[DragonFlyBSD - Bug #3333] Update LibreSSL to 3.6.1

bugtracker-admin at leaf.dragonflybsd.org bugtracker-admin at leaf.dragonflybsd.org
Fri Nov 25 15:29:43 PST 2022


Issue #3333 has been updated by tuxillo.


h3. Test usr.bin/dc
h3. Test usr.bin/nc

<pre>
<code class="terminal">
root@:~ # dc 
[la1+dsa*pla10>y]sy 
0sa1 
lyx 
1
2
6
24
120
720
5040
40320
362880
3628800

root@:~ # nc -cv -T protocols=all www.google.es 443 
Connection to www.google.es (142.250.185.3) 443 port [tcp/https] succeeded!
TLS handshake negotiated TLSv1.3/TLS_AES_256_GCM_SHA384 with host www.google.es
Peer name: www.google.es
Subject: /CN=*.google.es
Issuer: /C=US/O=Google Trust Services LLC/CN=GTS CA 1C3
Valid From: Wed Nov  2 13:46:42 2022
Valid Until: Wed Jan 25 13:46:41 2023
Cert Hash: SHA256:6ff244af5060ca6ec4c1a0c9acf209ea5c0ccf2915b260de41b2e008217c5d7f
OCSP URL: http://ocsp.pki.goog/gts1c3

</code>
</pre>

----------------------------------------
Bug #3333: Update LibreSSL to 3.6.1
http://bugs.dragonflybsd.org/issues/3333#change-14428

* Author: tuxillo
* Status: In Progress
* Priority: Normal
* Assignee: tuxillo
* Category: Vendor software
* Target version: 6.4
* Start date: 2022-11-25
----------------------------------------
We're currently using LibreSSL 3.2.5 in base, which is quite old. Need to upgrade to the latest stable, which at the moment is 3.6.1

Following tests are required:

# Test encrypted root installation and boot
# Test pkgng
# Test openssl
# Test ldns consumers
# Test usr.bin/dc
# Test usr.bin/nc


---Files--------------------------------
encrypted_root_361.png (29 KB)
install-vim-from-avalon.png (27.9 KB)


-- 
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account



More information about the Bugs mailing list