Bug#1028565: Acknowledgement (upgrade-reports: Audio breaks between 5.10.0-19-amd64 and 5.10.0-20-amd64)

2023-01-24 Thread Michael Shuler
This audio issue was resolved for me with the SoC updates included in 
stable linux-image:

  5.10.0-21-amd64 5.10.162-1 (2023-01-21) x86_64

For reference, my machine info:
  Product Name: 20QDCTO1WW
  Version: ThinkPad X1 Carbon 7th
  BIOS Version: N2HET68W (1.51)
  Audio PCI info:
  00:1f.3 Audio device [0403]: Intel Corporation Cannon Point-LP High 
Definition Audio Controller [8086:9dc8] (rev 11) (prog-if 80)


Thanks for this bug report, the build info and revert patch for -20, and 
for rolling in the additional SoC bits to make -21 work properly.


Kind regards,
Michael



Bug#996005: ca-certificates: fails upgrading when no new certs selected

2021-10-10 Thread Michael Shuler

On 10/9/21 6:40 PM, Christoph Anton Mitterer wrote:

It seems that when not selecting any of the new certs on upgrade, the package
install fails:
Setting up ca-certificates (20211004) ...
Updating certificates in /etc/ssl/certs...
chmod: cannot access '/etc/ssl/certs/ca-certificates.crt.new': No such file or 
directory
dpkg: error processing package ca-certificates (--configure):
  installed ca-certificates package post-installation script subprocess 
returned error exit status 1


Good find - patch attached to check if file exists before chmod & mv.

--
Kind regards,
Michael
diff --git a/debian/changelog b/debian/changelog
index 2a146c2..7b1e0bc 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+ca-certificates (20211010) UNRELEASED; urgency=medium
+
+  [ Michael Shuler ]
+  * Fix error on install when TEMPBUNDLE missing. Closes: #996005
+
+ -- Michael Shuler   Sun, 10 Oct 2021 09:10:28 -0500
+
 ca-certificates (20211004) unstable; urgency=low
 
   [ Debian Janitor ]
diff --git a/sbin/update-ca-certificates b/sbin/update-ca-certificates
index 789867f..0265205 100755
--- a/sbin/update-ca-certificates
+++ b/sbin/update-ca-certificates
@@ -187,8 +187,12 @@ then
   fi
 fi
 
-chmod 0644 "$TEMPBUNDLE"
-mv -f "$TEMPBUNDLE" "$CERTBUNDLE"
+# chmod and mv only if TEMPBUNDLE exists or install may fail, #996005
+if [ -f "$TEMPBUNDLE" ]
+then
+  chmod 0644 "$TEMPBUNDLE"
+  mv -f "$TEMPBUNDLE" "$CERTBUNDLE"
+fi
 # Restore proper SELinux label after moving the file
 [ -x /sbin/restorecon ] && /sbin/restorecon "$CERTBUNDLE" >/dev/null 2>&1
 


Bug#992300: ca-certificates: ca-certificate update fails because of missing /usr/bin/cert-sync

2021-08-17 Thread Michael Shuler

On 8/17/21 9:40 AM, Alex wrote:


I am not sure if ca-certificates-mono was installed at all. I do not
have mono on the system.


The machine did have the packages below installed at some point.


$ dpkg -l|grep mono|grep -v fonts-|grep -v python3-monotonic
rc  ca-certificates-mono 4.6.2.7+dfsg-1
all  Common CA certificates (Mono keystore)
rc  mono-runtime-common  4.6.2.7+dfsg-1
amd64Mono runtime - common files


The packages were removed (r), leaving behind configuration (c) files.


$ ls /etc/ca-certificates/update.d/mono-keystore /usr/bin/cert-sync
ls: cannot access '/usr/bin/cert-sync': No such file or directory
/etc/ca-certificates/update.d/mono-keystore


Version 4.6.2.7+dfsg-1 is listed on p.d.o as the latest version from 
Stretch, so it could have been quite some time ago and your logs for 
that were likely rotated, so not in the latest dpkg.log file. Purging 
packages would also remove configurations, so if you wish to do a little 
clean up:


  apt purge ca-certificates-mono mono-runtime-common

Seems this bug can likely be closed, the fix version for #902663 is 
later than the reporter's old "rc" remnants.


Kind regards,
Michael



Bug#992300: ca-certificates: ca-certificate update fails because of missing /usr/bin/cert-sync

2021-08-17 Thread Michael Shuler

Control: notfound -1 20210119
Control: reassign -1 ca-certificates-mono
Control: tags -1 + moreinfo

On 8/16/21 4:58 PM, Alex wrote:

...
Updating Mono key store
/etc/ca-certificates/update.d/mono-keystore: 10: /usr/bin/cert-sync: not found
Done


Reassigning to appropriate package, ca-certificates-mono.

Bug reporter's ca-certificates-mono version is unknown, but it appears 
that #902663 with the same error report was fixed in 
ca-certificates-mono 5.18.0.240+dfsg-2. Please, update bug report with 
the proper "found" version.


Kind regards,
Michael



Bug#976406: O: ca-certificates -- Common CA certificates

2020-12-04 Thread Michael Shuler
Package: wnpp
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

I have orphaned the ca-certificates package, due to time constraints.

If you want to be the new maintainer, please see
https://www.debian.org/devel/wnpp/#howto-o for detailed instructions how to
adopt a package properly.

Some information about this package:

Package: ca-certificates
Binary: ca-certificates, ca-certificates-udeb
Version: 20190110
Maintainer: Michael Shuler 
Uploaders: Raphael Geissert , Thijs Kinkhorst 

Build-Depends: debhelper-compat (= 12), po-debconf
Build-Depends-Indep: python, openssl
Architecture: all
Standards-Version: 4.3.0.1
Format: 3.0 (native)
Files:
 e1b3a61d2ae8fd7bc833e9c4bcae5f13 1805 ca-certificates_20190110.dsc
 e91d3d9259127ba2dbb65fda58d73f31 243472 ca-certificates_20190110.tar.xz
Vcs-Browser: https://salsa.debian.org/debian/ca-certificates
Vcs-Git: https://salsa.debian.org/debian/ca-certificates.git
Checksums-Sha256:
 bffbfe63a1ad2a07c6094502f05899c65edba93aefe58682f440e000fc65f6f0 1805 
ca-certificates_20190110.dsc
 ee4bf0f4c6398005f5b5ca4e0b87b82837ac5c3b0280a1cb3a63c47555c3a675 243472 
ca-certificates_20190110.tar.xz
Package-List: 
 ca-certificates deb misc optional arch=all
 ca-certificates-udeb udeb debian-installer optional arch=all
Directory: pool/main/c/ca-certificates
Priority: source
Section: misc

Package: ca-certificates
Version: 20190110
Priority: optional
Section: misc
Maintainer: Michael Shuler 
Installed-Size: 393 kB
Depends: openssl (>= 1.1.1), debconf (>= 0.5) | debconf-2.0
Breaks: ca-certificates-java (<< 20121112+nmu1)
Enhances: openssl
Tag: protocol::ssl, role::app-data, security::authentication
Download-Size: 157 kB
APT-Manual-Installed: no
APT-Sources: http://deb.debian.org/debian buster/main i386 Packages
Description: Common CA certificates
 Contains the certificate authorities shipped with Mozilla's browser to allow
 SSL-based applications to check for the authenticity of SSL connections.
 .
 Please note that Debian can neither confirm nor deny whether the
 certificate authorities whose certificates are included in this package
 have in any way been audited for trustworthiness or RFC 3647 compliance.
 Full responsibility to assess them belongs to the local system
 administrator.

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEom5SiycfGbnl2OGeoni3gf5LK9oFAl/KgMcACgkQoni3gf5L
K9r3yQ/+KX8VXWAVmF+e/LT9EieilhbGjYcKh+dtRc7hOiMjaiXqjAZhWLCOi/r2
PNUk/L5oxpZUty4rnBsaRbHoKVG2u1VbKIj3sAVgYjGcmi10b86DOWzdAvQO9EZn
HezUWImTHWFMp1lSBIhGyS+BzngG7axNGcr7wepOdh6Y4l+3KYYbc+wAF9BpMPVv
sT55pa9BhiWZfTTVhhA+Xur2hGgTZAYJgLhiTQV36yRUPc+QpxQVUvhRiXKls1HC
18RT6IRRMRcyLt6hMYbZrEVqteGq/5/iNONJ3DNoRbKzf1dp8T4ANspDMZAItcvV
L+G6FgIWDaPJLZBQsFRVYitSSb5kPtyyVPfH3V68PSpHMaDVOdfBz2vqg7h1BYBq
M1a1wFoLTJVQo2hpbsoQu6s7gGp+g02uV5IS+ixeMlr0GCZfb6g5SxIrGNhanhG/
dIJikvRfUfkYLrjgAMnNI9moJxpuUX+YIseRglcMJ4i3BiF1va+9081BwQpFaNsO
VAJ+tGv1IxVieTMlPZelLXBiL1bbfOkfCWB3OUSZEtgwtuuVJ1Bx1Cc4g981cQUf
mXzo8mPaRGGTXJ6uCfQiBHVrNDgI4eSeawUulkcPMcXD1MUwjZlkXG3CCZQRkWke
A0M026uv19KLqFxdgyi0mC1O2DCiUJwi0/qgIF+NGtCB1mz8APc=
=sNlZ
-END PGP SIGNATURE-



Bug#962669: Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-12 Thread Michael Shuler




On 6/12/20 7:36 AM, Adrian Bunk wrote:

On Fri, Jun 12, 2020 at 08:40:29AM +0100, Adam D. Barratt wrote:

On Fri, 2020-06-12 at 00:50 +0300, Adrian Bunk wrote:

Control: tags 962669 moreinfo

On Thu, Jun 11, 2020 at 08:18:38PM +0100, Adam D. Barratt wrote:

On Thu, 2020-06-11 at 13:48 -0500, Michael Shuler wrote:

On 6/11/20 1:33 PM, Adam D. Barratt wrote:

Just to confirm - will the certificates be automatically re-
added (assuming that users have either the automatically trust
or prompt options enabled)?


(stretch-pu report cc'ed, since same applies)

Excellent question. I believe we're going to hit #743339
"Previously removed certificates not added again". I had not
found a reasonable fix for that case in general, to preserve a
user's selections.
Maybe a "good enough" fix will have to do for the specific ones
added back.


OK.

In that case, how does this seem as an SUA text?

[...]

use the affected certificates, you may need to manually enable them
by running "dpkg-reconfigure ca-certificates" as root.



This does not work in various embedded scenarios.


Wouldn't embedded setups be more likely to have a hard-coded
configuration?


The official way to hardcode CA configuration would be through debconf
or /etc/ca-certificates.conf, which runs into #743339.

If you are really security-focussed you might pin the actual certificate
instead of trusing a CA.

For the average embedded device the only thing that matters about
ca-certificates is something like "https works".


Would it work to force-enable them in /etc/ca-certificates.conf
from the preinst when upgrading from old-version matching 20200601* ?


This could actually be done in the postinst before the debconf
configuration, something like
   sed -i "s|^\!mozilla/GeoTrust_Global_CA.crt|mozilla/GeoTrust_Global_CA.crt|" 
/etc/ca-certificates.conf
for all affected certificates when $2 matches 20200601*


This is what I was working on last night, there is an old dpkg 
--compare-versions example in postinst, and that is similar to the 
action I had in mind. I intend to sed all in the list we blacklisted, 
since they remain in the bundle, so we're not here next week with 
another of the date or intermediate exceptions in NSS. If there is 
objection to this, please let me know.



I'll leave the technical answer to Michael.

Practically, it's then not great for users who had intentionally
removed the certificates - or simply decided not to trust them in the
first place - prior to the upgrade. I'm not sure how we could
distinguish the cases automatically.


The default is to trust all new certificates, so this is what the vast
majority of users are using.

#743339 is primarily about this kind of remove+readd in the package
being the only way how any installed certificate could end up being
deactivated in the default situation.

This is permanent damage that can lead to nasty problems months or
years later.

There are likely some users somewhere who have manually activated or
deactivated these specific certificates, but this is nothing we can
handle correctly in both directions now.


This is exactly the kind of behavior I think we'd like to preserve, so 
we don't stomp on a previous intentional trust setting and blindly 
enable, but I think this specific list of blacklisted certs being 
re-enabled, if specifically 20200601* is installed should work. The 
default "yes" trust and re-enable of these may be the "good enough" fix, 
while #743339 is still an issue. That should hit way over 80% use case, 
if we consider an 80/20 split.


For what it's worth, with additional testing after this, I believe I may 
have found one of the "save but disable' causes of #743339, after 
staring at ca-certificates.conf creation, upgrades, etc in postinst and 
the debconf ca-certificates.config contents. It won't fix existing trust 
^!'s, but would help on future root removals - later on that bug..



Unrelated to that, please keep the Python 2 -> 3 build dependency
change out of this emergency update.


ACK.


Will do, thank you both.

Kind regards,
Michael



Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-11 Thread Michael Shuler

On 6/11/20 1:33 PM, Adam D. Barratt wrote:

Just to confirm - will the certificates be automatically re-added
(assuming that users have either the automatically trust or prompt
options enabled)?


(stretch-pu report cc'ed, since same applies)

Excellent question. I believe we're going to hit #743339 "Previously 
removed certificates not added again". I had not found a reasonable fix 
for that case in general, to preserve a user's selections. Maybe a "good 
enough" fix will have to do for the specific ones added back.


Thanks for the question, patch ideas welcomed.

Michael



Bug#962674: stretch-pu: package ca-certificates/20200611~deb9u1

2020-06-11 Thread Michael Shuler

Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu

Hi release team,

#911289 resulted in a regression, and the explicitly blacklisted roots 
have been reverted. One in particular, "GeoTrust Global CA", has caused 
serious issues noted in #962596. The other reverted roots also remain in 
the Mozilla CA bundle[0], so #911289 will require additional research 
and be re-opened when uploaded.


stretch-proposed-updates and stretch-updates both got the previous upload.

I would like to upload ca-certificates_20200611~deb9u1 with the 
following changes:



ca-certificates (20200611~deb9u1) stretch; urgency=medium

   * Rebuild for stretch.
   * This oldstable release Closes: #962596, #942915

  -- Michael Shuler   Thu, 11 Jun 2020 09:11:56 
-0500


ca-certificates (20200611) unstable; urgency=medium

   * mozilla/blacklist:
 Revert Symantec CA blacklist (#911289). Closes: #962596
 The following root certificates were added back (+):
 + "GeoTrust Global CA"
 + "GeoTrust Primary Certification Authority"
 + "GeoTrust Primary Certification Authority - G2"
 + "GeoTrust Primary Certification Authority - G3"
 + "GeoTrust Universal CA"
 + "thawte Primary Root CA"
 + "thawte Primary Root CA - G2"
 + "thawte Primary Root CA - G3"
 + "VeriSign Class 3 Public Primary Certification Authority - G4"
 + "VeriSign Class 3 Public Primary Certification Authority - G5"
 + "VeriSign Universal Root Certification Authority"

   [ Gianfranco Costamagna ]
   * debian/{rules,control}:
 Merge Ubuntu patch from Matthias Klose to use Python3 during build.
 Closes: #942915

  -- Michael Shuler   Thu, 11 Jun 2020 08:38:00 
-0500



Source debdiff attached.

ca-certificates_20200611~deb9u1 uploaded to mentors[1], RFS will be 
submitted pending pu approval. Source can be fetched from mentors or the 
`debian-stretch` git branch, commit 
c151326dda72f703f7001f655e331b548eb1e411.


Binary debdiff files list matches unstable upload for 20200611 currently 
on mentors - RFS: #962669.


[0] 
https://ccadb-public.secure.force.com/mozilla/IncludedCACertificateReport

[1] https://mentors.debian.net/package/ca-certificates

Kind regards,
Michael

diffstat for ca-certificates-20200601~deb9u1 ca-certificates-20200611~deb9u1

 debian/changelog|   37 +++--
 debian/control  |8 
 mozilla/Makefile|2 +-
 mozilla/blacklist.txt   |   23 ---
 mozilla/certdata2pem.py |2 +-
 5 files changed, 33 insertions(+), 39 deletions(-)

diff -Nru ca-certificates-20200601~deb9u1/debian/changelog 
ca-certificates-20200611~deb9u1/debian/changelog
--- ca-certificates-20200601~deb9u1/debian/changelog2020-06-05 
11:52:50.0 -0500
+++ ca-certificates-20200611~deb9u1/debian/changelog2020-06-11 
09:11:56.0 -0500
@@ -1,16 +1,33 @@
-ca-certificates (20200601~deb9u1) stretch; urgency=medium
+ca-certificates (20200611~deb9u1) stretch; urgency=medium
 
   * Rebuild for stretch.
-  * Merge changes from 20200601
-- d/control
-  * This release updates the Mozilla CA bundle to 2.40, blacklists
-distrusted Symantec roots, and blacklists expired "AddTrust External
-Root". Closes: #956411, #955038, #911289, #961907
-  * Fix permissions on /usr/local/share/ca-certificates when using symlinks.
-Closes: #916833
-  * Remove email-only roots from mozilla trust store. Closes: #721976
+  * This oldstable release Closes: #962596, #942915
 
- -- Michael Shuler   Fri, 05 Jun 2020 11:52:50 -0500
+ -- Michael Shuler   Thu, 11 Jun 2020 09:11:56 -0500
+
+ca-certificates (20200611) unstable; urgency=medium
+
+  * mozilla/blacklist:
+Revert Symantec CA blacklist (#911289). Closes: #962596
+The following root certificates were added back (+):
++ "GeoTrust Global CA"
++ "GeoTrust Primary Certification Authority"
++ "GeoTrust Primary Certification Authority - G2"
++ "GeoTrust Primary Certification Authority - G3"
++ "GeoTrust Universal CA"
++ "thawte Primary Root CA"
++ "thawte Primary Root CA - G2"
++ "thawte Primary Root CA - G3"
++ "VeriSign Class 3 Public Primary Certification Authority - G4"
++ "VeriSign Class 3 Public Primary Certification Authority - G5"
+    + "VeriSign Universal Root Certification Authority"
+
+  [ Gianfranco Costamagna ]
+  * debian/{rules,control}:
+Merge Ubuntu patch from Matthias Klose to use Python3 during build.
+Closes: #942915
+
+ -- Michael Shuler   Thu, 11 Jun 2020 08:38:00 -0500
 
 ca-certificates (20200601) unstable; urgency=medium
 
diff -Nru ca-certificates-20200601~deb9u1/debian/control 
ca-certificates-20200611~deb9u

Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-11 Thread Michael Shuler

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

Hi release team,

#911289 resulted in a regression, and the explicitly blacklisted roots 
have been reverted. One in particular, "GeoTrust Global CA", has caused 
serious issues noted in #962596. The other reverted roots also remain in 
the Mozilla CA bundle[0], so #911289 will require additional research 
and be re-opened when uploaded.


buster-proposed-updates and buster-updates both got the previous upload.

I would like to upload ca-certificates_20200611~deb10u1 with the 
following changes:



ca-certificates (20200611~deb10u1) buster; urgency=medium

  * Rebuild for buster.
  * This stable release Closes: #962596, #942915

 -- Michael Shuler   Thu, 11 Jun 2020 09:07:27 
-0500


ca-certificates (20200611) unstable; urgency=medium

  * mozilla/blacklist:
Revert Symantec CA blacklist (#911289). Closes: #962596
The following root certificates were added back (+):
+ "GeoTrust Global CA"
+ "GeoTrust Primary Certification Authority"
+ "GeoTrust Primary Certification Authority - G2"
+ "GeoTrust Primary Certification Authority - G3"
+ "GeoTrust Universal CA"
+ "thawte Primary Root CA"
+ "thawte Primary Root CA - G2"
+ "thawte Primary Root CA - G3"
+ "VeriSign Class 3 Public Primary Certification Authority - G4"
+ "VeriSign Class 3 Public Primary Certification Authority - G5"
+ "VeriSign Universal Root Certification Authority"

  [ Gianfranco Costamagna ]
  * debian/{rules,control}:
Merge Ubuntu patch from Matthias Klose to use Python3 during build.
Closes: #942915

 -- Michael Shuler   Thu, 11 Jun 2020 08:38:00 
-0500



Source debdiff attached.

ca-certificates_20200611~deb10u1 uploaded to mentors[1], RFS will be 
submitted pending pu approval. Source can be fetched from mentors or the 
`debian-buster` git branch, commit 442fd47f4831483b72329e0df1f6260e4a91ab36.


Binary debdiff files list matches unstable upload for 20200611 currently 
on mentors - RFS: #962669.


[0] 
https://ccadb-public.secure.force.com/mozilla/IncludedCACertificateReport

[1] https://mentors.debian.net/package/ca-certificates

Kind regards,
Michael
diffstat for ca-certificates-20200601~deb10u1 ca-certificates-20200611~deb10u1

 debian/changelog|   34 +++---
 debian/control  |2 +-
 mozilla/Makefile|2 +-
 mozilla/blacklist.txt   |   23 ---
 mozilla/certdata2pem.py |2 +-
 5 files changed, 30 insertions(+), 33 deletions(-)

diff -Nru ca-certificates-20200601~deb10u1/debian/changelog 
ca-certificates-20200611~deb10u1/debian/changelog
--- ca-certificates-20200601~deb10u1/debian/changelog   2020-06-03 
13:09:34.0 -0500
+++ ca-certificates-20200611~deb10u1/debian/changelog   2020-06-11 
09:07:27.0 -0500
@@ -1,13 +1,33 @@
-ca-certificates (20200601~deb10u1) buster; urgency=medium
+ca-certificates (20200611~deb10u1) buster; urgency=medium
 
   * Rebuild for buster.
-  * Merge changes from 20200601
-- d/control; set d/gbp.conf branch to debian-buster
-  * This release updates the Mozilla CA bundle to 2.40, blacklists
-distrusted Symantec roots, and blacklists expired "AddTrust External
-Root". Closes: #956411, #955038, #911289, #961907
+  * This stable release Closes: #962596, #942915
 
- -- Michael Shuler   Wed, 03 Jun 2020 13:09:34 -0500
+ -- Michael Shuler   Thu, 11 Jun 2020 09:07:27 -0500
+
+ca-certificates (20200611) unstable; urgency=medium
+
+  * mozilla/blacklist:
+Revert Symantec CA blacklist (#911289). Closes: #962596
+The following root certificates were added back (+):
++ "GeoTrust Global CA"
++ "GeoTrust Primary Certification Authority"
++ "GeoTrust Primary Certification Authority - G2"
++ "GeoTrust Primary Certification Authority - G3"
++ "GeoTrust Universal CA"
++ "thawte Primary Root CA"
++ "thawte Primary Root CA - G2"
++ "thawte Primary Root CA - G3"
++ "VeriSign Class 3 Public Primary Certification Authority - G4"
++ "VeriSign Class 3 Public Primary Certification Authority - G5"
+    + "VeriSign Universal Root Certification Authority"
+
+  [ Gianfranco Costamagna ]
+  * debian/{rules,control}:
+Merge Ubuntu patch from Matthias Klose to use Python3 during build.
+Closes: #942915
+
+ -- Michael Shuler   Thu, 11 Jun 2020 08:38:00 -0500
 
 ca-certificates (20200601) unstable; urgency=medium
 
diff -Nru ca-certificates-20200601~deb10u1/debian/control 
ca-certificates-20200611~deb10u1/debian/control
--- ca-certificates-20200601~deb10u1/debian/control 2020-06-03 
13:09:34.0 -0500
+++ ca-certificates-20200611~deb10u1/debian/control 2

Bug#962669: RFS: ca-certificates/20200611 [RC] -- Common CA certificates

2020-06-11 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200611
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates
   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200611.dsc


Changes since the last upload:

   * mozilla/blacklist:
 Revert Symantec CA blacklist (#911289). Closes: #962596
 The following root certificates were added back (+):
 + "GeoTrust Global CA"
 + "GeoTrust Primary Certification Authority"
 + "GeoTrust Primary Certification Authority - G2"
 + "GeoTrust Primary Certification Authority - G3"
 + "GeoTrust Universal CA"
 + "thawte Primary Root CA"
 + "thawte Primary Root CA - G2"
 + "thawte Primary Root CA - G3"
 + "VeriSign Class 3 Public Primary Certification Authority - G4"
 + "VeriSign Class 3 Public Primary Certification Authority - G5"
 + "VeriSign Universal Root Certification Authority"
 .
   [ Gianfranco Costamagna ]
   * debian/{rules,control}:
 Merge Ubuntu patch from Matthias Klose to use Python3 during build.
 Closes: #942915

Regards,

--
  Michael Shuler



Bug#962596: ca-certificates: Removal of GeoTrust Global CA requires investigation

2020-06-11 Thread Michael Shuler

Control: severity -1 serious
Control: tags -1 + pending
Control: tags 942915 + pending

Bump severity. Pending branch commits:

master: commit 679daf6e9bf6fcdcb574b8029297d24836fafde0
  Revert "Set release 20200601; add Symantec CAs to blacklist"
  This reverts commit 1efe81a680eedb94111716c8825290a0cde509af.

debian-buster: commit 442fd47f4831483b72329e0df1f6260e4a91ab36
  Merge branch 'master' into debian-buster

debian-stretch: commit c151326dda72f703f7001f655e331b548eb1e411
  Merge branch 'debian-buster' into debian-stretch

Kind regards,
Michael



Bug#962596: ca-certificates: Removal of GeoTrust Global CA requires investigation

2020-06-11 Thread Michael Shuler

Control: severity -1 important

(cc'ed bug reporters and those on a direct email to ack)

On 6/10/20 3:27 PM, Carlos Alberto Lopez Perez wrote:

On 10/06/2020 16:51, Philippe Normand wrote:

Since the update of ca-certificates to version 20200601 I can no longer access
webkit.org websites.


The removed CA (GeoTrust Global CA) is used to sign the Apple
intermediate certificate "Apple IST CA 2 - G1".

Firefox and Chrome have some sort of hack (likely a whitelist)
specifically to trust this Apple's intermediate CAs:
https://wiki.mozilla.org/CA/Additional_Trust_Changes#Symantec

So the website still works in Firefox and Chrome on Debian, even with
GeoTrust removed. But it doesn't work with GnuTLS (or the Epiphany web
browser).


Thanks for the bug report. I will work on reverting the blacklist commit 
and get with the release team when that is completed.


Kind regards,
Michael



Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler

On 6/5/20 10:35 AM, Adrian Bunk wrote:

Except for keeping debian/NEWS you were actually backporting everything
that was possible, this was not a 20161130+nmu1+deb9u2 release that
cherry-picked only one or few changes.

Given the nature of ca-certificates it was IMHO the correct decision
to backport as much as possible, it is just not "backporting as little
as possible".

Since similar updates to stable releases might happen in the future,
I would recommend that you try to get build and runtime dependencies in
unstable to a level that allows rebuilding the package in all supported
Debian releases. For compatibility with buster this would include
staying at dh compat <= 12.

"Backporting everything possible" changes are often safest when the only
change in the ~deb10u1 source package is the entry in debian/changelog.


I uploaded an updated package for 20200601~deb9u1 to mentors and updated 
#962155 for approval.


Backporting the latest changes to stable and oldstable was the essence 
of a conversation on making that simpler with this package. These 
uploads get us a lot closer. The branch diffs are not far off now.


Stretch has an openssl version without `openssl rehash`, but that is not 
a large diff. Both stretch & buster will have python->python3 difference 
from unstable on the next release, but that's also not a large diff. I 
hadn't thought about leaving older compat and standards in unstable, I 
generally try to keep lintian pleased.. not a bad idea, if no one minds 
much.


Thanks again - I'll update this RFS when #962155 comes back from the 
release team.


Michael



Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-05 Thread Michael Shuler

On 6/5/20 10:37 AM, Adam D. Barratt wrote:

On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote:

Thanks again, uploaded to mentors:

RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
https://bugs.debian.org/962245


I re-uploaded to mentors the updated 20200601~deb9u1 package artifacts 
with the suggested changes committed.



I see there was some additional feedback on the RFS, which is why this
hasn't been uploaded yet.

It makes sense to combine the release via stretch-updates and buster-
updates, so we can release a single SUA and users don't have to stagger
updates. On that basis, I'll hold off on that until we have more idea
what's happening with the stretch update.


