Committer to address 2 CVE's against strongswan
Kurt Jaeger
lists at opsec.eu
Thu May 15 11:22:36 UTC 2014
Hi!
> Thank-you for taking the time to look into this. The configuration used
> in the final build isn't standard, and comprises:
> CURL=on: Enable CURL to fetch CRL/OCSP
> EAPRADIUS=on: Enable EAP Radius proxy authentication
> IKEv1=on: Enable IKEv1 support
> XAUTH=on: Enable XAuth password verification
strongswan has many options and covering all those is not easy
(and not part of my build-testing it 8-) The issue would be
feature-testing it, but I hope I'm into gardening as a new
career when this happens 8-)
> The environment is 9.2Stable i386 and amd64 as of 5th May. Built
> without both pkg_ng and poudriere.
>
> The entire tree was rebuilt on May 10 (all ports deleted, rebuilt and
> reinstalled on two build and four test machines). Strongswan and
> libexecinfo have been rebuilt a few times since then as I've added
> --enable-padlock to the build.
I'm not sure I'm following you here. The patch from the maintainer
in PR 189132 does probably not contain your --enable-padlock change,
right ?
Would you mind to submit a seperate PR with the change ?
> So its disappointing that
> you've come across these errors, but does raise the prospect that
> migrating to next gen tools might enhance quality control - a benefit.
Yes, and the pkg-plist issue was easy to fix 8-)
--
pi at opsec.eu +49 171 3101372 6 years to go !
More information about the freebsd-ports
mailing list