ring a bell?