Yes, Adrian was super helpful with this style of backporting latest. 
With that advice, here is the current package debdiff from latest 
version, which gets us where we want:


$ debdiff ca-certificates_20200601_all.deb 
ca-certificates_20200601~deb9u1_all.deb

File lists identical (after any substitutions)

Control files: lines which differ (wdiff format)

Depends: openssl (>= [-1.1.1),-] {+1.0.0),+} debconf (>= 0.5) | debconf-2.0
Installed-Size: [-381-] {+380+}
Version: [-20200601-] {+20200601~deb9u1+}


Updated changelog adds the removal of email-only roots from stretch:

ca-certificates (20200601~deb9u1) stretch; urgency=medium

  * Rebuild for stretch.
  * Merge changes from 20200601
- d/control
  * This release updates the Mozilla CA bundle to 2.40, blacklists
distrusted Symantec roots, and blacklists expired "AddTrust External
Root". Closes: #956411, #955038, #911289, #961907
  * Fix permissions on /usr/local/share/ca-certificates when using 
symlinks.

Closes: #916833
  * Remove email-only roots from mozilla trust store. Closes: #721976


Attached is the updated debdiff.gz from oldstable->this_backport and 
those stats:


diffstat for ca-certificates-20161130+nmu1+deb9u1 
ca-certificates-20200601~deb9u1


 .gitignore  |   12
 debian/NEWS |  393 ---
 debian/ca-certificates.postinst |8
 debian/changelog|  231 +
 debian/copyright|   14
 mozilla/blacklist.txt   |   54
 mozilla/certdata.txt| 4927 


 mozilla/certdata2pem.py |2
 mozilla/nssckbi.h   |6
 9 files changed, 2734 insertions(+), 2913 deletions(-)
----

Kind regards,
Michael Shuler



ca-certificates_20200601~deb9u1.debdiff.gz
Description: application/gzip


Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler

On 6/5/20 4:15 AM, Adrian Bunk wrote:

Compared to 20200601 and 20200601~deb10u1 this contains the following
additional files:

/usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt
/usr/share/ca-certificates/mozilla/Camerfirma_Global_Chambersign_Root.crt
/usr/share/ca-certificates/mozilla/Certum_Root_CA.crt
/usr/share/ca-certificates/mozilla/D-TRUST_Root_CA_3_2013.crt
/usr/share/ca-certificates/mozilla/SwissSign_Platinum_CA_-_G2.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/ca-certificates/mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt
/usr/share/doc/ca-certificates/NEWS.Debian.gz

The additional NEWS.Debian.gz is either correct or harmless,
the additional certificates are not.

This is due to the backport missing the "Remove email-only roots from
mozilla trust store" (#721976) change that is in 20200601.


Great catch, thanks, result of using currentver~debXuY as discussed with 
some people for better update recognition, while backporting as little 
as possible. I was diffing 20161130+nmu1+deb9u1 to 
ca-certificates-20200601~deb9u1, so this is also a good check the other 
direction.


I hadn't removed d/NEWS, which was dropped in later versions.

I also had not modified certdata2pem.py from the latest. I will take a 
look at the changes for #721976 and see if it seems ok, I think the 
email root removal backport is reasonable.



Please update the stretch-pu request with that fixed and let me know
when the corrected debdiff is approved.


Will do, thank you for the feedback.

--
Kind regards,
Michael



Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-04 Thread Michael Shuler

Thanks again, uploaded to mentors:

RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
https://bugs.debian.org/962245

--
Kind regards,
Michael



Bug#962152: buster-pu: package ca-certificates/20200601~deb10u1

2020-06-04 Thread Michael Shuler

Thank you. Uploaded to mentors:

RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates
https://bugs.debian.org/962244

--
Kind regards,
Michael



Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-04 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

** stretch-pu approval and debdiff can be found on:
   https://bugs.debian.org/962155

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb9u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates 
(debian-stretch branch)

   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb9u1.dsc


Changes since the last upload:

   * Rebuild for stretch.
   * Merge changes from 20200601
 - d/control
   * This release updates the Mozilla CA bundle to 2.40, blacklists
 distrusted Symantec roots, and blacklists expired "AddTrust External
 Root". Closes: #956411, #955038, #911289, #961907
   * Fix permissions on /usr/local/share/ca-certificates when using 
symlinks.

 Closes: #916833

Thank you sponsor!

--
Kind regards,
Michael Shuler



Bug#962244: RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates

2020-06-04 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

** buster-pu approval and debdiff can be found on:
   https://bugs.debian.org/962152

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb10u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates 
(debian-buster branch)

   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb10u1.dsc


Changes since the last upload:

   * Rebuild for buster.
   * Merge changes from 20200601
 - d/control; set d/gbp.conf branch to debian-buster
   * This release updates the Mozilla CA bundle to 2.40, blacklists
 distrusted Symantec roots, and blacklists expired "AddTrust External
 Root". Closes: #956411, #955038, #911289, #961907

Thank you sponsor!

--
Kind regards,
Michael Shuler



Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-03 Thread Michael Shuler

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


* Note: Please, upload this to stretch-updates as well to fix ongoing 
issues with failing web services from the expired AddTrust certificate. 
See #961907 for details.


I would like to upload ca-certificates_20200601~deb9u1 with the 
following fixes:


ca-certificates (20200601~deb9u1) stretch; urgency=medium

  * Rebuild for stretch.
  * Merge changes from 20200601
- d/control
  * This release updates the Mozilla CA bundle to 2.40, blacklists
distrusted Symantec roots, and blacklists expired "AddTrust External
Root". Closes: #956411, #955038, #911289, #961907
  * Fix permissions on /usr/local/share/ca-certificates when using 
symlinks.

Closes: #916833


diffstat for ca-certificates-20161130+nmu1+deb9u1 
ca-certificates-20200601~deb9u1


 .gitignore  |   12
 debian/ca-certificates.postinst |8
 debian/changelog|  228 +
 debian/copyright|   14
 mozilla/blacklist.txt   |   54
 mozilla/certdata.txt| 4927 


 mozilla/nssckbi.h   |6
 7 files changed, 2731 insertions(+), 2518 deletions(-)

Full debdiff.gz attached, due to the size of certdata changes.

--
Kind regards,
Michael Shuler


ca-certificates_20200601~deb9u1.debdiff.gz
Description: application/gzip


Bug#962152: buster-pu: package ca-certificates/20200601~deb10u1

2020-06-03 Thread Michael Shuler

Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu


* Note: Please, upload this to buster-updates as well to fix ongoing 
issues with failing web services from the expired AddTrust certificate. 
See #961907 for details.



I would like to upload ca-certificates_20200601~deb10u1 with the 
following fixes:


ca-certificates (20200601~deb10u1) buster; urgency=medium

  * Rebuild for buster.
  * Merge changes from 20200601
- d/control; set d/gbp.conf branch to debian-buster
  * This release updates the Mozilla CA bundle to 2.40, blacklists
distrusted Symantec roots, and blacklists expired "AddTrust External
Root". Closes: #956411, #955038, #911289, #961907


diffstat for ca-certificates-20190110 ca-certificates-20200601~deb10u1

 debian/changelog  |   59
 debian/copyright  |   12
 debian/gbp.conf   |2
 mozilla/blacklist.txt |   26
 mozilla/certdata.txt  | 3908 
--

 mozilla/nssckbi.h |4
 6 files changed, 2318 insertions(+), 1693 deletions(-)

Full debdiff.gz attached, due to the size of certdata changes.

--
Kind regards,
Michael


ca-certificates_20200601~deb10u1.debdiff.gz
Description: application/gzip


Bug#942915: ca-certificates: Python2 removal in sid/bullseye

2020-06-03 Thread Michael Shuler

tags 942915 + pending
thanks

On 6/3/20 6:25 AM, Gianfranco Costamagna wrote:


the patch is now committed on the shared git, but I don't plan to upload it.
(I don't like to touch native packages when possible)


I was just looking at this exact change last night, thanks for the 
commit. It wasn't clear to me that python3 could be expected to be 
installed on a minimal unstable OS, since the python wiki page lists, 
"Debian Unstable contains some 2.x and 3.x, python2 is being removed".


Works for me to include in unstable, since the python2 removal is on the 
way, but may result in a little fallout until removal is completed.


Kind regards,
Michael



Bug#962008: RFS: ca-certificates/20200601 [RC] -- Common CA certificates

2020-06-03 Thread Michael Shuler

On 6/3/20 1:37 AM, Adrian Bunk wrote:


ca-certificates (20200601) unstable; urgency=medium
ca-certificates (20200601~deb10u1) buster-security; urgency=medium
ca-certificates (20200601~deb9u1) stretch-security; urgency=medium

Did you already agree with the security team (Cc'ed) that these should
also be published as DSA for stable and oldstable?

If yes, a security team member might be the best person to sponsor these
for unstable/buster-security/stretch-security.

If they shouldn't be treated as DSA, the uploads for stable and
oldstable have to be done differently.

BTW: What is the next expiry date of any certificate in ca-certificates?


(Note: 20200601 has been uploaded to unstable by Andrew Shadura 
 - thank you for the upload, Andrew.)


Re: exipry dates:

Generally, expiry date has not been an issue remaining in the bundle 
until removal upstream, since the certification authorities have managed 
migration to new roots well and openssl>=1.1.1 handles this gracefully. 
This appears to have not been the case with AddTrust and older 
openssl<1.1.1 bug, as that fix was not backported, to the best of my 
understanding.


I would have to cycle through all the certs to see what dates are 
upcoming, but this is a new(old-openssl) problem, apparently. I don't 
have that bit of time at this very moment.


Re: security uploads:

I have received no reply from the security team, as of this message, so 
awaiting their OK/advice. Copy of email sent to team@security, since 
there is no secret info in here:


 Forwarded Message 
Subject: ca-certificates: buster-security & stretch-security (and sid) 
uploads

Date: Mon, 1 Jun 2020 22:22:47 -0500
From: Michael Shuler 
To: t...@security.debian.org

Hi Security Team,

I committed changes to to git for an RC security issue, as well as 
update the certificate bundle to current. This has been critical for a 
number of web services failing due to the expired certificate on older 
operating systems. Evidently this has been fixed in openssl-1.1.1, but 
never backported.


I have prepared unstable, and stable/oldstable security updates on mentors.

https://salsa.debian.org/debian/ca-certificates/

master sha for unstable (ca-certificates_20200601):
b3a8980b · Fix typo on AddTrust CN

RC bug fixed:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961907
CA update:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955038
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956411
Symantec roots explicitly blacklisted:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911289

The master branch was merged to the debian-buster and debian-stretch 
branches (control file kept) and releases created for buster-security 
and stretch-security


debian-buster sha (ca-certificates_20200601~deb10u1):
5256b350 · Set buster-security for suite

debian-stretch sha (ca-certificates_20200601~deb10u1):
7bd8f941 · Set stretch-security for suite

I uploaded all 3 to mentors and they are ready to be sponsored:

https://mentors.debian.net/package/ca-certificates

bug#s for the mentors upload requests:

unstable:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962008
buster-security:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962009
stretch-security:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962010

Please, let me know if I can provide any additional info.

Kind regards,
Michael



Bug#962079: Blacklist Expired Certificate: CN=Staat der Nederlanden Root CA - G2

2020-06-02 Thread Michael Shuler

Package: ca-certificates
Version: 20200601
Severity: normal

Follow up to #955038, expired certificate "Staat der Nederlanden Root CA 
- G2" remains in the Mozilla bundle. If the CA managed their migration 
to the same-named G3 cert, this could be a non-issue, however the 
expired certificate can be blacklisted to effectively remove it.


CCing #955038 (remove in later replies, please) and BCCing the original 
and secondary reporters to acknowledge. Thanks for report and follow up 
on the error.


Kind regards,
Michael Shuler

--
$ openssl x509 -noout -startdate -enddate -in 
/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt

notBefore=Mar 26 11:18:17 2008 GMT
notAfter=Mar 25 11:03:10 2020 GMT
$ openssl x509 -noout -startdate -enddate -in 
/usr/share/ca-certificates/mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt

notBefore=Nov 14 11:28:42 2013 GMT
notAfter=Nov 13 23:00:00 2028 GMT



Bug#962010: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb9u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates
   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb9u1.dsc


Changes since the last upload:

  * Rebuild for stretch-security.
  * Merge changes from 20200601
- d/control
  * This security release updates the Mozilla CA bundle and blacklists
distrusted Symantec roots and the expired AddTrust External Root.

Regards,
Michael Shuler



Bug#962009: RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601~deb10u1
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates
   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb10u1.dsc


Changes since the last upload:

  * Rebuild for buster-security.
  * Merge changes from 20200601
- d/control; set d/gbp.conf branch to debian-buster
  * This security release updates the Mozilla CA bundle and blacklists
distrusted Symantec roots and the expired AddTrust External Root.

Regards,
Michael Shuler



Bug#962008: RFS: ca-certificates/20200601 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler

Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name: ca-certificates
   Version : 20200601
 * License : Mozilla Public License Version 2.0
 * Vcs : https://salsa.debian.org/debian/ca-certificates
   Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the 
following URL:


  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

  dget -x 
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601.dsc


Changes since the last upload:

  * debian/control:
Set Standards-Version: 4.5.0.2
Set Build-Depends: debhelper-compat (= 13)
  * debian/copyright:
Replace tabs in license text
  * mozilla/{certdata.txt,nssckbi.h}:
Update Mozilla certificate authority bundle to version 2.40.
Closes: #956411, #955038
  * mozilla/blacklist.txt
Add distrusted Symantec CA list to blacklist for explicit removal.
Closes: #911289
Blacklist expired root certificate, "AddTrust External Root"
Closes: #961907
The following certificate authorities were added (+):
+ "Certigna Root CA"
+ "emSign ECC Root CA - C3"
+ "emSign ECC Root CA - G3"
+ "emSign Root CA - C1"
+ "emSign Root CA - G1"
+ "Entrust Root Certification Authority - G4"
+ "GTS Root R1"
+ "GTS Root R2"
+ "GTS Root R3"
+ "GTS Root R4"
+ "Hongkong Post Root CA 3"
+ "UCA Extended Validation Root"
+ "UCA Global G2 Root"
The following certificate authorities were removed (-):
- "AddTrust External Root"
- "Certinomis - Root CA"
- "Certplus Class 2 Primary CA"
- "Deutsche Telekom Root CA 2"
- "GeoTrust Global CA"
- "GeoTrust Primary Certification Authority"
- "GeoTrust Primary Certification Authority - G2"
- "GeoTrust Primary Certification Authority - G3"
- "GeoTrust Universal CA"
- "thawte Primary Root CA"
- "thawte Primary Root CA - G2"
- "thawte Primary Root CA - G3"
- "VeriSign Class 3 Public Primary Certification Authority - G4"
- "VeriSign Class 3 Public Primary Certification Authority - G5"
- "VeriSign Universal Root Certification Authority"

Regards,
Michael Shuler



Bug#911289: Tagging Pending Bugs

2020-06-01 Thread Michael Shuler

tags 911289 + pending
tags 955038 + pending
tags 956411 + pending
tags 961907 + pending
thanks

This commit on master is good to go to fix the above bugs in unstable - 
marking them pending:


commit b3a8980b781bc9a370e42714a605cd4191bb6c0b
Commit: Michael Shuler 
CommitDate: Mon Jun 1 14:38:12 2020 -0500

Fix typo on AddTrust CN


Looking at stable, oldstable builds using the same commit, next. Likely 
standards/compat need downgrading, but should work ok as-is otherwise.


