Page MenuHomeFreeBSD

michaelo (Michael Osipov)
User

Projects

User Details

User Since
Jul 19 2018, 5:53 PM (351 w, 1 h)

Recent Activity

Mon, Apr 7

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

Maybe this should be split into two reviews: (1) Basic funtionality for the base system, (2) adding links in LOCALBASE?

Mon, Apr 7, 6:49 AM

Sat, Apr 5

michaelo added inline comments to D49130: certctl: Add support for generating a certificate bundle (CAfile).
Sat, Apr 5, 5:40 PM
michaelo added a reviewer for D49130: certctl: Add support for generating a certificate bundle (CAfile): kevans.
Sat, Apr 5, 9:31 AM

Fri, Apr 4

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1132354, @jrm wrote:

It's indeed running in a chroot.

% sudo procstat -f $(pgrep local-unbound)
  PID COMM                FD T V FLAGS    REF  OFFSET PRO NAME
 3763 local-unbound     text v r r-------   -       - -   /usr/sbin/local-unbound
 3763 local-unbound      cwd v d r-------   -       - -   /var/unbound
 3763 local-unbound     root v d r-------   -       - -   /var/unbound
 3763 local-unbound     jail v d r-------   -       - -   /var/unbound
 3763 local-unbound        0 v c rw------   3       0 -   /dev/null
 3763 local-unbound        1 v c rw------   3       0 -   /dev/null
 3763 local-unbound        2 v c rw------   3       0 -   /dev/null
 3763 local-unbound        3 s - rw---n--   1       0 UDP ::1.53 ::.0
 3763 local-unbound        4 s - rw---n--   1       0 TCP 0 0 ::1.53 ::.0
 3763 local-unbound        5 s - rw---n--   1       0 UDP 127.0.0.1:53 *:0
 3763 local-unbound        6 s - rw---n--   1       0 TCP 0 0 127.0.0.1:53 *:0
 3763 local-unbound        7 s - rw---n--   1       0 UDS 0 0 /var/run/local_unbound.ctl
 3763 local-unbound        8 s - rw------   1       0 UDD /var/run/log
 3763 local-unbound        9 s - rw---n--   1       0 UDS 0 0 -
 3763 local-unbound       10 s - rw---n--   1       0 UDS 0 0 -
Fri, Apr 4, 7:32 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1132352, @jrm wrote:

Sorry. I'm struggling to keep up with a lot of requests these days.

% rg tls /var/unbound/unbound.conf
9:      tls-system-cert: yes

I can confirm that without the ca_root_nss package installed, local_unbound will not resolve unless the certificate bundle is installed as /etc/ssl/cert.pem. With the certificate bundle present, it will resolve and truss output shows:

88570: open("/etc/ssl/cert.pem",O_RDONLY,0666)   = 8 (0x8)

Does that answer your questions?

Fri, Apr 4, 7:06 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

@jrm , yet another ping: Where you able to test this with local_unbound?

Fri, Apr 4, 6:29 PM

Tue, Apr 1

michaelo added a comment to D49294: caroot: update the root bundle.

No reaction from secteam...

Tue, Apr 1, 9:10 AM

Wed, Mar 26

michaelo accepted D49489: Update dhclient.conf section on script statement..

I am fine with that.

Wed, Mar 26, 7:16 PM

Tue, Mar 25

michaelo requested changes to D49489: Update dhclient.conf section on script statement..
Tue, Mar 25, 2:44 PM

Mon, Mar 24

michaelo added inline comments to D49489: Update dhclient.conf section on script statement..
Mon, Mar 24, 7:59 PM

Thu, Mar 20

michaelo added a comment to D49294: caroot: update the root bundle.

MFC'ed and issue created: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=285546

Thu, Mar 20, 12:09 PM
michaelo committed rGf89c056e1184: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Thu, Mar 20, 11:40 AM
michaelo committed rG7577dae4d672: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Thu, Mar 20, 10:19 AM
michaelo closed D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Thu, Mar 20, 10:11 AM
michaelo committed R11:055a1041eda4: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal (authored by michaelo).
devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal
Thu, Mar 20, 10:11 AM

Wed, Mar 19

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

@jrm, did you get a chance to test that with local unbound?

