Bug#812708: ca-certificates: on fresh debian install typical ssl session fails on Thawte certificates

2016-01-27 Thread Michael Shuler
On 01/27/2016 06:47 AM, Christian Beer wrote: I tested with a current Jessie and Stretch installation and it turns out that openssl 1.0.2 verifies the "Thawte Primary Root CA" correctly because it is in the certificate store. With openssl 1.0.1 this verification fails because it looks for the

Bug#812488: libsms-send-perl: After upgrade: Can't send SMS: 500 Can't connect to api.twilio.com:443 (certificate verify failed)

2016-01-24 Thread Michael Shuler
On 01/24/2016 09:49 AM, gregor herrmann wrote: On Sun, 24 Jan 2016 12:32:39 +0100, Rosario Maddox wrote: Yesterday I did: sudo apt-get upgrade, and I have this now: Can't send SMS: 500 Can't connect to api.twilio.com:443 (certificate verify failed) at /usr/share/perl5/SMS/Send.pm line 270.

Bug#808711: ca-certificates: please make the build reproducible

2016-01-04 Thread Michael Shuler
Control: tags -1 + pending http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/commit/?id=24b5bdcb3a3ede1d9664958b55cd480fc43e97b3 -- Kind regards, Michael

Bug#809259: Please add letsencrypt certificates

2015-12-28 Thread Michael Shuler
On 12/28/2015 03:53 PM, Michael Shuler wrote: `openssl s_client -CApath /etc/ssl/certs -connect wrapdb.mesonbuild.com:443` shows the cert for wrapdb.mesonbuild.com, issued by CN=Let's Encrypt Authority X1, but no intermediate, which is cross-signed by DST Root CA X3 and should validate properly

Bug#809259: Please add letsencrypt certificates

2015-12-28 Thread Michael Shuler
On 12/28/2015 01:54 PM, Jussi Pakkanen wrote: Currently trying to connect to a server that has letsencrypt enabled will fail. For example this command: wget https://wrapdb.mesonbuild.com will error out saying that the certificate is not trusted because it has no known issuer. The connection

Bug#806239: Updating ca-certificates through stable-updates

2015-12-14 Thread Michael Shuler
On 12/14/2015 06:22 PM, Andrew Ayer wrote: > I'm curious why the 2.6 update wasn't included with the 20151204 > release. Thanks. Thijs and/or Raphael. Please, hold until some additional changes can be committed to include 2.6. NSS released 2.6 while working on 2.5, essentially, Andrew. --

Bug#783615: "update-ca-certificates --fresh" doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2015-12-14 Thread Michael Shuler
Control: tags -1 + pending Committed to master for next upload. Thanks, Daniel! -- Kind regards, Michael

Bug#721976: Roots trusted for email but not TLS

2015-12-14 Thread Michael Shuler
On 12/14/2015 06:18 PM, Andrew Ayer wrote: > Hi Michael, > > Have you given any more thought to a redesign of ca-certificates that > separates the email certificates from the TLS certificates? I suspect Yep - got a patch? :-) > that the vast majority of packages that depend on ca-certificates

Bug#721976: Roots trusted for email but not TLS

2015-12-14 Thread Michael Shuler
On 12/14/2015 07:45 PM, Andrew Ayer wrote: > On Mon, 14 Dec 2015 18:45:40 -0600 > Michael Shuler <mich...@pbandjelly.org> wrote: > >>> As always, let me know if you could use any help. I'm going to >>> start looking through the reverse depends for ca-cert

Bug#793027: Missing QuoVadis "G3" Root CAs (in Wheezy)

2015-12-05 Thread Michael Shuler
Control: tags -1 + pending I'm preparing uploads for stable/oldstable proposed-updates, so Wheezy/Jessie will get the current Mozilla CA bundle v2.5, which includes the referenced QuoVadis certs. http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/log/?h=debian-wheezy -- Kind

Bug#806239: Updating ca-certificates through stable-updates

2015-12-05 Thread Michael Shuler
On 12/05/2015 04:25 PM, Philipp Kern wrote: >> Could I perhaps convince you to file this (kind of) request as a pu bug? >> They are much easier for us to track than mails to the mailing list. >> I appreciate that you might have been sending this mail to avoid the >> pu-bug. Unfortunately, we

Bug#796208: libnss3 removed the SPI CA

2015-12-04 Thread Michael Shuler
Control: tags -1 + pending On 11/25/2015 03:15 PM, Josh Triplett wrote: > Related to this bug, nss removed this CA today: Thanks for the update. I've removed the SPI CA in git, and I'm prepping an upload to unstable.

Bug#806239: Updating ca-certificates through stable-updates

2015-12-04 Thread Michael Shuler
On 11/25/2015 03:18 PM, Andrew Ayer wrote: > Hi Stable Release Managers, > > We're currently discussing in #806239 how to keep the > ca-certificates package more up-to-date in (old)stable. Since > ca-certificates is a data package that needs timely updating (when CAs > are removed due to lapsed

Bug#806239: ca-certificates: Contains unaudited root CAs

2015-11-25 Thread Michael Shuler
On 11/25/2015 03:13 PM, Andrew Ayer wrote: >> The April release contained the 2.4 bundle from Mozilla. CA bundle 2.5 >> was recently released in NSS and an upload to unstable is being >> prepped. I was incorrect about the NSS release relative time being as recent as I recalled. See below. > I'm

Bug#806239: ca-certificates: Contains unaudited root CAs

2015-11-25 Thread Michael Shuler
Control: tags -1 + pending On 11/25/2015 11:28 AM, Andrew Ayer wrote: > ca-certificates hasn't been updated since April 2015. Since then, 14 > CAs have been removed from the NSS root store[1, 2]. ca-certificates in > stable hasn't been updated since October 2014. Since then, 6 additional > CAs

Bug#789753: Add Python 3 support to ca-certificates. (v2)

2015-11-24 Thread Michael Shuler
Control: tags -1 + pending On 11/22/2015 12:28 PM, Richard Ipsum wrote: > The attached patch is based on the patch provided by Andrew Wilcox, > I've verified that this patched version of certdata2pem.py produces > the same certificate filenames when run with python2 and python3 and > also when

Bug#789753: Add Python 3 support to ca-certificates. (v2)

2015-11-23 Thread Michael Shuler
On 11/22/2015 12:28 PM, Richard Ipsum wrote: The attached patch is based on the patch provided by Andrew Wilcox, I've verified that this patched version of certdata2pem.py produces the same certificate filenames when run with python2 and python3 and also when run with python2 without this patch.

Bug#789753: Add Python 3 support to ca-certificates source.

2015-10-22 Thread Michael Shuler
Control: tags -1 - pending On 10/22/2015 04:29 PM, Michael Shuler wrote: Committed to git and test build works fine for me with sid cowbuilder. I have not gone through attempting to set up a python3-only system to test build, so hopefully, it "just works". :) I take it back, this d

Bug#789753: Add Python 3 support to ca-certificates source.

2015-10-22 Thread Michael Shuler
This needs work. Sorry for the delay in fully testing this patch out. After reverting the commit of this patch and rebuilding, I'm seeing the expected result: mshuler@mana:~/git$ ls -l ca-certificates_2015*.deb -rw-r--r-- 1 mshuler mshuler 207866 May 28 11:14 ca-certificates_20150426_all.deb

Bug#789753: Add Python 3 support to ca-certificates source.

2015-10-22 Thread Michael Shuler
Control: tags -1 + pending Committed to git and test build works fine for me with sid cowbuilder. I have not gone through attempting to set up a python3-only system to test build, so hopefully, it "just works". :)

Bug#795244: ca-certificates-java.jar - String index out of range: -1

2015-08-12 Thread Michael Shuler
Control: reassign 795244 ca-certificates-java 20140324 On 08/12/2015 03:35 AM, Christian Hammers wrote: One of my Java applications does not recognize a CA certificate from /usr/local/share/ca-certificates/ as valid so I tried the following program in the hope it would somehow update the Java

Bug#793027: Missing QuoVadis G3 Root CAs (in Wheezy)

2015-07-21 Thread Michael Shuler
On 07/21/2015 09:05 AM, Cédric Dufour - Idiap Research Institute wrote: We do have the wheezy-updates repository enabled: # rgrep wheezy-updates /etc/apt/sources.list* /etc/apt/sources.list.d/debian.list:deb http://daily-updated-local-mirror/debian.wheezy/ wheezy-updates main contrib non-free

Bug#793027: Missing QuoVadis G3 Root CAs (in Wheezy)

2015-07-21 Thread Michael Shuler
On 07/21/2015 04:22 AM, Cédric Dufour - Idiap Research Institute wrote: Jessie package does install cleanly. Thanks for the confirmation. The only problem I see with this approach is that I have to monitor Jessie security updates closely and make sure to import any updated package in our

Bug#793027: Missing QuoVadis G3 Root CAs (in Wheezy)

2015-07-20 Thread Michael Shuler
On 07/20/2015 09:57 AM, Cédric Dufour - Idiap Research Institute wrote: In Debian/Wheezy (oldstable), QuoVadis three G3 Root CAs - https://www.quovadisglobal.ch/Repository/DownloadRootsAndCRL.aspx - are missing from the 'ca-certificates' package (while they are present in Debian/Jessie). Would

Bug#789753: Add Python 3 support to ca-certificates source.

