Your message dated Thu, 23 Jun 2011 18:48:40 +0000
with message-id <e1qzoxe-0004ci...@franck.debian.org>
and subject line Bug#628332: fixed in openssl-blacklist 0.5-3
has caused the Debian Bug report #628332,
regarding openssl-blacklist: FTBFS: tests failed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
628332: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628332
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: openssl-blacklist
Version: 0.5-2
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20110528 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part:
>  /usr/bin/fakeroot debian/rules clean
> dh_testdir
> dh_testroot
> rm -f build-stamp configure-stamp
> # Add here commands to clean up after the build process.
> dh_clean
>  dpkg-source -b openssl-blacklist-0.5
> dpkg-source: warning: no source format specified in debian/source/format, see 
> dpkg-source(1)
> dpkg-source: info: using source format `1.0'
> dpkg-source: info: building openssl-blacklist using existing 
> openssl-blacklist_0.5.orig.tar.gz
> dpkg-source: info: building openssl-blacklist in 
> openssl-blacklist_0.5-2.diff.gz
> dpkg-source: warning: the diff modifies the following upstream files: 
>  examples/bad_req.csr
>  examples/bad_rsa.key
>  examples/bad_rsa_4096.pem
>  examples/bad_rsa_password_is_pass.key
>  examples/bad_x509.pem
>  examples/bad_x509_4096.pem
>  examples/gen_certs.sh
>  examples/getpid.c
>  examples/good_req.csr
>  examples/good_rsa.key
>  examples/good_x509.pem
>  openssl-vulnkey
>  openssl-vulnkey.1
>  test.sh
> dpkg-source: info: use the '3.0 (quilt)' format to have separate and 
> documented changes to upstream files, see dpkg-source(1)
> dpkg-source: info: building openssl-blacklist in openssl-blacklist_0.5-2.dsc
>  debian/rules build
> dh_testdir
> # Add here commands to configure the package.
> touch configure-stamp
> dh_testdir
> # Add here commands to compile the package.
> sh ./test.sh
> no args: PASS
> no modulus: PASS
> no bits: PASS
> 
> bad_req.csr: 
> Skipped: 'examples/bad_req.csr' has unsupported bit size
> FAIL
> 
> bad_req.csr (stdin): 
> Skipped: '-' has unsupported bit size
> FAIL
> 
> bad_x509.pem: 
> Skipped: 'examples/bad_x509.pem' has unsupported bit size
> FAIL
> 
> bad_x509.pem (stdin): 
> Skipped: '-' has unsupported bit size
> FAIL
> 
> bad_rsa.key: 
> COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key
> PASS
> 
> bad_rsa.key (stdin): 
> COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 -
> PASS
> 
> bad_rsa_4096.pem: 
> COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 
> examples/bad_rsa_4096.pem
> PASS
> 
> bad_rsa_4096.pem (stdin): 
> COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 -
> PASS
> 
> bad_x509_4096.pem: 
> Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size
> FAIL
> 
> bad_x509_4096.pem (stdin): 
> Skipped: '-' has unsupported bit size
> FAIL
> 
> all bad files (examples/bad_req.csr examples/bad_x509.pem 
> examples/bad_rsa.key examples/bad_rsa_4096.pem examples/bad_x509_4096.pem): 
> Skipped: 'examples/bad_req.csr' has unsupported bit size
> Skipped: 'examples/bad_x509.pem' has unsupported bit size
> Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size
> COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key
> COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 
> examples/bad_rsa_4096.pem
> PASS
> 
> bad modulus: 
> COMPROMISED: ff64d7f83c9701d5fa7958ef2c82003451fa91ee 
> PASS
> 
> good_req.csr: 
> Skipped: 'examples/good_req.csr' has unsupported bit size
> PASS
> 
> good_req.csr (stdin): 
> Skipped: '-' has unsupported bit size
> PASS
> 
> good_x509.pem: 
> Skipped: 'examples/good_x509.pem' has unsupported bit size
> PASS
> 
> good_x509.pem (stdin): 
> Skipped: '-' has unsupported bit size
> PASS
> 
> good_rsa.key: 
> Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b 
> examples/good_rsa.key
> PASS
> 
> good_rsa.key (stdin): 
> Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b -
> PASS
> 
> all good files (examples/good_req.csr examples/good_x509.pem 
> examples/good_rsa.key): 
> Skipped: 'examples/good_req.csr' has unsupported bit size
> Skipped: 'examples/good_x509.pem' has unsupported bit size
> Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b 
> examples/good_rsa.key
> PASS
> 
> some bad files, some good files (examples/bad_req.csr examples/bad_x509.pem 
> examples/bad_rsa.key examples/bad_rsa_4096.pem examples/bad_x509_4096.pem 
> examples/good_req.csr examples/good_x509.pem examples/good_rsa.key): 
> Skipped: 'examples/bad_req.csr' has unsupported bit size
> Skipped: 'examples/bad_x509.pem' has unsupported bit size
> Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size
> Skipped: 'examples/good_req.csr' has unsupported bit size
> Skipped: 'examples/good_x509.pem' has unsupported bit size
> COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key
> COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 
> examples/bad_rsa_4096.pem
> Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b 
> examples/good_rsa.key
> PASS
> 
> good modulus: 
> Not blacklisted: ad385a7bd24e9ef98198404cb98f3adc614e527e 
> PASS
> 
> Non-existent file:
> PASS
> 
> Permission denied:
> PASS
> 
> ----------------------
> FAILED
> make: *** [build-stamp] Error 1

The full build log is available from:
   
http://people.debian.org/~lucas/logs/2011/05/28/openssl-blacklist_0.5-2_lsid64.buildlog

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot.  Internet was not
accessible from the build systems.

-- 
| Lucas Nussbaum
| lu...@lucas-nussbaum.net   http://www.lucas-nussbaum.net/ |
| jabber: lu...@nussbaum.fr             GPG: 1024D/023B3F4F |



--- End Message ---
--- Begin Message ---
Source: openssl-blacklist
Source-Version: 0.5-3

We believe that the bug you reported is fixed in the latest version of
openssl-blacklist, which is due to be installed in the Debian FTP archive:

openssl-blacklist-extra_0.5-3_all.deb
  to main/o/openssl-blacklist/openssl-blacklist-extra_0.5-3_all.deb
openssl-blacklist_0.5-3.diff.gz
  to main/o/openssl-blacklist/openssl-blacklist_0.5-3.diff.gz
openssl-blacklist_0.5-3.dsc
  to main/o/openssl-blacklist/openssl-blacklist_0.5-3.dsc
openssl-blacklist_0.5-3_all.deb
  to main/o/openssl-blacklist/openssl-blacklist_0.5-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 628...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jamie Strandboge <ja...@ubuntu.com> (supplier of updated openssl-blacklist 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 22 Jun 2011 11:14:53 -0500
Source: openssl-blacklist
Binary: openssl-blacklist openssl-blacklist-extra
Architecture: source all
Version: 0.5-3
Distribution: unstable
Urgency: low
Maintainer: Kees Cook <k...@debian.org>
Changed-By: Jamie Strandboge <ja...@ubuntu.com>
Description: 
 openssl-blacklist - Blacklists for  OpenSSL RSA keys and tools
 openssl-blacklist-extra - Non-default blacklists of OpenSSL RSA keys
Closes: 612461 616927 628332
Changes: 
 openssl-blacklist (0.5-3) unstable; urgency=low
 .
   * openssl-vulnkey: adjust for new openssl 1.0.0 output (Closes: #628332)
   * fix test suite when run as root. Patch from Moritz Muehlenhoff.
     (Closes: #612461)
   * convert to dh_python2. Patch from Colin Watson (Closes: #616927)
   * make lintian -Ivi clean
     - debian/control: update Standards-Version to 3.9.2
     - debian/control: add ${misc:Depends} to binaries
     - debian/control: make Description more verbose
     - debian/copyright: convert to DEP-5
     - openssl-vulnkey.1: fix some hyphens as minuses
     - add debian/source/format
     - add comments only debian/watch file
Checksums-Sha1: 
 3b8bebce37c6a183b3e75e69f0face69ca748b0c 1992 openssl-blacklist_0.5-3.dsc
 082786be8ac7518d33c841c747371fe1a73c601c 20228 openssl-blacklist_0.5-3.diff.gz
 aaa87c8a4e1d80d3cb74e62931a9c6e5a6db82c2 6338006 
openssl-blacklist_0.5-3_all.deb
 f330e89f88743c42ab0834fb066513cf8212727e 6319496 
openssl-blacklist-extra_0.5-3_all.deb
Checksums-Sha256: 
 6790be3d5e3cb7ae10fc596a751f1e4f7abfeee6484c22fe860205eb75e65423 1992 
openssl-blacklist_0.5-3.dsc
 caf34380fce6f4b31d958a176f8f5d0a4d1e9da66ceaed2e5a20c7929d341942 20228 
openssl-blacklist_0.5-3.diff.gz
 b2117b962f1c20a59a38237a971a5e37d0a5b82b0d900c732e1a7aad8b2bee75 6338006 
openssl-blacklist_0.5-3_all.deb
 7d745023c9c77149989a8538703339c24b6de11cdab9c742e87eade2bbe4e991 6319496 
openssl-blacklist-extra_0.5-3_all.deb
Files: 
 f63fe6c958896256231abfb2b0bb12b5 1992 net optional openssl-blacklist_0.5-3.dsc
 bc6e1d6061842a03b2d5dedace4b52f6 20228 net optional 
openssl-blacklist_0.5-3.diff.gz
 14a49e66a64cf0fe033a43b6e261258b 6338006 net optional 
openssl-blacklist_0.5-3_all.deb
 bb3d2e75eab25a8bcb3914ae5ba2e094 6319496 net optional 
openssl-blacklist-extra_0.5-3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Kees Cook <k...@outflux.net>
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=uoO+
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to