From owner-freebsd-questions@freebsd.org Mon Mar 4 16:09:58 2019 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6440015185B2 for ; Mon, 4 Mar 2019 16:09:58 +0000 (UTC) (envelope-from galtsev@kicp.uchicago.edu) Received: from kicp.uchicago.edu (kicp.uchicago.edu [128.135.20.70]) by mx1.freebsd.org (Postfix) with ESMTP id 6F4A970B27 for ; Mon, 4 Mar 2019 16:09:57 +0000 (UTC) (envelope-from galtsev@kicp.uchicago.edu) Received: from point.uchicago.edu (point.uchicago.edu [128.135.52.6]) by kicp.uchicago.edu (Postfix) with ESMTP id 987D3718054 for ; Mon, 4 Mar 2019 10:09:51 -0600 (CST) Subject: Re: OpenSSL111 To: freebsd-questions@freebsd.org References: <684E88FA-DA55-47FB-9D14-1028FE5F88CD@kreme.com> From: Valeri Galtsev Message-ID: Date: Mon, 4 Mar 2019 10:09:50 -0600 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 MIME-Version: 1.0 In-Reply-To: <684E88FA-DA55-47FB-9D14-1028FE5F88CD@kreme.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 6F4A970B27 X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dmarc=fail reason="" header.from=uchicago.edu (policy=none) X-Spamd-Result: default: False [0.95 / 15.00]; ARC_NA(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[uchicago.edu : No valid SPF, No valid DKIM,none]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.04)[-0.040,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; TO_DN_NONE(0.00)[]; NEURAL_SPAM_MEDIUM(0.31)[0.309,0]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-0.01)[country: US(-0.07)]; NEURAL_SPAM_SHORT(0.60)[0.601,0]; MX_GOOD(-0.01)[kicp.uchicago.edu]; RCVD_IN_DNSWL_NONE(0.00)[70.20.135.128.list.dnswl.org : 127.0.10.0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:160, ipnet:128.135.0.0/16, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 04 Mar 2019 16:09:58 -0000 On 3/4/19 10:04 AM, @lbutlr wrote: > On 03 Mar 2019, at 02:40, Odhiambo Washington wrote: >> On Sat, 2 Mar 2019 at 21:46, @lbutlr wrote: >>> What is the current port status of moving to OpenSSL111 over 1.0.2r? >> >> There is /usr/ports/security/openssl111/ > > That isn’t at all relevant to my question though. I’m not asking about OpenSSL 1.1.1, I’m asking about the status of ports moving to it (since it cannot co-exist with 1.0.2) > This question is for port maintainer. To find out how to contact port maintainer you can do this: cd /usr/ports/security/openssl111 make maintainer I hope, this helps. Valeri >>> Is there an easy way to check if any ports I have are still not able to >>> use OpenSSL 1.1.1? >> >> Since you install the ports yourself, you must check with their respective >> support channels/mailing lists to >> know how they interact with or support ver.111. That's what I think as a >> Sysadmin. > >> It also depends on why you really need ver111 😃 > > Since 1.0.2 has an EOL date of December and some ports are no longer supporting it it would be useful to know what the progress is for the ports tree the than checking dozens (or hundred) of individual packages. > -- ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++