mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

568
comptes actifs

#LibreSSL

0 message0 participant0 message aujourd’hui

Released: #swad v0.1 🥳

Looking for a simple way to add #authentication to your #nginx reverse proxy? Then swad *could* be for you!

swad is the "Simple Web Authentication Daemon", written in pure #C (+ #POSIX) with almost no external dependencies. #TLS support requires #OpenSSL (or #LibreSSL). It's designed to work with nginx' "auth_request" module and offers authentication using a #cookie and a login form.

Well, this is a first release and you can tell by the version number it isn't "complete" yet. Most notably, only one single credentials checker is implemented: #PAM. But as pam already allows pretty flexible configuration, I already consider this pretty useful 🙈

If you want to know more, read here:
github.com/Zirias/swad

GitHubGitHub - Zirias/swad: Simple Web Authentication DaemonSimple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.

Finally a #poudriere bulk build of my package list succeeded for #FreeBSD 14.1. Quite some #libressl fallout to fix (I still refuse to use OpenSSL ...) ... and a few other mysterious issues.

Testing it on my desktop right now. #ZFS #bootenvironments are still AWESOME! Did just the following:

# bectl create new
# bectl mount new /mnt/tmp
# cd /usr/src
# make BATCH_DELETE_OLD_FILES=yes DESTDIR=/mnt/tmp installkernel installworld delete-old delete-old-libs
# etcupdate -D /mnt/tmp
# etcupdate resolve -D /mnt/tmp
# pkg -c /mnt/tmp upgrade -f
# pkg -c /mnt/tmp autoremove
# bectl umount new
# bectl activate -t new

Full upgrade without touching the running installation, one single reboot to test it! Yes, for a major upgrade, running was FreeBSD 13.3 😁

Finishing up some longstanding work started in 2022, Bob Beck committed a patch enabling namespaced (symbol hiding) builds by default for libssl and libcrypto for #LibreSSL in #OpenBSD -current.

beck@ modified src/lib/libcrypto/Makefile: Enable namespaced builds by default for libssl and libcrypto.

Some further refinements will happen to the build process to automatically generate the Symbols.namespace file, and to remove our last public unhidden symbol (which was a mistake, but waits for a major bump to get removed)

But for now everything should be using this.

ok tb@

In addition to a flurry of commits over the years hiding symbols, the initial commit notes:

Fully explained in libcrypto/README. TL;DR make sure libcrypto and libssl's function calls internally and to each other are via symbol names that won't get overridden by linking other libraries.

Mostly work by guenther@, which will currently be gated behind a build setting NAMESPACE=yes. once we convert all the symbols to his method we will do a major bump and pick up the changes.

ok tb@ jsing@

cvsweb.openbsd.org/cgi-bin/cvs

#OpenBSD uses an explicit list of symbols exported to help avoid unintentional namespace pollution for a number of base libraries, starting with libc in 2015.

marc.info/?l=openbsd-cvs&m=144

OK, updated the MacPorts got 0.98.2 PR here:

github.com/macports/macports-p

Which, is mostly referring to more voluminous stuff I detailed in Trac here:

trac.macports.org/ticket/69827

My most recent iteration of the Portfile, does at least:

1. install in a clean MacPorts trees (which is kind of close to what GitHub Actions CI will do, so presumably this would pass that).

2. smart enough to pick the correct variant if LibreSSL is installed and seems to (mostly) work.

However, it fails the %port -vst install PR prerequisite.

Also, the dependency walk it does if %port install +libressl is explicitly stated, is completely friggin bonkers and will, predictably, fail, because it wants to install libressl and openssl3 simultaneously (though it doesn't have libretls as a dependency at least I guess that is almost a good thing?)

Feeling very lost.

GitHubgot: update to 0.98.2 by artkiver · Pull Request #23716 · macports/macports-portsPar artkiver
#Got#TLS#libressl
A répondu dans un fil de discussion

Well, I wanted to test #FreeBSD #PowerShell for my usecase (which I *guess* I have, still not entirely sure), but ... I thought now that the port works, let's first rebase #ports (on main).

BAAAD idea. Not only did some change force my #poudriere to rebuild more or less *everything*, I also had fallout to fix from new #LibreSSL incompatibilities and some strange build error with #llvm-17.

Right now STILL waiting for the build of #chromium to finish.

Ok, testing PowerShell: tomorrow. 🙄

Goal: Get some #letsencrypt certificate obtained with #uacme deployed on some #Windows box

Step 1: Ok, this probably works best with #Powershell (which I don't really like ...)

Step 2: There's no #FreeBSD port ... but hey, there's now a FreeBSD port of #dotnet, let's try to "just" build Powershell using that.

Step 3: Hell why does it fail to build. Oh, System.Security.Cryptography.Native doesn't play well with #LibreSSL

Patch and retry, I guess I'll take some sleep now first. Bah!

(there's some irony in running into OpenSSL/LibreSSL issues when trying to deploy TLS certificates ...)

This whole #urllib3 / #OpenSSL situation is getting absurd.

I don't have sympathy for #OpenBSD or #LibreSSL. However, I can understand that they had good reasons to fork OpenSSL, and that switching back today would be hard.

I can understand projects refusing to officially declare support and rejecting workarounds. But pushing LibreSSL hate to the point of blocking #Python implementations that don't link to OpenSSL is just horrible. Users get in the crossfire, again.

github.com/urllib3/urllib3/iss

GitHubDrop support for OpenSSL<1.1.1 · Issue #2168 · urllib3/urllib3Par pquentin
A répondu dans un fil de discussion

@SpaceLifeForm @Perl This isn’t just shelling out to #curl or #wget (which core tools like #CPAN already fall back on). This is about in-process #TLS, which is currently best supported in #Perl by IO::Socket::SSL and its dependency Net::SSLeay, which in turn depends on either #OpenSSL or #LibreSSL with development header files.

There are modules that wrap #libcurl and other interfaces, but the more popular HTTP and other client modules don’t use them.

heise+ | OpenBSD 7.1 im Test: Unix-Distribution läuft stabil auf Apple M1-Systemen

Die Portierung von OpenBSD 7.1 auf Apples moderne ARM-Hardware ist nahezu abgeschlossen, Hilfe kam vom Asahi-Linux-Projekt. Das bietet OpenBSD.
OpenBSD 7.1 im Test: Unix-Distribution läuft stabil auf Apple M1-Systemen
heise onlineOpenBSD 7.1 im Test: Unix-Distribution läuft stabil auf Apple M1-SystemenPar Michael Plura