Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 17 Apr 2010 11:12:03 -0400
From:      APseudoUtopia <apseudoutopia@gmail.com>
To:        Tim Gustafson <tjg@soe.ucsc.edu>
Cc:        freebsd-security@freebsd.org
Subject:   Re: OpenSSL 0.9.8k -> 0.9.8l
Message-ID:  <v2x27ade5281004170812s6250d4acke6c7059c752d9456@mail.gmail.com>
In-Reply-To: <1849729321.700021271515794985.JavaMail.root@mail-01.cse.ucsc.edu>
References:  <1849729321.700021271515794985.JavaMail.root@mail-01.cse.ucsc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Apr 17, 2010 at 10:49 AM, Tim Gustafson <tjg@soe.ucsc.edu> wrote:
> Hi,
>
> I run a few web servers with need to be PCI compliant. =C2=A0Apparently t=
here's a problem with OpenSSL 0.9.8k that requires us to upgrade to 0.9.8l =
for us to maintain our compliance level.
>
> I've csup'd to RELENG_8_0 and did a build/install cycle and OpenSSL is st=
ill at 0.9.8k. =C2=A0Using RELENG_8 isn't really an option for me because t=
he last I upgraded to that level, ipfw was broken and I'm not sure that the=
 problem with ipfw has been fixed (Luigi tells me that it has, but I haven'=
t had time to test it yet).
>
> Is there any movement to patch RELENG_8_0 with OpenSSL 0.9.8l? =C2=A0Or w=
ill I be stuck with 0.9.8k until I move to RELENG_8?
>
> Tim Gustafson

This isn't an answer to your question, but you could always use
OpenSSL from the ports tree.

http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssl/

It's at version 1.0.0.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?v2x27ade5281004170812s6250d4acke6c7059c752d9456>