Your message dated Mon, 18 Mar 2013 21:03:52 +0000
with message-id <[email protected]>
and subject line Bug#678353: fixed in openssl 1.0.1e-2
has caused the Debian Bug report #678353,
regarding openssl: SSL3_GET_RECORD:decryption failed or bad record 
mac:s3_pkt.c:480
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
678353: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678353
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssl
Version: 1.0.1c-3
Severity: normal

Originally I was trying to do this:

  $ python
  >>> import urllib2
  >>> 
urllib2.urlopen("https://myrta.com/regcheck/pages/content/enterVehicleDetails.jsf";)
  Traceback (most recent call last):
    File "<stdin>", line 1, in <module>
    File "/usr/lib/python2.7/urllib2.py", line 126, in urlopen
      return _opener.open(url, data, timeout)
    File "/usr/lib/python2.7/urllib2.py", line 400, in open
      response = self._open(req, data)
    File "/usr/lib/python2.7/urllib2.py", line 418, in _open
      '_open', req)
    File "/usr/lib/python2.7/urllib2.py", line 378, in _call_chain
      result = func(*args)
    File "/usr/lib/python2.7/urllib2.py", line 1215, in https_open
      return self.do_open(httplib.HTTPSConnection, req)
    File "/usr/lib/python2.7/urllib2.py", line 1177, in do_open
      raise URLError(err)
  urllib2.URLError: <urlopen error [Errno 1] _ssl.c:504: error:1408F119:SSL 
routines:SSL3_GET_RECORD:decryption failed or bad record mac>

Tracing it back, I see python2.7 uses
/usr/lib/x86_64-linux-gnu/libssl.so.1.0.0, so I tred this which
fails with the same error:

  $ openssl s_client -connect myrta.com:443
  CONNECTED(00000003)
  depth=3 C = ZA, ST = Western Cape, L = Cape Town, O = Thawte Consulting cc, 
OU = Certification Services Division, CN = Thawte Premium Server CA,
  emailAddress = [email protected]
  verify error:num=19:self signed certificate in certificate chain
  verify return:0
  140092995372712:error:1408F119:SSL routines:SSL3_GET_RECORD:decryption failed 
or bad record mac:s3_pkt.c:480:
  ---
  Certificate chain
  0 s:/C=AU/ST=New South Wales/L=Sydney/O=Roads & Traffic Authority of New 
South Wales/OU=RTA/CN=myrta.com
    i:/C=US/O=Thawte, Inc./CN=Thawte SSL CA
  1 s:/C=US/O=Thawte, Inc./CN=Thawte SSL CA
    i:/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 
thawte, Inc. - For authorized use only/CN=thawte Primary Root CA
  2 s:/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 
thawte, Inc. - For authorized use only/CN=thawte Primary Root CA
    i:/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification 
Services Division/CN=Thawte Premium Server 
CA/[email protected]
  3 s:/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification 
Services Division/CN=Thawte Premium Server 
CA/[email protected]
    i:/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification 
Services Division/CN=Thawte Premium Server 
CA/[email protected]
  ---
  Server certificate
  -----BEGIN CERTIFICATE-----
  MIIDdTCCAl2gAwIBAgIQLHaSJK5b0C6VDcLigNgAdTANBgkqhkiG9w0BAQUFADA8
  MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMVGhhd3RlLCBJbmMuMRYwFAYDVQQDEw1U
  aGF3dGUgU1NMIENBMB4XDTEwMDcwNTAwMDAwMFoXDTEzMDcwNDIzNTk1OVowgZEx
  CzAJBgNVBAYTAkFVMRgwFgYDVQQIEw9OZXcgU291dGggV2FsZXMxDzANBgNVBAcU
  BlN5ZG5leTE1MDMGA1UEChQsUm9hZHMgJiBUcmFmZmljIEF1dGhvcml0eSBvZiBO
  ZXcgU291dGggV2FsZXMxDDAKBgNVBAsUA1JUQTESMBAGA1UEAxQJbXlydGEuY29t
  MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC3n1XjueInNUMpCmkeFi3cJz0Q
  qown8uMZk1sH1ServbrmTXawz/lzSTJeeevG2UuhsNtZPRyEHXgCE5Nc1M+zIIZC
  XR2UhwpdTv7KCICM7oBZf5Vuvq9mcpr/2TeW1P2yQgJmWN5C313g355djW3Q2+f2
  25ez1/VoJR16un+hVwIDAQABo4GgMIGdMAwGA1UdEwEB/wQCMAAwOgYDVR0fBDMw
  MTAvoC2gK4YpaHR0cDovL3N2ci1vdi1jcmwudGhhd3RlLmNvbS9UaGF3dGVPVi5j
  cmwwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDIGCCsGAQUFBwEBBCYw
  JDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AudGhhd3RlLmNvbTANBgkqhkiG9w0B
  AQUFAAOCAQEAOMW00EDDrP9gq1vDH1S9m0YgkVrorKCXd6/p7rE50L8MCrBC1vGc
  kh5AmymCeq6adjpM6LT4CRQvk8DagN+T0eRMH2IXaYmUjCX8DAedJ13cDd9Qrkvt
  KPTOyRMWHxjYdnQPNY0BmSCDgemO7BrBKzaHHEDE2AmBDli3/uk4ywFLBN/SNIEq
  WWvgjvfo5a4UWEi8iExFy4Crnli5Bz7IIWE+kK2VMjeFn1njfm9JSkKNr0Sz2l64
  N3W+D3s2Q8sKM1+GeCmzsB3O71Udp6iprQFYI9SrOVjljRniiWJKuQueuUevOtD4
  Ek7KUxBltihRh78oY72+06i6bpD01SrKQQ==
  -----END CERTIFICATE-----
  subject=/C=AU/ST=New South Wales/L=Sydney/O=Roads & Traffic Authority of New 
South Wales/OU=RTA/CN=myrta.com
  issuer=/C=US/O=Thawte, Inc./CN=Thawte SSL CA
  ---
  No client certificate CA names sent
  ---
  SSL handshake has read 4064 bytes and written 205 bytes
  ---
  New, TLSv1/SSLv3, Cipher is RC4-MD5
  Server public key is 1024 bit
  Secure Renegotiation IS NOT supported
  Compression: NONE
  Expansion: NONE
  SSL-Session:
      Protocol  : TLSv1
      Cipher    : RC4-MD5
      Session-ID: 
000039B7D44355DBF50A59F8A4F5049402D0B048585858584FE2863E000009E7
      Session-ID-ctx: 
      Master-Key: 
4C860E68617462AB0D15E06B1637A46640A2C3D61F802ECC714191A897DDCF46C6DB37F9089E623C9181FD246BE8455E
      Key-Arg   : None
      PSK identity: None
      PSK identity hint: None
      SRP username: None
      Start Time: 1340245567
      Timeout   : 300 (sec)
      Verify return code: 19 (self signed certificate in certificate chain)
  ---
  $ 

Iceweasel on the same box has no trouble with the URL given to
python.  On a squeeze amd64 box on the same LAN, executing the
above statements doesn't return any errors.

This has only happened with myrta.com.  https://www.google.com/ for
example works.

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssl depends on:
ii  libc6        2.13-33
ii  libssl1.0.0  1.0.1c-3
ii  zlib1g       1:1.2.7.dfsg-11+b1

