Re: Reaffirm public voting

2022-03-05 Thread Kurt Roeckx
On Sat, Mar 05, 2022 at 06:30:35PM +0100, Thomas Goirand wrote: > When considering a voting system, there are a few important things to > consider [1]: > > 1- vote-privacy: the fact that a particular voter voted in a particular way > is not revealed to anyone. > 2- Receipt-freeness: a voter does

General resolution: voting secrecy

2022-03-04 Thread Kurt Roeckx
Hi, A general resolution about voting secrecy has been started. Details about it are available at: https://www.debian.org/vote/2022/vote_001 Kurt Roeckx Debian Project Secretary signature.asc Description: PGP signature

Debian Project Leader Elections 2022: Call for nominations

2022-03-04 Thread Debian Project Secretary - Kurt Roeckx
round 2022-03-20. Details and results for the vote will be published at: http://www.debian.org/vote/2022/vote_002 Please make sure that nominations are sent to (or cc:'d to) debian-vote, and are cryptographically signed. Kurt Roeckx Debian Project Secretary signature.asc Description: PGP signature

voting secrecy GR

2022-03-04 Thread Kurt Roeckx
Hi, I've put up an initial page about the GR at: https://www.debian.org/vote/2022/vote_001 I didn't have time yet to properly record all the seconds yet, but believe the 3 option there all have the required amount of seconds, and are the only options that reached that. The 3rd option reached

Re: Amendment to GR Option 1: Hide Identities of Developers Casting a Particular Vote

2022-03-04 Thread Kurt Roeckx
On Fri, Mar 04, 2022 at 11:54:19AM -0800, Russ Allbery wrote: > Kurt Roeckx writes: > > > I've been reading our new constitution about the discussion period. What > > I find is this in A.1.1: > > The discussion period starts when a draft resolution is proposed and &g

Re: Amendment to GR Option 1: Hide Identities of Developers Casting a Particular Vote

2022-03-04 Thread Kurt Roeckx
On Fri, Mar 04, 2022 at 01:12:23PM -0700, Sam Hartman wrote: > One easy way for you to do that would be to send a diff to the spacing. > I could then update my branch and use the typo correction procedure in > the constitution to get this fixed. Or we can just leave it to the maintainer of the

Re: Amendment to GR Option 1: Hide Identities of Developers Casting a Particular Vote

2022-03-04 Thread Kurt Roeckx
On Thu, Mar 03, 2022 at 01:54:36PM -0700, Sam Hartman wrote: > > I also believe this advances the end of the discussion period to next > Thursday (although other actions may advance the end of the discussion > period further). I've been reading our new constitution about the discussion period.

DPL 2022 timeline

2022-03-01 Thread Kurt Roeckx
I'm proposing the following vote timeline: Nomination period: Saturday 2022-03-05 - Friday 2022-03-11 Campaigning period: Saturday 2022-03-12 - Friday 2022-04-01 Voting period: Saturday 2022-04-02 - Friday 2022-04-15 The new term will start on 2022-04-21 Kurt

Re: GR: Hide Identities of Developers Casting a Particular Vote

2022-02-26 Thread Kurt Roeckx
On Wed, Feb 23, 2022 at 02:44:10PM -0700, Sam Hartman wrote: > > "Pierre-Elliott" == Pierre-Elliott Bécue writes: > > Pierre-Elliott> I sponsor the resolution quoted below. > > I haven't gone and checked signatures, but unless someone's signature is > bad or something, I think that

Re: Amendment: Keep e-mail while allowing other options in addition [Re: GR: Hide Identities of Developers Casting a Particular Vote]

2022-02-26 Thread Kurt Roeckx
On Fri, Feb 25, 2022 at 08:06:20AM -0700, Sam Hartman wrote: > > 2) In the General resolution system, in addition to the constitutional > amendment, include a statement of the day asking the secretary to obtain > sufficient project consensus before changing how voting works. I plan to look at