Wed, Mar 19, 7:57 AM
michaelo updated the diff for D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.

Add improvements from @jrm.

Wed, Mar 19, 7:56 AM
michaelo added inline comments to D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Wed, Mar 19, 6:14 AM
michaelo updated the diff for D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.

Fix invalid test condition

Wed, Mar 19, 6:13 AM

Tue, Mar 18

michaelo requested review of D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Tue, Mar 18, 8:40 PM
michaelo closed D49402: devel/apr1: Pass correct configuration if BDB5 is selected.
In D49402#1126581, @jrm wrote:

@jrm, yes of course, it simply worked in poudriere. Did forget to bump the revision.

I don't know who represents maintainer apache@FreeBSD.org, but I guess I have to give the potential maintainers two weeks of time for this.

It's a mailing list [0] so proceed as you see fit.

[0] https://lists.freebsd.org/subscription/freebsd-apache

Tue, Mar 18, 8:25 PM
michaelo committed R11:f5d84834f492: devel/apr1: Pass correct configuration if BDB5 is selected (authored by michaelo).
devel/apr1: Pass correct configuration if BDB5 is selected
Tue, Mar 18, 8:03 PM
michaelo closed D49397: sysutils/javaservicewrapper: Update port to 3.5.60.
Tue, Mar 18, 2:25 PM
michaelo added a comment to D49397: sysutils/javaservicewrapper: Update port to 3.5.60.

Merged.

Tue, Mar 18, 2:25 PM
michaelo committed R11:3e62a7ef7345: sysutils/javaservicewrapper: Update port to 3.5.60 (authored by michaelo).
sysutils/javaservicewrapper: Update port to 3.5.60
Tue, Mar 18, 2:14 PM
michaelo added a comment to D49402: devel/apr1: Pass correct configuration if BDB5 is selected.

I don't know who represents maintainer apache@FreeBSD.org, but I guess I have to give the potential maintainers two weeks of time for this.

Tue, Mar 18, 1:07 PM
michaelo updated the diff for D49402: devel/apr1: Pass correct configuration if BDB5 is selected.

@jrm, yes of course, it simply worked in poudriere. Did forget to bump the revision.

Tue, Mar 18, 1:00 PM
michaelo requested review of D49402: devel/apr1: Pass correct configuration if BDB5 is selected.
Tue, Mar 18, 12:24 PM

Mon, Mar 17

michaelo requested review of D49397: sysutils/javaservicewrapper: Update port to 3.5.60.
Mon, Mar 17, 8:13 PM

Sat, Mar 15

michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG61df1b78f906: sh(1): Replace recommendation of use of -e with a note.
Sat, Mar 15, 2:02 PM
michaelo committed rG61df1b78f906: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Sat, Mar 15, 2:02 PM
michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG1245f6e34884: sh(1): Replace recommendation of use of -e with a note.
Sat, Mar 15, 2:01 PM
michaelo committed rG1245f6e34884: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Sat, Mar 15, 2:01 PM
michaelo committed rGd3e5558d3168: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Sat, Mar 15, 1:57 PM
michaelo committed rG4fd560bc94f0: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Sat, Mar 15, 1:52 PM

Fri, Mar 14

michaelo added a comment to D49294: caroot: update the root bundle.

Who is supported to cherry-pick to releng?

Secteam will do that. You can just fill out the erratum template and mail it to secteam.

Fri, Mar 14, 1:34 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Awesome, thanks! Let me know if you need help with the process- I'd like others to be comfortable with updating the caroot bundle as I'd never intended to be the long-term maintainer of it, but I've failed repeatedly to entice anyone else into dealing with it.

Fri, Mar 14, 9:41 AM

Thu, Mar 13

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124975, @jrm wrote:
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Regarding unbound, if you set tls-system-cert to true you will have the default truststore enabled: https://github.com/NLnetLabs/unbound/blob/5c84bb573f9728c10bcb3592dbd12be403d362de/util/net_help.c#L1593-L1601

Only chroot requires a bundle which sitll can use tls-system-cert.