2015-07-17 Thread Michael Shuler
On 07/17/2015 10:44 PM, Andrew Wilcox wrote: Is there anything else that I need to do to get this patch merged, or is there any ETA? This is one of the last packages I use that require Python 2 to build so I'm highly motivated. I'll be happy to do any further testing, if necessary. I just

Bug#789753: Add Python 3 support to ca-certificates source.

2015-06-25 Thread Michael Shuler
This is great - thanks, Andrew! -- Kind regards, Michael -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#611501: /usr/local/share/ca-certificates/ group-writable

2015-06-03 Thread Michael Shuler
Control: tags -1 + pending On 05/29/2015 12:05 AM, Christoph Anton Mitterer wrote: As already explicitly stated in the original report, this fix should not only be applied for new installations but also for existing ones. I added ca-certificates package upgrade handling of setting ownership

Bug#787281: ca-certificates: Missing GlobalSign nv-sa

2015-06-01 Thread Michael Shuler
so that users see a green lock, even when talking to misconfigured servers. -- Kind regards, Michael Shuler -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#786892: ca-certificates: split out certificate-bundles into separate packages

2015-05-26 Thread Michael Shuler
On 05/26/2015 08:44 AM, Christoph Anton Mitterer wrote: If e.g. the Mozilla bundle would be split out to ca-mozilla or something like that, users that have no interest in these certs could choose not to install that package and save some space. Probably something like 99.N% of use cases by

Bug#783615: update-ca-certificates --fresh doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2015-05-01 Thread Michael Shuler
Thank you for the details. On 04/30/2015 02:41 AM, Daniel Lutz wrote: The hooks in /etc/ca-certificates/update.d are called to re-add/ update/replace certificates in $CERTSDIR, but not for those in $LOCALCERTSDIR. Is this intended behaviour? It seems that this has just never come up, so it

Bug#783615: update-ca-certificates --fresh doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2015-04-28 Thread Michael Shuler
On 04/28/2015 07:26 AM, Daniel Lutz wrote: If update-ca-certificates is called with the --fresh option, it doesn't correctly re-add certificates in /usr/local/share/ca-certificates. These are ignored. They are not ignored. If they exist, they are trusted. Period. Although

Bug#782230: ca-certificates: update-ca-certificates manpage refers to the certificates.crt file instead of ca-certificates.crt

2015-04-13 Thread Michael Shuler
Control: tags -1 + pending Thanks! I committed this change to the git repo for the english man page, so it will get updated on the next upload to unstable. I'll dig through the po files to see if I can find any other instances of this typo and commit those.

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2015-04-13 Thread Michael Shuler
On 04/12/2015 09:39 PM, Simon Deziel wrote: Just so that you know, the NSS version that includes this CA was released in December 2014. Yep, thanks - I'm aware. This bug will be closed when the new ca-certificates package is uploaded. -- Michael -- To UNSUBSCRIBE, email to

Bug#776805: mozilla/GTE_CyberTrust_Global_Root.crt not (re)enabled on upgrades

2015-02-03 Thread Michael Shuler
On 02/01/2015 05:05 PM, Michael Biebl wrote: Digging a bit deeper, I found that https://softwareupdate.vmware.com/ uses the GTE_CyberTrust_Global_Root.crt certificate, and apparently that certificate was disabled, as dpkg-reconfigure ca-certificates showed. After re-enabling that CA the problem

Bug#775932: Certificate from msm.mitre.org (Entrust) not recognized by some programs.

2015-01-27 Thread Michael Shuler
On 01/22/2015 09:45 AM, Carlos Alberto Lopez Perez wrote: So Why iceweasel, chromium or wget accept this certificate as valid? Do you have any idea? Unfortunately, I haven't had the time to investigate the various software you have listed, nor do I see much personal time to do so in the

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2015-01-17 Thread Michael Shuler
Control: tags -1 + pending On 10/06/2014 05:23 PM, Michael Shuler wrote: Do I understand this chain correctly to be the new root: CN=USERTrust RSA Certification Authority which is currently open for inclusion into Mozilla? mozilla.org: Status: ASSIGNED - https://bugzilla.mozilla.org

Bug#774201: update-ca-certificates: allow setting the certs in a dir to the default set

2014-12-29 Thread Michael Shuler
Will do as as soon as possible. Thanks, Michael.

