From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mr3.vodafonemail.de (mr3.vodafonemail.de [145.253.228.163]) by sourceware.org (Postfix) with ESMTPS id F1FD83858D28 for ; Wed, 11 Oct 2023 18:05:52 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org F1FD83858D28 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=nexgo.de Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=nexgo.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nexgo.de; s=vfde-mb-mr2-23sep; t=1697047551; bh=ntBZWZrSlLduRweHHuXV+05/r1naSWZlmH8lW0r/m5c=; h=From:To:Subject:In-Reply-To:References:Date:Message-ID:User-Agent: Content-Type:From; b=JAjQ7TIUqtPtdbAN3kYZ/w92/xLq9eFo7AQMJk3xYV0kT/gPA5vJ95PDlCNYgUZgF XF91QOZ2CZgZt8+S3D6jydoA7dXlwW9R0SmfsIHI2IHZFH62Cv/3SjDwplopJaSO7V g9Hc2XDJbzCKqg9FSVizk5kZnhAbXQzq+B+UArP0= Received: from smtp.vodafone.de (unknown [10.0.0.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by mr3.vodafonemail.de (Postfix) with ESMTPS id 4S5LKq3vQVz1yNX for ; Wed, 11 Oct 2023 18:05:51 +0000 (UTC) Received: from Gerda (p54a0ca9a.dip0.t-ipconnect.de [84.160.202.154]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp.vodafone.de (Postfix) with ESMTPSA id 4S5LKl195PzHnfv for ; Wed, 11 Oct 2023 18:05:44 +0000 (UTC) From: ASSI To: cygwin-apps@cygwin.com Subject: Re: [Attn. Maintainers] OpenSSL v3 In-Reply-To: <87wmy1bep6.fsf@Rainer.invalid> (ASSI via Cygwin-apps's message of "Fri, 11 Aug 2023 20:45:41 +0200") References: <87wmy1bep6.fsf@Rainer.invalid> Date: Wed, 11 Oct 2023 20:05:39 +0200 Message-ID: <87r0m1uj9o.fsf@> User-Agent: Gnus/5.13 (Gnus v5.13) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-purgate-type: clean X-purgate: clean X-purgate-size: 991 X-purgate-ID: 155817::1697047547-CCDAE94E-04BAF4CB/0/0 X-Spam-Status: No, score=-3030.5 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,INVALID_MSGID,KAM_NUMSUBJECT,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS,TXREP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: ASSI via Cygwin-apps writes: > Support for OpenSSL LTS v1.1.1 is ending on September 11. > > With the next release from upstream I will make OpenSSL LTS v3.0 current > on Cygwin. I've just rebuilt OpenSSH locally using the 3.0.10 test > package without any problems and unless your package has no current > upstream I expect no problems from switching. > > Please check that your packages build cleanly with the v3.0 libssl-devel > in place. I shall remind y'all that OpenSSL 1.1 is EOL for a month now. so please stop building packages against it and switch to OpenSSL 3.0=E2=80=A6 all packages that depend on OpenSSL need to make that switch latest when a new CVE for SSL gets published, which looking at the past year can be expected to happen just about now. Regards, Achim. --=20 +<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+ Factory and User Sound Singles for Waldorf Blofeld: http://Synth.Stromeko.net/Downloads.html#WaldorfSounds