find: cannot delete ‘/usr/local/share/doc/openssl’: Directory not empty
find: cannot delete ‘/usr/local/include/openssl’: Directory not empty
which openssl
Output:
/usr/bin/openssl
openssl binary placed in folder:
/bin
/usr/bin/
but:
/usr/bin/openssl version
/usr/bin/openssl: /usr/local/lib/libssl.so.1.1: version OPENSSL_1_1_1' not found (required by /usr/bin/openssl) /usr/bin/openssl: /usr/local/lib/libcrypto.so.1.1: version OPENSSL_1_1_1' not found (required by /usr/bin/openssl)
Great stuff - I'm not sure how you've ended up with a custombroken build of OpenSSL but at least it's working again.
I just checked an up-to-date 18.04 instance and the latest version of OpenSSL is indeed 1.1.1 11 Sep 2018.
For /etc/update-manager/meta-release, the default (and recommended) is https - the s meaning secure connections are established to the server, reducing the chance of a man-in-the-middle attack while it is in transit over the internet.
My bad! I replied while I was on my phone and didn't actually check my sources.list or if the server actually supports HTTPS, which it doesn't.
deb http://gb.archive.ubuntu.com/ubuntu/ bionic main restricted
deb http://gb.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
deb http://gb.archive.ubuntu.com/ubuntu/ bionic universe
deb http://gb.archive.ubuntu.com/ubuntu/ bionic-updates universe
deb http://gb.archive.ubuntu.com/ubuntu/ bionic multiverse
deb http://gb.archive.ubuntu.com/ubuntu/ bionic-updates multiverse
deb http://gb.archive.ubuntu.com/ubuntu/ bionic-backports main restricted universe multiverse
deb http://security.ubuntu.com/ubuntu bionic-security main restricted
deb http://security.ubuntu.com/ubuntu bionic-security universe
deb http://security.ubuntu.com/ubuntu bionic-security multiverse
While HTTPS is generally important to have, it's not necessary for Apt packages as they are signed with a key trusted by the system. So in this case, security is not compromised as the package will be refused if it was tampered with.
Here's a more detailed explanation:
So, these need to stay HTTP. Sorry, I should have double checked.
In Ubuntu 18.04.6 LTS I was frustrated by SEGV crashes,
in do-release-upgrade ( ubuntu-release-upgrader/check-new-release ) every time.
Also I got a consistent SEGV if I tried to run update-manager
I had tried lots of other things, lots of other checking ... to find the problem.
And was not figuring it out. That is, until I walked through this post. ( Which is grand, BTW )
Hooray, my problem was caused by an installation ofopenssl-1.1.0funder/usr/local/...
for which I had no source build ; but I was able to, manually, clean out those files - and that finally resolved it.
Thanks !!