Am 04.04.2010, 17:39 Uhr, schrieb Sjoerd Simons:

Package: fetchmail
Version: 6.3.15-1
Severity: important
Tags: patch


As the subject says, during openssl initialisation fetchmail doesn't seem to load all ssl algorithms causing the ssl negotiation to fail depending on what the server wants to use..

ssl(3) doesn't state that this OpenSSL_add_all_algorithms() is needed. Neither does SSL_connect or SSL_library_init. The only EVP reference is EVP_md5() explicitly, which doesn't need OpenSSL_add_all_algorithms() either. So could you:

1. please demonstrate an actual failure case

2. tell me how I as programmer should/could have known this in advance? I'm really annoyed that so much ssl lore needs to be retrofitted over time whenever there appears to be some new failure. ssl(3) states I need to run SSL_library_init and seed the RNG on machines without /dev/*random. Nothing about OpenSSL_add_all_algorithms().

If the OpenSSL documentation is so incomplete, I may have to switch the SSL library inside stable versions to avoid such issues.

Thank you.

--
Matthias Andree



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to