In my opinion the unbound in base should have this option set to true by default to reduce the user headache.

In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Regarding unbound, if you set tls-system-cert to true you will have the default truststore enabled: https://github.com/NLnetLabs/unbound/blob/5c84bb573f9728c10bcb3592dbd12be403d362de/util/net_help.c#L1593-L1601

Only chroot requires a bundle which sitll can use tls-system-cert.

In my opinion the unbound in base should have this option set to true by default to reduce the user headache.

Please confirm, but I believe if you put something like this in /etc/rc.conf:

local_unbound_enable="YES"
local_unbound_forwarders="x.x.x.x@853#xxx"
local_unbound_tls="YES"

Then run # service local_unbound setup, you will get that option in /var/unbound/unbound.conf and it will use a chroot, so you do need the bundle.

Thu, Mar 13, 8:33 AM
michaelo closed D49294: caroot: update the root bundle.

Will work on EN after MFC.

Thu, Mar 13, 7:49 AM
michaelo committed rG0100da4deb96: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Thu, Mar 13, 7:46 AM
michaelo closed D49327: */*: Rework manpages handling in Samba-related ports.
Thu, Mar 13, 7:40 AM
michaelo committed R11:47b3df759415: */*: Rework manpages handling in Samba-related ports (authored by michaelo).
*/*: Rework manpages handling in Samba-related ports
Thu, Mar 13, 7:40 AM
michaelo committed R11:9e3b3289bf14: print/ghostscript10: Update port to 10.05.0 (authored by michaelo).
print/ghostscript10: Update port to 10.05.0
Thu, Mar 13, 7:37 AM
michaelo closed D49338: print/ghostscript10: Update port to 10.05.0.
Thu, Mar 13, 7:37 AM

Wed, Mar 12

michaelo requested review of D49338: print/ghostscript10: Update port to 10.05.0.
Wed, Mar 12, 10:10 PM
michaelo updated the diff for D49327: */*: Rework manpages handling in Samba-related ports.

Address @jrm's comments

Wed, Mar 12, 9:45 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Wed, Mar 12, 4:34 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Wed, Mar 12, 4:14 PM
michaelo added inline comments to D49327: */*: Rework manpages handling in Samba-related ports.
Wed, Mar 12, 4:13 PM
michaelo added a comment to D49294: caroot: update the root bundle.

This looks reasonable to me, thanks! We'll want an associated EN, as well- are you OK with preparing for that?

I must admit that I have no idea how to create an EN. Whould that apply only to stable branches?

So we can MFC these kinds of changes to stable/ branches without overhead, but we then submit EN to get secteam@ to roll them into patch releases following MFC. You can use the pre-existing caroot EN you pointed at for most of the fields, but you'd want to grab a fresh copy of the EN template in case there's some verbiage updates int he parts that we don't fill out: https://www.freebsd.org/security/errata-template.txt -- the completed template then gets attached to a new bugzilla PR for secteam to track (I think we can just file a new "Base System" > misc PR for "Bundled caroot in existing releases is out of date", attach the template then assign it to secteam@ with the "needs_errata" flag set).

Wed, Mar 12, 1:22 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Are you talking about https://www.freebsd.org/security/advisories/FreeBSD-EN-23:11.caroot.asc?

Wed, Mar 12, 1:07 PM
michaelo added a comment to D49294: caroot: update the root bundle.

This looks reasonable to me, thanks! We'll want an associated EN, as well- are you OK with preparing for that?

Wed, Mar 12, 1:04 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Guys, can you have a look?

Wed, Mar 12, 10:49 AM
michaelo closed D49299: net/samba4{19,20}: Rework manpages handling.

Followup review: https://reviews.freebsd.org/D49327

Wed, Mar 12, 9:17 AM
michaelo requested review of D49327: */*: Rework manpages handling in Samba-related ports.
Wed, Mar 12, 9:16 AM
michaelo committed R11:6cbfa0518c35: net/samba4{19,20}: Rework manpages handling (authored by michaelo).
net/samba4{19,20}: Rework manpages handling
Wed, Mar 12, 9:03 AM

Mar 11 2025

michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

Is there any action required by the administrator from this change? E.g., they'll just seamlessly have updated manpages?

