-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Supply Darwin binaries + install documentation #127
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Anybody? |
What would be needed to do this? I've a Mac and would be willing to setup a build environment, but I've not done much *nix build stuff for like 20+ years or so. |
I can't tell what's required on Darwin, maybe others do |
See commit 370bcc3. Thx @jvehent. I am leaving it open as it's 10.2b from @PeterMosmans . |
It would result in both an i386 and x64 binary. Is that OK with you? |
Am 18. Juli 2015 19:19:37 MESZ, schrieb Jeroen Wiert Pluimers [email protected]:
Sure, much appreciated. Go ahead pls |
@jpluimers , I would add more build flags to make sure that zlib, ssl2, ssl3 and more ciphers are added, eg for the 64 bit version:
Please send pull requests if you make any Apple-specific changes to the openssl repository, which would benefit all users. Thanks, Peter |
Am 19. Juli 2015 10:56:36 MESZ, schrieb Peter Mosmans [email protected]:
See also https://github.com/drwetter/testssl.sh/blob/master/openssl-bins/openssl-1.0.2-chacha.pm/Readme.md. and https://github.com/drwetter/testssl.sh/blob/master/openssl-bins/make-openssl.sh. -DOPENSSL_BUILD_DATE is useful informational info. Cheers, Dirk |
Thanks guys. I'll try to get as close to the |
I'm stuck. Your parameters make
|
Have you issued the following commands from the 1.0.2-chacha branch ?
|
Yup, I am:
Your steps give me this:
I adapted my script to include your steps: https://gist.github.com/jpluimers/f4de3937630b87753133
The full output is at https://gist.github.com/jpluimers/47b2fd6131d675002009 |
Hmm, it looks like there's something wrong with the Makefile..
after running ./Configure ? Does your /tmp partition has different permissions than your regular partitions (eg. /home ) ? |
in
|
@PeterMosmans : How many ciphers do you have with your configure option? I did a comparison of your suggestion with how I built (https://github.com/drwetter/testssl.sh/tree/master/openssl-bins/openssl-1.0.2-chacha.pm) and I supply in addition
Probably some are redundant because it's the default any way like I also find OTOH I am missing Thx, Dirk |
From the Configure file:
As in: these are enabled by default. It's always better to explicitly enable them, as you never know if the defaults will change.. |
Am 07/20/2015 um 12:29 PM schrieb Peter Mosmans:
that seems to be only partly correct. I missed completely the new option
definitely!
sure. Feel from to help yourself from https://github.com/drwetter/testssl.sh/blob/master/openssl-bins/make-openssl.sh . Outcome is 179 ciphers plus the four GOST ciphers via engine. MIT Kerberos gives 14 ciphers on top of Cheers, Dirk |
Neither
nor running these after
The permissions for /tmp/openssl are these:
It seems that makedepend is not available on OS X as of version 10.7.4: osx - makedepend missing? - Stack Overflow I'm not yet good enough at building Mac OS X or Linux stuff, so I need some help (especially since the Stack Overflow thread mentions bash aliases not working with makefiles) on how to get that working in makefiles. I quit writing makefiles 25 years ago in favour of batch files and later PowerShell as I could not get my head around makefiles. The current openssl makefiles are too intimidating and non-DRY to just dig into it:
|
I'd love to help out, as I think it will be beneficial for everybody to have OS X binaries containing full cipher support. Especially now that it proves less-than straightforward.After taking another look at your build output it looks as if the binary is build successfully after all ? Even the ChaCha20 and Poly1305 tests succeed ? Thanks for all your efforts, Peter (I'm trying to bring a OSX + openssl specialist into this discussion...) |
@PeterMosmans what time zone are you in? If you are anywhere near to around UTC+2, as I think it will be faster doing a screen sharing session so I can show you a couple of things. Adding I'll try to get it building, testing and reporting again, then let you know the results. Hopefully with as many ciphers configured as you mentioned in the thread above. |
You need a tool called You need to install that and stick it in the http://xorg.freedesktop.org/releases/individual/proto/xproto-7.0.25.tar.bz2 If you use Homebrew, just The script provided here further up doesn't seem to fully work though:
I suspect it's picking up on the headers in |
This may be useful as a reference. I've had a working Homebrew script for Peter's OpenSSL for a while. This seems to work:
I'd urge not including SSLv2 though. SSLv2 is essentially the safety equivalent of yelling your private details out of an open window these days, and SSLv3 isn't much better. The standard OpenSSL shipped by Apple supports SSLv2, but none of Debian or Ubuntu or Homebrew do. |
@DomT4 (the OSX + openssl specialist 😄 ) : A big thanks for chiming in. (In)secure protocols like sslv2 and ciphers are actually encouraged, as the main reason for this fork is testing all these ciphers. Thanks once again! Peter |
Am 07/21/2015 um 09:33 PM schrieb Dominyk Tiller:
from "The precompiled binaries provided here have extended support for everything which is normally [..] Never use these binaries for anything other than testing" Cheers, Dirk |
Specialist is probably a little kind, a mix of Homebrew maintaining and screwing around on OS X mostly 😉. Happy to help where I can though.
