Bug 270101 - security/sslscan: Update to 2.0.16
Summary: security/sslscan: Update to 2.0.16
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Some People
Assignee: Gavin Atkinson
URL: https://github.com/rbsec/sslscan/rele...
Keywords: patch
Depends on:
Blocks:
 
Reported: 2023-03-11 02:55 UTC by Jamie Landeg-Jones
Modified: 2023-06-09 22:15 UTC (History)
1 user (show)

See Also:
bugzilla: maintainer-feedback? (gavin)


Attachments
cd /usr/ports/security/sslscan && patch < patch-security_sslscan (7.05 KB, patch)
2023-03-11 02:55 UTC, Jamie Landeg-Jones
no flags Details | Diff
cd /usr/ports/security/sslscan && patch < patch-security_sslscan (6.94 KB, patch)
2023-05-11 22:57 UTC, Jamie Landeg-Jones
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Jamie Landeg-Jones 2023-03-11 02:55:15 UTC
Created attachment 240737 [details]
cd /usr/ports/security/sslscan && patch < patch-security_sslscan

Attached patch to update sslscan to 2.0.15

This version compiles openssl (currently 1.1.1t) statically within in its binary so that it can perform all old and new protocol checks (including compression checks) without depending on the installed version of openssl, and without depending on the openssl-unsafe package.

From the notes:

"sslscan version 2 has now been released. This includes a major rewrite of the backend scanning code, which means that it is no longer reliant on the version of OpenSSL for many checks. This means that it is possible to support legacy protocols (SSLv2 and SSLv3), as well as supporting TLSv1.3 - regardless of the version of OpenSSL that it has been compiled against."
Comment 1 Jamie Landeg-Jones 2023-03-11 02:57:35 UTC
This would close the request in https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251167
Comment 2 Jamie Landeg-Jones 2023-04-23 21:17:36 UTC
*bump*

Maintainer timeout?
Comment 3 Jamie Landeg-Jones 2023-05-11 22:57:25 UTC
Created attachment 242128 [details]
cd /usr/ports/security/sslscan && patch < patch-security_sslscan

Previous patch is out of date.

This updated patch upgrades to 2.0.16 and statically compiles with OpenSSL 3.0.1
Comment 4 commit-hook freebsd_committer freebsd_triage 2023-05-12 05:53:30 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=ae95a8af2f0b8cb01bcb222956cbb35fa92237f5

commit ae95a8af2f0b8cb01bcb222956cbb35fa92237f5
Author:     Jamie Landeg-Jones <jamie@catflap.org>
AuthorDate: 2023-05-12 05:46:00 +0000
Commit:     Stefan Eßer <se@FreeBSD.org>
CommitDate: 2023-05-12 05:52:48 +0000

    security/sslscan: update to 2.0.16 and use OpenSSL-3

    This update removes the UNSAFESSL option and unconditionally and
    compiles in OpenSSL-3.

    The author of this patch requests it to be committed after a
    maintainer time-out.

    PR:             270101
    Approved by:    portmgr (implicit)

 security/sslscan/Makefile                     | 33 ++++------
 security/sslscan/distinfo                     |  8 ++-
 security/sslscan/files/patch-Makefile         | 94 ++++++++++++++++++++++++---
 security/sslscan/files/patch-sslscan.c (gone) | 19 ------
 4 files changed, 101 insertions(+), 53 deletions(-)
Comment 5 Jamie Landeg-Jones 2023-06-09 22:15:09 UTC
cheers for doing that, Stefan!