Bug#611501: /usr/local/share/ca-certificates/ group-writable

2014-10-20 Thread Michael Shuler
Control: tags -1 + pending http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git/commit/?id=a1a33ae5e155d2be5b17912ea060953f5cba9845 -- Kind regards, Michael -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#764296: ca-certificates: old certificates are not removed on upgrade but only at the next run of reconfiguration

2014-10-07 Thread Michael Shuler
Control: tags -1 - moreinfo Thanks for the extra info! On 10/07/2014 10:02 AM, Christoph Anton Mitterer wrote: Well I have many disabled certs... could that be a difference? And what's your default debconf mode for ca-certificates? ask/yes/no? Mine is ask. I use the package defaults, for

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2014-10-06 Thread Michael Shuler
On 09/28/2014 05:24 AM, Emerick 'mz' Mounoury wrote: Yes, because we integrated in our own-made ca-certificates package installed on our SSL/X509 reverse proxy the cross-signed certificate (usertrust) between our intermediate (gandi ssl ca 2) and the root ca (addtrust). Do I understand this

Bug#764296: ca-certificates: old certificates are not removed on upgrade but only at the next run of reconfiguration

2014-10-06 Thread Michael Shuler
Control: tags -1 + moreinfo unreproducible Hello, I tested upgrades on about 8 boxes with no issues, before requesting an upload. Here's a test I just ran on a box that I had not upgraded, yet: (master)mshuler@hana:~$ dpkg -l ca-certificates Desired=Unknown/Install/Remove/Purge/Hold |

Bug#763166: ca-certificates: New upstream version

2014-09-28 Thread Michael Shuler
http://anonscm.debian.org/cgit/collab-maint/ca-certificates.git I made a request, yesterday, to my sponsors for an upload. Michael On Sun, Sep 28, 2014 at 6:31 AM, Kurt Roeckx k...@roeckx.be wrote: Package: ca-certificates Version: 20140325 Severity: wishlist Hi, Could you please update

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2014-09-28 Thread Michael Shuler
and one root certificate from SPI - if there is something missing from the Mozilla certificate bundle, then this request would need to go to Mozilla. Michael On Sun, Sep 28, 2014 at 5:24 AM, Emerick 'mz' Mounoury emer...@gandi.net wrote: On 09/28/2014 02:09 AM, Michael Shuler wrote: On 09/25/2014

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2014-09-27 Thread Michael Shuler
On 09/25/2014 04:14 AM, Emerick 'mz' Mounoury wrote: On 09/24/2014 09:25 PM, Michael Shuler wrote: Do you have a test SSL site URL on your system to see the full trust chain? There are 4 AddTrust root CAs in ca-certificates, so I'd like to see the trust path to better understand your problem

Bug#743156: wheezy-pu: package ca-certificates/20130119+deb7u1

2014-09-24 Thread Michael Shuler
On 09/20/2014 11:53 AM, Adam D. Barratt wrote: On Mon, 2014-08-25 at 21:36 -0500, Michael Shuler wrote: On 08/24/2014 02:12 PM, Adam D. Barratt wrote: Does the upgrade issue you mentioned in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743259#22 also apply to this upload? No, Wheezy

Bug#762709: ca-certificates: Import http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt Root CA certificate which is missing

2014-09-24 Thread Michael Shuler
Do you have a test SSL site URL on your system to see the full trust chain? There are 4 AddTrust root CAs in ca-certificates, so I'd like to see the trust path to better understand your problem. Thanks! -- Kind regards, Michael -- To UNSUBSCRIBE, email to

Bug#743156: wheezy-pu: package ca-certificates/20130119+deb7u1

2014-08-25 Thread Michael Shuler
On 08/24/2014 02:12 PM, Adam D. Barratt wrote: On 2014-03-31 1:25, Michael Shuler wrote: I would like to upload ca-certificates to stable to include one important patch to fix duplicate CKA_LABEL certificates, and bring the Mozilla CA bundle up to date. The stable debdiff is attached. Does

Bug#743259: squeeze-pu: package ca-certificates/20090814+squeeze1

2014-07-19 Thread Michael Shuler
On 07/19/2014 06:45 AM, Adam D. Barratt wrote: On Thu, 2014-07-10 at 19:30 +0100, Adam D. Barratt wrote: On Mon, 2014-03-31 at 22:10 -0500, Michael Shuler wrote: I would like to upload ca-certificates to oldstable to bring the Mozilla CA bundle up to date, include one important patch to fix