Re: General Resolution: Change the resolution process: results

2022-01-31 Thread Kurt Roeckx
On Mon, Jan 31, 2022 at 10:31:54AM +0200, Wouter Verhelst wrote: > On Sun, Jan 30, 2022 at 11:41:51PM +0100, Kurt Roeckx wrote: > > On Sun, Jan 30, 2022 at 11:23:35PM +0200, Wouter Verhelst wrote: > > > As of this writing, the tally sheet is still the dummy tally sheet, and >

Re: General Resolution: Change the resolution process: results

2022-01-30 Thread Kurt Roeckx
On Sun, Jan 30, 2022 at 11:23:35PM +0200, Wouter Verhelst wrote: > As of this writing, the tally sheet is still the dummy tally sheet, and it > has not been replaced with the real one. I don't see a problem. This looks like the real tally sheet:

General Resolution: Change the resolution process: results

2022-01-30 Thread Debian Project Secretary - Kurt Roeckx
Hi, The winner of the General Resolution is: Choice 1: "Amend resolution process, set maximum discussion period" The details of the results are available at: https://www.debian.org/vote/2021/vote_003 Kurt Roeckx Debian Project Secretary signature.asc Description: PGP signature

General Resolution: Change the resolution process: results

2022-01-30 Thread Debian Project Secretary - Kurt Roeckx
Hi, The winner of the General Resolution is: Choice 1: "Amend resolution process, set maximum discussion period" The details of the results are available at: https://www.debian.org/vote/2021/vote_003 Kurt Roeckx Debian Project Secretary signature.asc Description: PGP signature

General Resolution: Change the resolution process: First call for votes

2022-01-14 Thread Debian Project Secretary - Kurt Roeckx
Hi, This is the first call for votes on the general resolution about changing the resolution process. Voting period starts 2022-01-15 00:00:00 UTC Votes must be received by 2022-01-28 23:59:59 UTC The following ballot is for voting on changing the resolution process. This vote

Re: Calling for a vote on resolution process GR

2022-01-14 Thread Kurt Roeckx
On Sat, Jan 08, 2022 at 08:20:18PM -0800, Russ Allbery wrote: > Hi everyone, > > As previously discussed, and given that there has been no further > discussion, I am calling for a vote on the general resolution on the > Debian resolution process, using the ballot currently on the web site at >

Bug#1002576: dch doesn't read email settings from config file

2021-12-24 Thread Kurt Roeckx
Package: devscripts Version: 2.21.7 Running dch will give me: dch warning: neither DEBEMAIL nor EMAIL environment variable is set dch warning: building email address from username and mailname dch: Did you see those 2 warnings? Press RETURN to continue... The manual says I can put it in the

Re: OTC VOTE: Accept PR #16705 into 3.0

2021-12-08 Thread Kurt Roeckx
On Wed, Dec 08, 2021 at 09:17:05AM +0100, Tomas Mraz wrote: > On Tue, 2021-12-07 at 19:18 +0100, Kurt Roeckx wrote: > > On Tue, Dec 07, 2021 at 10:35:02AM +, Matt Caswell wrote: > > > topic: Accept PR #16705 into 3.0 subject to the normal review > > > process >

Re: OTC VOTE: Accept PR #16705 into 3.0

2021-12-07 Thread Kurt Roeckx
On Tue, Dec 07, 2021 at 10:35:02AM +, Matt Caswell wrote: > topic: Accept PR #16705 into 3.0 subject to the normal review process -1 >From what I understand, this breaks our provider API. Providers that work with 3.0.0 will not work when that PR is applied, and providers that do the same

Re: GR: Change the resolution process (corrected)

2021-12-02 Thread Kurt Roeckx
On Thu, Dec 02, 2021 at 03:50:22PM +0200, Wouter Verhelst wrote: > On Mon, Nov 29, 2021 at 06:52:59PM +0100, Kurt Roeckx wrote: > > On Mon, Nov 29, 2021 at 09:31:42AM -0800, Russ Allbery wrote: > > > Wouter Verhelst writes: > > > > > > > aaand t

Re: GR: Change the resolution process (corrected)

2021-11-30 Thread Kurt Roeckx
On Tue, Nov 23, 2021 at 09:53:50AM +0200, Wouter Verhelst wrote: > > Text of the GR > > == > > > > The Debian Developers, by way of General Resolution, amend the Debian > > constitution under point 4.1.2 as follows. This General Resolution > > requires a 3:1 majority. > > > >

