Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crash with OpenSSL 1.0.2f #650

Closed
gahr opened this issue Jan 30, 2016 · 8 comments
Closed

crash with OpenSSL 1.0.2f #650

gahr opened this issue Jan 30, 2016 · 8 comments

Comments

@gahr
Copy link

gahr commented Jan 30, 2016

From FreeNode/#opensmtpd:

20:03 < gahr> hi, after updating OpenSSL to 1.0.2f, opensmtpd quits after connecting:
20:03 < gahr> an 29 18:08:36 mail smtpd[31270]: smtp-in: session 16287480c99a20ee: connection from host mail.ptrcrt.ch [192.168.1.1] established
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31268]: warn: lka -> pony: pipe closed                                                              
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31267]: warn: control -> pony: pipe closed                                                          
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31265]: warn: parent -> pony: pipe closed                                                           
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31266]: warn: queue -> pony: pipe closed                                                           
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31271]: warn: ca -> pony: pipe closed                                                               
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31269]: warn: scheduler -> control: pipe closed 

11:52 < dcarmich> I've been having an interesting issue with OpenSMTPD 5.7.3 on FreeBSD. It starts up fine, configuration is OK... but then when the SSL connection is started, it coredumps. How can I find out what caused this? (All the port versions are updated.)
11:52 < dcarmich> It seems to stop when the client sends STARTTLS, and crash on rsa_sign().
@poolpOrg
Copy link
Member

Will you be around IRC tonight around 9pm  (CET) or tomorrow anytime ?
Le 30 janv. 2016 1:15 PM, Pietro Cerutti notifications@github.com a écrit :From FreeNode/#opensmtpd:

20:03 < gahr> hi, after updating OpenSSL to 1.0.2f, opensmtpd quits after connecting:
20:03 < gahr> an 29 18:08:36 mail smtpd[31270]: smtp-in: session 16287480c99a20ee: connection from host mail.ptrcrt.ch [192.168.1.1] established
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31268]: warn: lka -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31267]: warn: control -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31265]: warn: parent -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31266]: warn: queue -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31271]: warn: ca -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31269]: warn: scheduler -> control: pipe closed

11:52 < dcarmich> I've been having an interesting issue with OpenSMTPD 5.7.3 on FreeBSD. It starts up fine, configuration is OK... but then when the SSL connection is started, it coredumps. How can I find out what caused this? (All the port versions are updated.)
11:52 < dcarmich> It seems to stop when the client sends STARTTLS, and crash on rsa_sign().

—Reply to this email directly or view it on GitHub.

@gahr
Copy link
Author

gahr commented Jan 30, 2016

I will be on IRC later today

Pietro Cerutti
gahr@gahr.ch

PGP Public Key
http://gahr.ch/pgp

On 30 Jan 2016, at 14:56, Gilles Chehade notifications@github.com wrote:

Will you be around IRC tonight around 9pm (CET) or tomorrow anytime ?
Le 30 janv. 2016 1:15 PM, Pietro Cerutti notifications@github.com a écrit :From FreeNode/#opensmtpd:

20:03 < gahr> hi, after updating OpenSSL to 1.0.2f, opensmtpd quits after connecting:
20:03 < gahr> an 29 18:08:36 mail smtpd[31270]: smtp-in: session 16287480c99a20ee: connection from host mail.ptrcrt.ch [192.168.1.1] established
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31268]: warn: lka -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31267]: warn: control -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31265]: warn: parent -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31266]: warn: queue -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31271]: warn: ca -> pony: pipe closed
20:03 < gahr> Jan 29 18:08:36 mail smtpd[31269]: warn: scheduler -> control: pipe closed

11:52 < dcarmich> I've been having an interesting issue with OpenSMTPD 5.7.3 on FreeBSD. It starts up fine, configuration is OK... but then when the SSL connection is started, it coredumps. How can I find out what caused this? (All the port versions are updated.)
11:52 < dcarmich> It seems to stop when the client sends STARTTLS, and crash on rsa_sign().

—Reply to this email directly or view it on GitHub.

Reply to this email directly or view it on GitHub.