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Michael Shuler
Control: forwarded -1 https://bugzilla.mozilla.org/show_bug.cgi?id=994033 On 04/09/2014 08:07 AM, Klemens Baum wrote: Following the OpenSSL CVE-2014-0160 Heartbleed vulnerability [1,2], any certificate that was used with an vulnerable version of OpenSSL (I read somewhere 1/3 of the web) should

Bug#743667: Missing GTE_CyberTrust_Global_Root

2014-04-06 Thread Michael Shuler
Control: severity -1 normal Control: tags -1 + moreinfo On 04/04/2014 05:17 PM, Weilu Jia wrote: GTE_CyberTrust_Global_Root is missing from the package and is causing ssl certificate verification to fail. Certificate verification fails because file is missing: optix2000@rumia

Bug#743365: [ca-certificates] Please reconsider NEWS.Debian usage

2014-04-02 Thread Michael Shuler
On 04/02/2014 12:27 AM, Filipus Klutiero wrote: I rarely see multiple NEWS entries from packages which I never directly interact with. ca-certificates is one package I never had to install, remove, upgrade, downgrade, fix, or even learn about, yet it has 17 entries in 10 years. In fact,

Bug#743365: [ca-certificates] Please reconsider NEWS.Debian usage

2014-04-02 Thread Michael Shuler
Thanks for the suggestions, Filipus - I appreciate your time :) -- Michael -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#741561: Proposal for resolution of this issue

2014-04-01 Thread Michael Shuler
be a fantastic indicator that the project is viable and trustworthy by their own standards. I would enjoy reading about this and consider our options. If CAcert is included in the Mozilla certdata.txt, it will be included in Debian ASAP, as this is our current inclusion policy. -- Warm regards, Michael

Bug#741561: merge foobar

2014-04-01 Thread Michael Shuler
I unarchived and reopened #687693, then merged #741561-#687693. That didn't seem to do what I thought. Apologies if I goofed that up, as it seems #741561 no longer appears on the open bugs page for the package. I had thought they would both appear as open bugs. If someone has the proper merge

Bug#743339: ca-certificates: Previously removed certificates not added again

2014-04-01 Thread Michael Shuler
On 04/01/2014 04:52 PM, Kurt Roeckx wrote: It seems that you revered the removal of some certificates. However they did not get installed again. It seems they were excluded in /etc/ca-certificates.conf for some reason, and so not added again. Is this between 20140223 - 20140325? Yes, Mozilla

Bug#687693: CAcert Licensing and Inclusion in Debian main

2014-04-01 Thread Michael Shuler
/RootDistributionLicense.php https://bugs.debian.org/718434 https://bugs.debian.org/741561 -- Kind regards, Michael Shuler -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#742810: ca-certificates not trusting comodo positiveSSL ?

2014-03-30 Thread Michael Shuler
Control: notfound -1 20140325 Control: tag -1 unreproducible You probably need to follow the positivessl installation documentation [0] and include the intermediate CA certificate file(s) in your web server configuration. The various Comodo root CA certificates are already in ca-certificates.

Bug#742957: /usr/sbin/update-ca-certificates: Please restore SELinux label after generating ca-certificates.crt file

2014-03-29 Thread Michael Shuler
Thanks for the patch, Laurent. -- Michael

Bug#741561: No longer ship cacert certificates

2014-03-14 Thread Michael Shuler
On 03/14/2014 04:40 AM, Klaus Ethgen wrote: Am Fr den 14. Mär 2014 um 0:41 schrieb Michael Shuler: On 03/13/2014 05:18 PM, Klaus Ethgen wrote: The severity is critical as it breaks several unrelated packages Please, be specific about the stated several packages. - - mutt: Asking to prove

Bug#741561: No longer ship cacert certificates (and valicert)

2014-03-14 Thread Michael Shuler
Thanks for including your thoughts. On 03/14/2014 01:25 PM, Wolfgang Walter wrote: And why valicert's certificates have been removed though they are still in iceweasel? Valicert as well as several other 1024-bit CA certificates were removed from Mozilla.

Bug#741561: No longer ship cacert certificates

2014-03-13 Thread Michael Shuler
On 03/13/2014 05:18 PM, Klaus Ethgen wrote: The severity is critical as it breaks several unrelated packages Please, be specific about the stated several packages. -- Kind regards, Michael -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe.

Bug#733987: RFS: dbab/1.0.1 [ITP] - dnsmasq-based ad-blocking using pixelserv

2014-01-02 Thread Michael Shuler
This has all sorts of problems. 1) incomplete source and debian packaging (symlinked to nowhere) 2) native package (version 1.0.1 and debian/ dir should be separate from upstream source) -- Kind regards, Michael mshuler@mana:~/tmp/build$ dget -xu

Bug#733627: ca-certificates: hooks don't get all the CAs

2013-12-30 Thread Michael Shuler
On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote: After adding ca-certificates-java I found that a locally installed ca (/usr/local/share/ca-certificates/whatever.crt) was not being added to the java keystore, -- .crt The only way I got it added to the java certs was by removing all

Bug#733627: ca-certificates: hooks don't get all the CAs

2013-12-30 Thread Michael Shuler
On 12/30/2013 09:10 AM, Michael Shuler wrote: On 12/30/2013 08:16 AM, Santiago Garcia Mantinan wrote: After adding ca-certificates-java I found that a locally installed ca (/usr/local/share/ca-certificates/whatever.crt) was not being added to the java keystore, -- .crt The only way I got

Bug#501123: ca-certificates should be maintained as a security relevant package

2013-12-16 Thread Michael Shuler
On 12/16/2013 04:37 PM, Christoph Lechleitner wrote: Why is the ca-certificates package not in the list of security relevant packages? The Debian Security team does place some importance on keeping ca-certificates updated, as can be seen in various uploads over the years, however, as per

Bug#501123: ca-certificates should be maintained as a security relevant package

2013-12-16 Thread Michael Shuler
On 12/16/2013 06:27 PM, Christoph Lechleitner wrote: Regarding our business model: Using Debian on those customer systems was not our choice, it was the customer's. But we recommended it Debian is a great choice :) My comment was about the decision to remain on oldstable for such a long

Bug#718434: ca-certificates: should CAcert.org be included?

2013-12-06 Thread Michael Shuler
I just wanted to include a reply on this bug that I have been reading the responses as they have been posted. I appreciate the feedback and I'm still pretty torn, to be honest. #1 - Debian does not distribute CAcert's web site code, so while the question about its quality is technically

Bug#731463: Bug#718434: ca-certificates: should CAcert.org be included?

2013-12-06 Thread Michael Shuler
I just wanted to include a reply on this bug that I have been reading the responses as they have been posted. I appreciate the feedback and I'm still pretty torn, to be honest. #1 - Debian does not distribute CAcert's web site code, so while the question about its quality is technically

Bug#718434: Bug#731463: Bug#718434: ca-certificates: should CAcert.org be included?

2013-12-06 Thread Michael Shuler
On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote: can we ship CAs marked as disabled by default? I think this would prove to be a rather severe disservice to Debian users, making all SSL connections fail for all software that is or depends on one of the reverse dependencies of

Bug#718434: Bug#731463: ca-certificates: should CAcert.org be included?

2013-12-06 Thread Michael Shuler
On 12/06/2013 08:18 PM, Daniel Kahn Gillmor wrote: On 12/06/2013 08:11 PM, Michael Shuler wrote: On 12/06/2013 06:21 PM, Daniel Kahn Gillmor wrote: can we ship CAs marked as disabled by default? I think this would prove to be a rather severe disservice to Debian users, making all SSL

Bug#728220: RFS: fatcat -- FAT32 explore, extract, repair, and forensic tool

2013-10-29 Thread Michael Shuler
Hi, Your package is built as a native Debian package, version 1.0.1 (doesn't contain a Debian build version, i.e.: 1.0.1-1). This is the first thing to work on. Builds OK in a sid cowbuilder. More TODO: :) mshuler@mana:~/tmp/build$ lintian -I --pedantic fatcat_1.0.1_amd64.changes I: fatcat

Bug#728220: RFS: fatcat -- FAT32 explore, extract, repair, and forensic tool

2013-10-29 Thread Michael Shuler
Hi again, Some other things I noticed: - no source code Copyright in d/copyright (only lists debian/*) - is the source code to build the docs/ image files available? - no d/watch file - no Homepage: entry in d/control - no Vcs-*: entries in d/control -- Kind regards, Michael -- To

Bug#724674: ca-certificates: local certificates added are not trusted

2013-10-23 Thread Michael Shuler
Hello Michal, This bug report needs some additional information from you. Please, read my 9/26/2013 reply [0] and and reply to the bug to see if we can figure out how we can help solve your problem. [0] http://bugs.debian.org/724674#10 -- Kind regards, Michael -- To UNSUBSCRIBE, email to