Re: GR: Change the resolution process (2021-11-25 revision)

2021-11-30 Thread Kurt Roeckx
On Thu, Nov 25, 2021 at 07:25:45PM -0800, Russ Allbery wrote: > Section 6.3 > --- > > Replace 6.3.1 in its entirety with: > > 1. Resolution process. > >The Technical Committee uses the following process to prepare a >resolution for vote: > >1. Any member of

Re: GR: Change the resolution process (corrected)

2021-11-29 Thread Kurt Roeckx
On Mon, Nov 29, 2021 at 09:31:42AM -0800, Russ Allbery wrote: > Wouter Verhelst writes: > > > aaand this should've been signed. Good morning. > > > On Tue, Nov 23, 2021 at 09:50:14AM +0200, Wouter Verhelst wrote: > > >> All this changes my proposal to the below. I would appreciate if my >

Re: GR: Change the resolution process (2021-11-25 revision)

2021-11-28 Thread Kurt Roeckx
On Thu, Nov 25, 2021 at 07:25:45PM -0800, Russ Allbery wrote: > Here is an updated version of my proposal, which incorporates the formal > amendment to change the default option for TC resolutions to also be "None > of the above" and fixes two typos. I've updated the website and changed the start

Re: GR: Change the resolution process (2021-11-25 revision)

2021-11-26 Thread Kurt Roeckx
On Fri, Nov 26, 2021 at 08:19:26AM -0800, Russ Allbery wrote: > Timo Röhling writes: > > > I was under the impression that this amendment by the original > > proposer does not require re-sponsoring, and my consent is > > implicitly assumed unless I choose to object. Am I wrong? > > > (If I am,

2 factor authentication

2021-11-24 Thread Kurt Roeckx
Hi, The following vote passed with 6 in favour, 0 against, 0 abstain: topic: All committers to the main source repository must enable 2 factor authentication on GitHub Enterprise when it is moved there We plan to move all repositories from git.openssl.org to github.openssl.org which uses Github

Re: GR: Change the resolution process (corrected)

2021-11-23 Thread Kurt Roeckx
On Sat, Nov 20, 2021 at 10:04:07AM -0800, Russ Allbery wrote: > I propose the following General Resolution, which will require a 3:1 > majority, and am seeking sponsors. This is now at: https://www.debian.org/vote/2021/vote_003 I did not add any of the corrections, you did not sign them, you

Re: GR: Change the resolution process (corrected)

2021-11-22 Thread Kurt Roeckx
On Tue, Nov 23, 2021 at 12:09:54AM +0100, Mathias Behrle wrote: > > Seconded. Your message isn't signed. Kurt

Bug#999606: Acknowledgement (fetchmail: configuration requires TLS for SSH authentication)

2021-11-13 Thread Kurt Roeckx
It seems that 6.4.23 actually changed the message to: configuration requires TLS, but STARTTLS is not permitted because of authenticated state (PREAUTH). Aborting connection. If your plugin is secure, you can defeat STARTTLS with --sslproto '' (see manual). See:

Bug#999606: Acknowledgement (fetchmail: configuration requires TLS for SSH authentication)

2021-11-13 Thread Kurt Roeckx
It seems that 6.4.23 actually changed the message to: configuration requires TLS, but STARTTLS is not permitted because of authenticated state (PREAUTH). Aborting connection. If your plugin is secure, you can defeat STARTTLS with --sslproto '' (see manual). See:

Bug#999606: fetchmail: configuration requires TLS for SSH authentication

2021-11-13 Thread Kurt Roeckx
Package: fetchmail Version: 6.4.22-1 Severity: serious Hi, With version 6.4.22-1 and 6.4.23-1 I get the following error: configuration requires TLS, but STARTTLS is not permitted because of authenticated state (PREAUTH). Aborting connection. Server permitting, try --ssl instead (see manual).

Bug#999606: fetchmail: configuration requires TLS for SSH authentication

2021-11-13 Thread Kurt Roeckx
Package: fetchmail Version: 6.4.22-1 Severity: serious Hi, With version 6.4.22-1 and 6.4.23-1 I get the following error: configuration requires TLS, but STARTTLS is not permitted because of authenticated state (PREAUTH). Aborting connection. Server permitting, try --ssl instead (see manual).

Re: OTC VOTE: Accept Policy change process proposal

2021-11-09 Thread Kurt Roeckx
On Mon, Nov 01, 2021 at 11:23:15AM +0100, Tomas Mraz wrote: > topic: Accept openssl/technical-policies PR#1 - the policy change > process proposal as of commit 3bccdf6. This will become an official OTC > policy. > > comment: This will implement the formal policy change process so we can >

[web] master update

2021-10-20 Thread Kurt Roeckx
- commit 4ed858ce02d41753b78629e0b908660593f082b6 Author: Kurt Roeckx Date: Wed Oct 20 09:40:16 2021 +0200 Fix table summary title Reviewed-by: Tim Hudson GH: #268 commit 825e40e042c3eb67f7c8f865cff7f21a669f989b Author: Kurt Roeckx Date: Wed Oct 20 09:50:47 2021 +0200

[web] master update

2021-10-20 Thread Kurt Roeckx
- commit 4d8357b7e6fb544f0a618e65d98a9206a2df05f6 Author: Kurt Roeckx Date: Wed Oct 20 09:31:44 2021 +0200 Update info about FreeBSD and VMS commit 1628f0f455848c12f365c9bac03bfc30b50e2d86 Author: Kurt Roeckx Date: Wed Oct 20 09:11

Re: OTC VOTE: Accept PR#16725

2021-10-19 Thread Kurt Roeckx
On Tue, Oct 19, 2021 at 11:07:26AM +0100, Matt Caswell wrote: > topic: Accept PR#16725 as a bug fix for backport into 3.0 subject to the > normal review process +1 Kurt

Re: OTC VOTE: Accept PR#16725

2021-10-19 Thread Kurt Roeckx
On Tue, Oct 19, 2021 at 11:07:26AM +0100, Matt Caswell wrote: > topic: Accept PR#16725 as a bug fix for backport into 3.0 subject to the > normal review process So we have various people voting -1. Does someone want to explain why they vote -1? Kurt

Bug#996048: [Pkg-openssl-devel] Bug#996048: postfix-mta-sts-resolver: autopkgtest doesn't handle new version of ca-certificates nicely: rehash: warning: skipping ca-certificates.crt, it does not conta

2021-10-18 Thread Kurt Roeckx
On Mon, Oct 18, 2021 at 10:40:59PM +0200, Julien Cristau wrote: > On Mon, Oct 18, 2021 at 02:50:50PM +0200, Benjamin Hof wrote: > > Hi, > > > > I think the following change might be the relevant one: > > > > --- a/update-ca-certificates > > +++ b/update-ca-certificates > > @@ -164,8

Bug#996048: [Pkg-openssl-devel] Bug#996048: postfix-mta-sts-resolver: autopkgtest doesn't handle new version of ca-certificates nicely: rehash: warning: skipping ca-certificates.crt, it does not conta

2021-10-18 Thread Kurt Roeckx
On Mon, Oct 18, 2021 at 10:40:59PM +0200, Julien Cristau wrote: > On Mon, Oct 18, 2021 at 02:50:50PM +0200, Benjamin Hof wrote: > > Hi, > > > > I think the following change might be the relevant one: > > > > --- a/update-ca-certificates > > +++ b/update-ca-certificates > > @@ -164,8

Bug#996692: Cargo: New upstream release

2021-10-17 Thread Kurt Roeckx
Source: cargo Version: 0.47.0-3 Severity: wishlist Hi, Can you package a newer version of cargo? The current version seems to be too old for some things. Kurt

Bug#996425: hitch: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: hitch Version: 1.7.1-2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: hitch.c: In function init_dh: hitch.c:318:2: error: PEM_read_bio_DHparams is

Bug#996424: haskell-blogliterately: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: haskell-blogliterately Version: 0.8.7-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: [12 of 12] Compiling Text.BlogLiterately (

Bug#996424: haskell-blogliterately: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: haskell-blogliterately Version: 0.8.7-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: [12 of 12] Compiling Text.BlogLiterately (

Bug#996423: haproxy: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: haproxy Version: 2.2.17-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: src/ssl_sock.c: In function ‘ctx_set_TLSv13_func’:

Bug#996422: golang-github-mendersoftware-openssl: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: golang-github-mendersoftware-openssl Version: 1.1.0-2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: github.com/mendersoftware/openssl #

Bug#996421: globus-proxy-utils: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: globus-proxy-utils Version: 7.2-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: make[4]: Entering directory '/<>/test' FAIL:

Bug#996420: globus-gssapi-gsi: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
Source: globus-gssapi-gsi Version: 14.17-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: FAIL: gssapi-thread-test-wrapper

Re: [External] : Agenda for the next OTC meeting

2021-10-13 Thread Kurt Roeckx
> I would like to also discuss code coverage, and in particular adding tests > for any new code that is added. It was always my understanding that our policy was that tests need to be added. We have a checkbox in the pull request to indicate that it's been done. But maybe it's not written down

Bug#996275: [Pkg-erlang-devel] Bug#996275: coturn: FTBFS with OpenSSL 3.0

2021-10-13 Thread Kurt Roeckx
On Wed, Oct 13, 2021 at 07:43:26AM +0300, Sergei Golovan wrote: > > This is a known issue, see https://github.com/erlang/otp/issues/4577 > and I'm afraid the fix will come only with the new major Erlang 25. > It's expected to be released in May 2022. As far as I know, there are 2 issues: - The

Bug#996288: globus-gsi-openssl-error: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: globus-gsi-openssl-error Version: 4.3-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: not ok 4 - Match reference output # Failed test 'Match

Bug#996287: git-crypt: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: git-crypt Version: 0.6.0-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: crypto-openssl-10.cpp: In constructor

Bug#996286: freerdp2: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: freerdp2 Version: 2.3.0+dfsg1-2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: /<>/winpr/libwinpr/utils/ssl.c /<>/winpr/libwinpr/utils/ssl.c: In

Bug#996285: freelan: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: freelan Version: 2.2-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error:

Bug#996285: freelan: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: freelan Version: 2.2-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error:

Bug#996275: coturn: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: erlang Version: 24.0.6+dfsg-2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: pkey.c:76:14: error: implicit declaration of function FIPS_mode

Bug#996276: foxeye: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: foxeye_0.12.1-3 Version: 0.12.1-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: openssl.c:450:5: warning: implicit declaration of function

Bug#996274: erlang-p1-tls: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: erlang-p1-tls Version: 1.1.13-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: EUnit module

Bug#996273: dovecot: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: dovecot Version: 2.3.16+dfsg1-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: test_get_info_pw_encrypted

Bug#996272: crda: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: crda Version: 4.14+git20191112.9856751-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: reglib.c: In function reglib_verify_db_signature:

Bug#996272: crda: FTBFS with OpenSSL 3.0

2021-10-12 Thread Kurt Roeckx
Source: crda Version: 4.14+git20191112.9856751-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: reglib.c: In function reglib_verify_db_signature:

Bug#995660: clickhouse: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: clickhouse Version: 18.16.1+ds-7.2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: 11: + openssl dhparam -out

Bug#995659: coturn: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: coturn Version: 4.5.2-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: src/client/ns_turn_msg.c: In function stun_produce_integrity_key_str:

Bug#995657: clevis: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: clevis Version: 18-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: In file included from ../src/pins/sss/sss.c:41: ../src/pins/sss/sss.c: In

Bug#995644: lebiniou: Fails to upgrade: trying to overwrite '/usr/share/lebiniou/etc/schemes.json'

2021-10-03 Thread Kurt Roeckx
Package: lbeibiou Version: 3.61.2-1 Severity: serious Hi, During an upgrade, I get the following: dpkg: considering deconfiguration of lebiniou-data, which would be broken by installation of lebiniou ... dpkg: yes, will deconfigure lebiniou-data (broken by lebiniou) Preparing to unpack

Bug#995644: lebiniou: Fails to upgrade: trying to overwrite '/usr/share/lebiniou/etc/schemes.json'

2021-10-03 Thread Kurt Roeckx
Package: lbeibiou Version: 3.61.2-1 Severity: serious Hi, During an upgrade, I get the following: dpkg: considering deconfiguration of lebiniou-data, which would be broken by installation of lebiniou ... dpkg: yes, will deconfigure lebiniou-data (broken by lebiniou) Preparing to unpack

Bug#995643: cjose: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: cjose Version: 0.6.1+dfsg1-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: jwk.c: In function _cjose_jwk_rsa_get: jwk.c:58:5: error: RSA_get0_key

Bug#995642: cfengine3: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: cfengine3 Version: 3.15.2-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: In file included from hash.c:33: ./hash.h:64:28: error: unknown type

Bug#995641: certmonger: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: certmonger Version: 0.79.13-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: ../../src/util-o.c: In function util_EVP_PKEY_id:

Bug#995640: boxbackup: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: boxbackup Version: 0.13~~git20200326.g8e8b63c-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: NOTICE: Running test bbackupd in debug mode...

Bug#995640: boxbackup: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: boxbackup Version: 0.13~~git20200326.g8e8b63c-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: NOTICE: Running test bbackupd in debug mode...

Bug#995639: botan: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: botan Version: 2.18.1+dfsg-3 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: Thread_Pool ran 100 tests all ok tls: 3DES ECDH ran 2 tests 2 FAILED

Bug#995637: boinc: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: boinc Version: 7.16.17+dfsg-2 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with the following error: In file included from /usr/include/openssl/x509.h:29,

Bug#995636: transition: openssl

2021-10-03 Thread Kurt Roeckx
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Hi, We would like to transition to OpenSSL 3.0.0. It's currently in experimental. It has an soname change, so the binary packages got renamed and binNMUs will be required. We did a

Bug#995636: transition: openssl

2021-10-03 Thread Kurt Roeckx
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Hi, We would like to transition to OpenSSL 3.0.0. It's currently in experimental. It has an soname change, so the binary packages got renamed and binNMUs will be required. We did a

Bug#995635: azure-uamqp-python: FTBFS with OpenSSL 3.0

2021-10-03 Thread Kurt Roeckx
Source: azure-uamqp-python Version: 1.4.1-1 Severity: important Tags: bookworm sid User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Hi, Your package is failing to build using OpenSSL 3.0 with errors like:

Bug#995634: autobahn-cpp: FTBFS with OpenSSL 3.0: Uses -Werror and deprecated functions

2021-10-03 Thread Kurt Roeckx
Source: autobahn-cpp Version: 17.5.1+git7cc5d37-2.1 Severity: important User: pkg-openssl-de...@lists.alioth.debian.org Usertags: ftbfs-3.0 Your package is building using -Werror and is using functions that have been deprecated in OpenSSL 3.0. The log contains errors like: In file included from

Re: Draft proposal for resolution process changes

2021-10-02 Thread Kurt Roeckx
On Mon, Sep 27, 2021 at 06:51:05PM -0700, Russ Allbery wrote: > Hello everyone, > > Below is an initial proposal for a revision to the GR and Technical > Committee processes, offered to start a project discussion. You've made various changes to your draft since. Can you send an updated draft?

Re: Blog post about FIPS submission

2021-09-23 Thread Kurt Roeckx
On Thu, Sep 23, 2021 at 09:42:01PM +0200, Dmitry Belyavsky wrote: > Hello Matt, > > The link > https://csrc.nist.gov/projects/cryptographic-module-validation-program/modules-in-processmodules-in-process-list > (You can see the official listing for the submission *here*) seems to be > not working

Re: OTC vote: include Keccak digests in OpenSSL

2021-09-21 Thread Kurt Roeckx
On Tue, Sep 21, 2021 at 06:37:42PM +0200, Tomas Mraz wrote: > On Tue, 2021-09-21 at 18:32 +0200, Kurt Roeckx wrote: > > On Tue, Sep 21, 2021 at 07:14:51PM +1000, Dr Paul Dale wrote: > > > Accept PR#16594 into master subject to the normal review process > > > > >

Re: OTC VOTE: Increase the default security level from 1 to 2

2021-09-21 Thread Kurt Roeckx
On Tue, Sep 21, 2021 at 11:08:40AM +0100, Matt Caswell wrote: > topic: Increase the default security level from 1 to 2 in master +1 Kurt

Re: OTC vote: include Keccak digests in OpenSSL

2021-09-21 Thread Kurt Roeckx
On Tue, Sep 21, 2021 at 07:14:51PM +1000, Dr Paul Dale wrote: > Accept PR#16594 into master subject to the normal review process > > > > This doesn't meet the "is a standard" requirement but it is in use and we > have the implementation.  It just isn't exposed. Can you describe where it is in

Re: OTC VOTE: Restart merging of non-breaking small features

2021-09-15 Thread Kurt Roeckx
On Tue, Sep 14, 2021 at 11:13:13AM +0100, Matt Caswell wrote: > topic: Allow the restart of merging of non-breaking small features to the > master >branch +1 Kurt

Re: OTC quick votes [WAS: RE: OTC vote PR #16171: config_diagnostic]

2021-08-29 Thread Kurt Roeckx
can make a > decision - but that would be accepting one PR over another PR. We have had > "competing" PRs regularly - and we then vote on the alternatives - where it > is clear what the alternatives are. A single PR vote is about that PR. > On Wed, Aug 4, 2021 at 8:07 AM Kurt Roeckx

Re: OTC VOTE: Accept PR#16286 into 3.0 subject to the normal review process

2021-08-29 Thread Kurt Roeckx
On Tue, Aug 17, 2021 at 02:19:08PM +0100, Matt Caswell wrote: > topic: Accept PR#16286 into 3.0 subject to the normal review process -1 Do we need some general policy for such changes after the 3.0 release? Kurt

Re: OTC VOTE: Revert the commits merged from PR #16027 in 1.1.1

2021-08-11 Thread Kurt Roeckx
On Wed, Aug 11, 2021 at 09:53:14PM +0300, Nicola Tuveri wrote: > On the other hand, 1.1.1 is not in its last year of support so it is not > limited to security fixes only. > > The commits which this vote proposes to revert fixed a bug that produced > invalid output from functions with a clear

Re: OTC VOTE: Revert the commits merged from PR #16027 in 1.1.1

2021-08-11 Thread Kurt Roeckx
On Tue, Aug 10, 2021 at 11:53:23AM +0100, Matt Caswell wrote: > topic: Revert the commits merged from PR #16027 in 1.1.1 +1 Kurt

Re: OTC quick votes [WAS: RE: OTC vote PR #16171: config_diagnostic]

2021-08-03 Thread Kurt Roeckx
On Wed, Aug 04, 2021 at 07:21:57AM +1000, Tim Hudson wrote: > > This isn't about the OTC meeting itself - this is about the details of the > topic actually being captured within the PR. > You need to actually look at the PR to form a view. And we do add to the > PRs during the discussion if

Re: OTC VOTE: Approve the release of 3.0 beta 2

2021-07-27 Thread Kurt Roeckx
On Tue, Jul 27, 2021 at 10:11:53AM +0100, Matt Caswell wrote: > topic: OTC approve the release of 3.0 beta2 on Thursday 29th July +1 Kurt

Re: OTC VOTE: Accept PR 16050 in 3.0

2021-07-27 Thread Kurt Roeckx
On Tue, Jul 27, 2021 at 10:10:27AM +0100, Matt Caswell wrote: > topic: Accept PR 16050 in 3.0 subject to our normal review process > Proposed by Tim Hudson > Public: yes > opened: 2021-07-20 > closed: 2021-07-27 > accepted: no (for: 1, against: 3, abstained: 4, not voted: 1) I don't find a call

Re: OTC VOTE: Accept PR 16128

2021-07-27 Thread Kurt Roeckx
On Thu, Jul 22, 2021 at 01:51:27PM +0100, Matt Caswell wrote: > topic: Accept PR 16128 in 3.0 subject to our normal review process +1 Kurt

Re: OTC Vote: Accept PR #16118

2021-07-27 Thread Kurt Roeckx
On Tue, Jul 20, 2021 at 11:18:27AM +0100, Matt Caswell wrote: > topic: We should accept PR #16118 into 3.0 when completed and subject to the >normal review process This already seems to be merged, so I'll vote 0. Kurt

Re: OTC VOTE: Fix issue #16088

2021-07-27 Thread Kurt Roeckx
> topic: We should fix the issue described in #16088 for 3.0 After reading #16088, I have no idea what this vote means, so I will vote -1. Please stop referring to a github issue or pull request as vote text and actually describe what we're voting on. Since this describes a regression against

Re: OTC VOTE: Allow the addition of EVP_PKEY_get0_provider() and EVP_PKEY_CTX_get0_provider()

2021-07-13 Thread Kurt Roeckx
On Tue, Jul 13, 2021 at 11:24:55AM +0100, Matt Caswell wrote: > topic: Allow the addition of EVP_PKEY_get0_provider() and >EVP_PKEY_CTX_get0_provider() calls in 3.0 -1 Kurt

Re: OTC VOTE: Remove ERR_GET_FUNC in 3.0

2021-07-07 Thread Kurt Roeckx
On Tue, Jul 06, 2021 at 10:26:13AM +0100, Matt Caswell wrote: > topic: Remove ERR_GET_FUNC in 3.0 > Proposed by Nicola Tuveri > Public: yes > opened: 2021-07-06 > closed: 2021-07-06 > accepted: yes (for: 6, against: 1, abstained: 0, not voted: 2) There seem to be no good solutions here, so I'm

Re: Interleaved Mode (Was: Re: Using Go for NTPsec)

2021-07-06 Thread Kurt Roeckx via devel
On Tue, Jul 06, 2021 at 12:18:26PM -0500, Richard Laager via devel wrote: > On 7/5/21 8:38 AM, Eric S. Raymond via devel wrote: > > > There is a close-to-RFC to handle this area. "Interleave" is the > > > buzzword. I > > > haven't studied it. The idea is to grab a transmit time stamp, then >

Re: OTC VOTE: Accept PR #15763

2021-06-30 Thread Kurt Roeckx
On Tue, Jun 29, 2021 at 10:50:36AM +0100, Matt Caswell wrote: > topic: Accept PR #15763 for 1.1.1 subject to the normal review process +1 Kurt

Bug#990369: cfengine3: FTBFS with OpenSSL 3.0

2021-06-27 Thread Kurt Roeckx
Package: cfengine3 Version: 3.15.2-3 Hi, cfengine3 fails to build with OpenSSL 3.0 beta 1 with the following error: In file included from hash.c:33: ./hash.h:64:28: error: unknown type name RSA 64 | Hash *HashNewFromKey(const RSA *rsa, HashMethod method); |

Bug#990364: certmonger: FTBFS with OpenSSL 3.0

2021-06-27 Thread Kurt Roeckx
Package: certmonger Version: 0.79.13-3 Hi, Your package is failing to build with OpenSSL 3.0 beta 1. The problem is that EVP_PKEY_base_id has been renamed to EVP_PKEY_get_base_id. There is a define to rename it: /usr/include/openssl/evp.h:# define EVP_PKEY_base_id EVP_PKEY_get_base_id But your

Bug#990363: caml-crush: FTBFS with OpenSSL 3.0

2021-06-27 Thread Kurt Roeckx
Package: caml-crush Version: 1.0.10-4 Hi, Your package is failing to build against OpenSSL 3.0 beta 1. The log file show: configure:6589: checking for SSL_get_peer_certificate in -lssl configure:6614: gcc -o conftest -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat

Bug#990228: [Pkg-openssl-devel] Bug#990228: Bug#990228: Bug#990228: Bug#990228: openssl: breaks ssl-cert installation: 8022CB35777F0000:error:1200007A:random number generator:RAND_write_file:Not a reg

2021-06-25 Thread Kurt Roeckx
reassign 990228 ssl-cert severity 990228 normal thanks So I think there is no bug in OpenSSL and the additional check being done in 3.0 makes sense. So I'm reassigning this to ssl-cert. Kurt

<    1   2   3   4   5   6   7   8   9   10   >