tech-pkg archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: the path to openssl3



On Wed, Sep 06, 2023 at 06:49:19PM +0200, Tobias Nygren wrote:
> On Sun, 03 Sep 2023 19:25:41 -0400
> Greg Troxel <gdt%lexort.com@localhost> wrote:
> 
> >   Another path is adding security/openssl3, namespacing the binaries and
> >   adding OPENSSL_VERSIONS_ACCEPTED and OPENSSL_VERSIONS_INCOMPATIBLE as
> >   11 30 31.  Each could have a builtin.  This is messy as a program
> >   could want to have both indirectly and that's ungood, maybe doubleplus
> >   ungood.
> 
> I don't like this approach but unfortunately it is necessary. Right now
> we have the problem that some abandonware doesn't build with openssl 3.
> But a couple of years down the road we will have the opposite problem:
> Maintained software will ONLY work with openssl 3, important packages
> will start to break on NetBSD <10 and it will be necessary to blanket
> require openssl from pkgsrc on that subset of platforms to maintain
> some sort of sanity.
> 
> I would prefer however if security/openssl can just go to 3 and we
> re-import security/openssl11 with alternate libdir/incdir patches.
> Similar to how RHEL9 added a compat-openssl11 package to deal with
> this problem. The VERSIONS_ACCEPTABLE/VERSIONS_INCOMPATIBLE stuff can
> IMHO wait and we just point abandonware packages directly at
> openssl11's bl3.mk.

Inspired by today's security fix release, 've just updated
security/openssl to 3.1.4.

I've bumped pkgsrc to require OpenSSL 3 ABI (not API) (since the shlib
major of the openssl package was increased from 1 to 3). I've used "3"
instead of "3.1.4" in the buildlink3.mk file to give native OpenSSL 3
versions a chance to be selected.

Let's see from the bulk build outputs if we'll need an openssl11
package (or we can make one now, if someone feels like it).
 Thomas


Home | Main Index | Thread Index | Old Index