On 27-2-2020 20:52, Pete Wright wrote:
On 2020-02-27 11:42, Willem Jan Withagen wrote:
On 27-2-2020 20:25, Miroslav Lachman wrote:
Willem Jan Withagen wrote on 2020/02/27 20:00:
Hi,
My ceph ports uses all kinds of python stuff, and now the trouble
is that I'm getting
an error on missing:
SSLv3_client_method
Which i guess, is because in the current openssl libs SSLv3 is
disabled.
And I sort of get this, SSLv3 is unsafe.
But I need it to be able to run parts of the ceph port.
So how do I get a openssl lib dependancy that has SSLv3 enabled.
You can build OpenSSL 1.1.1 from the ports where you can enable
SSLv3 in the options dialog.
https://www.freshports.org/security/openssl/
The defaults are:
====> Protocol Support
NEXTPROTONEG=on: Next Protocol Negotiation (SPDY)
SCTP=on: SCTP (Stream Control Transmission)
SSL3=off: SSLv3 (unsafe)
TLS1=on: TLSv1.0 (requires TLS1_1, TLS1_2)
TLS1_1=on: TLSv1.1 (requires TLS1_2)
TLS1_2=on: TLSv1.2
Yup, this is what I did, and that works.
But how do I do that for a port? And the make sure that the installer
of the ceph-package gets an openssl that had SSLv3
It may be best to build an internal package with the options you need
configured accordingly. I do this via poudriere for some of my
internal software. For example I have this file on my package builder:
/usr/local/etc/poudriere.d/make.conf
which contains the following:
x11-servers_xorg-server_SET=FIXDRM
I think this matches the same format of make.conf you would use if
building the ports tree locally.
Interesting, but not quite what I want....
It is not for personal usage, but for ports that I have commited to the
ports collection, and want to upgrade.
And yes, fixing openssl works for this problem, but it is not only my
problem.
I maintain these Ceph ports, and now upstream uses a python module that
expects SSlv3 to be available in the openssl that encounters on the system.
And the question is how to accommodate that?
Short of embedding my own openssl libs with the ceph-libs, thus creating
a huge maintenance problem.
I could also argue that switching of SSLv3 in a generic library is sort
of impractical, even if it is a protocol that we want to erradicate.
But I guess that the maintainers of openssl have decided that this is
the smart thing to do.
And I'm in peace with that, but now require an escape from this catch-22.
--WjW
_______________________________________________
freebsd-ports@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"