CCing Thijs and a few others directly for upload, or I can go the 
mentors route. Thank you, sponsor!


--
Kind regards,
Michael



Bug#956411: ca-certificates: please update to latest Mozilla bundle

2020-04-10 Thread Michael Shuler
Thanks for the bug report. I've checked in the latest release branch 
certdata, so the recent adds/removes will be up in the next release. 
I'll try to get that release built soon, it has indeed been a while.


Kind regards,
Michael



Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2020-02-05 Thread Michael Shuler

On 2/5/20 11:12 AM, Dan Nicholson wrote:

I recently ran into this same issue and dug into it for a while. The
real problem stems from
https://sourceware.org/bugzilla/show_bug.cgi?id=23960. The issue is
that glibc 2.28 changed readdir to always use getdents64. This causes
problems when you're running a 32 bit guest in QEMU on a 64 bit host.
So, this would also affect running an i386 guest on an x86_64 host,
for example.


Thanks for the details. This appears more to me now that this is a lower 
level issue than the symptomatic behavior we see in processing 
certificates. (ie. this is not a bug with ca-certificates, but with openssl)





So, I think there are a few options on what to do.

1. Change update-ca-certificates back to using c_rehash. Presumably
perl is built with LFS and it's readdir wrapper DTRT.


c_rehash could be removed at any time, so I don't think this is a good 
option.



2. Build openssl with LFS as noted above.


Noted, thanks. This is why I am starting to believe this is a bug with 
openssl, not ca-certificates.



3. Wait for a fix to be hashed out between the glibc, kernel and qemu folks.


..which I suppose is indeed the eventual lower level issue to resolve, 
below openssl.


--
Kind regards,
Michael



Bug#927879: ca-certificates should not hardcode QuoVadis certificate authorities in /etc/ca-certificates.conf

2019-04-24 Thread Michael Shuler

On 4/24/19 5:22 PM, Soppy bear wrote:


1. This is a Debian problem because the end user should be able to
use TLS without having to import/use certificates without any
practical use for normal operations.


Users *can* configure the ca-certificate package and set CA trust for 
each and every CA, as well as configure new-CA trust however they wish. 
Users can preseed debconf at installation time to trust no CAs, if they 
so desire. I'm not going to get into the details of preseeding 
installations, but runtime configuration is done with:


  dpkg-reconfigure ca-certificates

Please, describe the problem better, if there is a concrete bug. The 
description here and previously make little sense to me, other than a 
personal preference and misunderstanding of how to configure CA trust.


If there is a CA in the current Mozilla bundle that is problematic for 
you and the Internet, please contact Mozilla with this information, if 
there is evidence of evil doings, Mozilla is the correct project to 
inform. If you don't trust a particular CA that is in the current 
Mozilla bundle, disable it. You can automate this, if you maintain a 
large number of systems.



2. I have removed Firefox from my systems permanently because of this
reason and upgraded my research laptop to debian unstable for this
specific reason.


OK. What does this have to do with the ca-certificates package?

--
Kind regards,
Michael



Bug#923942: postinst script error: mv: cannot move '/tmp/ca-certificates.crt.tmp.hi8W7j' to a subdirectory of itself, 'ca-certificates.crt'

2019-03-19 Thread Michael Shuler
On 3/19/19 3:29 AM, Michael Stapelberg wrote:
> So I debugged this some more, and found out that the problem is that
> moving *any files* from /tmp to /etc does not work, but only within the
> Docker container running on travis-ci, and only when configured with
> “group: deprecated-2017Q3”. The fix is to remove that config option:
> https://github.com/i3/i3/pull/3650.
> 
> I will write this off to kernel weirdness, but, independently of this
> issue, it might make sense to change update-ca-certificates to no longer
> need /tmp and instead create the temporary files within /etc, which
> would get us closer to an atomic replacement.

I appreciate the follow up. I did some quick reproduction attempts last
weekend, but was unable to get the same behavior, so this makes more
sense. There's another recent edge case bug, #923784 (full root
partition), that may benefit from using an explicit /etc path with
mktmp, so maybe we'll get a 2 for 1 fix.

-- 
Kind regards,
Michael



Bug#923784: update-ca-certificates: corrupts ca-certificates.crt on full root file system

2019-03-07 Thread Michael Shuler
On 3/5/19 11:47 AM, Arthur de Jong wrote:
> I have created a merge request in Salsa for this:
> https://salsa.debian.org/debian/ca-certificates/merge_requests/2

Thank for the MR. I'll take a look.

-- 
Kind regards,
Michael



Bug#923942: postinst script error: mv: cannot move '/tmp/ca-certificates.crt.tmp.hi8W7j' to a subdirectory of itself, 'ca-certificates.crt'

2019-03-07 Thread Michael Shuler
On 3/7/19 8:13 AM, Michael Stapelberg wrote:
> Package: ca-certificates
> Version: 20190110
> Severity: normal
> 
> The i3 continuous integration testing on travis-ci.org currently fails:
> 
> Setting up ca-certificates (20190110) ...
> Updating certificates in /etc/ssl/certs...
> mv: cannot move '/tmp/ca-certificates.crt.tmp.hi8W7j' to a subdirectory of 
> itself, 'ca-certificates.crt'
> dpkg: error processing package ca-certificates (--configure):
>  installed ca-certificates package post-installation script subprocess 
> returned error exit status 1
> 
> See https://travis-ci.org/i3/i3/jobs/503115864 for the full log.
> 
> Have not dug any deeper, but perhaps this rings a bell, or is obvious from the
> error message. Let me know if you need more details.

Thank you. I have not seen this error before, but will dig around!

-- 
Kind regards,
Michael



Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
On 2/28/19 7:37 PM, James Pooton wrote:
> So installing ca-certificates (20170717) with the latest openssl
> (1.1.1a-1), does produce the hashes in /etc/ssl/certs when doing an ARM
> 32bit build via QEMU.
> 
> One interesting thing is that the 382 syscalls were still present in the
> build, so that may be a red herring:
> 
> ...
>     Preparing to unpack .../ca-certificates_20170717_all.deb ...
>     Unpacking ca-certificates (20170717) ...
>     Setting up ca-certificates (20170717) ...
>     Updating certificates in /etc/ssl/certs...
>     qemu: Unsupported syscall: 382
>     148 added, 0 removed; done.
>     Processing triggers for ca-certificates (20170717) ...
>     Updating certificates in /etc/ssl/certs...
>     qemu: Unsupported syscall: 382
>     0 added, 0 removed; done.
> ...

Interesting, thanks. So c_rehash works fine-ish, which we were pretty
sure of, and the same behavior with the syscall errors.

/usr/bin/c_rehash is perl with a few calls out to openssl within.

You could try to debug by directly running `sudo openssl rehash -v
/etc/ssl/certs` on either version of ca-certificates (new one has new
CAs added, old ones removed, and a couple other bug fixes, but openssl
behavior should be the same).

> The only other thing I noticed (which certainly may not be related) is
> that a a few of the CA cert filename must have some crazy UTF8
> characters that get encoded (“NetLock_Arany”,
> “RKTRUST_Elektronik_Sertifika_Hizmet_Sa”, “k_Sertifika_Hizmet_Sa”).
>  Just seemed odd, and potentially something that could trip things up.

Yep, there are a few CAs with UTF8 labels, so the files are written out
that way. I was included in a conversation maybe 2 years ago with
someone that did some UTF8 filename research through the package
repositories, but there haven't been any issues raised.

An example of the options would be the existing UTF8:
"NetLock Arany (Class Gold) Főtanúsítvány"
or:
"NetLock Arany (Class Gold) F..tan..s..tv..ny"

F..who? :) I think the native UTF8 is a better option. It's probably a
bug if some file widget does not handle UTF8 files correctly.

-- 
Kind regards,
Michael



Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
On 2/28/19 4:30 PM, James Pooton wrote:
> 
>> What version of the openssl package is installed?
> 
> Currently we’ve got the following versions getting installed:
> 
> openssl: Installed: 1.1.1a-1 Candidate: 1.1.1a-1 Version table: ***
> 1.1.1a-1 500 500 http://deb.debian.org/debian buster/main armhf
> Packages 100 /var/lib/dpkg/status
> 
> ca-certificates: Installed: 20190110 Candidate: 20190110 Version
> table: *** 20190110 500 500 http://deb.debian.org/debian buster/main
> armhf Packages 100 /var/lib/dpkg/status
> 
> 
>> This does sound like a potential issue with `openssl rehash`. Your 
>> workaround looks OK for the moment, but the problem is that the
>> openssl devs would like to remove the deprecated `c_rehash`
>> utility. At this point in the release cycle, it's possible c_rehash
>> may stick around for Buster, but no guarantees from me on that one
>> - that's up to the openssl folks.
> 
> Yep..  I actually read about that in the issue where that was
> changed.  Just wasn’t able to get ‘openssl rehash’ to work myself
> either, so fell back to the deprecated call for now.
> 
> 
>>> qemu: Unsupported syscall: 382
>> 
>> I can't find what syscall 382 should be, it seems to be higher than
>> all the numbers I can find, the higest number is 294.
> 
> I’m with you on that.  It’s odd, but that’s the syscall number I’ve
> seen on Docker for Mac, Windows, and Linux using QEMU.  Linux also
> kicks out some 384 but it didn’t appear related.
> 
>> Can you give combination of ca-certificates / openssl that works /
>> fails?
> 
> I actually was looking to see if I could just apt install the
> previous packages to verify things, but they don’t seem to be options
> in the repo any more according to apt-cache.  But I’ll see if I can’t
> find the previous packages that were being install when things were
> building fine.  I’ll let you know.

20170717 was the previous version in testing (20180409 introduced the
`openssl rehash` usage and was kept from testing for an important bug).

20170717 used the perl c_rehash utility. If you need it, here it is!

http://snapshot.debian.org/package/ca-certificates/20170717/#ca-certificates_20170717

-- 
Kind regards,
Michael



Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
What version of the openssl package is installed?

This does sound like a potential issue with `openssl rehash`. Your
workaround looks OK for the moment, but the problem is that the openssl
devs would like to remove the deprecated `c_rehash` utility. At this
point in the release cycle, it's possible c_rehash may stick around for
Buster, but no guarantees from me on that one - that's up to the openssl
folks.

-- 
Kind regards,
Michael



Bug#922062: ca-certificates package post-installation script subprocess returned error exit status 1

2019-02-11 Thread Michael Shuler
On 2/11/19 12:51 PM, Michel Meyers wrote:
> Mystery solved: Somebody (or something) placed a private key in a file
> called privkey.pem and stored it in /etc/ssl/certs. This caused openssl
> rehash to silently exit with error code 1, thus causing the whole
> postinst script to fail.
> 
> After cleaning out the offending file, the package installed without any
> problems.

Thanks for the debugging info. I tried to reproduce a non-zero exit from
both the old c_rehash and new openssl rehash calls, in order to see if
we've found another behavior difference, but each call ended up with a
clean 0 exit for me with a key file in the same place.

cd /etc/ssl/certs/
sudo cp ../private/ssl-cert-snakeoil.key privkey.pem
sudo c_rehash -v .
echo $?
sudo openssl rehash -v .
echo $?
sudo update-ca-certificates --fresh -v
echo $?
sudo rm privkey.pem

I do see an expected warning "rehash: warning: skipping privkey.pem,it
does not contain exactly one certificate or CRL" but no non-zero exit. I
do have the same version of openssl installed, 1.1.1a-1.

I'd like to see if we can reproduce and maybe come up with some basic
error avoidance, if this is a common practice to put keys here? (I
wouldn't, so not sure how common this is.)

Kind regards,
Michael



Bug#922062: ca-certificates package post-installation script subprocess returned error exit status 1

2019-02-11 Thread Michael Shuler
Control: tag -1 moreinfo

On 2/11/19 9:58 AM, Michel Meyers wrote:
> 
> Setting up ca-certificates (20190110) ...
> Updating certificates in /etc/ssl/certs...
> dpkg: error processing package ca-certificates (--configure):
>  installed ca-certificates package post-installation script subprocess 
> returned error exit status 1
> --
> 
> It's not quite clear why (error message doesn't point to a particular
> issue). I'm thinking it's something on this box causing the postinst
> script to error out, but have no leads as to
> what.

Tagging moreinfo. I guess you could escalate `dpkg --debug=$X`
troubleshooting on your system. Corrupt file? Bad disk? etc. If it's
hardware and not related to ca-certificates, we should close this.

Thanks,
Michael



Bug#920348: ca-certificates.crt bundle gets temporarily removed during update-ca-certificates

2019-01-24 Thread Michael Shuler
On 1/24/19 7:54 AM, Dimitris Aragiorgis wrote:
> 
> It seems that update-ca-certificates temporarily removes the
> /etc/ssl/certs/ca-certificates.crt bundle.

I remember this bug. c_rehash behavior was "fixed" at some point and
resulted in multiple symlinks to ca-certificates.crt, so moving it out
of the way first was the workaround.

https://bugs.debian.org/643667 and the linked LP bug within have the
details.

> As a result, whoever uses this file explicitly, e.g. python-requests via
> DEFAULT_CA_BUNDLE_PATH, might fail during a system-wide
> update-ca-certificates.
> 
> Removing this file is practically unesseccery since a few lines below,
> the script replaces it atomically using mv.
> 
> Note, that currently, if we skip the removal of the bundle we get the
> following openssl rehash warning:
> 
>   rehash: warning: skipping ca-certificates.crt,it does not contain exactly 
> one certificate or CRL
> 
> Still `openssl rehash` exits normally. The above warning will show up
> only in debug mode (with --verbose).

Nice.

> Attached is a patch that fixes the above "racy" behavior.

Thanks for the bug report and patch, this is a good cleanup from
dropping c_rehash that I hadn't considered looking for.

-- 
Kind regards,
Michael



signature.asc
Description: OpenPGP digital signature


Bug#919433: RFS: ca-certificates/20190110 [RC;Security]

2019-01-15 Thread Michael Shuler
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

  * Package name: ca-certificates
Version : 20190110
  * License : GPL-2+, MPL-2.0
Section : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb (udeb)

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ca-certificates


Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20190110.dsc

Changes since the last upload:

ca-certificates (20190110) unstable; urgency=high

  * debian/control:
Depend on openssl (>= 1.1.1).
Set Standards-Version: 4.3.0.1.
Set Build-Depends: debhelper-compat (= 12); drop d/compat
Remove trailing whitespace from d/changelog.
  * debian/ca-certificates.postinst:
Fix permissions on /usr/local/share/ca-certificates when using symlinks.
Closes: #916833
  * sbin/update-ca-certificates:
Remove orphan symlinks found in /etc/ssl/certs to prevent `openssl
rehash` from exiting with an error. Closes: #895482, #895473
This will also fix removal of user CA certificates from /usr/local
without
needing to run --fresh. Closes: #911303
  * mozilla/{certdata.txt,nssckbi.h}:
Update Mozilla certificate authority bundle to version 2.28.
The following certificate authorities were added (+):
+ "GlobalSign Root CA - R6"
+ "OISTE WISeKey Global Root GC CA"
The following certificate authorities were removed (-):
- "Certplus Root CA G1"
- "Certplus Root CA G2"
- "OpenTrust Root CA G1"
- "OpenTrust Root CA G2"
- "OpenTrust Root CA G3"
- "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
- "Visa eCommerce Root"

 -- Michael Shuler   Thu, 10 Jan 2019 19:31:31 -0600

-- 
Kind regards,
Michael





signature.asc
Description: OpenPGP digital signature


Bug#918957: RFS: ifmetric/0.3-5

2019-01-10 Thread Michael Shuler
Package: sponsorship-requests
Severity: normal

Hi mentors,

I am looking for a sponsor for "ifmetric", as well as possible support
for allowing me to upload as a DM.

Previous uploaders, since I've adopted ifmetric:
Gianfranco Costamagna 
Nicholas Breen 

This is not a frequently updated package and I'm not learning anything
new by just asking other people to upload every couple years. I have
requested support for DM upload on ifmetric from one of my
ca-certificates uploaders and received no reply (it was a long time ago..).

Anyway, here's the changelog, and if you're so inclined, I would be very
appreciative of a review of the changes and allowing me to do the actual
upload after a:

  dcut dm --uid 0xA278B781FE4B2BDA --allow ifmetric



 * Package name: ifmetric
   Version : 0.3-5
   Upstream Author : Lennart Poettering 
 * URL : http://0pointer.de/lennart/projects/ifmetric/
 * License : GPL-2+
   Section : net

It builds those binary packages:

  ifmetric   - Set routing metrics for a network interface

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ifmetric

Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/i/ifmetric/ifmetric_0.3-5.dsc

Changes since the last upload:

ifmetric (0.3-5) unstable; urgency=medium

  * debian/{compat,control,copyright}:
Update to debhelper-compat (= 12) build dependency; drop d/compat
Update to standards version 4.3.0.1
Update to salsa Vcs-Browser/Vcs-Git URLs
Update to priority optional
Update to https copyright format URL
  * Fix "NETLINK: Error: Invalid argument" for links that are down in kernel
4.4+. Thanks for the patch, Jim Paris. Closes: #864889

 -- Michael Shuler   Thu, 10 Jan 2019 13:17:26 -0600

The package is lintian clean with a couple pedantic warnings.

The package shows 2 warnings on the mentors site that I have not been
able to resolve (bugs with mentors site?):
- Buildsystem: Package uses debhelper with an old compatibility level
  - package is using:  Build-Depends: debhelper-compat (= 12)
- Watch file is not present
  - package has a d/watch file and uscan works as expected

I appreciate your time, and let me know if I need to fix something up.

Kind regards,
Michael



Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2019-01-10 Thread Michael Shuler
Control: tags -1 + pending

Quick update for the new git repo location and tag pending.

https://salsa.debian.org/mshuler-guest/ifmetric

-- 
Kind regards,
Michael



Bug#911303: Symlink not removed when certificates from /usr/local/share/ca-certificates is removed

2018-12-20 Thread Michael Shuler
On 10/18/18 8:08 AM, Laurent Bigonville wrote:
> 
> In the past I've added certificates in /usr/local/share/ca-certificates
> 
> After running update-ca-certificates symlinks were added in
> /etc/ssl/certs
> 
> After removing the files from /usr/local/share/ca-certificates and
> running update-ca-certificates again, the symlinks are not removed and
> are now broken.

A patch for a couple other bug reports is going to fix this without
running `update-ca-certificates --fresh`.  Using --fresh will remove
*all* symlinks and generate the entire set, so that will always work in
this case.

https://salsa.debian.org/debian/ca-certificates/commit/cfe7064cb707ed2e8ac587877c1153029d46dc28

This is going to find and remove any broken symlinks from /etc/ssl/certs
before running `openssl rehash`, so we should catch a removal of a
custom certificate from /usr/local/share/ca-certificates.

-- 
Kind regards,
Michael



Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-12-20 Thread Michael Shuler
I've been able to test this error by creating a bogus symlink in
/etc/ssl/certs and I committed a patch that removes any orphan symlinks,
prior to running `openssl rehash`.

https://salsa.debian.org/debian/ca-certificates/commit/cfe7064cb707ed2e8ac587877c1153029d46dc28

-- 
Kind regards,
Michael.



Bug#916833: SECURITY: world writable /srv/local/share/ca-certificates

2018-12-19 Thread Michael Shuler
On 12/19/18 3:10 AM, Maurizio Sartori wrote:
> 
>* Possible correction
>   The problem seems to be in
>  /var/lib/dpkg/info/ca-certificates.postinst
>   the stat command should have the '-L' switch
> 
>   So for example:
>  chmod $(stat -c %a /usr/local) /usr/local/share/ca-certificates
>  chown $(stat -c %u /usr/local):$(stat -c %g /usr/local) 
> /usr/local/share/ca-certificates
>   should became
>  chmod $(stat -c %a -L /usr/local) /usr/local/share/ca-certificates
>  chown $(stat -c %u -L /usr/local):$(stat -c %g -L /usr/local) 
> /usr/local/share/ca-certificates

Thanks for the bug report.

-- 
Kind regards,
Michael



Bug#911289: ca-certificates should remove Symantec certs

2018-10-18 Thread Michael Shuler
Thanks, I'll take a look. From memory, I recall this was a "certificates
after X date" logic in NSS, but the CAs are still in certdata.txt.

-- 
Kind regards,
Michael



Bug#911303: Symlink not removed when certificates from /usr/local/share/ca-certificates is removed

2018-10-18 Thread Michael Shuler
Did you run `update-ca-certificates --fresh`?

That's the flag that clears all symlinks, then updates.

-- 
Kind regards,
Michael

On 10/18/18 8:08 AM, Laurent Bigonville wrote:
> Package: ca-certificates
> Version: 20180409
> Severity: normal
> File: /usr/sbin/update-ca-certificates
> 
> Hi,
> 
> In the past I've added certificates in /usr/local/share/ca-certificates
> 
> After running update-ca-certificates symlinks were added in
> /etc/ssl/certs
> 
> After removing the files from /usr/local/share/ca-certificates and
> running update-ca-certificates again, the symlinks are not removed and
> are now broken.
> 
> I don't think this is intended, isn't it?
> 
> Kind regards,
> 
> Laurent Bigonville
> 
> -- System Information:
> Debian Release: buster/sid
>   APT prefers unstable-debug
>   APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 
> 'experimental-debug'), (1, 'experimental')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
> 
> Kernel: Linux 4.18.0-2-amd64 (SMP w/4 CPU cores)
> Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), 
> LANGUAGE=fr_BE.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: SELinux: enabled - Mode: Permissive - Policy name: refpolicy
> 
> Versions of packages ca-certificates depends on:
> ii  debconf [debconf-2.0]  1.5.69
> ii  openssl1.1.1-1
> 
> ca-certificates recommends no packages.
> 
> ca-certificates suggests no packages.
> 
> -- debconf information excluded
> 



Bug#908858: ca-certificates: hidden dependency on default-jre

2018-09-17 Thread Michael Shuler
Control: reassign -1 ca-certificates-java 20180516

Purge (not just remove) of the ca-certificates-java package should
remove config files, including
/etc/ca-certificates/update.d/jks-keystore. Reassigning to appropriate
package, ca-certificates-java, but perhaps this is wontfix.

-- 
Kind regards,
Michael

On 09/15/2018 01:58 AM, Marc Lehmann wrote:
> Package: ca-certificates
> Version: 20161130+nmu1+deb9u1
> Severity: normal
> 
> Dear Maintainer,
> 
> I get this error when installing openjdk-8-jre:i386 on an amd64 system, which 
> pulls in
> ca-certificates-java automatically:
> 
>Processing triggers for ca-certificates (20161130+nmu1+deb9u1) ...
>Updating certificates in /etc/ssl/certs...
>0 added, 0 removed; done.
>Running hooks in /etc/ca-certificates/update.d...
> 
>/etc/ca-certificates/update.d/jks-keystore: 86: 
> /etc/ca-certificates/update.d/jks-keystore: java: Permission denied
>E: /etc/ca-certificates/update.d/jks-keystore exited with code 1.
> 
> The way this happened is that I uninstalled opendjk-8.*, which removed 
> ca-certificates-java and default-jre. The result was that there was no "java" 
> executable in the PATH anymore.
> 
> Then, during installation of openjdk-8-jre:i386, I got the above error.
> 
> I was able top work around this by installing default-jre again, which gave 
> me a java executable.
> 
> I don't know if this is a problem in ca-certificates, ca-certificates-java, 
> openjdk or elsewhere, so apologies if I report this against the wrong package.
> 
> -- System Information:
> Debian Release: 9.5
>   APT prefers stable
>   APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
> 
> Kernel: Linux 4.18.7-041807-generic (SMP w/4 CPU cores)
> Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=C 
> (charmap=UTF-8)
> Shell: /bin/sh linked to /usr/bin/dash
> Init: systemd (via /run/systemd/system)
> 
> Versions of packages ca-certificates depends on:
> ii  debconf [debconf-2.0]  1.5.61
> ii  openssl1.1.0f-3+deb9u2
> 
> ca-certificates recommends no packages.
> 
> ca-certificates suggests no packages.
> 
> -- debconf information excluded
> 



Bug#903204: ca-certificates: Errors on updating to 20141019+deb8u4

2018-07-07 Thread Michael Shuler
Control: tags -1 + moreinfo

On 07/07/2018 10:21 AM, guidot wrote:
> I just updated from 20141019+deb8u3 to 20141019+deb8u4 using
> 
>   aptitude safe-upgrade
> 
> and got these errors:
> 
>   Updating certificates in /etc/ssl/certs... unable to load certificate
>   140549699909264:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong 
> tag:tasn_dec.c:1219:
>   140549699909264:error:0D07803A:asn1 encoding 
> routines:ASN1_ITEM_EX_D2I:nested asn1 error:tasn_dec.c:386:Type=X509
>   WARNING: dhparam.pem does not contain a certificate or CRL: skipping
>   20 added, 42 removed; done.
> 
> I don't understand what went wrong here. I'm pretty sure I didn't touch 
> anything in /etc/ssl/certs, my local certs are stored elsewhere.

This appears to be a warning from c_rehash on a non-certificate pem file
`dhparam.pem` found in /etc/ssl/certs, then success on the 20 new and 42
removed CA certificates in this update.

For clarity, did the installation of update packages complete
successfully, or did it exit non-zero with an error from aptitude/dpkg?

I'm pretty sure an `ls -l /etc/ssl/certs/dhparam.pem` would indeed
return the file, which is not a part of the ca-certificates package.

Searching around for dhparam.pem, it appears this is a Diffie-Hellman
option file for using a larger key than the openssl default. I found
quite a few web pages that say to put it there. The warning should be
innocuous, but I'd suggest moving it to a better location. For instance,
I found a number of nginx how-to pages that use the /etc/ssl/certs
location, but I would think it should be appropriate to put the file at
`/etc/nginx/ssl/dhparam.pem` and configure nginx to find it there.

Setting bug to moreinfo.

-- 
Kind regards,
Michael



Bug#901288: stretch-pu: package ca-certificates/20161130+nmu1

2018-07-05 Thread Michael Shuler

On 07/05/2018 03:37 PM, Adam D. Barratt wrote:

On Sun, 2018-06-10 at 21:22 -0500, Michael Shuler wrote:

I would like to upload ca-certificates_20161130+nmu1+deb9u1 with the
following fixes:
- update Mozilla CA bundle in Stretch to 2.22 (#858064)
- fix postinst failure on read-only /usr/local (#843722)
- remove Christian Perrier from uploaders per his request (#894070)



The Uploaders change is basically a no-op in stable, but please go
ahead, bearing in mind that the window for 9.5 closes this weekend.


Thanks for the update. I emailed my the active Uploaders to see if they 
can push this up in the short timeframe. For clarification, were you 
asking that the Uploaders change be omitted, or was this just an FYI? 
Much appreciated.


--
Kind regards,
Michael



Bug#895482: Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-06-21 Thread Michael Shuler

On 06/20/2018 04:33 PM, Sebastian Andrzej Siewior wrote:

On 2018-06-13 08:19:32 [+0200], To Axel Beckert wrote:

I asked upstream what they thing about ignoring these errors because the
perl script does so. On the other hand what about cleaning up these
dangling symlinks?


ca-certificate maintainers: what do we do here?

[ ] we intend to figure out why there are dangling symlinks, no need to
 change "openssl rehash" in anyway.

[ ] we intend to figure out why there are dangling symlinks but in the
 meantime "openssl rehash" should not error out on them.

[ ] "openssl rehash" should not error out on certificates which can not
 be opened. This is the old behavioud and required due to $reason.


[x] I intend to find the time between work, family, and multiple other
projects to attempt to reliably reproduce the problem, in order to
intelligently answer the above.

--
Kind regards,
Michael



Bug#901352: unblock: ca-certificates/20180409

2018-06-13 Thread Michael Shuler

On 06/13/2018 02:35 AM, Cyril Brulebois wrote:

It seems the block-udeb isn't the only blocker though:
 Migration status: BLOCKED: Rejected/introduces a regression
 Updating ca-certificates introduces new bugs: #895482

and I see no severity downgrade in that bug report?