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20120212

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.0.1e-2

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <[email protected]> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 18 Mar 2013 20:37:11 +0100
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl-dev libssl-doc 
libssl1.0.0-dbg
Architecture: source all amd64
Version: 1.0.1e-2
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Kurt Roeckx <[email protected]>
Description: 
 libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl-doc - SSL development documentation documentation
 libssl1.0.0 - SSL shared libraries
 libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 678353 699692 701826 701868 702635 703031
Changes: 
 openssl (1.0.1e-2) unstable; urgency=high
 .
   * Bump shlibs.  It's needed for the udeb.
   * Make cpuid work on cpu's that don't set ecx (Closes: #699692)
   * Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, 
#678353)
   * Fix problem with DTLS version check (Closes: #701826)
   * Fix segfault in SSL_get_certificate (Closes: #703031)
Checksums-Sha1: 
 db5b2f5254177fd10516418f5aded10e41238584 2200 openssl_1.0.1e-2.dsc
 79aab42004fe748d787f350b696c97052d9844aa 92251 openssl_1.0.1e-2.debian.tar.gz
 a7db079df4c769b67dbd5596a0e12adaf297c828 1200002 libssl-doc_1.0.1e-2_all.deb
 c3e6d0bdf6164e3e518c9af7e6ff08561773b5f9 699076 openssl_1.0.1e-2_amd64.deb
 82a3e215f953998c48e203627141ec62af447aac 1218956 libssl1.0.0_1.0.1e-2_amd64.deb
 6509fcf58f0f98eecb6972e39d7e44bb66da1cd6 605098 
libcrypto1.0.0-udeb_1.0.1e-2_amd64.udeb
 01def5b417c11f3ce6e164a9063c1c5cbf8bc2a8 1705096 libssl-dev_1.0.1e-2_amd64.deb
 b069075875842f52f3cab26635201400c474ae86 3015378 
libssl1.0.0-dbg_1.0.1e-2_amd64.deb
Checksums-Sha256: 
 86aa7e7bc7d048d2ebb98fcbbdb01d06a05f457c9c68a562cbe4b144656d6cae 2200 
openssl_1.0.1e-2.dsc
 878e82daa896ef1db74f6cc6b6c4ce29d34b0add8f92fae91f84e533920c3b08 92251 
openssl_1.0.1e-2.debian.tar.gz
 45c9c36d33a147fd35ebef984f7f3401bfd7b83531844f30e4c90fb29fb93bf5 1200002 
libssl-doc_1.0.1e-2_all.deb
 13628ca20e97451494ac1132c0ba7ec6f3f9b56071b38df429eaaa5f37afe2c1 699076 
openssl_1.0.1e-2_amd64.deb
 972b929a114764c8da4adceac6151004ad3a69eb55316c688fa5b3e53b2dd626 1218956 
libssl1.0.0_1.0.1e-2_amd64.deb
 e1953379849a16ef11d7487133dd19098f04b1fc4f775f6210d2544a8b9c6f65 605098 
libcrypto1.0.0-udeb_1.0.1e-2_amd64.udeb
 6b05d5c3ae00b8e9c0cab78e5f4961d90e5359e6354a15e1ac91472bcf05d973 1705096 
libssl-dev_1.0.1e-2_amd64.deb
 a72311458460461937ed9264a839612183f35c44b8575e7324d34396b4ca2e54 3015378 
libssl1.0.0-dbg_1.0.1e-2_amd64.deb
Files: 
 197d7f46f2024a53c945c0dab1965e07 2200 utils optional openssl_1.0.1e-2.dsc
 efa47a7fb3d60798ac95d58776a3f0c7 92251 utils optional 
openssl_1.0.1e-2.debian.tar.gz
 7e8bec78d61c659eaba9480bfffe69b9 1200002 doc optional 
libssl-doc_1.0.1e-2_all.deb
 02e83e4a9c6284db8f5eee963ccf8a6b 699076 utils optional 
openssl_1.0.1e-2_amd64.deb
 4f16d78441d83f9da09be71f0eca09fa 1218956 libs important 
libssl1.0.0_1.0.1e-2_amd64.deb
 6864b5ac478d12fa3e9f9b1484c833bf 605098 debian-installer optional 
libcrypto1.0.0-udeb_1.0.1e-2_amd64.udeb
 082832d40ca3c858e0b668f54ecf9098 1705096 libdevel optional 
libssl-dev_1.0.1e-2_amd64.deb
 d43f4f7c37524a4165965e8407c720d2 3015378 debug extra 
libssl1.0.0-dbg_1.0.1e-2_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=3a9s
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to