./security/openssl, Secure Socket Layer and cryptographic library

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.1.1knb1, Package name: openssl-1.1.1knb1, Maintainer: pkgsrc-users

The OpenSSL Project is a collaborative effort to develop a
robust, commercial-grade, full-featured, and Open Source
toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as
a full-strength general purpose cryptography library. The
project is managed by a worldwide community of volunteers
that use the Internet to communicate, plan, and develop the
OpenSSL toolkit and its related documentation.

MESSAGE.SunOS [+/-]

Required to build:
[pkgtools/cwrappers]

Package options: idea, md2, mdc2, rc5, threads

Master sites:

SHA1: bad9dc4ae6dcc1855085463099b5dacb0ec6130b
RMD160: 5c9fbbeae7d115e59be705162e58195517a37cae
Filesize: 9593.164 KB

Version history: (Expand)


CVS history: (Expand)


   2021-07-19 01:11:08 by David A. Holland | Files touched by this commit (1)
Log message:
PR 55733 Joern Clausen: use GNU m4 with security/openssl on Solaris.

Seems that Solaris's m4 overflows internal limits.
   2021-07-10 17:40:52 by Jonathan Perkin | Files touched by this commit (1)
Log message:
openssl: Stop passing CFLAGS/LDFLAGS to configure.

If this ever worked it only did by accident.  Specifying, for example,
"-arch arm64" as used on macOS is enough to break its custom configure
script that assumes all arguments start with "-".

The flags seem to propogate through the environment normally.
   2021-07-09 20:22:56 by Amitai Schleier | Files touched by this commit (1)
Log message:
On Mac OS X Snow Leopard with ABI=64, configure was selecting a 32-bit
build (and then failing in the assembler). Override its choice on
Darwin/x86_64 by specifying KERNEL_BITS=${ABI} in CONFIGURE_ENV.
   2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575)
Log message:
*: recursive bump for perl 5.34
   2021-04-22 11:59:38 by Nia Alarie | Files touched by this commit (1)
Log message:
openssl: add note on updating
   2021-04-22 11:32:40 by Niclas Rosenvik | Files touched by this commit (2)
Log message:
Fix c++17 and openssl on solaris/illumos

gcc on solaris/illumos defines __STDC_VERSION__ in c++ mode where _Noreturn
does not exist.
This causes breakage when building c++17 programs that use openssl.
   2021-03-25 17:36:19 by Jonathan Perkin | Files touched by this commit (2) | Package updated
Log message:
openssl: Update to 1.1.1k.

Approved by @wiz during freeze.

Changes between 1.1.1j and 1.1.1k [25 Mar 2021]

 *) Fixed a problem with verifying a certificate chain when using the
    X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks
    of the certificates present in a certificate chain. It is not set by
    default.

    Starting from OpenSSL version 1.1.1h a check to disallow certificates in
    the chain that have explicitly encoded elliptic curve parameters was added
    as an additional strict check.

    An error in the implementation of this check meant that the result of a
    previous check to confirm that certificates in the chain are valid CA
    certificates was overwritten. This effectively bypasses the check
    that non-CA certificates must not be able to issue other certificates.

    If a "purpose" has been configured then there is a subsequent \ 
opportunity
    for checks that the certificate is a valid CA.  All of the named \ 
"purpose"
    values implemented in libcrypto perform this check.  Therefore, where
    a purpose is set the certificate chain will still be rejected even when the
    strict flag has been used. A purpose is set by default in libssl client and
    server certificate verification routines, but it can be overridden or
    removed by an application.

    In order to be affected, an application must explicitly set the
    X509_V_FLAG_X509_STRICT verification flag and either not set a purpose
    for the certificate verification or, in the case of TLS client or server
    applications, override the default purpose.
    (CVE-2021-3450)
    [Tomáš Mráz]

 *) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
    crafted renegotiation ClientHello message from a client. If a TLSv1.2
    renegotiation ClientHello omits the signature_algorithms extension (where
    it was present in the initial ClientHello), but includes a
    signature_algorithms_cert extension then a NULL pointer dereference will
    result, leading to a crash and a denial of service attack.

    A server is only vulnerable if it has TLSv1.2 and renegotiation enabled
    (which is the default configuration). OpenSSL TLS clients are not impacted
    by this issue.
    (CVE-2021-3449)
    [Peter Kästle and Samuel Sapalski]
   2021-03-02 00:28:55 by Greg Troxel | Files touched by this commit (1)
Log message:
seurity/openssl: Accomodate non-standard paths and cert bundles

Some systems choose unusual paths fro certs, and some use bundles.
Try to accomodate that, in particular by defining SSLCERTBUNDLE.

Patch concept from Thomas Orgis on tech-pkg, with no objections.