It was upgraded back to serious again, yesterday, after some testing 
feedback.



Also, I should have mentioned this in my dda@ mail I suppose:
 63 days old (needed 5 days)

If a given package has spent that much time out of testing, it probably
can wait a few days while we're going through the late stages of the d-i
release process. It should only be a matter of days or hours now. ;)

I'll get back to your package later if we spot any issues that would
need to be addressed before we release; or it's going to be unblocked
automatically when I unfreeze udebs.


Thanks for the note, I appreciate it.

--
Michael



Bug#901352: unblock: ca-certificates/20180409

2018-06-11 Thread Michael Shuler

Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock

ca-certificates-udeb is blocked.

Please unblock the package ca-certificates to transition to testing.

We just downgraded the severity of a bug, since openssl was updated to 
fix an issue with the processing of CA certificates[0], in order to 
allow ca-certificates to transition to testing. The bug is intended to 
be closed after testing transition, just to be sure all is well, since 
the fix was really in openssl.


It appears that ca-certificates is now blocked due to udebs being 
frozen[1], as noted a couple days ago on d-d-announce (thank you for 
this note!).


Kind regards,
Michael Shuler

[0] https://bugs.debian.org/895482
[1] https://qa.debian.org/excuses.php?package=ca-certificates



Bug#889852: ca-certificates: piuparts failure causes piuparts failures in (all?) dependent packages

2018-06-11 Thread Michael Shuler

Control: tags -1 + moreinfo

On 02/07/2018 03:29 PM, Nicholas D Steeves wrote:

https://piuparts.debian.org/stretch2buster-rcmd/fail/ca-certificates_20170717.log

   1m9.6s DEBUG: Modified(user, group, mode, size, target): 
/etc/ca-certificates.conf expected(root, root, - 100644, 6488, None) != 
found(root, root, - 100644, 7694, None)
1m9.7s INFO: Warning: Package purging left files on system:
   /etc/ca-certificates.conf.dpkg-oldnot owned

1m9.7s ERROR: FAIL: After purging files have been modified:
   /etc/ca-certificates.conf not owned


I'm not really sure what piuparts is testing here, nor how to suppress 
this error. debian/ca-certificates.postrm in purge does:


  rm -f /etc/ca-certificates.conf*

This configuration file is nearly guaranteed to be modified, so it 
should be expected to have a different size.


On a fresh VM, installing and purging the package, the config files are 
removed as I would expect. If there is some reasonable way for piuparts 
to ignore a configuration file that is expected to be modified, I'd like 
to know how to add this exclusion to ca-certificate to prevent this 
error, particularly if it's affecting other packages.


--
Kind regards,
Michael



Bug#867461: Bug#858539: should ca-certificates certdata.txt synchronize across all suites?

2018-06-10 Thread Michael Shuler

On 06/08/2018 03:37 PM, Adam D. Barratt wrote:


Ping? We're a week away from the final chance to get an update into
jessie-as-oldstable before it becomes jessie-lts.


Thanks for the ping. I updated the debian-jessie branch of 
ca-certificates with mozilla bundle 2.22, and it's ready to be uploaded.


Thijs, might you have a chance to upload 20141019+deb8u4 to 
jessie-updates? If not, perhaps we can wrangle someone else to help.


commit: ce1498e496b749f71fd96d60942d2c2aa7fdf0ca

$ git diff --stat debian/20141019+deb8u3 debian-jessie
 debian/changelog |74 +
 debian/control   | 1 -
 mozilla/certdata.txt | 28220 
+--

 mozilla/nssckbi.h|39 +-
 4 files changed, 10787 insertions(+), 17547 deletions(-)

Thanks all!
--
Kind regards,
Michael



Bug#895482: severity 895482 important

2018-06-10 Thread Michael Shuler

severity 895482 important
thanks

Dropped severity to allow testing migration.

--
Michael



Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-05-30 Thread Michael Shuler

On 05/30/2018 12:46 PM, Sebastian Andrzej Siewior wrote:


I've read about this bug (and the other one) on d-devel. I uploaded
recently a new version of openssl to unstable (1.1.0h-3)which changes
the exit code of "openssl rehash" to zero in case of a duplicate or if a
certificate can no be open.
I left this bug open in case the maintainer of this package wants to
investigate why there are duplicates or non-existing certificates.


Thanks for the update, Sebastian.

OpenSSL commit for my own reference and for others, if interested:
https://github.com/openssl/openssl/commit/e6a833cb97ed762408b57ea3efa83bd10c1d2a78

--
Kind regards,
Michael



Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-04-16 Thread Michael Shuler
Thanks for the details. #895473 reported a similar error on locally
installed CA certificates, which I think may be related.

Each of the list of `rehash: skipping .. cannot open file` in your
errors appears to be on CAs that were removed in the package during this
update, so somewhere we have a problem with `openssl rehash` trying to
link to files we removed, but for some reason were not prefixed with '!'
in /etc/ca-certificates.conf.

I've tried a number of upgrades from a March 29 unstable chroot, as well
as from stretch to unstable on openstack instances, on both amd64 and
i386 (I don't think arch is dependent), and I've been unable to get a
similar error to present itself.

Each way I've tried, I get the package-removed certificates prefixed
properly and no errors, so haven't been able to reproduce this, yet. I
will keep trying with different options and see if I can figure out
where the problem is. If someone has a good way to reproduce, I'd
appreciate it!

-- 
Kind regards,
Michael



Bug#895473: ca-certificates: Post-install script subprocess return error exit status 3 while upgrading

2018-04-16 Thread Michael Shuler
On 04/11/2018 04:01 PM, Pr0metheus wrote:
> 
>* What led up to the situation?
> 
> apt-get upgrade
> 
>* What exactly did you do (or not do) that was effective (or
>  ineffective)?
> 
> Cannot fix the problem
> 
>* What was the outcome of this action?
> 
> Setting up ca-certificates (20180409) ...
> Updating certificates in /etc/ssl/certs...
> rehash: skipping duplicate certificate in HaricaRootCA2011.pem
> rehash: skipping vpn.auth.gr.pem, cannot open file
> rehash: skipping AutCentralCAR5.pem, cannot open file
> dpkg: error processing package ca-certificates (--configure):
>  installed ca-certificates package post-installation script subprocess 
> returned
> error exit status 3
> Errors were encountered while processing:
>  ca-certificates
> E: Sub-process /usr/bin/dpkg returned an error code (1)
> 
>* What outcome did you expect instead?
> 
> Like previous upgrades, maintain my existing list and update the rest.

Thanks for the bug report. I'm having trouble reproducing a similar
error reported in #895482 on package-removed CAs and have not merged
these reports because this error appears to be on locally installed
certificates. I believe they are related, however.

I will keep trying to reproduce and identify where the problem might be.

-- 
Kind regards,
Michael



Bug#894295: ca-certificates fails to install: Execution of /usr/bin/c_rehash aborted due to compilation errors

2018-03-28 Thread Michael Shuler
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894282

This appears to be a bug in openssl with a new version to address the
regression.

-- 
Kind regards,
Michael

On 03/28/2018 09:07 AM, Helmut Grohne wrote:
> Package: ca-certificates
> Version: 20170717
> Severity: grave
> Justification: fails to install
> User: helm...@debian.org
> Usertags: rebootstrap
> 
> In a fresh sid amd64 chroot:
> 
> # apt-get install ca-certificates
> Reading package lists... Done
> Building dependency tree
> Reading state information... Done
> The following additional packages will be installed:
>   libssl1.1 openssl
> The following NEW packages will be installed:
>   ca-certificates libssl1.1 openssl
> 0 upgraded, 3 newly installed, 0 to remove and 22 not upgraded.
> Need to get 2274 kB of archives.
> After this operation, 5394 kB of additional disk space will be used.
> Do you want to continue? [Y/n]
> Get:1 http://ftp.stw-bonn.de/debian sid/main amd64 libssl1.1 amd64 1.1.0h-1 
> [1352 kB]
> Get:2 http://ftp.stw-bonn.de/debian sid/main amd64 openssl amd64 1.1.0h-1 
> [744 kB]
> Get:3 http://ftp.stw-bonn.de/debian sid/main amd64 ca-certificates all 
> 20170717 [178 kB]
> Fetched 2274 kB in 2s (1181 kB/s)
> debconf: delaying package configuration, since apt-utils is not installed
> Selecting previously unselected package libssl1.1:amd64.
> (Reading database ... 10089 files and directories currently installed.)
> Preparing to unpack .../libssl1.1_1.1.0h-1_amd64.deb ...
> Unpacking libssl1.1:amd64 (1.1.0h-1) ...
> Selecting previously unselected package openssl.
> Preparing to unpack .../openssl_1.1.0h-1_amd64.deb ...
> Unpacking openssl (1.1.0h-1) ...
> Selecting previously unselected package ca-certificates.
> Preparing to unpack .../ca-certificates_20170717_all.deb ...
> Unpacking ca-certificates (20170717) ...
> Processing triggers for libc-bin (2.27-2) ...
> Setting up libssl1.1:amd64 (1.1.0h-1) ...
> Setting up openssl (1.1.0h-1) ...
> Setting up ca-certificates (20170717) ...
> Updating certificates in /etc/ssl/certs...
> Unknown regexp modifier "/b" at /usr/bin/c_rehash line 15, at end of line
> Unknown regexp modifier "/W" at /usr/bin/c_rehash line 26, at end of line
> Unknown regexp modifier "/3" at /usr/bin/c_rehash line 26, at end of line
> Unknown regexp modifier "/2" at /usr/bin/c_rehash line 26, at end of line
> No such class installdir at /usr/bin/c_rehash line 58, near "Prefix our 
> installdir"
>   (Might be a runaway multi-line // string starting on line 26)
> syntax error at /usr/bin/c_rehash line 58, near "Prefix our installdir"
> Can't redeclare "my" in "my" at /usr/bin/c_rehash line 63, near "my"
> Execution of /usr/bin/c_rehash aborted due to compilation errors.
> dpkg: error processing package ca-certificates (--configure):
>  installed ca-certificates package post-installation script subprocess 
> returned error exit status 255
> Processing triggers for libc-bin (2.27-2) ...
> Errors were encountered while processing:
>  ca-certificates
> E: Sub-process /usr/bin/dpkg returned an error code (1)
> #
> 
> Helmut
> 



Bug#874120: ca-certificates: should "TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1" be trusted by default?

2017-09-06 Thread Michael Shuler
On 09/03/2017 09:09 AM, Julien Cristau wrote:
> ca-certificates 20170717 added the "TUBITAK Kamu SM SSL Kok Sertifikasi
> - Surum 1" CA, but when that was added to nss it was restricted to a
> small set of domains[1].  Thus I wonder if it wouldn't be better to
> blacklist it from ca-certificates, since we can't encode this kind of
> constraint.
> 
> [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1349705

There are a number of technically constrained CAs. I'm not sure
blacklisting would be the right answer for Debian/derivative users,
since that makes the CA certificate completely uninstalled by the
package and never able to be used. In the best case scenario, the CA
abides by the technical constraints and never issues a certificate
outside of their allowed domains, and there are no problems. I
understand this isn't an ideal world, security issues happen, but I also
don't wish to punish users of a technically constrained CA, since
there's no mechanism in ca-certificates for this check, like there is in
NSS.

I don't have a great idea at the moment, but do think blacklisting a
technically constrained CA is a bit heavy handed.

-- 
Michael



signature.asc
Description: OpenPGP digital signature


Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-07-21 Thread Michael Shuler
On 07/21/2017 12:46 AM, Michael Shuler wrote:
> I committed this patch to git and started to test, but it fails to
> compile for me. Quick repro:
> 
> git clone https://anonscm.debian.org/git/collab-maint/ifmetric.git
> cd ifmetric/
> git-buildpackage
> 
> Due to hardening flags that are used for Debian packages, this needs
> some definition before use.

Building on a Strech machine appears to work, so ignore my error for now :)

-- 
Kind regards,
Michael



Bug#767272: Bug#866670: ca-certificates: update-ca-certificates -f does not pass removed certs to hooks

2017-07-21 Thread Michael Shuler
Testing against a new build for jessie, it looks as if the
ca-certificates-java hook does nothing with new CA certificate
additions, either? None of the newly added CAs appear to have made it to
the keystore upon package upgrade, but were added in --fresh. It appears
the hook is not doing the right thing in either add/remove case.

Just wanted to let you know I've taken a quick look, but I'm not sure
what the real issue is, at this moment.

