From owner-freebsd-ports@FreeBSD.ORG Mon May 11 22:51:05 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CBE831C5 for ; Mon, 11 May 2015 22:51:05 +0000 (UTC) Received: from shell1.rawbw.com (shell1.rawbw.com [198.144.192.42]) by mx1.freebsd.org (Postfix) with ESMTP id B67C6176D for ; Mon, 11 May 2015 22:51:05 +0000 (UTC) Received: from yuri.doctorlan.com (c-50-184-63-128.hsd1.ca.comcast.net [50.184.63.128]) (authenticated bits=0) by shell1.rawbw.com (8.14.9/8.14.9) with ESMTP id t4BMp3t5077388 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 11 May 2015 15:51:04 -0700 (PDT) (envelope-from yuri@rawbw.com) X-Authentication-Warning: shell1.rawbw.com: Host c-50-184-63-128.hsd1.ca.comcast.net [50.184.63.128] claimed to be yuri.doctorlan.com Message-ID: <55513256.2030900@rawbw.com> Date: Mon, 11 May 2015 15:51:02 -0700 From: Yuri User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: "Dr. Peter Voigt" CC: freebsd-ports@freebsd.org Subject: Re: www/firefox really depends on security/openssl? References: <20150509125643.0bda93e6@kirk.drpetervoigt.private> <554EEBB5.8010304@rawbw.com> <20150511202110.34e6e29c@kirk.drpetervoigt.private> <55510C22.9050900@rawbw.com> <20150512000259.32a44ec4@kirk.drpetervoigt.private> In-Reply-To: <20150512000259.32a44ec4@kirk.drpetervoigt.private> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 May 2015 22:51:05 -0000 On 05/11/2015 15:02, Dr. Peter Voigt wrote: > I changed to base openssl after fighting with latest port openssl. > As reported by several people > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=198788 You can also downgrade security/openssl port locally to the last known version, and then rebuild postfix, and the rest, locally without packages. Local builds currently generally produce better results compared to poudriere builds because they are more likely to avoid openssl problem. Yuri