Mar 11 2025, 6:33 AM

Mar 10 2025

michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

Just tested devel/talloc, suffers from the same problem as net/samba4*, another manpage is installed. When XSLTPROC is properly disabled, the build fails. So, I guess, several, at least, other Samba-related ports require fixing.

Mar 10 2025, 8:38 PM
michaelo updated the diff for D49299: net/samba4{19,20}: Rework manpages handling.

Enable MANPAGES by default

Mar 10 2025, 8:13 PM
michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

These seem MANPAGES not to have on by default:

./audio/libsndfile/Makefile
./databases/ldb25/Makefile
./databases/ldb28/Makefile
./databases/ldb29/Makefile
./databases/libmemcached/Makefile
./databases/pxlib/Makefile
./databases/tdb/Makefile
./databases/tdb1410/Makefile
./deskutils/xdg-desktop-portal/Makefile
./deskutils/xdg-terminal-exec/Makefile
./devel/json-glib/Makefile
./devel/ocaml-dolmen/Makefile
./devel/schilybase/Makefile
./devel/talloc/Makefile
./devel/talloc242/Makefile
./devel/tcllib/Makefile
./devel/tevent/Makefile
./devel/tevent016/Makefile
./devel/universal-ctags/Makefile
./graphics/libavif/Makefile
./math/alt-ergo/Makefile
./multimedia/dvdauthor/Makefile
./ports-mgmt/appstream-generator/Makefile
./security/git-crypt/Makefile
./sysutils/conky/Makefile
./sysutils/gnome-power-manager/Makefile
./sysutils/polkit/Makefile
Mar 10 2025, 7:06 PM
michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.
In D49299#1124382, @jrm wrote:

Do we want to go from installing man pages by default to not installing them by default?

There used to be a section in the Porter's Handbook that said something along the lines of man pages should be unconditionally installed. (If it's still there, I can't find it.) I think options like MANPAGES were added as an exception for when generating the man pages requires some bloated dependency. I recall @mat has strong opinions about this, so I'll add him here.

Mar 10 2025, 6:53 PM
michaelo updated subscribers of D46716: periodic 100.chksetuid: supress output if diff is purely whitespace.

@phk This is what I was writing you privately...

Mar 10 2025, 12:40 PM
michaelo closed D49117: www/wget2: Rename HTTP2 option.
Mar 10 2025, 12:10 PM
michaelo committed R11:9537b429308c: www/wget2: Rename HTTP2 option (authored by michaelo).
www/wget2: Rename HTTP2 option
Mar 10 2025, 12:10 PM
michaelo closed D49118: www/{lib,}nghttp2: Improve descriptions.
Mar 10 2025, 12:07 PM
michaelo committed R11:4fc8ab499f44: www/{lib,}nghttp2: Improve descriptions (authored by michaelo).
www/{lib,}nghttp2: Improve descriptions
Mar 10 2025, 12:07 PM

Mar 8 2025

michaelo requested review of D49299: net/samba4{19,20}: Rework manpages handling.
Mar 8 2025, 11:02 PM
michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG7bd8da72c581: sh(1): Replace recommendation of use of -e with a note.
Mar 8 2025, 4:14 PM
michaelo closed D45073: sh(1): Replace recommendation of use of -e with a note.
Mar 8 2025, 4:14 PM
michaelo committed rG7bd8da72c581: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Mar 8 2025, 4:14 PM
michaelo updated the summary of D49294: caroot: update the root bundle.
Mar 8 2025, 4:02 PM
michaelo updated the diff for D49294: caroot: update the root bundle.

Remove also expired untrusted roots

Mar 8 2025, 4:01 PM
michaelo requested review of D49294: caroot: update the root bundle.
Mar 8 2025, 3:42 PM
michaelo closed D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.
Mar 8 2025, 3:35 PM
michaelo committed rG457c03b397c8: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Mar 8 2025, 3:35 PM
michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

@jrm , do you accept your own proposal formally?

Mar 8 2025, 3:30 PM

Mar 7 2025

michaelo committed R11:093b0eb52a7e: lang/rust: Make OpenSSL use the system default truststore in Cargo (authored by michaelo).
lang/rust: Make OpenSSL use the system default truststore in Cargo
Mar 7 2025, 6:02 PM
michaelo closed D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.
Mar 7 2025, 5:45 PM
michaelo committed R11:078082660317: lang/rust: Make OpenSSL use the system default truststore in Cargo (authored by michaelo).
lang/rust: Make OpenSSL use the system default truststore in Cargo
Mar 7 2025, 5:45 PM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Mentors, any opinion?

Mar 7 2025, 5:14 PM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Hope to remove patch when upstream accepts it.

Mar 7 2025, 5:12 PM

Mar 6 2025

michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

I think this communicates an important caveat in a terse, informative, and specific way.

Mar 6 2025, 6:34 PM
michaelo added a comment to D49191: shells/bash-static: Exclude PORTS_READLINE and NLS options with STATIC.

@ehaupt, do you want to close this out as a user problem and not a port problem?

Yes. I'd like to do that. If the user wants to have a static version without any port readline or gettext he can simply rebuild shells/bash-static without those options. Sure, no pre-built pkgs but that's just the way it is.

Mar 6 2025, 11:07 AM
michaelo added a comment to D49191: shells/bash-static: Exclude PORTS_READLINE and NLS options with STATIC.

@ehaupt, do you want to close this out as a user problem and not a port problem?

Mar 6 2025, 10:02 AM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Rust maintainers, please have a look. This is quite annoying issue especially because it is hard to diagnose from a high level perspective.

Mar 6 2025, 9:59 AM
michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

Recommendation is out, have another look.

Mar 6 2025, 9:56 AM
michaelo updated the diff for D45073: sh(1): Replace recommendation of use of -e with a note.

Update with @jrm's proposal

Mar 6 2025, 9:56 AM
michaelo retitled D45073: sh(1): Replace recommendation of use of -e with a note from sh(1): Improve recommendation of use of -e to sh(1): Replace recommendation of use of -e with a note.
Mar 6 2025, 9:55 AM
michaelo closed D49114: Mk/bsd.options.desc.mk: Use proper name for HTTP/2.
Mar 6 2025, 9:32 AM
michaelo committed R11:111fab8011ea: Mk/bsd.options.desc.mk: Use proper name for HTTP/2 (authored by michaelo).
Mk/bsd.options.desc.mk: Use proper name for HTTP/2
Mar 6 2025, 9:32 AM
michaelo updated the diff for D49117: www/wget2: Rename HTTP2 option.

Incorporate @jrm's comment

Mar 6 2025, 7:46 AM
michaelo retitled D49117: www/wget2: Rename HTTP2 option from www/wget2: Harmonize HTTP2 option to www/wget2: Rename HTTP2 option.
Mar 6 2025, 7:45 AM

Mar 5 2025

michaelo added a comment to D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

certdata.txt uses unfortunately a two-digit year

Yeah, that's the sad part

Mar 5 2025, 2:58 PM
michaelo added a comment to D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

I will leave other a few more days to review.

Mar 5 2025, 2:53 PM
michaelo added a comment to D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

$year + 100 makes me sad :(

Mar 5 2025, 2:29 PM
michaelo added inline comments to D49130: certctl: Add support for generating a certificate bundle (CAfile).
Mar 5 2025, 11:22 AM
michaelo updated the diff for D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

Fix formatting

Mar 5 2025, 10:14 AM
michaelo added a comment to D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

I'd like to MFC it after a week.

Mar 5 2025, 10:06 AM
michaelo retitled D49075: caroot: Ignore soft distrust of server CA certificates after 398 days from caroot: Ignore soft distrust of server CA certificates to caroot: Ignore soft distrust of server CA certificates after 398 days.
Mar 5 2025, 10:03 AM
michaelo updated the diff for D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.

Distrust after 398 days as requested by @emaste

Mar 5 2025, 10:00 AM