(test stdout attached)

-- 
Kind regards,
Michael
mshuler@hana:~$ sudo apt-get install ca-certificates=20141019+deb8u4
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages will be upgraded:
  ca-certificates
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 196 kB of archives.
After this operation, 70.7 kB of additional disk space will be used.
WARNING: The following packages cannot be authenticated!
  ca-certificates
Install these packages without verification? [y/N] y
Get:1 http://www.pbandjelly.org/debian/ ./ ca-certificates 20141019+deb8u4 [196 
kB]
Fetched 196 kB in 0s (1,513 kB/s)   
Reading changelogs... Done
Preconfiguring packages ...
(Reading database ... 278491 files and directories currently installed.)
Preparing to unpack .../ca-certificates_20141019+deb8u4_all.deb ...
Unpacking ca-certificates (20141019+deb8u4) over (20141019+deb8u3) ...
Processing triggers for man-db (2.7.0.2-5) ...
Setting up ca-certificates (20141019+deb8u4) ...
Updating certificates in /etc/ssl/certs... 12 added, 24 removed; done.
Processing triggers for ca-certificates (20141019+deb8u4) ...
Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d
done.
done.
mshuler@hana:~$ 
mshuler@hana:~$ 
mshuler@hana:~$ sudo update-ca-certificates --fresh --verbose   
Clearing symlinks in /etc/ssl/certs...done.
Updating certificates in /etc/ssl/certs... Doing .
SwissSign_Silver_CA_-_G2.pem => 57bcb2da.0
SwissSign_Silver_CA_-_G2.pem => 5046c355.0
Entrust_Root_Certification_Authority.pem => 6b99d060.0
Entrust_Root_Certification_Authority.pem => bf64f35b.0
AC_RAIZ_FNMT-RCM.pem => cd8c0d63.0
AC_RAIZ_FNMT-RCM.pem => b936d1c6.0
Entrust_Root_Certification_Authority_-_G2.pem => 02265526.0
Entrust_Root_Certification_Authority_-_G2.pem => 455f1b52.0
T-TeleSec_GlobalRoot_Class_2.pem => 1e09d511.0
T-TeleSec_GlobalRoot_Class_2.pem => d06393bb.0
SZAFIR_ROOT_CA2.pem => fe8a2cd8.0
SZAFIR_ROOT_CA2.pem => a81e292b.0
Trustis_FPS_Root_CA.pem => d853d49e.0
Trustis_FPS_Root_CA.pem => c51c224c.0
DigiCert_Trusted_Root_G4.pem => 75d1b2ed.0
DigiCert_Trusted_Root_G4.pem => a2c66da8.0
IdenTrust_Commercial_Root_CA_1.pem => ef954a4e.0
IdenTrust_Commercial_Root_CA_1.pem => d18e9066.0
ssl-cert-snakeoil.pem => 2781bb9b.0
ssl-cert-snakeoil.pem => 548bcbf5.0
TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem => ff34af3f.0
TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem => 31188b5e.0
SwissSign_Gold_CA_-_G2.pem => 4f316efb.0
SwissSign_Gold_CA_-_G2.pem => 3c860d51.0
DigiCert_Global_Root_G2.pem => 607986c7.0
DigiCert_Global_Root_G2.pem => c90bc37d.0
CFCA_EV_ROOT.pem => 0b1b94ef.0
CFCA_EV_ROOT.pem => 9282e51c.0
Global_Chambersign_Root_-_2008.pem => 0c4c9b6c.0
Global_Chambersign_Root_-_2008.pem => 9f533518.0
Network_Solutions_Certificate_Authority.pem => 4304c5e5.0
Network_Solutions_Certificate_Authority.pem => 2fa87019.0
Swisscom_Root_CA_1.pem => 667c66d4.0
Swisscom_Root_CA_1.pem => e60bf0c0.0
GlobalSign_Root_CA.pem => 5ad8a5d6.0
GlobalSign_Root_CA.pem => b0f3e76e.0
AddTrust_Qualified_Certificates_Root.pem => e536d871.0
AddTrust_Qualified_Certificates_Root.pem => 052e396b.0
GlobalSign_ECC_Root_CA_-_R5.pem => 1d3472b9.0
GlobalSign_ECC_Root_CA_-_R5.pem => 2add47b6.0
GeoTrust_Primary_Certification_Authority_-_G3.pem => e2799e36.0
GeoTrust_Primary_Certification_Authority_-_G3.pem => c7e2a638.0
DigiCert_Global_Root_G3.pem => dd8e9d41.0
DigiCert_Global_Root_G3.pem => ed39abd0.0
Symantec_Class_2_Public_Primary_Certification_Authority_-_G6.pem => 1320b215.0
Symantec_Class_2_Public_Primary_Certification_Authority_-_G6.pem => 0708417d.0
Entrust_Root_Certification_Authority_-_EC1.pem => 106f3e4d.0
Entrust_Root_Certification_Authority_-_EC1.pem => b3fb433b.0
AffirmTrust_Premium.pem => b727005e.0
AffirmTrust_Premium.pem => dbc54cab.0
Symantec_Class_1_Public_Primary_Certification_Authority_-_G6.pem => 26312675.0
Symantec_Class_1_Public_Primary_Certification_Authority_-_G6.pem => b6782d18.0
QuoVadis_Root_CA_1_G3.pem => 749e9e03.0
QuoVadis_Root_CA_1_G3.pem => 52b525c7.0
S-TRUST_Universal_Root_CA.pem => 19c1fa33.0
S-TRUST_Universal_Root_CA.pem => 631c779f.0
GeoTrust_Primary_Certification_Authority_-_G2.pem => 116bf586.0
GeoTrust_Primary_Certification_Authority_-_G2.pem => 27af790d.0
TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.pem => 65b876bd.0
TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.pem => 418595b9.0
SecureSign_RootCA11.pem => 18856ac4.0
SecureSign_RootCA11.pem 

Bug#721976: ca-certificates contains both server and email certificates

2017-07-21 Thread Michael Shuler
The patch was committed to collab-maint master a few days ago and I
tagged this bug as pending yesterday. It's on the way :)

-- 
Kind regards,
Michael



Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-07-20 Thread Michael Shuler
I committed this patch to git and started to test, but it fails to
compile for me. Quick repro:

git clone https://anonscm.debian.org/git/collab-maint/ifmetric.git
cd ifmetric/
git-buildpackage

Due to hardening flags that are used for Debian packages, this needs
some definition before use.

-- 
Kind regards,
Michael
(master)mshuler@hana:~/git/ifmetric$ git-buildpackage 
 dpkg-buildpackage -rfakeroot -D -us -uc -i -I
dpkg-buildpackage: source package ifmetric
dpkg-buildpackage: source version 0.3-5
dpkg-buildpackage: source distribution UNRELEASED
dpkg-buildpackage: source changed by Michael Shuler <mich...@pbandjelly.org>
 dpkg-source -i -I --before-build ifmetric
dpkg-buildpackage: host architecture amd64
dpkg-source: info: using options from ifmetric/debian/source/local-options: 
--unapply-patches --abort-on-upstream-changes
dpkg-source: info: applying ifmetric.c_typo
dpkg-source: info: applying nlrequest.c_packet-too-small_fix
dpkg-source: info: applying ifmetric.8_typo
dpkg-source: info: applying ifmetric.c_netlink-invalid-arg
 fakeroot debian/rules clean
dh clean
   dh_testdir
   dh_auto_clean
   dh_autoreconf_clean
   dh_clean
 dpkg-source -i -I -b ifmetric
dpkg-source: info: using options from ifmetric/debian/source/local-options: 
--unapply-patches --abort-on-upstream-changes
dpkg-source: info: using source format `3.0 (quilt)'
dpkg-source: info: building ifmetric using existing ./ifmetric_0.3.orig.tar.gz
dpkg-source: info: building ifmetric in ifmetric_0.3-5.debian.tar.xz
dpkg-source: info: building ifmetric in ifmetric_0.3-5.dsc
 debian/rules build
dh build
   dh_testdir
   dh_update_autotools_config
   dh_autoreconf
configure.ac:36: installing './compile'
   dh_auto_configure
./configure --build=x86_64-linux-gnu --prefix=/usr 
--includedir=\${prefix}/include --mandir=\${prefix}/share/man 
--infodir=\${prefix}/share/info --sysconfdir=/etc --localstatedir=/var 
--disable-silent-rules --libdir=\${prefix}/lib/x86_64-linux-gnu 
--libexecdir=\${prefix}/lib/x86_64-linux-gnu --disable-maintainer-mode 
--disable-dependency-tracking
configure: WARNING: unrecognized options: --disable-maintainer-mode
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /bin/mkdir -p
checking for gawk... gawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking for style of include used by make... GNU
checking dependency style of gcc... none
checking for memset... yes
checking for socket... yes
checking for strerror... yes
checking for strrchr... yes
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking sys/socket.h usability... yes
checking sys/socket.h presence... yes
checking for sys/socket.h... yes
checking for unistd.h... (cached) yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible malloc... yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible realloc... yes
checking for ANSI C header files... (cached) yes
checking whether ln -s works... yes
checking for pid_t... yes
checking linux/version.h usability... yes
checking linux/version.h presence... yes
checking for linux/version.h... yes
checking for lynx... yes
checking for xmltoman... no
configure: WARNING: *** Not rebuilding man pages as xmltoman is not found ***
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: creating src/Makefile
config.status: creating Makefile
config.status: creating man/Makefile
config.status: creating doc/Makefile
config.status: creating doc/README.html
config.status: creating config.h
config.status: executing depfiles commands
configure: WARNING: unrecognized options: --disable-maintainer-mode
   dh_auto_build
make -j1
make[1]: Entering directory '/home/mshuler/git/ifmetric'
make  all-recursive
make[2]: Entering directory '/home/mshuler/git/ifmetric'
Making all in src
make[3]: Entering directory '/home/mshuler/git/ifmetric/sr

Bug#858539: should ca-certificates certdata.txt synchronize across all suites?

2017-07-19 Thread Michael Shuler
On 07/06/2017 11:13 PM, Paul Wise wrote:
> On Fri, Jul 7, 2017 at 2:01 AM, Antoine Beaupré wrote:
> 
>> For what it's worth, my opinion is that we should attempt to synchronize
>> certdata.txt (and blacklist.txt, for that matter) across all suites (but
>> not other changes to the packaging). This would remove another decision
>> point in our infrastructure and ensure harmonious X509 processing across
>> suites.
> 
> I would like to see that happen too.

I spent a few sessions over the past few days getting the mozilla bundle
2.14 committed to all the suite branches wheezy and newer. I have some
more verification to work on and I'll get some packages rolled up and
tested for all the suites.

I appreciate the notes here!

-- 
Kind regards,
Michael



Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-06-20 Thread Michael Shuler
Hi Jim,

Thanks for the patch. Do you happen to know if this patch presents any
adverse behavior on kernel versions <4.4, or if this ends up being a
no-op? I ask because Jessie is 3.16 by default, with a 4.9 kernel
version in backports.

Thanks!
Michael



Bug#721976: ca-certificates contains both server and email certificates

2017-05-26 Thread Michael Shuler
On 05/26/2017 02:18 PM, Jacob Hoffman-Andrews wrote:
> Hi, just checking in on the status of this. I provided a patch above;
> does it look good to you?

The patch is simple, so I see no particular issue with it. My time has
been crunched lately, but I have some vacation soon with plans for some
Debian work. I will get this committed for the next release round for
unstable and mark it pending when I do so.

Thanks for the ping and your patience.

-- 
Kind regards,
Michael



signature.asc
Description: OpenPGP digital signature


Bug#858539: ca-certificates: Contains untrusted StartCom and WoSign certificates

2017-05-19 Thread Michael Shuler
On 05/19/2017 10:07 AM, Chris Lamb wrote:
> I've uploaded ca-certificates 20161130+nmu1 to DELAYED/5:
>   
>   ca-certificates (20161130+nmu1) unstable; urgency=medium
>   
> * Non-maintainer upload.
> * Add StartCom and WoSign certificates to mozilla/blacklist.txt as they 
> are
>   now untrusted by the major browser vendors. Closes: #858539

Thank you for the NMU, Chris, I'm good with that change.

-- 
Kind regards,
Michael




signature.asc
Description: OpenPGP digital signature


Bug#852040: jessie-pu: package ca-certificates/20141019+deb8u3

2017-04-28 Thread Michael Shuler
On 04/28/2017 11:39 AM, Adam D. Barratt wrote:
> On Fri, 2017-04-28 at 00:58 +0200, Andreas Beckmann wrote:
>>
>> Attached is the combined debdiff of the commits backported by Michael
>> and me. I verified in piuparts that "running update-certificates without
>> hooks initially" now actually works as intended.
> 
> That looks okay, thanks.
> 
> Please feel free to upload, bearing in mind that the window for 8.8
> closes over the weekend.

Thank you so much. I'm sorry I've been ridiculously busy, and "I'll get
to it this weekend" repeatedly hasn't materialized for me.

-- 
Kind regards,
Michael



Bug#843722: I've tested the fix

2017-04-17 Thread Michael Shuler
On 04/17/2017 03:22 PM, Thomas Lange wrote:
> The fix works for me. Please try to fix it soon, so the fixed version
> will be going into the stretch release.

Thanks for the patch, Antoine, and confirmation, Thomas - I'll get an
upload ready as soon as I can.

-- 
Kind regards,
Michael



Bug#858539: ca-certificates: Contains untrusted StartCom and WoSign certificates

2017-03-23 Thread Michael Shuler
On 03/23/2017 04:02 AM, Chris Lamb wrote:
> StartCom and WoSign certificates are now untrusted by the major browser
> vendors[0][1], making websites that use certs from these vendors
> inaccessible.

I followed these events on dev-security-policy and libnss performs date
checks on certs signed by these roots, which ca-certificates has no
facility to perform.

> However, as this is not reflected in ca-certificates, tools such as curl
> still intepret these as valid/secure.

Blacklisting StartCom and WoSign roots will possibly invalidate some
user's pre- Oct 21, 2016 valid certificates, but I think that is
probably OK.

> (This has a knock-on effect that health-check tools that use the output
> of such tools to determine whether a site is "up" — eg. updown.io — will
> misleadingly imply that the site is available to users when, in all
> practical senses, they are not.)
> 
> I would suggest we remove the offending authorities from ca-certificates
> as soon as possible.
> 
> 
> [0] 
> https://blog.mozilla.org/security/2016/10/24/distrusting-new-wosign-and-startcom-certificates/
> [1] My installation "chrome-stable" rejects them as well.

Thanks for the report, Chris.

-- 
Kind regards,
Michael



Bug#721976: ca-certificates contains both server and email certificates

2017-03-20 Thread Michael Shuler
I appreciate the research and suggestions. I'd be happy to review a
patch submission to fix this. I'm not a mutt nor S/MIME user, so perhaps
there may be some fallout from simple removal of email-only roots, if
there are people using them. There's no way I know of to tell how many
users use specific CAs, other than bug reports of "you moved my
cheese!", but we could ask for testers :-)

-- 
Kind regards,
Michael



Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
On 03/20/2017 12:59 PM, Alex Gaynor wrote:
> Confirmed that with the package from `git`, this is resolved! Awesome.

Great! Thanks a bunch for the confirmation.

-- 
Warm regards,
Michael



Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Clone the repo and `dpkg-buildpackage`.

-- 
Kind regards,
Michael



Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Control: tags -1 - moreinfo + pending

Thanks for the details. Those appear to be a few of the removals in the
2.11 bundle, which are committed, but not released yet. Those will make
it to a stable proposed update, too.

https://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/tree/debian/changelog

-- 
Kind regards,
Michael



Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Control: tags -1 + moreinfo

On 03/17/2017 04:38 PM, Alex Gaynor wrote:
> Package: ca-certificates
> Severity: normal

What version of ca-certificates?

> The ca-certificates package includes legacy root certificates which have
> 1024-bit RSA keys. These are considered weak by modern standards, and
> have been removed from the upstream Mozilla trust store.

Please, be specific: what 1024-bit roots?

> For a while these were needed to workaround a bug in OpenSSL X.509 path
> building logic, but that bug has since been resolved so these are now
> vestigial and a risk.

ca-certificates version 20140927 removed the 1024-bit certificates when
updating the mozilla CA bundle to 2.1.

Please, provide some details about your installation, otherwise, this
was fixed long ago.

