Your message dated Sun, 13 Nov 2016 21:35:39 +0000
with message-id <[email protected]>
and subject line Bug#828405: fixed in libpam-ssh 2.1+ds1-2
has caused the Debian Bug report #828405,
regarding libpam-ssh: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
828405: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828405
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libpam-ssh
Version: 2.1+ds1-1
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/libpam-ssh_2.1+ds1-1_amd64-20160529-1444

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: libpam-ssh
Source-Version: 2.1+ds1-2

We believe that the bug you reported is fixed in the latest version of
libpam-ssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jerome Benoit <[email protected]> (supplier of updated libpam-ssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 13 Nov 2016 20:51:17 +0000
Source: libpam-ssh
Binary: libpam-ssh
Architecture: source
Version: 2.1+ds1-2
Distribution: unstable
Urgency: medium
Maintainer: Jerome Benoit <[email protected]>
Changed-By: Jerome Benoit <[email protected]>
Description:
 libpam-ssh - Authenticate using SSH keys
Closes: 828405
Changes:
 libpam-ssh (2.1+ds1-2) unstable; urgency=medium
 .
   * RC bug fix release (Closes: #828405): follow the Debian OpenSSH Maintainers
     approach as exposed in Debian Bug report #828475.
   * Debianization:
     - debian/control;
       - Standards-Version, bump to 3.9.8;
       - Build-Depends, adjust to force use of OpenSSL 1.0 for now
         (see RC bug fix comment);
       - Vcs-* fields, secure;
       - #Vcs-Hg field, discard;
     - debian/copyright, refresh;
     - debian/rules:
       - dpkg-buildflags, add hardening=+all.
Checksums-Sha1:
 ab7f793f673f373e869cb8f381369f80c78f842e 2668 libpam-ssh_2.1+ds1-2.dsc
 77d586695e0c2dc8dcf9c580a68a973d337f0ea9 17052 
libpam-ssh_2.1+ds1-2.debian.tar.xz
Checksums-Sha256:
 9b736d65f7e44b1abf18bf9e3ba84604500d6f3e5138ce1dc0302116886d4950 2668 
libpam-ssh_2.1+ds1-2.dsc
 7c4a318686cb211c024f9edb9ac08843e619a53283cef7023f528bfb3c08d2b8 17052 
libpam-ssh_2.1+ds1-2.debian.tar.xz
Files:
 f2d10d21910b0c4001ee6823e9d10e51 2668 admin optional libpam-ssh_2.1+ds1-2.dsc
 5882215bc819c1243a51096959f0f80c 17052 admin optional 
libpam-ssh_2.1+ds1-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=
=wnm7
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to