Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Mar 2011 17:00:27 GMT
From:      Freddie Cash <fjwcash@gmail.com>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: ports/150493: Update for: security/openssh-portable port from 5.2p1 to 5.6p1
Message-ID:  <201103111700.p2BH0RQb063695@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/150493; it has been noted by GNATS.

From: Freddie Cash <fjwcash@gmail.com>
To: bug-followup@freebsd.org, magik@roorback.net
Cc:  
Subject: Re: ports/150493: Update for: security/openssh-portable port from
 5.2p1 to 5.6p1
Date: Fri, 11 Mar 2011 08:55:12 -0800

 Upon closer inspection, I see that OpenSSH in the base for 9-CURRENT
 is already 5.6, so there's no reason the port shouldn't compile.
 According to SVN, it looks like DES was the last one to touch OpenSSH
 in the base, so maybe he'll have some ideas on how to make the port
 compile on 9.0?
 
 I did a first go-round of trying to manually patch the
 /usr/src/crypto/openssh tree with the HPN patches.  The "kitchensink"
 patch didn't work, all kinds of errors with the multi-threaded cipher
 patches.  However, the dynamic window and none cipher patch applied
 with only 3 rejected hunks (due to VersionAddendum lines in our
 sources) that are easily hand-merged.
 
 Recompiling /usr/src/secure and re-installing it enables the NONE
 cipher in the base OpenSSH.  :)
 
 So, for those running 9-CURRENT, it's possible to get the benefits of
 some of the HPN patches, without installing a port.
 
 
 -- 
 Freddie Cash
 fjwcash@gmail.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201103111700.p2BH0RQb063695>