Date: Wed, 11 Oct 2000 12:53 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHEA-2000:085-02] OpenSSL cryptography/security library
available for Red Hat Linux 6.x
Red Hat, Inc. Product Enhancement Advisory Synopsis: OpenSSL cryptography/security library available for Red Hat Linux 6.x Advisory ID: RHEA-2000:085-02 Issue date: 2000-10-11 Updated on: 2000-10-11 Product: Red Hat Linux Keywords: openssl ssl tls rsa dsa encryption Cross references: N/A
1. Topic:
OpenSSL is being made available for Red Hat Linux 6.x. This
release brings cryptographic algorithms and protocols as well as
certificate management to these platforms.
2. Relevant releases/architectures:
Red Hat Linux 6.0 – i386, alpha, sparc
Red Hat Linux 6.1 – i386, alpha, sparc
Red Hat Linux 6.2 – i386, alpha, sparc
Red Hat Linux 6.2EE – i386, alpha, sparc
3. Problem description:
OpenSSL, which was first officially shipped with Red Hat Linux
7.0, has been built and tested on Red Hat Linux 6.0, 6.1, and 6.2.
These packages are being made available so that developers may make
use of the encryption algorithms and protocols it provides, most
notably SSL (Secure Sockets Layer) version 3.0.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
You will need the base package to support SSL and RSA
functionality in future packages. To build programs that need this
functionality, you will need the development subpackage. The
various other packages are bindings for developers using scripting
languages.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):
N/A
6. RPMs required:
Red Hat Linux 6.x:
alpha:
ftp://updates.redhat.com/6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm
i386:
ftp://updates.redhat.com/6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm
7. Verification:
MD5 sum Package Name
ec20eb60a42420ea45dfb76ad6d3e313 6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm e5fcfd49849a12d1902477097e0d133b 6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm 71dee4ad5eac83950443ce1a633e4812 6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm 70ae7e28394e3e984122897e52dc5047 6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm 640933567bfa6f2909e7e31ac4b07e00 6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm a1e4c89a7c5e24fd6e0e2ab2d5b6aac6 6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm 329a894fcee6c9d850fc1343cc9b7564 6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm 6d1fb9a62a9087b107423b964ed9075f 6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm 3c470abfb6acbf87df2731f4ab8ecbda 6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm f7fbdad93fc7dd38fe329cb91ef4f6b8 6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm d23aa9f8fa1012255b2868890f9dbb01 6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm ed01f5f223cbf48fc23f43c5f2ed4bda 6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm dbc1c22b8143b7248645c0fa5ec78e47 6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig <filename>
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>
8. References:
N/A
Copyright(c) 2000 Red Hat, Inc.