Bug#724674: ca-certificates: local certificates added are not trusted

2013-10-23 Thread Michael Shuler
OP's email still bounces.. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#727136: /usr/sbin/update-ca-certificates: please sort local ca certificates

2013-10-22 Thread Michael Shuler
Control: tags -1 patch On 10/22/2013 10:39 AM, Vaclav Ovsik wrote: Is it possible to add sort after find, so the order will be deterministic? --- /usr/sbin/update-ca-certificates~ 2013-10-22 17:36:21.953351000 +0200 +++ /usr/sbin/update-ca-certificates2013-10-22 17:36:42.685350998

Bug#724592: pu: package ifmetric/0.3-2

2013-10-02 Thread Michael Shuler
regards, Michael Shuler /gentle nudge signature.asc Description: OpenPGP digital signature

Bug#724592: pu: package ifmetric/0.3-2

2013-10-02 Thread Michael Shuler
On 10/02/2013 02:25 PM, Adam D. Barratt wrote: On Wed, 2013-10-02 at 10:31 -0500, Michael Shuler wrote: I would enjoy the possibility of getting ifmetric_0.3-2+deb7u1 uploaded for the 7.2 release and the window is getting smaller. I confirmed my sponsor's availability for the next few days

Bug#724674: ca-certificates: local certificates added are not trusted

2013-09-26 Thread Michael Shuler
actually used? Could you please restate the actual problem we need to look at? -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#724674: Fwd: Delivery Status Notification (Failure)

2013-09-26 Thread Michael Shuler
Shuler mshu...@pbandjelly.org Message-ID: 52443b46.1090...@pbandjelly.org Date: Thu, 26 Sep 2013 08:48:54 -0500 From: Michael Shuler mich...@pbandjelly.org User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Michal Suchanek hramr...@centrum.cz

Bug#724592: pu: package ifmetric/0.3-2

2013-09-26 Thread Michael Shuler
-pages -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#724592: pu: package ifmetric/0.3-2

2013-09-25 Thread Michael Shuler
is a one line patch to increase the reply buffer size. Attached is the proposed stable debdiff. - -- Kind regards, Michael Shuler - -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (990, 'testing'), (300, 'unstable'), (200, 'experimental') Architecture: amd64

Bug#721951: RFS: ifmetric/0.3-3 [RC][ITA] -- Set routing metrics for a network interface

2013-09-22 Thread Michael Shuler
/2013 04:51 PM, Michael Shuler wrote: Here's the mentors URL: http://mentors.debian.net/package/ifmetric Here's the dget command: dget -x http://mentors.debian.net/debian/pool/main/i/ifmetric/ifmetric_0.3-3.dsc And here are the collab-maint repository URLs (pristine-tar, git

Bug#706904: Chinese Checkers RFS review

2013-09-20 Thread Michael Shuler
On 09/20/2013 10:06 AM, Dave Steele wrote: On Fri, Sep 20, 2013 at 10:19 AM, Paul Tagliamonte paul...@debian.org wrote: On Fri, Sep 20, 2013 at 10:18:18AM -0400, Dave Steele wrote: I'm not sure we are clear with terms here. The newbie is the upstream, and he has chosen to include the debian

Bug#700481: Login... Network error: TLS read failed.

2013-09-17 Thread Michael Shuler
Upstream commit ea4324b [0] corrects this and is contained in upstream tag/release 2013.09.15, so the upload of pianobar_2013.09.15 should fix this issue. [0] https://github.com/PromyLOPh/pianobar/commit/ea4324 -- Kind regards, Michael Shuler -- To UNSUBSCRIBE, email to debian-bugs-dist-requ

Bug#700481: Login... Network error: TLS read failed.

2013-09-17 Thread Michael Shuler
On 09/17/2013 10:01 AM, Luke Faraone wrote: Is this issue also occurring in wheezy? If so, I could probably update it also in the stable release. I track testing, so cannot confirm, but I imagine so. Pianobar is one of those packages that changes as the target service API changes, making it

Bug#718434: ca-certificates: should CAcert.org be included?

2013-09-14 Thread Michael Shuler
On 09/14/2013 12:15 PM, Thomas R. Koll wrote: ..lots!.. I appreciate you adding some good details and your thoughts to this bug report, Thomas. -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#721692: Please add USERTrust's USERFirst Object Root CA to ca-certificates

2013-09-06 Thread Michael Shuler
On 09/04/2013 10:38 AM, Raphael Geissert wrote: On 3 September 2013 08:05, Charles Davis cdavi...@gmail.com wrote: On behalf of the Wine community, I'd like to request that the USERTrust Group (now COMODO)'s USERFirst Object Root CA (UTN-USERFirst-Object) be added to the ca-certificates

Bug#721951: RFS: ifmetric/0.3-3 [ITA] -- Set routing metrics for a network interface

2013-09-05 Thread Michael Shuler
/ifmetric.c for s/Recieved/Received/ typo. * Add debian/upstream_changelog from homepage News section. * Add patch to fix NETLINK: Packet too small or truncated! error. Thanks to Benedek László for the patch. Closes: #514197, LP: #896584 -- Kind regards, Michael Shuler signature.asc

Bug#721951: RFS: ifmetric/0.3-3 [ITA] -- Set routing metrics for a network interface

2013-09-05 Thread Michael Shuler
I meant to include a comment in the original RFS about #661591: #661591 packages providing ifupdown scripts must have those scripts fixed if needed I have not fully tested exit codes, but the ifmetric if-up script should cleanly exit 0 or 1. Once I have tested it out, I will removed ifmetric

Bug#661591: Bug #661591: packages providing ifupdown scripts must have those scripts fixed if needed

2013-09-05 Thread Michael Shuler
Control: affects 661591 - ifmetric I checked that the ifmetric if-up script exits 0 on success and 1 on error. -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#721769: ITA: ifmetric -- Set routing metrics for a network interface

2013-09-04 Thread Michael Shuler
Control: tags -1 pending ifmetric now has a collab-maint git repository and some low hanging fruit committed: http://anonscm.debian.org/gitweb/?p=collab-maint/ifmetric.git -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#609238: debian-reference: ifmetric typo

2013-09-03 Thread Michael Shuler
reassign 609238 debian-reference retitle 609238 debian-reference: ifmetric typo tags 609238 patch thanks Attached is a patch to correct the typo. -- Kind regards, Michael Shuler Index: asciidoc/05_network.txt === --- asciidoc

Bug#721769: ITA: ifmetric -- Set routing metrics for a network interface

2013-09-03 Thread Michael Shuler
package: wnpp severity: normal Per an email conversation with the current maintainer, I intend to adopt ifmetric. On 09/03/2013 04:47 PM, Chris Hanson wrote: I would love it if you would take over ifmetric. -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital

Bug#718434: ca-certificates: should CAcert.org be included?

2013-07-31 Thread Michael Shuler
In addition, I had an email conversation (link to thread is escaping me, at the moment) about removal due to their license statement [0] that You are bound by the Root Distribution Licence for any re-distributions of CAcert's roots. [1]. I was convinced by others that the certificates cannot be

Bug#718434: ca-certificates: should CAcert.org be included?

2013-07-31 Thread Michael Shuler
On 07/31/2013 01:55 PM, Michael Shuler wrote: In addition, I had an email conversation (link to thread is escaping me, at the moment) about removal due to their license statement [0] that You are bound by the Root Distribution Licence for any re-distributions of CAcert's roots. [1

Bug#718173: ca-certificates: /usr/local/share/ca-certificates/ handling broken

2013-07-28 Thread Michael Shuler
Control: severity -1 normal On 07/27/2013 08:52 PM, Christoph Anton Mitterer wrote: Hi. Hi Christoph - thanks for the bug report. I lowered the severity since I agree that some improvements can be made, but local certificate handling does work fine. Biggest hint I have is to use

Bug#717761: [ca-certificates] Cartificates with blank spaces in file name break ca-certificates.conf when running dpkg-reconfigure

2013-07-26 Thread Michael Shuler
further escaping is needed after looking more closely. -- Kind regards, Michael Shuler -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Bug#514197: ifmetric fails on amd64

2013-06-07 Thread Michael Shuler
release. -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#705290: Works for me.

2013-04-17 Thread Michael Shuler
Using the steps to reproduce, I successfully get audio playback with chromium_26.0.1410.43-1 without any issues at all. Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) hmm.. I'm using 3.2.0-4-amd64 (3.2.41-2). Relevant? -- Kind regards, Michael -- To UNSUBSCRIBE, email to

Bug#705515: munin: Please include delaycompress for munin log files

2013-04-15 Thread Michael Shuler
to avoid log data loss, at the cost of a bit of disk space. - -- Kind regards, Michael Shuler - -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (900, 'testing'), (400, 'unstable'), (300, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel

<    1   2   3   4   >