Your message dated Wed, 24 Aug 2016 06:09:11 +0000
with message-id <[email protected]>
and subject line Re: Bug#690255: mutt: smime_keys fails to add certificates if 
they are self-signed
has caused the Debian Bug report #690255,
regarding mutt: smime_keys fails to add certificates if they are self-signed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
690255: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690255
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: mutt
Version: 1.5.20-9+squeeze2
Severity: normal


A self-signed certificate does not require a root certificate.
However, the perl script smime_keys falls over if a self-signed cert
is supplied.  The error is:

  Couldn't identify root certificate!
  No root and no intermediate certificates. Can't continue. at 
/usr/bin/smime_keys line 708.

Below are the steps to reproduce the error (effectively simulating the
creation of SSL certificates for internal use within an organization):

  $ smime_keys init
  $ openssl genrsa -out my.key 2048
  $ openssl req -new -key my.key -out my_request.csr
  $ openssl x509 -req -days 3650 -in my_request.csr -signkey my.key -out my.crt
  $ openssl pkcs12 -keypbe  PBE-SHA1-3DES\
                   -certpbe PBE-SHA1-3DES\
                   -export\
                   -in      my.crt\
                   -inkey   my.key\
                   -out     my_pkcs12.pfx\
                   -name    "Me"
  $ smime_keys add_p12 my_pkcs12.pfx
      ...
      Verifying - Enter PEM pass phrase:
      Couldn't identify root certificate!
      No root and no intermediate certificates. Can't continue. at 
/usr/bin/smime_keys line 708.


-- Package-specific info:
Mutt 1.5.20 (2009-06-14)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.

System: Linux 2.6.32-5-amd64 (x86_64)
ncurses: ncurses 5.7.20100313 (compiled with 5.7)
libidn: 1.15 (compiled with 1.15)
hcache backend: tokyocabinet 1.4.37
Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL  +USE_SETGID  +USE_DOTLOCK  +DL_STANDALONE  +USE_FCNTL  -USE_FLOCK   
+USE_POP  +USE_IMAP  +USE_SMTP  
-USE_SSL_OPENSSL  +USE_SSL_GNUTLS  +USE_SASL  +USE_GSS  +HAVE_GETADDRINFO  
+HAVE_REGCOMP  -USE_GNU_REGEX  
+HAVE_COLOR  +HAVE_START_COLOR  +HAVE_TYPEAHEAD  +HAVE_BKGDSET  
+HAVE_CURS_SET  +HAVE_META  +HAVE_RESIZETERM  
+CRYPT_BACKEND_CLASSIC_PGP  +CRYPT_BACKEND_CLASSIC_SMIME  +CRYPT_BACKEND_GPGME  
-EXACT_ADDRESS  -SUN_ATTACHMENT  
+ENABLE_NLS  -LOCALES_HACK  +COMPRESSED  +HAVE_WC_FUNCS  +HAVE_LANGINFO_CODESET 
 +HAVE_LANGINFO_YESEXPR  
+HAVE_ICONV  -ICONV_NONTRANS  +HAVE_LIBIDN  +HAVE_GETSID  +USE_HCACHE  
-ISPELL
SENDMAIL="/usr/sbin/sendmail"
MAILPATH="/var/mail"
PKGDATADIR="/usr/share/mutt"
SYSCONFDIR="/etc"
EXECSHELL="/bin/sh"
MIXMASTER="mixmaster"
To contact the developers, please mail to <[email protected]>.
To report a bug, please visit http://bugs.mutt.org/.

