Your message dated Mon, 16 May 2022 15:28:13 +0000
with message-id <[email protected]>
and subject line Bug#1011047: fixed in vpnc 0.5.3+git20220503-1
has caused the Debian Bug report #1011047,
regarding New version of vpnc with security improvements
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1011047: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011047
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: vpnc
Version: 0.5.3+git20210125-1


Hi Andreas,

the canonical way would be to open a bug against vpnc in the Debian BTS,
which I'm doing right now (Cc:).

I've had a brief look at the current upstream git version, and I think
it should be easy to update the Debian package. However, as I've lost
access to any ipsec VPN concentrator, once it compiles I have no way to
test the resulting package. Do you know of any publicly available
services, by chance?

I guess I should make it more clear that I need to pass on maintenance
of vpnc in Debian...

Florian



On Tue, May 10, 2022 at 02:59:56PM +0200, Andreas Erhard wrote:
> Hi Florian,
> 
> thank you very much for maintaining so many Debian packages. Concerning the
> VPN-Client vpnc, I'd have an update proposal and could not find another
> point of contact  (such as "report outdated package" for Arch Linux) so
> sorry for bothering you with this request.
> 
> In the latest version, vpnc supports way stronger key exchange security. The
> Modular Exponential (MODP) Diffie-Hellman groups 14 to 18 (2048 bits to 8192
> bits) as specified in RFC3526 are now supported. We also tested the enhanced
> key exchange on a Cisco IPSec VPN appliance.
> 
> The new version is already packaged in the extra repo for Arch Linux[1],
> I've opened an issue for OpenWRT[2] as well which is pending at the moment.
> 
> As the patches greatly improve the security and interoperability of vpnc, it
> would be great to get this update included in Debian. How would be the best
> procedure for that?
> 
> Thank you very much, best regards from Tyrol
> 
> Andreas Erhard
> 
> [1] https://archlinux.org/packages/?name=vpnc
> [2] https://github.com/openwrt/packages/issues/18477

--- End Message ---
--- Begin Message ---
Source: vpnc
Source-Version: 0.5.3+git20220503-1
Done: Florian Schlichting <[email protected]>

We believe that the bug you reported is fixed in the latest version of
vpnc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Florian Schlichting <[email protected]> (supplier of updated vpnc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 16 May 2022 22:21:20 +0800
Source: vpnc
Architecture: source
Version: 0.5.3+git20220503-1
Distribution: unstable
Urgency: medium
Maintainer: Florian Schlichting <[email protected]>
Changed-By: Florian Schlichting <[email protected]>
Closes: 1011047
Changes:
 vpnc (0.5.3+git20220503-1) unstable; urgency=medium
 .
   [ Debian Janitor ]
   * Set upstream metadata fields: Bug-Submit, Repository, Repository-Browse.
 .
   [ Florian Schlichting ]
   * Import new upstream version 0.5.3+git20220503 (closes: #1011047)
   * Update d/watch: point to streambinder repo, use mode=git
   * Update copyright years
   * Declare compliance with Debian Policy 4.6.1
   * Drop patches applied upstream
   * Add d/README.source about creating the upstream tarball
Checksums-Sha1:
 5943b8e5bfde51528230be4a082c933a663fb281 1936 vpnc_0.5.3+git20220503-1.dsc
 5db5c754ce10159ea55f1ee653e91fa956f9449a 125447 
vpnc_0.5.3+git20220503.orig.tar.gz
 3f1c5a9051aafd3e8a54f072a70d8a279d64a939 10732 
vpnc_0.5.3+git20220503-1.debian.tar.xz
 5abb907ae926e1fd174e25a78355bea4e0b3309b 6969 
vpnc_0.5.3+git20220503-1_amd64.buildinfo
Checksums-Sha256:
 b203d38ac590a934c2a8a60a58b49b550a834ad397348b391e0235328bbc1875 1936 
vpnc_0.5.3+git20220503-1.dsc
 951c4f9edf09db44344f51622043d6fadc5502d0734e1ec4c2debb6df36843e3 125447 
vpnc_0.5.3+git20220503.orig.tar.gz
 0f42f024e419ab28787399207e3dcfc78be95aafa4ec0f1b94f953c2653e24a4 10732 
vpnc_0.5.3+git20220503-1.debian.tar.xz
 75bea230897b7cdb5e5fd511e65b18d300b26807ecda110b471c95c8e6a20696 6969 
vpnc_0.5.3+git20220503-1_amd64.buildinfo
Files:
 303bcd787266ae1dfe732427a5828d44 1936 net optional vpnc_0.5.3+git20220503-1.dsc
 82e3980da729374f6a4165fa73c99867 125447 net optional 
vpnc_0.5.3+git20220503.orig.tar.gz
 ef7cf8902b4c3dfc872fc56aea75a9f3 10732 net optional 
vpnc_0.5.3+git20220503-1.debian.tar.xz
 1ea62a4c6854b6ac7948b7fe37877fa2 6969 net optional 
vpnc_0.5.3+git20220503-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=NJJO
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to