-- 
Kind regards,
Michael



Bug#825730: jessie-pu: package ca-certificates/20141019+deb8u3

2017-01-23 Thread Michael Shuler
Thanks for the follow up. I'll get this fixed and resubmit a new debdiff
for stable update.

-- 
Kind regards,
Michael



Bug#783615: "update-ca-certificates --fresh" doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2017-01-20 Thread Michael Shuler
PU request sent!
https://bugs.debian.org/852040

Thanks again,
Michael



Bug#852040: jessie-pu: package ca-certificates/20141019+deb8u3

2017-01-20 Thread Michael Shuler
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu

I would like to upload ca-certificates_20141019+deb8u3 to stable, in
order to backport the fix from #783615 [0]. This bug was reopened and
set to Serious severity. The debdiff is attached.

[0] https://bugs.debian.org/783615

-- 
Kind regards,
Michael
diffstat for ca-certificates-20141019+deb8u2 ca-certificates-20141019+deb8u3

 debian/changelog|7 +++
 sbin/update-ca-certificates |2 +-
 2 files changed, 8 insertions(+), 1 deletion(-)

diff -Nru ca-certificates-20141019+deb8u2/debian/changelog 
ca-certificates-20141019+deb8u3/debian/changelog
--- ca-certificates-20141019+deb8u2/debian/changelog2016-11-18 
09:24:20.0 -0600
+++ ca-certificates-20141019+deb8u3/debian/changelog2017-01-20 
16:00:09.0 -0600
@@ -1,3 +1,10 @@
+ca-certificates (20141019+deb8u3) stable; urgency=medium
+
+  * sbin/update-ca-certificates:
+Update local certificates directory when calling --fresh. Closes: #783615
+
+ -- Michael Shuler <mich...@pbandjelly.org>  Wed, 18 Jan 2017 15:54:56 -0600
+
 ca-certificates (20141019+deb8u2) stable; urgency=medium
 
   [ Michael Shuler ]
diff -Nru ca-certificates-20141019+deb8u2/sbin/update-ca-certificates 
ca-certificates-20141019+deb8u3/sbin/update-ca-certificates
--- ca-certificates-20141019+deb8u2/sbin/update-ca-certificates 2016-11-18 
09:24:15.0 -0600
+++ ca-certificates-20141019+deb8u3/sbin/update-ca-certificates 2017-01-20 
16:00:09.0 -0600
@@ -89,7 +89,7 @@
   find . -type l -print | while read symlink
   do
 case $(readlink $symlink) in
-  $CERTSDIR*) rm -f $symlink;;
+  $CERTSDIR*|$LOCALCERTSDIR*) rm -f $symlink;;
 esac
   done
   find . -type l -print | while read symlink


Bug#783615: "update-ca-certificates --fresh" doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2017-01-18 Thread Michael Shuler
On 01/18/2017 03:25 PM, Adrian Bunk wrote:
> after a discussion with someone who ran into this bug in stable I have 
> set the severity to serious, since this should IMHO also be fixed in 
> stable.

This does look like a good patch to backport to stable. I'll get this
commited to git and work on a stable update. Thanks, Adrian!

-- 
Kind regards,
Michael



Bug#843722: (no subject)

2017-01-03 Thread Michael Shuler
On 01/01/2017 12:40 PM, Thomas Lange wrote:
> There's still no fix. Do you need help for a fix?

If you have a patch idea, that would be great! Apologies for the delay
in getting something together to reproduce and test a fix.

-- 
Kind regards,
Michael



Bug#845456: Please add a udeb to ca-certificates

2016-12-01 Thread Michael Shuler
Just a quick follow up. Thijs uploaded ca-certificates_20161130 this
morning, and it is currently in the NEW binary-BYHAND queue for approval.

-- 
Kind regards,
Michael



Bug#845456: Please add a udeb to ca-certificates

2016-11-28 Thread Michael Shuler
Thanks for the patches to enable the use of HTTPS in the installer. This
does sound useful. (And apologies for the holiday delay in replying.)

I'd like to complete a pending stable upload, first, then I'll work on
this request.

-- 
Kind regards,
Michael



Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-11-18 Thread Michael Shuler
Stable update requested! Thanks again for the report, Andreas.

https://bugs.debian.org/844746
"jessie-pu: package ca-certificates/20141019+deb8u2"

-- 
Kind regards,
Michael Shuler



signature.asc
Description: OpenPGP digital signature


Bug#843722: wants to write to /usr/local

2016-11-09 Thread Michael Shuler
On 11/08/2016 10:07 PM, Thomas Lange wrote:
> My /usr/local file system is mounted read-only via NFS. This results
> in an error:
> 
> 
> stretch[~]# dpkg --configure ca-certificates
> Setting up ca-certificates (20161102) ...
> chmod: changing permissions of '/usr/local/share/ca-certificates': Read-only 
> file system
> dpkg: error processing package ca-certificates (--configure):
>  subprocess installed post-installation script returned error exit status 1
>  Errors were encountered while processing:
>   ca-certificates

Thanks for the report. I'd bet we can come up with a conditional to
check this gracefully, so post-inst does not outright fail in this scenario.

-- 
Kind regards,
Michael



Bug#843121: RFS: ifmetric/0.3-4

2016-11-03 Thread Michael Shuler
Package: sponsorship-requests
Severity: normal

Dear mentors,

I would appreciate a sponsor for this maintenance upload of ifmetric.
This release updates the packaging standards to be current for Stretch.

  * Package name: ifmetric
Version : 0.3-4
Upstream Author : Lennart Poettering <mzvszrg...@0pointer.de>
  * URL : http://0pointer.de/lennart/projects/ifmetric/
  * License : GPL-2+
Section : net

It builds those binary packages:

  ifmetric - Set routing metrics for a network interface

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ifmetric

Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/i/ifmetric/ifmetric_0.3-4.dsc

Changes since the last upload:

ifmetric (0.3-4) unstable; urgency=low

  * debian/control:
Set Architecture: linux-any to exclude kfreebsd/hurd builds.
Update to Standards-Version: 3.9.8.
Update Vcs-Browser/Vcs-Git: https URLs.
  * debian/copyright:
Drop recurrent license text for lintian.
  * debian/rules:
Add hardening build flag for all options.
  * debian/patches/ifmetric.8_typo:
Fix typo in man page.

 -- Michael Shuler <mich...@pbandjelly.org>  Thu, 03 Nov 2016 18:09:20 -0500

Thanks for your time!
-- 
Kind regards,
Michael



signature.asc
Description: OpenPGP digital signature


Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-09-16 Thread Michael Shuler
On 09/11/2016 03:48 AM, Andreas Beckmann wrote:
> The fix is quite easy: we just need to run update-ca-certificates
> *without* processing the hooks during postinst configure:
> 
> update-ca-certificates --hooksdir ""

Thanks Andreas! I'll test this out as soon as I can.

> This should be backported to stable, too.

I have a pending stable upload after the next unstable, so as long as
test install works and this fits for stable-updates policy, I don't see
a problem with that.

-- 
Kind regards,
Michael



Bug#828845: ca-certificates: update to Mozilla bundle 2.7

2016-08-17 Thread Michael Shuler
Control: tags -1 + pending

On 08/04/2016 07:02 AM, Jonathan Wiltshire wrote:
> Can I be any help in moving this along? It would be nice to get a stable
> update underway too, and the next point release isn't far away.

Thanks for the ping. I have committed the 2.7 bundle to the collab-maint
master branch for unstable, along with a couple small standards updates.
I've also committed the 2.7 bundle to the debian-jessie branch for a
stable update. I'll make sure upgrades work properly tomorrow and let my
sponsors know an upload is ready.

> I'd be happy to get into co-maintaining if that would be helpful.

The other uploaders are usually quick to help, but I appreciate the
offer and will add you to uploaders and let you know if additional help
is needed.

-- 
Kind regards,
Michael



Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-08-16 Thread Michael Shuler
The ca-certificates triggers were added to deal with
installation/upgrade problems in https://bugs.debian.org/537051

Do you have a suggested patch that also properly handles the issues
presented in #537051? I would suggest that downloader packages possibly
might pre-depend on ca-certificates, if that is required by the
download, as a possible fix. I'm not sure if the trigger runs to
completion first, as a pre-depend package.

-- 
Kind regards,
Michael



Bug#828845: ca-certificates: update to Mozilla bundle 2.7

2016-06-28 Thread Michael Shuler
On 06/28/2016 07:57 AM, Jonathan Wiltshire wrote:
> 
> The attached patch updates the package to the latest Mozilla bundle.

Thanks for the update patch and the recent bug triage, Jonathan. I
appreciate the help!

-- 
Warm regards,
Michael




signature.asc
Description: OpenPGP digital signature


Bug#807274: wheezy-pu: package ca-certificates/20130119+deb7u2

2016-03-24 Thread Michael Shuler
Backlog of $REAL_LIFE work has kept me super busy. I ran into upgrade
issues (sorry, don't have the existing bts#), and it looks like Ubuntu
did a similar addition using a 'mozilla-1024/' directory, which may
solve the immediate upgrade problem with previously removed
certificates. I have not tested this out, yet, but will try to do so
soon.

-- 
Kind regards,
Michael



Bug#816541: ca-certificates: avoid creating an empty /etc/java-6-sun

2016-03-02 Thread Michael Shuler
reassign 816541 ca-certificates-java 20140324
thanks

See /etc/ca-certificates/update.d/jks-keystore hook, which is run by
update-ca-certificates, but is from the ca-certificates-java. There are
still users of Sun Java 6, so IMO, this is a non-issue, but I'll let the
package maintainer decide whether this is a wontfix bug.

-- 
Kind regards,
Michael



Bug#812488: update of openssl still in limbo

2016-02-25 Thread Michael Shuler
On 02/22/2016 04:12 AM, Christian Beer wrote:
> It seems that the openssl update is not happening soon. Can you please
> include the 1024bit certificates again to solve this regression?

Yeah, I have a work in progress branch that re-includes the 1024-bit
CAs. Ran back into #743339 on upgrade, so needs some additional testing..

> If you need help with determining what certificates are used in cross
> signing let me know. My general idea would be to include the removed
> certificates again if they are still valid and have not been revoked by
> the issuer.

Thanks for the offer, I appreciate it, but we're aware of the CAs that
were removed.

-- 
Kind regards,
Michael



Bug#812708: works ok on testing

2016-02-25 Thread Michael Shuler
On 02/25/2016 08:58 AM, Tony den Haan wrote:
> That is the problem, it requires -CApath, while /etc/ssl/certs should be
> default. On testing it works ok without it.

Which is unrelated to the ca-certificates package - that's my point :)

Feel free to open a new bug report for the openssl package describing
your problem, although I would suggest that this behavior change between
openssl versions in stable and testing means that feature was fixed or
added between those versions. Regardless, this is not related to
ca-certificates in any way.

-- 
Kind regards,
Michael



Bug#812708: works ok on testing

2016-02-25 Thread Michael Shuler
On 02/16/2016 11:22 AM, Tony den Haan wrote:
> openssl s_client -connect gmail-smtp-in.l.google.com:25 -starttls smtp
> 
> on jessie:  (and ubuntu lts :)
> Verify return code: 20 (unable to get local issuer certificate)
> 
> on testing:
> Verify return code: 0 (ok)
> 

This appears to be unrelated to this bug report and your command works
correctly on Jessie if given a CApath. I assume this is a behavioral
difference in openssl.

openssl s_client -CApath /etc/ssl/certs -connect
gmail-smtp-in.l.google.com:25 -starttls smtp
CONNECTED(0003)
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = Google Inc, CN = Google Internet Authority G2
verify return:1
depth=0 C = US, ST = California, L = Mountain View, O = Google Inc, CN =
mx.google.com
verify return:1
---
Certificate chain
 0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=mx.google.com
   i:/C=US/O=Google Inc/CN=Google Internet Authority G2
 1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
   i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
 2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
   i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
---
<...>
   Verify return code: 0 (ok)



Bug#807274: wheezy-pu: package ca-certificates/20130119+deb7u2

2016-02-22 Thread Michael Shuler
On 02/20/2016 06:53 AM, Adam D. Barratt wrote:
> For reference, neither the above nor the message opening the bug made it
> to debian-release, presumably for size reasons.

Thanks for the follow up.

> Looking at the diff:
> 
> diff -Nru ca-certificates-20130119+deb7u1/debian/config 
> ca-certificates-20130119+deb7u2/debian/config
> --- ca-certificates-20130119+deb7u1/debian/config 2014-09-24 
> 12:57:57.0 -0500
> +++ ca-certificates-20130119+deb7u2/debian/config 1969-12-31 
> 18:00:00.0 -0600
> 
> I'm assuming that wasn't intentional?

This is the unintentional result of building from a clean git checkout.
I'll have to pull the old generated debian/config from the existing
source package. This file has since been added to the clean target.

This Wheezy package is going to suffer from the same regression as in
Jessie, currently. Please, leave this bug report in "moreinfo", if
that's OK, or just close this and I'll open a new report. I will need to
create an updated diff that includes the removed 1024-bit CA
certificates, once I'm sure that's working correctly in Jessie.

-- 
Kind regards,
Michael



Bug#812708: Also affected: Baltimore CyberTrust Root used by Mailchimp

2016-02-05 Thread Michael Shuler

On 02/05/2016 05:49 AM, Rich wrote:

subject says it all.


Please provide a specific URL to test. The "Baltimore CyberTrust Root" 
CA may be a different issue, looking at several mozilla bugzilla 
tickets, but I can't tell without any detail.


Thanks, Michael



Bug#812488: libsms-send-perl: After upgrade: Can't send SMS: 500 Can't connect to api.twilio.com:443 (certificate verify failed)

2016-02-02 Thread Michael Shuler

On 02/02/2016 02:22 PM, Tim Small wrote:

#813468 is similar but impacting a different application.  I did come
across a patch which backports the fix included in newer versions of the
upstream OpenSSL 1.0.1 branch, to the 1.0.1k derived package in Jessie.

I haven't reviewed or tested the fix tho':

https://gist.github.com/h-yamamo/adf44638a1a04b8e86ea


Thanks for the additional info and openssl ticket number. I'm open to 
including the 1024-bit certificates mozilla removed and started a 
branch, but haven't completed this. I don't have the openssl expertise 
to review the patch, but it is interesting and could be a better way to 
handle the problem, but also it seems a new patch to openssl in stable 
could be more invasive.


--
Michael



  1   2   3   4   >