@douglas-carmichael
Copy link

Here is my smtpd.conf:


# This is the smtpd server system-wide configuration file.
# See smtpd.conf(5) for more information.

# To accept external mail, replace with: listen on all
listen on xn0 tls auth-optional
listen on xn0 port 587 tls auth


# If you edit the file, you have to run "smtpctl update table aliases"
table aliases file:/etc/mail/aliases

# SSL/PKI
pki pfa3.x.rootbsd.net certificate "/etc/ssl/certs/mail.dcarmichael.net.cert"
pki pfa3.x.rootbsd.net key "/etc/ssl/private/mail.dcarmichael.net.key"

# Uncomment the following to accept external mail for domain "example.org"
accept from any for domain "dcarmichael.net" alias <aliases> deliver to mbox

accept for local alias <aliases> deliver to mbox
accept for any relay

Here is a log of a debug run with "smtpd -dv -T all":

Script started on Sat Jan 30 15:04:25 2016
[root@pfa3 ~]# smtpd -dvv -T all
debug: init ssl-tree
info: loading pki information for pfa3.x.rootbsd.net
debug: init ca-tree
info: OpenSMTPD 5.7.3p1 starting
debug: bounce warning after 4h
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: startup [debug mode]
mproc: queue -> parent: enabled
mproc: queue -> control: enabled
mproc: parent -> control: enabled
mproc: parent -> lka: enabled
mproc: lka -> parent: enabled
mproc: parent -> queue: enabled
mproc: lka -> queue: enabled
mproc: parent -> ca: enabled
mproc: lka -> control: enabled
mproc: parent -> pony: enabled
mproc: lka -> pony: enabled
mproc: lka -> pony: disabled
mproc: queue -> lka: enabled
mproc: queue -> scheduler: enabled
mproc: queue -> pony: enabled
queue-backend: queue_envelope_walk() -> -1 (0000000000000000)
debug: queue: done loading queue into scheduler
debug: init ssl-tree
mproc: scheduler -> control: enabled
info: loading pki keys for pfa3.x.rootbsd.net
filter: building simple chains...
libevent 2.0.22-stable (kqueue)
mproc: scheduler -> queue: enabled
scheduler: getting batch: mask=0x3f, count=10
debug: /--- ramqueue: scheduler_ram_batch()
debug: \---
scheduler: got r=0, delay=-1, count=10
scheduler: sleeping
ramstat: init
ramstat: set: uptime
ramstat: uptime: n/a -> n/a
mproc: control -> scheduler: enabled
mproc: control -> queue: enabled
mproc: control -> parent: enabled
mproc: control -> lka: enabled
mproc: control -> pony: enabled
mproc: control -> ca: enabled
filter: building complex chains...
filter: done building complex chains
mproc: ca -> control: enabled
mproc: ca -> parent: enabled
mproc: ca -> pony: enabled
mproc: ca -> pony: disabled
mproc: pony -> parent: enabled
debug: parent_send_config_ruleset: reloading
mproc: parent -> lka : 0 IMSG_CONF_START
mproc: pony -> queue: enabled
mproc: parent -> lka : 0 IMSG_CONF_END
debug: parent_send_config: configuring pony process
mproc: parent -> pony : 0 IMSG_CONF_START
mproc: parent -> pony : 0 IMSG_CONF_END
debug: parent_send_config: configuring ca process