misc/am-maintainer-mode
misc/hg.pmdef.debugtime
debian-specific/build_doc_adjustments.diff
features/ifdef
features/xtitles
features/trash-folder
features/purge-message
features/sensible_browser_position
features-old/patch-1.5.4.vk.pgp_verbose_mime
features/compressed-folders
features/compressed-folders.debian
debian-specific/Muttrc
debian-specific/Md.etc_mailname_gethostbyname.diff
debian-specific/use_usr_bin_editor.diff
debian-specific/correct_docdir_in_man_page.diff
debian-specific/dont_document_not_present_features.diff
debian-specific/document_debian_defaults
debian-specific/assumed_charset-compat
debian-specific/467432-write_bcc.patch
misc/define-pgp_getkeys_command.diff
misc/gpg.rc-paths
misc/smime.rc
upstream/533209-mutt_perror.patch
upstream/533459-unmailboxes.patch
upstream/533439-mbox-time.patch
upstream/531430-imapuser.patch
upstream/534543-imap-port.patch
upstream/538128-mh-folder-access.patch
upstream/537818-emptycharset.patch
upstream/535096-pop-port.patch
upstream/542910-search-segfault.patch
upstream/533370-pgp-inline.patch
upstream/533520-signature-highlight.patch
upstream/393926-internal-viewer.patch
upstream/543467-thread-segfault.patch
upstream/544180-italian-yesorno.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/544794-smtp-batch.patch
upstream/537694-segv-imap-headers.patch
upstream/548577-gpgme-1.2.patch
upstream/548494-swedish-intl.patch
upstream/553321-ansi-escape-segfault.patch
upstream/553238-german-intl.patch
upstream/557395-muttrc-crypto.patch
upstream/545316-header-color.patch
upstream/568295-references.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/547739-manual-typos.patch
upstream/311296-rand-mktemp.patch
upstream/573823-imap_internal_date
upstream/542344-dont_fold_From_
upstream/537061-dont-recode-saved-attachments.patch
upstream/619216-gnutls-CN-validation.patch
upstream/path_max
misc/hyphen-as-minus.patch
misc/smime_keys-manpage.patch
mutt.org

-- System Information:
Debian Release: 6.0.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mutt depends on:
ii  libc6               2.11.3-4             Embedded GNU C Library: Shared lib
ii  libcomerr2          1.41.12-4stable1     common error description library
ii  libgnutls26         2.8.6-1+squeeze2     the GNU TLS library - runtime libr
ii  libgpg-error0       1.6-1                library for common error values an
ii  libgpgme11          1.2.0-1.2            GPGME - GnuPG Made Easy
ii  libgssapi-krb5-2    1.8.3+dfsg-4squeeze6 MIT Kerberos runtime libraries - k
ii  libidn11            1.15-2               GNU Libidn library, implementation
ii  libk5crypto3        1.8.3+dfsg-4squeeze6 MIT Kerberos runtime libraries - C
ii  libkrb5-3           1.8.3+dfsg-4squeeze6 MIT Kerberos runtime libraries
ii  libncursesw5        5.7+20100313-5       shared libraries for terminal hand
ii  libsasl2-2          2.1.23.dfsg1-7       Cyrus SASL - authentication abstra
ii  libtokyocabinet8    1.4.37-6             Tokyo Cabinet Database Libraries [

Versions of packages mutt recommends:
ii  libsasl2-modules        2.1.23.dfsg1-7   Cyrus SASL - pluggable authenticat
ii  locales                 2.11.3-4         Embedded GNU C Library: National L
ii  mime-support            3.48-1           MIME files 'mime.types' & 'mailcap
ii  postfix [mail-transport 2.7.1-1+squeeze1 High-performance mail transport ag

Versions of packages mutt suggests:
ii  aspell             0.60.6-4              GNU Aspell spell-checker
ii  ca-certificates    20090814+nmu3squeeze1 Common CA certificates
ii  gnupg              1.4.10-4              GNU privacy guard - a free PGP rep
ii  mixmaster          3.0.0-4               Anonymous remailer client and serv
ii  openssl            0.9.8o-4squeeze13     Secure Socket Layer (SSL) binary a
ii  urlview            0.9-18.1              Extracts URLs from text

Versions of packages mutt is related to:
ii  mutt                   1.5.20-9+squeeze2 text-based mailreader supporting M
pn  mutt-dbg               <none>            (no description available)
pn  mutt-patched           <none>            (no description available)

-- no debconf information

--- End Message ---
--- Begin Message ---
fixed 690255 1.6.2-3
thanks

On Thu, Oct 11, 2012 at 06:30:27PM +0200, Nomen Nescio wrote:
> Package: mutt
> Version: 1.5.20-9+squeeze2
> Severity: normal
> 
> 
> A self-signed certificate does not require a root certificate.
> However, the perl script smime_keys falls over if a self-signed cert
> is supplied.  The error is:
> 
>   Couldn't identify root certificate!
>   No root and no intermediate certificates. Can't continue. at 
> /usr/bin/smime_keys line 708.
> 
> Below are the steps to reproduce the error (effectively simulating the
> creation of SSL certificates for internal use within an organization):
[...]

Hi Nomen,
from what I can see smime_keys has now support for self-signed certificates, you
can try to reproduce it against 1.6.2-3 and see if it is still an issue but it
shouldn't be.

I'm closing this bug as a result of that, if it's still a problem please feel
free to reopen.

Cheers
Antonio

--- End Message ---

Reply via email to