Date: Tue, 8 Apr 2014 15:09:20 -0400 From: Nathan Dorfman <na@rtfm.net> To: Niklaus Schiess <nschiess@adversec.com> Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD's heartbleed response Message-ID: <CADgEyUt2Wc0Hsz-dtf3skCNv5Mb2v0edv_rdM8Kr%2B8=u=THZaQ@mail.gmail.com> In-Reply-To: <20140408190227.8774EDD1@hub.freebsd.org> References: <20140408174210.GA5433@behemoth> <CAMCLrkFXsnY-_KCw2PF0VtY6C0J-4CL03GzFskXmzUtLL2Ebig@mail.gmail.com> <20140408195049.04129f2a@azsupport.com> <20140408190227.8774EDD1@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Uh, an excuse for what exactly? You must be talking about installing 1.0.1 from the ports. That was fixed yesterday by updating the version in ports to 1.0.1g: http://svnweb.freebsd.org/ports?view=revision&revision=350548 -nd. On Tue, Apr 8, 2014 at 2:54 PM, Niklaus Schiess <nschiess@adversec.com> wrote: > Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2 > support in 0.9.x. So thats not an excuse. > > On 08.04.2014 19:50, Andrei wrote: >> On Tue, 8 Apr 2014 10:46:12 -0700 >> Mark Boolootian <booloo@ucsc.edu> wrote: >> >>> While it may not be quite what you're looking for, ports contains >>> OpenSSL 1.0.1g. >> >> And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base. >> _______________________________________________ >> freebsd-security@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-security >> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" >> > > -- > PGP FP: CB84 8C68 ADDB 6C50 7DF1 4227 F2A6 056A A799 76DA > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADgEyUt2Wc0Hsz-dtf3skCNv5Mb2v0edv_rdM8Kr%2B8=u=THZaQ>