Hi Lorenzo,

On Tue, Jun 10, 2014 at 10:01:13PM +0200, Lorenzo wrote:
> otherwise I guess this should be reported upstream.

Thanks for putting in the legwork and bringing this back to my
attention. The same problem exists in OpenSSH (from which the
compatibility layer for opensmtpd was taken), except that the Debian
OpenSSH maintainers simply patched out the entire check[0] (SONAME is
sufficient nowadays for us). Upstream rewrote the broken check last
night[1]. In order to minimise the delta between upstream opensmtpd and
Debian, I intend to apply their fixed check later on today or tomorrow
at the latest instead of simply cutting out the check as was done for
OpenSSH.

Best wishes,
Ryan

[0] 
http://anonscm.debian.org/gitweb/?p=pkg-ssh/openssh.git;a=blob;f=debian/patches/no-openssl-version-check.patch;h=56fa46aac080a3566941ac006c9324c0b8aa55ba;hb=HEAD
[1] https://github.com/poolpOrg/OpenSMTPD/commit/452d687

Attachment: signature.asc
Description: Digital signature

Reply via email to