Your message dated Thu, 12 Aug 2010 15:23:13 +0200
with message-id <[email protected]>
and subject line Bug#357709: fixed in openswan 1:2.6.27+dfsg-1
has caused the Debian Bug report #357709,
regarding openswan: "ipsec showhostkey" doesn't understand X.509 certs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
357709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357709
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openswan
Version: 1:2.4.4-1
Severity: normal

When X.509 certificates are used, as postinstall recommends, "ipsec
showhostkey" and therefore "ipsec verify" produce the error:

    ipsec showhostkey: no default key in "/etc/ipsec.secrets"

This was bug #257283 against freeswan.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (400, 'experimental'), (50, 'unstable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-powerpc
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages openswan depends on:
ii  bind9-host [h 1:9.3.2-2                  Version of 'host' bundled with BIN
ii  bsdmainutils  6.1.3                      collection of more utilities from 
ii  debconf [debc 1.4.71                     Debian configuration management sy
ii  debianutils   2.15.3                     Miscellaneous utilities specific t
ii  iproute       20051007-3                 Professional tools to control the 
ii  ipsec-tools   1:0.6.5-1                  IPsec tools for Linux
ii  libc6         2.3.5-13                   GNU C Library: Shared libraries an
ii  libcomerr2    1.38+1.39-WIP-2005.12.31-1 common error description library
ii  libcurl3      7.15.1-1                   Multi-protocol file transfer libra
ii  libgmp3c2     4.1.4-11                   Multiprecision arithmetic library
ii  libldap2      2.1.30-13                  OpenLDAP libraries
ii  libpam0g      0.79-3.1                   Pluggable Authentication Modules l
ii  libssl0.9.8   0.9.8a-7                   SSL shared libraries
ii  makedev       2.3.1-80                   creates device files in /dev
ii  openssl       0.9.8a-7                   Secure Socket Layer (SSL) binary a

openswan recommends no packages.

-- debconf information excluded


--- End Message ---
--- Begin Message ---
ource: openswan
Source-Version: 1:2.6.27+dfsg-1

We believe that the bug you reported is fixed in 1:2.6.27+dfsg-1 version of
openswan:

Changes: 
 openswan  (1:2.6.27+dfsg-1) unstable; urgency=low

   * UNRELEASED
 
   [Harald Jenny]
   * New upstream release.
     Closes: #357709: openswan: "ipsec showhostkey" doesn't understand X.509
                      certs
   * Disabled most patches for now and modified the rest due to manpage
     corrections from upstream.
   * Modified lintian override for long but unsplittable manpage line.
   * For security reasons change permission on /var/lib/openswan and
     /var/lib/openswan/ipsec.secrets.inc.
   * Removed old unused code from installation scripts.
   * Removed old unused changelog.
   * Limit the architectures where openswan's userspace and kernel binaries
     are available to linux-any.
   * Bump Standards to 3.9.0 (no changes needed).
   * Include SAref patches in openswan-modules-source (2.6.32 from tar.gz,
     2.6.34 from git).
   * Made the dependency of the debug package on openswan versioned.
   * Fixed rules file of binary openswan-modules package to use dh_prep.
   * Incorporate translation updates.
     Closes: #590109: openswan [INTL:de] updated German debconf translation
   * Bump Standards to 3.9.1 (no changes needed).
   * Added Replaces line for ike-server.


--- End Message ---

Reply via email to