mproc: parent -> ca : 0 IMSG_CONF_START
mproc: parent -> ca : 0 IMSG_CONF_END
mproc: pony -> lka: enabled
mproc: pony -> control: enabled
mproc: pony -> ca: enabled
imsg: lka <- parent: IMSG_CONF_START (len=0)
imsg: lka <- parent: IMSG_CONF_END (len=0)
TABLE "<anydestination>" type=LIST config=""
    "*"
    "pfa3"
TABLE "<anyhost>" type= config=""
    "0.0.0.0/0"
    "::/0"
    "local"
TABLE "<dynamic:0>" type=LIST config=""
    "dcarmichael.net"
TABLE "<getpwnam>" type=DYNAMIC config=""
TABLE "<localhost>" type= config=""
    "10.12.44.226"
    "127.0.0.1"
    "199.102.76.114"
    "ipv6:::1"
    "ipv6:fe80::1"
    "local"
TABLE "<localnames>" type=LIST config=""
    "10.12.44.226"
    "127.0.0.1"
    "199.102.76.114"
    "[10.12.44.226]"
    "[127.0.0.1]"
    "[199.102.76.114]"
    "[ipv6:::1]"
    "[ipv6:fe80::1]"
    "[ipv6:ipv6:::1]"
    "[ipv6:ipv6:fe80::1]"
    "ipv6:::1"
    "ipv6:fe80::1"
    "localhost"
    "pfa3.x.rootbsd.net"
TABLE "aliases" type=HASH config="/etc/mail/aliases"
    "_dhcp" -> "root"
    "_pflogd" -> "root"
    "abuse" -> "root"
imsg: ca <- parent: IMSG_CONF_START (len=0)
    "auditdistd" -> "root"
    "bin" -> "root"
imsg: ca <- parent: IMSG_CONF_END (len=0)
    "bind" -> "root"
debug: init private ssl-tree
    "daemon" -> "root"
    "ftp" -> "root"
    "ftp-bugs" -> "ftp"
    "games" -> "root"
    "hast" -> "root"
    "kmem" -> "root"
    "mailer-daemon" -> "postmaster"
    "mailnull" -> "postmaster"
    "man" -> "root"
    "news" -> "root"
    "nobody" -> "root"
    "operator" -> "root"
    "pop" -> "root"
    "postmaster" -> "root"
    "proxy" -> "root"
    "security" -> "root"
    "smmsp" -> "postmaster"
    "sshd" -> "root"
    "system" -> "root"
    "toor" -> "root"
    "tty" -> "root"
    "usenet" -> "news"
    "uucp" -> "root"
mproc: lka -> pony: enabled
mproc: ca -> pony: enabled
debug: ca_engine_init: using RSA privsep engine
imsg: pony <- parent: IMSG_CONF_START (len=0)
imsg: pony <- parent: IMSG_CONF_END (len=0)
debug: smtp: listen on 199.102.76.114 port 587 flags 0x449 pki "" ca ""
debug: smtp: listen on 199.102.76.114 port 25 flags 0x409 pki "" ca ""
debug: pony: rsae_init
debug: pony: rsae_init
debug: smtp: will accept at most 19340 clients
debug: smtpd: scanning offline queue...
debug: smtpd: offline scanning done
debug: smtp: new client on listener: 0x8028cd000
smtp: 0x80288b000: connected to listener 0x8028cd000 [hostname=pfa3.x.rootbsd.net, port=587, tag=]
mproc: pony -> lka: allocating 128
mproc: pony -> lka : 34 IMSG_SMTP_DNS_PTR
mproc: pony -> control: allocating 128
mproc: pony -> control : 47 IMSG_STAT_INCREMENT
mproc: pony -> control : 53 IMSG_STAT_INCREMENT
imsg: lka <- pony: IMSG_SMTP_DNS_PTR (len=34)
ramstat: increment: smtp.session
ramstat: smtp.session (0x802818101): 0 -> 1
ramstat: increment: smtp.session.inet4
ramstat: smtp.session.inet4 (0x8028160c1): 0 -> 1
mproc: lka -> pony: allocating 128
