dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Red Hat Product Enhancement Advisory: OpenSSL cryptography/security library available for Red Hat Linux 6.x

Oct 11, 2000, 20:27 (3 Talkback[s])

WEBINAR:
On-Demand

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers


Date: Wed, 11 Oct 2000 12:53 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHEA-2000:085-02] OpenSSL cryptography/security library available for Red Hat Linux 6.x


                   Red Hat, Inc. Product Enhancement Advisory

Synopsis:          OpenSSL cryptography/security library available for Red Hat Linux 6.x
Advisory ID:       RHEA-2000:085-02
Issue date:        2000-10-11
Updated on:        2000-10-11
Product:           Red Hat Linux
Keywords:          openssl ssl tls rsa dsa encryption
Cross references:  N/A

1. Topic:

OpenSSL is being made available for Red Hat Linux 6.x. This release brings cryptographic algorithms and protocols as well as certificate management to these platforms.

2. Relevant releases/architectures:

Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386, alpha, sparc

3. Problem description:

OpenSSL, which was first officially shipped with Red Hat Linux 7.0, has been built and tested on Red Hat Linux 6.0, 6.1, and 6.2. These packages are being made available so that developers may make use of the encryption algorithms and protocols it provides, most notably SSL (Secure Sockets Layer) version 3.0.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

You will need the base package to support SSL and RSA functionality in future packages. To build programs that need this functionality, you will need the development subpackage. The various other packages are bindings for developers using scripting languages.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

N/A

6. RPMs required:

Red Hat Linux 6.x:

alpha:
ftp://updates.redhat.com/6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm

sparc:
ftp://updates.redhat.com/6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm

7. Verification:

MD5 sum                           Package Name

ec20eb60a42420ea45dfb76ad6d3e313 6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm
e5fcfd49849a12d1902477097e0d133b 6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
71dee4ad5eac83950443ce1a633e4812 6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
70ae7e28394e3e984122897e52dc5047 6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
640933567bfa6f2909e7e31ac4b07e00 6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm
a1e4c89a7c5e24fd6e0e2ab2d5b6aac6 6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
329a894fcee6c9d850fc1343cc9b7564 6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
6d1fb9a62a9087b107423b964ed9075f 6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
3c470abfb6acbf87df2731f4ab8ecbda 6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm
f7fbdad93fc7dd38fe329cb91ef4f6b8 6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
d23aa9f8fa1012255b2868890f9dbb01 6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ed01f5f223cbf48fc23f43c5f2ed4bda 6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
dbc1c22b8143b7248645c0fa5ec78e47 6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.