From nobody Mon Jun 12 18:23:42 2023 X-Original-To: ports@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Qg0dS0WHPz4clvm for ; Mon, 12 Jun 2023 18:31:40 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-ej1-f50.google.com (mail-ej1-f50.google.com [209.85.218.50]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Qg0dQ5pmSz3nwJ; Mon, 12 Jun 2023 18:31:38 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of carpeddiem@gmail.com designates 209.85.218.50 as permitted sender) smtp.mailfrom=carpeddiem@gmail.com; dmarc=none Received: by mail-ej1-f50.google.com with SMTP id a640c23a62f3a-97881a996a0so830255666b.0; Mon, 12 Jun 2023 11:31:38 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686594696; x=1689186696; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=RSH2uJlF+DrSqqBXwvcEgMZaWRGcaFFlRe+l1axYjas=; b=YQEHlkltqiUk51lcAs6kFdO/awaEjZ2oFy8zoYSzeU0WrPGQJVhMzNCn0E6o6eJRIf OODSp56MNi66SA99mdfH3IFnqCn1yZrXRtbe0zm+EqS5HtZmN2yrOomkwF/doms2Khdm HBbkun7aevbxhp0xxqsD/1bdYIvstVwgGLXAv+8NeNZaaHqGjwgnw3/T9WvUnzar5pfK gc5BzoR8C5KLuW84USTp85BDNL7+5bqDjcxkdAFeIyc//cLK3aB56OvUYJ6+EaDQMpsN SYMzW/ZV5tp2kUf8533SuqAuqBl2SJCphzXFOyyj9jGpCgGvzlb/rxk8syyQSMWzwrUf sRbA== X-Gm-Message-State: AC+VfDy1TrKrJWSGpT9ZKyF65EnKhinx0N3mlWx+NgvPQAC3Qq/TXtQw IGvIm+qK/6N/m/bY8psVw94JEyFHOxOBHZc/0gWo1vjZj98= X-Google-Smtp-Source: ACHHUZ7gmbcND9jYSqQn0G+FKw3lYTxknS2fSh0JZXVaSaJrvJdPLn9Ejo3v4rfuymEtMDlQE/htGjc68kU8VjS28/M= X-Received: by 2002:a2e:8719:0:b0:2b1:e65a:a1d3 with SMTP id m25-20020a2e8719000000b002b1e65aa1d3mr3142464lji.40.1686594233669; Mon, 12 Jun 2023 11:23:53 -0700 (PDT) List-Id: Porting software to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-ports List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org MIME-Version: 1.0 References: <9e9c665b-96a3-08fd-9cf6-56b9acc528ae@freebsd.org> In-Reply-To: <9e9c665b-96a3-08fd-9cf6-56b9acc528ae@freebsd.org> From: Ed Maste Date: Mon, 12 Jun 2023 14:23:42 -0400 Message-ID: Subject: Re: OpenSSL 3.0 in the base system update To: Matthias Fechner Cc: ports@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Spamd-Result: default: False [-3.09 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.99)[-0.989]; FORGED_SENDER(0.30)[emaste@freebsd.org,carpeddiem@gmail.com]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; MIME_GOOD(-0.10)[text/plain]; RWL_MAILSPIKE_GOOD(-0.10)[209.85.218.50:from]; R_DKIM_NA(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[209.85.218.50:from]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FREEMAIL_ENVFROM(0.00)[gmail.com]; MLMMJ_DEST(0.00)[ports@freebsd.org]; RCPT_COUNT_TWO(0.00)[2]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[freebsd.org]; FREEFALL_USER(0.00)[carpeddiem]; ARC_NA(0.00)[]; FROM_NEQ_ENVFROM(0.00)[emaste@freebsd.org,carpeddiem@gmail.com]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4Qg0dQ5pmSz3nwJ X-Spamd-Bar: --- X-ThisMailContainsUnwantedMimeParts: N On Fri, 9 Jun 2023 at 01:56, Matthias Fechner wrote: > > Regarding my information openssl 3.0 has a major performance problem > compared to 1.1. Thanks for the note. This appears to be the main location for tracking OpenSSL 3.0 performance issues: https://github.com/openssl/openssl/issues/17627 Ultimately we have to move away from OpenSSL 1.1.1 in the base system. We'll track this issue and update the in-tree OpenSSL with upstream changes as feasible. If necessary individual ports may (temporarily) make use of an OpenSSL 1.1 port.