mproc: lka -> pony : 49 IMSG_SMTP_DNS_PTR
imsg: pony <- lka: IMSG_SMTP_DNS_PTR (len=49)
smtp: 0x80288b000: STATE_NEW -> STATE_CONNECTED
smtp-in: session e99e2c12f10188bf: connection from host c-73-22-88-72.hsd1.il.comcast.net [73.22.88.72] established
filter: new query QK_EVENT EVENT_CONNECT
filter: filter_drain_query e99e2c136de05083[QK_EVENT,EVENT_CONNECT,filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: filter_end_query e99e2c136de05083[QK_EVENT,EVENT_CONNECT,filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: new query QK_QUERY QUERY_CONNECT
filter: filter_drain_query e99e2c14a4a883c9[QK_QUERY,QUERY_CONNECT=199.102.76.114 <-> 73.22.88.72(c-73-22-88-72.hsd1.il.comcast.net),filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: filter_end_query e99e2c14a4a883c9[QK_QUERY,QUERY_CONNECT=199.102.76.114 <-> 73.22.88.72(c-73-22-88-72.hsd1.il.comcast.net),filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: query e99e2c14a4a883c9 done: status=FILTER_OK code=0 response="(null)"
smtp: 0x80288b000: >>> 220 pfa3.x.rootbsd.net ESMTP OpenSMTPD
smtp: 0x80288b000: IO_LOWAT <io:0x80288b048 fd=4 to=300000 fl=W ib=0 ob=0>
smtp: 0x80288b000: IO_DATAIN <io:0x80288b048 fd=4 to=300000 fl=R ib=20 ob=0>
smtp: 0x80288b000: <<< EHLO [192.168.1.3]
filter: new query QK_QUERY QUERY_HELO
filter: filter_drain_query e99e2c1555b065e9[QK_QUERY,QUERY_HELO=[192.168.1.3],filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: filter_end_query e99e2c1555b065e9[QK_QUERY,QUERY_HELO=[192.168.1.3],filter_session@0x8028c7480[datalen=0,eom=0x0,ofile=0x0]]
filter: query e99e2c1555b065e9 done: status=FILTER_OK code=0 response="(null)"
smtp: 0x80288b000: STATE_CONNECTED -> STATE_HELO
smtp: 0x80288b000: >>> 250-pfa3.x.rootbsd.net Hello [192.168.1.3] [73.22.88.72], pleased to meet you
smtp: 0x80288b000: >>> 250-8BITMIME
smtp: 0x80288b000: >>> 250-ENHANCEDSTATUSCODES
smtp: 0x80288b000: >>> 250-SIZE 36700160
smtp: 0x80288b000: >>> 250-DSN
smtp: 0x80288b000: >>> 250-STARTTLS
smtp: 0x80288b000: >>> 250 HELP
smtp: 0x80288b000: IO_LOWAT <io:0x80288b048 fd=4 to=300000 fl=W ib=0 ob=0>
smtp: 0x80288b000: IO_DATAIN <io:0x80288b048 fd=4 to=300000 fl=R ib=10 ob=0>
smtp: 0x80288b000: <<< STARTTLS
smtp: 0x80288b000: >>> 220 2.0.0: Ready to start TLS
smtp: 0x80288b000: STATE_HELO -> STATE_TLS
smtp: 0x80288b000: IO_LOWAT <io:0x80288b048 fd=4 to=300000 fl=W ib=0 ob=0>
mproc: pony -> lka : 272 IMSG_SMTP_TLS_INIT
imsg: lka <- pony: IMSG_SMTP_TLS_INIT (len=272)
debug: lka: looking up pki "pfa3.x.rootbsd.net"
mproc: lka -> pony : 2208 IMSG_SMTP_TLS_INIT
imsg: pony <- lka: IMSG_SMTP_TLS_INIT (len=2208)
debug: session_start_ssl: switching to SSL
debug: pony: rsae_sign
warn: queue -> pony: pipe closed
warn: lka -> pony: pipe closed
warn: scheduler -> queue: pipe closed
warn: control -> pony: pipe closed
warn: parent -> pony: pipe closed
warn: ca -> pony: pipe closed
[root@pfa3 ~]# exit

