Your message dated Sun, 15 Jun 2008 10:47:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#483500: fixed in openvpn 2.1~rc7-4
has caused the Debian Bug report #483500,
regarding OpenVPN using openssl-vulnkey instead of openvpn-vulnkey ?
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
483500: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483500
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openvpn
Version: 2.1~rc7-2
Severity: important
NB: this is discussed in Ubuntu bug #230197
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/230197
When upgrading from 2.1~rc7-1 to 2.1~rc7-2, I noticed a change in the
way OpenVPN was handling my private key. Instead of asking once for
passphrase, it was asking it four times !
2.7~rc7-1
~$ sudo openvpn --config /etc/openvpn/myconfig
[...]
Thu May 29 05:14:08 2008 us=971390 OpenVPN 2.1_rc7 i486-pc-linux-gnu
[SSL] [LZO2] [EPOLL] built on Apr 7 2008
Enter Private Key Password:
[...]
2.7~rc7-2
~$ sudo openvpn --config /etc/openvpn/myconfig
[...]
Thu May 29 05:19:08 2008 us=535971 OpenVPN 2.1_rc7 i486-pc-linux-gnu
[SSL] [LZO2] [EPOLL] built on May 18 2008
Thu May 29 05:12:08 2008 us=536149 /usr/sbin/openssl-vulnkey -q
/etc/openvpn/cert.key
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter Private Key Password:
[...]
Basically, we can see OpenVPN is invoking openssl-vulnkey which actually
requires checking the private key three times, asking for passphrase
each time:
~$ sudo openssl-vulnkey /etc/openvpn/cert.key
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Enter pass phrase for /etc/openvpn/cert.key:
Not blacklisted: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx /etc/openvpn/cert.key
If you use openvpn-vulnkey, no passphrase is asked:
~$ sudo openvpn-vulnkey /etc/openvpn/cert.key
Not blacklisted: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx /etc/openvpn/cert.key
In addition to obvious usability impact, having to enter four times
your private key passphrase, openssl-vulnkey will ask for passphrase
again on reconnect, making openvpn unable to reconnect by itself when
persist options are set.
As we have a openvpn-blacklist package, should OpenVPN use
openvpn-vulnkey instead of openssl-vulnkey ? As a matter of fact,
I could not find any call to openvpn-vulnkey when launching OpenVPN.
This bug is related to bugs #482498 (network-manager-openvpn:
openssl-vulnkey passphrase dialog hangs) and #483020 (openssl-vulnkey
hangs on connecting), having network-manager-openvpn not being able to
launch connections anymore:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482498
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483020
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.25 (SMP w/2 CPU cores; PREEMPT)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
Versions of packages openvpn depends on:
ii debconf [debconf-2.0] 1.5.22 Debian configuration management sy
ii libc6 2.7-11 GNU C Library: Shared libraries
ii liblzo2-2 2.03-1 data compression library
ii libpam0g 0.99.7.1-6 Pluggable Authentication Modules l
ii libssl0.9.8 0.9.8g-10 SSL shared libraries
ii openssl-blacklist 0.3 list of blacklisted OpenSSL RSA ke
ii openvpn-blacklist 0.3 list of blacklisted OpenVPN RSA sh
openvpn recommends no packages.
-- debconf information:
* openvpn/vulnerable_prng:
openvpn/change_init: false
openvpn/stop2upgrade: false
openvpn/default_port:
openvpn/change_init2: true
openvpn/create_tun: false
--- End Message ---
--- Begin Message ---
Source: openvpn
Source-Version: 2.1~rc7-4
We believe that the bug you reported is fixed in the latest version of
openvpn, which is due to be installed in the Debian FTP archive:
openvpn_2.1~rc7-4.diff.gz
to pool/main/o/openvpn/openvpn_2.1~rc7-4.diff.gz
openvpn_2.1~rc7-4.dsc
to pool/main/o/openvpn/openvpn_2.1~rc7-4.dsc
openvpn_2.1~rc7-4_i386.deb
to pool/main/o/openvpn/openvpn_2.1~rc7-4_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> (supplier of updated openvpn
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 14 Jun 2008 19:00:40 +0200
Source: openvpn
Binary: openvpn
Architecture: source i386
Version: 2.1~rc7-4
Distribution: unstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Changed-By: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Description:
openvpn - virtual private network daemon
Closes: 483020 483500 484007 484110 484111 484113 486129
Changes:
openvpn (2.1~rc7-4) unstable; urgency=low
.
* The 'Miriam helped me move to quilt' release
* Moved all the patches to debian/patches
* debian/control: Added Build-Dep on quilt
* Applied patch by Jamie Strandboge to fix openssl-vulnkey
extra passphrase prompts. Thanks Jamie.
(Closes: #483020, #483500, #486129)
* Updated Portuguese debconf templates. (Closes: #484007)
.
[ Martin Pitt ]
* Added note on Out Of Memory issues. (Closes: #484113)
* Avoid asking about the tun device creation if using udev.
(Closes: #484111)
* Reworked init.d script to use LSB functions. (Closes: #484110)
Checksums-Sha1:
9958a1c97a840fbb51d59ba9e0d3bec2eac15614 1024 openvpn_2.1~rc7-4.dsc
62a05c222406409cd464b856031a8ea36f7e87d5 80688 openvpn_2.1~rc7-4.diff.gz
b51f2836e95c873836ac68b8fa0634113677a9e1 374808 openvpn_2.1~rc7-4_i386.deb
Checksums-Sha256:
dd3e50484ae7fc444ca8f0a78d0a03c9017b701e4a20d99ce15063d2a60a7221 1024
openvpn_2.1~rc7-4.dsc
1205af287ebece23ed649c127d8eb4386f1ade51c0556485c3ca221f2c8bf9ea 80688
openvpn_2.1~rc7-4.diff.gz
e8974590b28fb1ce09446581cbaaccc5314eabbb86f897e308f4472c6ab31ba2 374808
openvpn_2.1~rc7-4_i386.deb
Files:
7ca61c1236717498cabceeb4e79e797b 1024 net optional openvpn_2.1~rc7-4.dsc
20656aae15e39c26889ef26901af8bfb 80688 net optional openvpn_2.1~rc7-4.diff.gz
868a6bc7027c3e492039c6cead412dde 374808 net optional openvpn_2.1~rc7-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIVPFvxRSvjkukAcMRAjIhAJ0XB6MTRlVxR05uJyXfbDamDzydrACg87Ff
Tg3RvkJ4TkDqAAmFso1lMuc=
=i1et
-----END PGP SIGNATURE-----
--- End Message ---