Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 11 Apr 2015 17:45:20 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 199298] [MAINTAINER] dns/knot: Update to 1.6.3
Message-ID:  <bug-199298-13-WoNcFpLH57@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-199298-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-199298-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199298

--- Comment #10 from freebsd@dns-lab.com ---
I'm currently suffering vision trouble; and apparently at the finish of
installing LibreSSL I had a dyslectic confusion. Then I was testing it the
traditional way, and combined with a forgotten `setenv FORCE_PKG_REGISTER` I
wasn't getting any of the errors that you got. But (elsewhere) neither
poudriere reported it.

Anyway, testing your last revision results in:
make: "/usr/ports/dns/knot/Makefile" line 56: Malformed conditional
(${OPENSSL_PORT} == security/libressl)
What would be a better way of detecting LibreSSL here?

Without that check, and having LibreSSL in make.conf, it all installs, but ends
up with fatal errors when starting Knot i.c.w. doing DNSSEC auto-signing of
zones using GOST keys.

As upstream is trying to solve this in the next release, what would you
recommend?
Should we maybe have a little patience, and for now remove the patch?
Although GOST in DNSSEC isn't very widely practiced, I think a DNS operator
rather has an error on install, than a silent message in a log.

Also; Knot's roadmap is to use GnuTLS per 2.0, because of hardware support and
smartcards. Actually this is already the case per 1.99.1 (a devel release).

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199298-13-WoNcFpLH57>