From owner-freebsd-ports@FreeBSD.ORG Wed May 13 11:11:17 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 53627AAF for ; Wed, 13 May 2015 11:11:17 +0000 (UTC) Received: from BLU004-OMC3S36.hotmail.com (blu004-omc3s36.hotmail.com [65.55.116.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "*.outlook.com", Issuer "MSIT Machine Auth CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0AD5E165C for ; Wed, 13 May 2015 11:11:16 +0000 (UTC) Received: from BLU436-SMTP104 ([65.55.116.74]) by BLU004-OMC3S36.hotmail.com over TLS secured channel with Microsoft SMTPSVC(7.5.7601.22751); Wed, 13 May 2015 04:11:10 -0700 X-TMN: [uIkwXPSrPVQ6SaXzh6P9xw6G8xmUBW2q] X-Originating-Email: [carmel_ny@outlook.com] Message-ID: Date: Wed, 13 May 2015 07:11:08 -0400 From: Carmel NY To: FreeBSD Ports Subject: Re: www/firefox really depends on security/openssl? In-Reply-To: <20150513012435.1912fdc2@kirk.drpetervoigt.private> References: <20150509125643.0bda93e6@kirk.drpetervoigt.private> <554EEBB5.8010304@rawbw.com> <20150511202110.34e6e29c@kirk.drpetervoigt.private> <55510C22.9050900@rawbw.com> <20150512000259.32a44ec4@kirk.drpetervoigt.private> <55512E8F.8040508@rawbw.com> <20150512022857.7230c163@kirk.drpetervoigt.private> <55515251.5040503@rawbw.com> <20150512112505.5f36f0b2@kirk.drpetervoigt.private> <5551DB5A.7090508@rawbw.com> <20150513012435.1912fdc2@kirk.drpetervoigt.private> Organization: seibercom NET X-Mailer: Claws Mail 3.11.1 (GTK+ 2.24.27; amd64-portbld-freebsd10.1) MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-OriginalArrivalTime: 13 May 2015 11:11:09.0436 (UTC) FILETIME=[83B4CBC0:01D08D6D] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 11:11:17 -0000 On Wed, 13 May 2015 01:24:35 +0200, Dr. Peter Voigt stated: [Truncated] The most reliable method to eliminate this, for lack of a better word "bullshit", would be for FreeBSD to keep the "base" system "openssl" version" up-to-date. It is apparent to even the most casual observer that the present method of allowing to different versions of such an important application on the same system without a fail proof method of choosing which version to use as you have demonstrated is truly counter productive to a "stable" environment. Assuming that the FreeBSD developers won't do it, perhaps you might investigate on how to replace the "base openssl" with the "port's openssl" version and eliminate the problem completely. By the way, I have run into this same nonsense myself. -- Carmel