Fair enough! |
@DomT4 I'd rather invest time in getting rid of the As gcc has been mentioned as an alternative since more than a decade (see http://cnds.eecs.jacobs-university.de/courses/eecslab1-2003/solution2.pdf) I want to invest time and effort into using that as an alternative on OS X for openssl. Sometimes you just have to do things "the right way". To me, striking a balance between "stock", OSS project requirements, availability of tooling in the OSS world and making stuff really cross platform is the right way. If that means I really have to dig into makefiles, I'm going to do that (despite what I mentioned above about my aversion against them), but I can use some help and it will take some time. |
@jpluimers : Apparently changing the link MAKEDEPPROG in the generated Makefile in the root (after running Configure) to the following will work:
After which you should be able to run
and the rest of the build steps. See http://openssl.6102.n7.nabble.com/OpenSSL-1-0-1c-Mac-OS-X-no-XXX-and-missing-make-depend-td42920.html for more information. |
OK. Will try that. Probably during the weekend. It's a bit really busy as one of our team members is unavailable, so we need to redistribute work. |
@PeterMosmans I did some Perl learning, instrumentation and came up with the following diff to create a correct Now Small extract of failure:
I'm going to dig that, but could use some help. If you're on Skype (search for me) or Hangouts (via https://plus.google.com/+JeroenPluimers), please drop me a there. Oh, I started a blog post because of the modifications too. A preliminary version with comment possibilities is here: http://wiert.me/?p=28747&shareadraft=55b3de750384d |
@PeterMosmans fixed that too. See my updated blog. Summary: This now works after a
What is the When building with that complete list succeeds, then I can run the build tomorrow, send you a pull request for the openssl change, and @drwetter a pull request or the x64 and x86 binary. Edit: cipher list and |
Sounds like you have a busy weekend @jpluimers :) You could try these settings for the maximum number of ciphers:
Note that you need the zlib-devel package (zlib headers) to compile. Peter |
It looks like I broke the tests for both x86 and x64. Anyone knows that the below means?
|
yes, was discussed elsewhere @PeterMosmans. and me, see PeterMosmans/openssl#26 . 0xff03 is one of the two additional gost ciphers which are compiled in via " -DTEMP_GOST_TLS". The test |
I care, so I adapted the SSL cipher list tests in
Now it gets much further, but fails on this: x86 failure:
x64 failure:
Is that actually OK? |
@jpluimers , any chance to drop by today in https://gitter.im/drwetter/testssl.sh ? |
Removing the flag
and
Working to get more ciphers running with the |
Am 07/27/2015 um 11:08 AM schrieb Jeroen Wiert Pluimers:
I wouldn't say "solve" as it removes two GOST ciphers. To be honest: I quite didn't understand what ./ssltest is doing there, see @peter: Is that known upstream? Cheers, Dirk |
@drwetter the GOST ciphers not only broke the cipher list. What I'm aiming now is a build for both x86 and x64 with as much common ciphers and which passes the built-in tests. After that we can work our way to see which cipher breaks what and try to solve that. My gut says I'm close. But during the week I don't have much time. |
@drwetter , I sent the GOST issue upstream last year (I will look for the RT number), but it was rejected as it's not officially supported (anymore). |
For what's it worth, here's the ticket from July 2014: https://rt.openssl.org/Ticket/Display.html?id=3430 |
New build script: https://gist.github.com/jpluimers/f4de3937630b87753133 |
I originally had this, as my binaries are named after the
But then I saw the binaries are not named that way:
Why is that? I'll make a pull request with the last two names. (BTW: found the errors in my script, resolved them, built, tested). |
BTW: what about the naming of the files? I think it would make more sense naming them after the Note that somewhere on my TODO list is to figure out about this |
first the important thing: Thx for all your work! The naming scheme is depended where we come from. ;-) The BTW: does WRT to |
Ah, the On my machine:
|
@jpluimers @ALL : What does I am afraid otherwise your 32 bit build is not being picked up by testssl.sh . |
Found it: on older equipment, it returns |
good, thx! |
@PeterMosmans what would be the best to keep me informed when to deliver new binaries after your sources get updated? |
Shall I send you an email on your github address after an important update/official release ? |
PS: As far as testssl.sh is concerned I am more on the conservative side, so I am happy if I have a stable binaries which is proven to do its job. OTOH I seem to miss what good things you have done @PeterMosmans wrt to changes. |
@PeterMosmans yes please, or if I can watch it through RSS that would be even better. |
OS X builds with as many ciphers as possible without generating errors. Should fix #127
It would be awesome if somebody could contribute OS X binaries from @PeterMosmans OpenSSL fork and also document the installation (sorry, I am a Mac n00b)
The text was updated successfully, but these errors were encountered: