[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gentoo-user
Subject:    Re: [gentoo-user] logjam vulnerability
From:       "Stefan G. Weichinger" <lists () xunil ! at>
Date:       2015-05-21 16:16:41
Message-ID: 555E04E9.80601 () xunil ! at
[Download RAW message or body]

On 21.05.2015 17:09, Paul Tobias wrote:

>> for apache-2.2.29 (=stable gentoo package) I googled that one has to
>>
>> # cat dhparams.pem >> /my/ssl_cert_file
>>
>> and restart apache
> 
> Hmm, where did you read that?

for example, in here:

http://serverfault.com/questions/693241/how-to-fix-logjam-vulnerability-in-apache-httpd/693244#693244

but also in a german thread somewhere.

> With apache 2.2 you'll have to patch manually for now, for example
> this patch: http://serverfault.com/a/693448/88476 I don't run any
> apache 2.2 instances so I can't test.
> 
> Fortunately it's quite easy to apply custom patches with gentoo:
> https://wiki.gentoo.org/wiki//etc/portage/patches

sure, no problem.

Don't you think there will be an updated ebuild in portage soon?

so far nothing on b.g.o.

Stefan

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic