Date: Fri, 11 Mar 2011 17:00:27 GMT From: Freddie Cash <fjwcash@gmail.com> To: freebsd-ports-bugs@FreeBSD.org Subject: Re: ports/150493: Update for: security/openssh-portable port from 5.2p1 to 5.6p1 Message-ID: <201103111700.p2BH0RQb063695@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/150493; it has been noted by GNATS. From: Freddie Cash <fjwcash@gmail.com> To: bug-followup@freebsd.org, magik@roorback.net Cc: Subject: Re: ports/150493: Update for: security/openssh-portable port from 5.2p1 to 5.6p1 Date: Fri, 11 Mar 2011 08:55:12 -0800 Upon closer inspection, I see that OpenSSH in the base for 9-CURRENT is already 5.6, so there's no reason the port shouldn't compile. According to SVN, it looks like DES was the last one to touch OpenSSH in the base, so maybe he'll have some ideas on how to make the port compile on 9.0? I did a first go-round of trying to manually patch the /usr/src/crypto/openssh tree with the HPN patches. The "kitchensink" patch didn't work, all kinds of errors with the multi-threaded cipher patches. However, the dynamic window and none cipher patch applied with only 3 rejected hunks (due to VersionAddendum lines in our sources) that are easily hand-merged. Recompiling /usr/src/secure and re-installing it enables the NONE cipher in the base OpenSSH. :) So, for those running 9-CURRENT, it's possible to get the benefits of some of the HPN patches, without installing a port. -- Freddie Cash fjwcash@gmail.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201103111700.p2BH0RQb063695>