Script done on Sat Jan 30 15:04:33 2016

@fireglow
Copy link

Hi, I'd like to chime in, I'm facing what I believe is the same problem.
I'm also on FreeBSD, which has just updated their OpenSSL.

smtpd.conf:

listen on localhost hostname alpha.firc.de
accept from local for any relay via 10.0.110.5 hostname alpha.firc.de

Log:

debug: init ssl-tree
debug: init ca-tree
info: OpenSMTPD 5.7.3p1 starting
debug: bounce warning after 4h
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: startup [debug mode]
filter: building simple chains...
filter: building complex chains...
filter: done building complex chains
debug: init ssl-tree
libevent 2.0.22-stable (kqueue)
debug: ca_engine_init: using RSA privsep engine
debug: scheduler: evp:36660fe8424e9cb1 scheduled (mta)
debug: parent_send_config_ruleset: reloading
debug: parent_send_config: configuring pony process
debug: parent_send_config: configuring ca process
debug: smtp: listen on 127.0.0.1 port 25 flags 0x400 pki "" ca ""
debug: init private ssl-tree
debug: scheduler: evp:97544b1cafdbc955 scheduled (mta)
debug: smtp: listen on IPv6:::1 port 25 flags 0x400 pki "" ca ""
debug: smtp: will accept at most 469115 clients
debug: scheduler: evp:77cd2d79502da821 scheduled (mta)
debug: scheduler: evp:6d934cc31a106b9c scheduled (mta)
debug: scheduler: evp:6c7fdf0b0514eae7 scheduled (mta)
debug: scheduler: evp:70d2b3ab53566ae9 scheduled (mta)
debug: scheduler: evp:1eb4e805f711964e scheduled (mta)
debug: queue: done loading queue into scheduler
debug: scheduler: evp:6e2fe36c9f91437c scheduled (mta)
debug: mta: received evp:36660fe8424e9cb1 for <<redacted>@firc.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=1, ntask=1, nconnector=0, nconn=0
debug: mta: querying MX for [relay:10.0.110.5,mx,heloname=alpha.firc.de]...
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:97544b1cafdbc955 for <<redacted>@posteo.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=2, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:77cd2d79502da821 for <<redacted>@posteo.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=3, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:6d934cc31a106b9c for <<redacted>@firc.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=4, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:6c7fdf0b0514eae7 for <<redacted>@posteo.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=5, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:70d2b3ab53566ae9 for <<redacted>@firc.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=6, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:1eb4e805f711964e for <<redacted>@firc.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=7, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: mta: received evp:6e2fe36c9f91437c for <<redacted>@posteo.de>
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=2, ntask=8, nconnector=0, nconn=0
debug: mta: [relay:10.0.110.5,mx,heloname=alpha.firc.de] waiting for MX
debug: MXs for domain 10.0.110.5:
    10.0.110.5 preference -1
debug: mta: ... got mx (0x802828080, 10.0.110.5, [relay:10.0.110.5,mx,heloname=alpha.firc.de])
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=1, ntask=8, nconnector=0, nconn=0
debug: mta: querying source for [relay:10.0.110.5,mx,heloname=alpha.firc.de]...
debug: mta: ... got source for [relay:10.0.110.5,mx,heloname=alpha.firc.de]: []
debug: mta: new [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x10000]
debug: mta: connecting with [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x0]
debug: mta-routing: searching new route for [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x0]...
debug: mta-routing: selecting candidate route [] <-> 10.0.110.5
debug: mta-routing: spawning new connection on [] <-> 10.0.110.5
debug: mta: 0x802940800: spawned for relay [relay:10.0.110.5,mx,heloname=alpha.firc.de]
debug: mta: connecting with [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x0]
debug: mta: cannot use [relay:10.0.110.5,mx,heloname=alpha.firc.de] before 2s
debug: mta-routing: no route available for [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x0]: must wait a bit
debug: mta: retrying to connect on [connector:[]->[relay:10.0.110.5,mx,heloname=alpha.firc.de],0x0] in 2s...
debug: mta: draining [relay:10.0.110.5,mx,heloname=alpha.firc.de] refcount=3, ntask=8, nconnector=1, nconn=1
debug: mta: scheduling relay [relay:10.0.110.5,mx,heloname=alpha.firc.de] in 1s...
smtp-out: session 7d36f1980448b1c4: connecting to smtp+tls://10.0.110.5:25 (10.0.110.5)
debug: lka: looking up pki "alpha.firc.de"
debug: pony: rsae_init
debug: pony: rsae_verify
warn: lka -> pony: pipe closed
warn: queue -> pony: pipe closed
warn: parent -> pony: pipe closed
warn: ca -> pony: pipe closed
warn: control -> pony: pipe closed
warn: scheduler -> queue: pipe closed

@schuemann
Copy link

The effect has been reported by other FreeBSD users:
http://comments.gmane.org/gmane.os.freebsd.devel.ports/128616

And it is not FreeBSD specific:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813398
https://bugs.archlinux.org/task/47967

Downgrading OpenSSL to 1.0.2e is a workaround.

@ericfaurot
Copy link
Contributor

This is due to an API change in a "patchlevel" release of OpenSSL. The API we relied on is now broken.
We are working on a solution.

@ericfaurot
Copy link
Contributor

A patch is being reviewed. It will probably be committed tomorrow and a new portable release will follow closely.

@poolpOrg
Copy link
Member

poolpOrg commented Feb 2, 2016

OpenSMTPD 5.7.3p2 has just been released with a workaround to the API change in OpenSSL.

Thanks

@poolpOrg poolpOrg closed this as completed Feb 2, 2016
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue Feb 2, 2016
Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@


git-svn-id: svn+ssh://svn.freebsd.org/ports/head@407825 35697150-7ecd-e111-bb59-0022644237b5
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue Feb 2, 2016
Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue Feb 2, 2016
mail/opensmtpd: update to 5.7.3p2

Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@ (bapt)
tota pushed a commit to tota/freebsd-ports that referenced this issue Feb 5, 2016
Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@


git-svn-id: svn+ssh://svn.freebsd.org/ports/head@407825 35697150-7ecd-e111-bb59-0022644237b5
@poolpOrg poolpOrg self-assigned this Feb 5, 2016
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue Dec 2, 2016
mail/opensmtpd: update to 5.7.3p2

Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@ (bapt)
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue Apr 1, 2021
mail/opensmtpd: update to 5.7.3p2

Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@ (bapt)
svmhdvn pushed a commit to svmhdvn/freebsd-ports that referenced this issue Jan 10, 2024
Details at OpenSMTPD/OpenSMTPD#650

While at it, remove a stale patch that isn't applicable anymore. Upstream
implements this logic already, and the patch doesn't actually patch anything.

PR:				206816
Submitted by:	sa.inbox@gmail.com
Approved by:	portmgr@
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants