Bug#874709: [Pkg-openssl-devel] Bug#874709: openssl1.0: Please add arm64ilp32 support

2017-09-09 Thread Kurt Roeckx
security release at some point and I might upload it at that time. Kurt

Bug#385907: [Pkg-openssl-devel] Bug#385907: marked as done (openssl: missing purging at remove-time)

2017-09-04 Thread Kurt Roeckx
> > Since > https://piuparts.debian.org/stretch/source/o/openssl.html > > says "successfully-tested 1.1.0f-3" I think that we are done here. I think it's other packages that call openssl from the maintainer scripts that fail. Kurt

Bug#761032: hunspell-nl

2017-08-30 Thread Kurt Roeckx
it should have been renamed ages ago. Thijs, do you have time to do this? Kurt

Bug#873302: openvpn: openssl 1.1 tls version support

2017-08-28 Thread Kurt Roeckx
On Mon, Aug 28, 2017 at 12:24:17PM +0200, Bernhard Schmidt wrote: > Am 26.08.2017 um 13:18 schrieb Kurt Roeckx: > > Hi Kurt, > > > Source: openvpn > > Version: 2.4.3-4 > > Severity: important > > Tags: patch > > > > Hi, > > > > T

Bug#873334: postfix: Enable all TLS protocols

2017-08-26 Thread Kurt Roeckx
point postfix upstream will add proper support for the SSL_CTX_set_min_proto_version() way of setting the minimum TLS version from the config file, I suggest you use this patch until that time. Kurt --- src/tls/tls_server.c.bak 2017-08-26 18:12:06.356346925 +0200 +++ src/tls/tls_server.c 2017-08-26

Bug#873302: openvpn: openssl 1.1 tls version support

2017-08-26 Thread Kurt Roeckx
is currently TLS 1.2 and you can't override it with the options that you're currently using (and are deprecated). Kurt --- src/openvpn/ssl_openssl.c.bak 2017-08-26 13:10:40.333428825 +0200 +++ src/openvpn/ssl_openssl.c 2017-08-26 13:12:05.143672978 +0200 @@ -215,6 +215,19 @@ #endif

Bug#871987: [Pkg-openssl-devel] Bug#871987: Bug#871987: openvpn

2017-08-26 Thread Kurt Roeckx
On Sat, Aug 26, 2017 at 02:50:37PM +0800, Gedalya wrote: > On 08/26/2017 02:58 AM, Kurt Roeckx wrote: > > > openvpn doesn't seem to make use of the > > SSL_CTX_set_min_proto_version() function yet. I've attached a > > patch that I didn't even try to compile that I think

Bug#871987: [Pkg-openssl-devel] Bug#871987: openvpn

2017-08-25 Thread Kurt Roeckx
r supporting only > TLS 1.0, and it doesn't work. It did of course work with with openssl > 1.1.0f-3. > with 1.1.0f-5, I get: openvpn doesn't seem to make use of the SSL_CTX_set_min_proto_version() function yet. I've attached a patch that I didn't even try to compile that I think should do the

Bug#833585: lintian: Check presence of upstream signature if signing key available

2017-08-21 Thread Kurt Roeckx
against uscan to do this, I understand that it's been commited just not uploaded yet. Kurt

Bug#872335: [Pkg-openssl-devel] Bug#872335: openssl: DES-CBC3-SHA not usable

2017-08-16 Thread Kurt Roeckx
> (https://www.ssllabs.com/ssltest/viewClient.html?name=IE=8=XP=101) > > The cipher is still present in the ciphers(1ssl) manpage. That cipher has been disabled by default because of the sweet32 attack. There are no ciphers enabled anymore that can talk to IE on windows XP. Kurt

Bug#871477: [Pkg-openssl-devel] Bug#871477: upgrade of libssl1.1 to breaks dovecot imap via tls: kmail from debian stable/unstable cannot connect to dovecot any more

2017-08-08 Thread Kurt Roeckx
y to continously > test debian/unstable and debian/testing on servers in our environment. I'm going to start with reassigning this to kmail. I believe all such issues should get fixed, and that they should get fixed in stable and maybe oldstable too. I'm planning on making a change to openssl too, but it would still likely still and up broken. Kurt

Bug#802658: libesmtp: Should support TLS 1.1+

2017-08-07 Thread Kurt Roeckx
y: > > SSLv23_method(), SSLv23_server_method() and SSLv23_client_method() > were deprecated and the preferred TLS_method(), TLS_server_method() > and TLS_client_method() functions were introduced in OpenSSL 1.1.0. > > Did I missunderstood something here? Even tought it's deprecated, it's unlikely we'll remove the compatiblity define any time soon. So either way really works for me. Kurt

Bug#869856: openssl: FTBFS: Testsuite failures

2017-08-06 Thread Kurt Roeckx
On Sun, Aug 06, 2017 at 06:03:30PM +0200, Sebastian Andrzej Siewior wrote: > On 5 August 2017 23:31:33 CEST, Kurt Roeckx <k...@roeckx.be> wrote: > > >I planned to break things by disabling TLS 1.0 and 1.1, which I > >might upload soon. I guess I can fix that at the same

Bug#869856: openssl: FTBFS: Testsuite failures

2017-08-05 Thread Kurt Roeckx
g new. I planned to break things by disabling TLS 1.0 and 1.1, which I might upload soon. I guess I can fix that at the same time. Kurt

Bug#870018: [Pkg-openssl-devel] Bug#870018: openssl: SIGSEGV/coredump on process stop when TLS is enabled in kamailio

2017-08-02 Thread Kurt Roeckx
reassign 870018 kamailio thanks On Wed, Aug 02, 2017 at 05:01:01PM +0200, Guillem Jover wrote: > Control: tags -1 patch > > Hi! > > On Sat, 2017-07-29 at 09:11:53 +0200, Kurt Roeckx wrote: > > On Sat, Jul 29, 2017 at 12:12:16AM +0200, Michael Prokop wrote: > > > Ku

Bug#870406: [pkg-mad-maintainers] Bug#870406: libmad: CVE-2017-11552

2017-08-01 Thread Kurt Roeckx
r changelog entry. I guess you don't have any patch for this? Kurt

Bug#870139: dieharder: dab_monobit2 broken?

2017-07-30 Thread Kurt Roeckx
Can you confirm that this is problem with the test and not the RNG? Kurt

Bug#870018: [Pkg-openssl-devel] Bug#870018: openssl: SIGSEGV/coredump on process stop when TLS is enabled in kamailio

2017-07-29 Thread Kurt Roeckx
On Sat, Jul 29, 2017 at 12:12:16AM +0200, Michael Prokop wrote: > > Kurt, do you have any ideas what might go wrong in OPENSSL_cleanup > here and how this could be fixed? We'd appreciate any hints. Thanks! I don't see anything obvious wrong. From what I understand it calls exit(0) from

Bug#869856: [Pkg-openssl-devel] Bug#869856: openssl: FTBFS: Testsuite failures

2017-07-27 Thread Kurt Roeckx
On Thu, Jul 27, 2017 at 08:14:45AM -0700, Daniel Schepler wrote: > On Thu, Jul 27, 2017 at 12:02 AM, Kurt Roeckx <k...@roeckx.be> wrote: > > Is that reproducible? > > Yes, it's definitely reproducible on my machine. Does the attached patch

Bug#869856: [Pkg-openssl-devel] Bug#869856: openssl: FTBFS: Testsuite failures

2017-07-27 Thread Kurt Roeckx
ut expected (7) >Tests out of sequence. Found (9) but expected (8) > Displayed the first 5 of 8 TAP syntax errors. Is that reproducible? This was most likely fixed upstream the day after the release. Kurt

Bug#858539: should ca-certificates certdata.txt synchronize across all suites?

2017-07-22 Thread Kurt Roeckx
try to implement all the rules that Mozilla applies in all software that deals with certificate. And at least Mozilla is interested in that, and at least some of the OpenSSL people would also like to see OpenSSL have more checks than that currently happen. Kurt

Bug#867104: wanna-build issue with src:perl versioned Provides

2017-07-03 Thread Kurt Roeckx
' > and the like. We have version 5.0.1-8~bpo8+1 of dose-builddebcheck installed, while the bug indicates that it's fixed in 4.1-1. Kurt

Bug#851094: apache2: Please migrate to openssl1.1 in buster

2017-06-30 Thread Kurt Roeckx
Apache 2.4.26 has been released which supports openssl 1.1.0. Kurt

Bug#865503: firmware-misc-nonfree: edimax ew-7711usn is not running on debian stretch

2017-06-21 Thread Serkan KURT
Package: firmware-misc-nonfree Version: 20161130-3 Severity: important Dear Maintainer, I can't use edimax ew-7711usn device on debian stretch. I've loaded firmware- misc-nonfree package. I'm seeing the device and wirelees networks in network manager. But I can not connect to one of them.

Bug#422347: [pkg-ntp-maintainers] Bug#422347: can't get ntpq without ntpd

2017-06-20 Thread Kurt Roeckx
; > > Most bugs are in that case, so "wontfix" is improper. What matters > > is that the bug will be fixed for the next stable version. > > I'm not sure whether we do want to split this up. If we don't plan to > ever split it "wontfix" (and eventually closin

Bug#422347: [pkg-ntp-maintainers] Bug#422347: can't get ntpq without ntpd

2017-06-19 Thread Kurt Roeckx
What matters > is that the bug will be fixed for the next stable version. > > > For sid there is a new binary package sntp that ships a proper > > ntp client. > > Unless sntp completely replaces ntpdc and ntpq, this doesn't solve > the bug. I think it's a replacement of ntpdate, not ntpdc and ntpq Kurt

Bug#850329: Greetings with Confidence

2017-06-17 Thread Sgt. Martin Kurt
Greetings with Confidence My name is Sgt. Martin Kurt currently serving in US military; I am contacting you to help me on a fund transfer. In one of our operations, some fund was discovered by my team and due to my position here; I cannot leave the base as am still on assignment. Therefore, I am

Bug#863707: [Pkg-openssl-devel] Bug#863707: Bug fixed in openssl?

2017-06-05 Thread Kurt Roeckx
is issue be closed? This issue has been reassigned to the openssl package, and it's not fixed yet in Debian. There is nothing to do on the simple-tpm-pk11 side. Kurt

Bug#863472: unblock: openssl/1.1.0f-1

2017-06-05 Thread Kurt Roeckx
On Mon, Jun 05, 2017 at 11:33:57AM +0200, Cyril Brulebois wrote: > Kurt Roeckx <k...@roeckx.be> (2017-06-04): > > So I've uploaded openssl 1.1.0f-2 > > Source debdiff lgtm from -1, and installation over https works fine, > ACK. So I actually have a new version I want to u

Bug#863707: [Pkg-openssl-devel] Bug#863707: simple-tpm-pk11: FTBFS: ./m4/test-driver: line 107: 4695 Aborted (core dumped)

2017-06-04 Thread Kurt Roeckx
y_)failed with error 22 But I can confirm that just upgrading libssl1.1 triggers the problem. The only idea that I currently have is that it's related to a cleanup handler after the program terminates. Kurt

Bug#863472: unblock: openssl/1.1.0f-1

2017-06-04 Thread Kurt Roeckx
On Sun, Jun 04, 2017 at 06:53:29PM +0200, Cyril Brulebois wrote: > Kurt Roeckx <k...@roeckx.be> (2017-06-04): > > So I changed it this instead: > > dh_makeshlibs -a -V --add-udeb="libcrypto1.1-udeb" -Xengines > > > > the shlib files now looks l

Bug#863472: unblock: openssl/1.1.0f-1

2017-06-04 Thread Kurt Roeckx
On Sun, Jun 04, 2017 at 11:09:00AM +, Niels Thykier wrote: > Kurt Roeckx: > > [...] > >> > >> Maybe file this as an RC bug against openssl so that it isn't forgotten > >> about, but ignore it for r0? > > > > So I have prepared an update. Shoul

Bug#863472: unblock: openssl/1.1.0f-1

2017-06-04 Thread Kurt Roeckx
On Sun, Jun 04, 2017 at 05:29:21AM +0200, Cyril Brulebois wrote: > Niels Thykier <ni...@thykier.net> (2017-06-03): > > Kurt Roeckx: > > > Package: release.debian.org > > > User: release.debian@packages.debian.org > > > Usertags: unblock > > >

Bug#863494: unblock: elfutils/0.168-1

2017-05-27 Thread Kurt Roeckx
-0.2 Kurt

Bug#863367: [Pkg-openssl-devel] Bug#863367: libecryptfs-dev: unable to install because of unmet dependency

2017-05-27 Thread Kurt Roeckx
hat the package manager should be able to deal with a conflict on just one side. It's not a conflict that involves version numbers. However, if everybody agrees that this is the best solution for the next release, I will need permission from the release team to make such a change. Kurt

Bug#863474: python-cryptography: FTBFS with openssl 1.1.0f

2017-05-27 Thread Kurt Roeckx
and they agreed it was their problem and they fixed it. See: https://github.com/openssl/openssl/pull/3360#issuecomment-304053330 https://github.com/pyca/cryptography/commit/6e7ea2e73e3baf31541c9533dc621d8913152848 Kurt

Bug#863473: unblock: openssl1.0/1.0.2l-1

2017-05-27 Thread Kurt Roeckx
processor (Closes: #861145) * Refresh valgrind.patch Kurt

Bug#863472: unblock: openssl/1.1.0f-1

2017-05-27 Thread Kurt Roeckx
) - Properly detect features on the AMD Ryzen processor (Closes: #861145) - Don't mention -tls1_3 in the manpage (Closes: #859191) * Update libssl1.1.symbols for new symbols * Update man-section.patch Kurt

Bug#863225: [pkg-ntp-maintainers] Bug#863225: ntp: NTP does not build from source

2017-05-25 Thread Kurt Roeckx
On Wed, May 24, 2017 at 10:42:14PM +, Hans Linkels wrote: > Hi Kurt, > > I agree with you on both statements. Libcrypto is not being linked, > and I have no idea either :) > > Today I installed the source files from the Jessie repo on a > fairly pristine Jessie insta

Bug#863225: [pkg-ntp-maintainers] Bug#863225: ntp: NTP does not build from source

2017-05-24 Thread Kurt Roeckx
On Wed, May 24, 2017 at 09:42:39AM +, Hans Linkels wrote: > Hello Kurt, > > I have prepared the build according to the normal Debian procedure for > building a package. This included running mk-build-deps. I checked the > presence of libssl-dev. It is installe

Bug#863225: [pkg-ntp-maintainers] Bug#863225: ntp: NTP does not build from source

2017-05-24 Thread Kurt Roeckx
ned > reference to `CRYPTO_memcmp' > collect2: error: ld returned 1 exit status Do you have libssl-dev installed? Kurt

Bug#862335: [Pkg-openssl-devel] Bug#862335: openssl creates and accepts certificates with bad notAfter field

2017-05-11 Thread Kurt Roeckx
penssl doesn't convert > the string to UTCTime format. Please note that the manual says the format is: YYMMDDHHMMSSZ I guess it would be nice we converted it properly. Kurt

Bug#635752: [pkg-ntp-maintainers] Bug#635752: ntp: Please include systemd service file

2017-05-10 Thread Kurt Roeckx
tion > of /bin/sh (which is an argument I'm still not buying) I see no > downsides. > > Kurt, what do you think? I guess systemd is happy with an exec(), that it stays the same PID? In that case I would prefer that we do it with a script, which should be able to do the other things like adding the correct user to run as. Kurt

Bug#862229: [Pkg-openssl-devel] Bug#862229: libssl1.0.2: Illegal instruction on a PowerPC G4 (32 bits) "in OPENSSL_crypto207_probe () at ppccpuid.s:20"

2017-05-10 Thread Kurt Roeckx
nd, installing the debug > symbols for libssl1.0.2, I was able to get the following (not entirely > complete, but hopefully, enough) bactrace: This is normal and expected. This is only something you see in a debugger, and is covered in the FAQ. Please just "continue". Kurt

Bug#823120: [pkg-ntp-maintainers] Bug#823120: Bug#823120: not fixed in the released version

2017-05-07 Thread Kurt Roeckx
On Sun, May 07, 2017 at 02:48:26PM +0200, Bernhard Schmidt wrote: > On 04.05.2017 22:47, Kurt Roeckx wrote: > > Hi Kurt, > > >>> I was checking 1:4.2.8p10+dfsg-1 that should have fixed this. > >> > >> No, 1:4.2.8p10+dfsg-1+exp1 (in experimental) shou

Bug#823120: [pkg-ntp-maintainers] Bug#823120: Bug#823120: not fixed in the released version

2017-05-04 Thread Kurt Roeckx
gt; > pool 2.debian.pool.ntp.org iburst > > pool 3.debian.pool.ntp.org iburst > > > > # grep pool /usr/sbin/ntpdate-debian > > > > Kurt, this is the only change in experimental I would consider to fix > for Stretch, especially since it has been fixed once and got lost > somewhere. What do you think? And maybe in jessie too. Kurt

Bug#861572: mutt: Shows begin pgp signed message for inline message

2017-04-30 Thread Kurt Roeckx
't see those lines: | -BEGIN PGP SIGNED MESSAGE- | Hash: SHA256 They're not part of the signed message. It really shouldn't be showing that to me. If I set crypt_use_gpgme=no those lines go away. I'm really using 1.7.2-1, but I assume it has that behaviour since 1.7.0-2 based on the NEWS file. Kurt

Bug#860254:

2017-04-27 Thread Kurt Roeckx
On Thu, Apr 27, 2017 at 09:25:33PM +0200, Sebastian Andrzej Siewior wrote: > On 2017-04-27 18:18:50 [+0200], Kurt Roeckx wrote: > > > > Yes, so perl-base should be find for c_rehash and CA.pl, but tsget > > requires libwww-curl-perl and we already don't depend on it. >

Bug#860254: [Pkg-openssl-devel] Bug#860254: Bug#860254: Bug#860254: Bug#860254:

2017-04-27 Thread Kurt Roeckx
On Thu, Apr 27, 2017 at 02:00:47PM +0200, Sebastian Andrzej Siewior wrote: > On 2017-04-23 20:31:35 [+0200], Kurt Roeckx wrote: > > On Sun, Apr 23, 2017 at 09:12:39AM +, Jonathon Delgado wrote: > > > So does this require anything from the perl package? I've never had > &g

Bug#861022: ca-certificates: Switch from c_rehash to openssl rehash

2017-04-23 Thread Kurt Roeckx
Package: ca-certificates Severity: wishlist Hi, Could you switch from calling the c_rehash perl script to the "openssl rehash"? I would like to remove c_rehash in the future. Kurt

Bug#860254: [Pkg-openssl-devel] Bug#860254: Bug#860254: Bug#860254:

2017-04-23 Thread Kurt Roeckx
, but has any > such scenario been identified? We just have to figure out if perl-base is enough or not. I've asked about this. Kurt

Bug#860254: [Pkg-openssl-devel] Bug#860254: Bug#860254:

2017-04-23 Thread Kurt Roeckx
package. This is only necessary for some | packages that are included in the base system. | | Note that this flag may cause no dependency on | perl-base to be generated at all. perl-base is Essential, so its | dependency can be left out, unless a versioned dependency is | needed. Kurt

Bug#860254: [Pkg-openssl-devel] Bug#860254: openssl depends on perl, when recommends seems more appropriate

2017-04-13 Thread Kurt Roeckx
On Thu, Apr 13, 2017 at 09:45:59AM -0700, Tianon Gravi wrote: > On 13 April 2017 at 09:44, Kurt Roeckx <k...@roeckx.be> wrote: > > One of the important binaries in c_rehash which is a perl script. > > Ahh, and that's used by ca-certificates? :( Yes. Kurt

Bug#860254: [Pkg-openssl-devel] Bug#860254: openssl depends on perl, when recommends seems more appropriate

2017-04-13 Thread Kurt Roeckx
gt; necessary. Would it be acceptable to downgrade that Depends to > Recommends instead? That would ensure that it's installed on most > folks' systems, while still allowing people who don't require it to > exclude it. :) One of the important binaries in c_rehash which is a perl script. Kurt

Bug#859930: apt-transport-https: Add http/2 support

2017-04-09 Thread Kurt Roeckx
On Sun, Apr 09, 2017 at 02:53:17PM +0200, Julian Andres Klode wrote: > Control: tag -1 wontfix > > On Sun, Apr 09, 2017 at 01:52:03PM +0200, Kurt Roeckx wrote: > > Package: apt-transport-https > > Severity: wishlist > > > > Hi, > > > >

Bug#859930: apt-transport-https: Add http/2 support

2017-04-09 Thread Kurt Roeckx
Package: apt-transport-https Severity: wishlist Hi, Can you add http/2 support? Kurt

Bug#787404: [pkg-ntp-maintainers] Bug#787404: ntp_intres.request: permission denied

2017-04-03 Thread Kurt Roeckx
On Mon, Apr 03, 2017 at 11:22:19PM +0200, Bernhard Schmidt wrote: > On Mon, Apr 03, 2017 at 11:15:35PM +0200, Kurt Roeckx wrote: > > HI, > > > > I tried to reproduce this with current Jessie and the future Stretch > > > release. As far as I can tell ntp ha

Bug#787404: [pkg-ntp-maintainers] Bug#787404: ntp_intres.request: permission denied

2017-04-03 Thread Kurt Roeckx
ring DNS for 0.debian.pool.ntp.org 1 > ntpd_initres[...]: host name not found: 0.debian.pool.ntp.org > > as soon as DNS and/or network connectivity is available again (a couple > of minutes later) it logs > > ntpd_initres[...]: DNS 0.debian.pool.ntp.org -> IP > > and starts using this server. As far as I know, this only works with the "pool" command, not with any of the server commands. Kurt

Bug#859376: decoding of quoted-printable text

2017-04-02 Thread Kurt Roeckx
an empty line before the boundary marker. I have no idea if that's correct or not. I know I can verify that signature using mutt, but maybe mutt has some workaround for it. The mail in question was generated by evolution. Kurt

Bug#851096: [pkg-ntp-maintainers] Bug#851096: update-leap tries to fetch https:// using a module without HTTPS support

2017-03-31 Thread Kurt Roeckx
ta instead: /usr/share/zoneinfo/leap-seconds.list I also don't trust that script, looking at: # Where to put temporary copy before it's validated my $TMPFILE="/tmp/leap-seconds.$$.tmp"; Kurt

Bug#858493: unblock: ntp/4.2.8p10+dfsg-1

2017-03-22 Thread Kurt Roeckx
-check.patch -- Kurt Roeckx <k...@roeckx.be> Wed, 22 Mar 2017 21:53:40 +0100 The upstream changes are: (4.2.8p10) * [Sec 3389] NTP-01-016: Denial of Service via Malformed Config (Pentest report 01.2017) <perlin...@ntp.org> * [Sec 3388] NTP-01-014: Buffer Overflow in DPTS Clock (Pentest re

Bug#828449: net-snmp: Please migrate to openssl1.1 in buster

2017-03-18 Thread Kurt Roeckx
On Sat, Mar 18, 2017 at 04:55:51PM +1100, Craig Small wrote: > Hi Kurt, > I have applied your patch, it looks like pretty minor API stuff but > thanks for hunting it all down. I needed to mess around with the > configure scripts so they found the new calls. > > One thing

Bug#856343: [pkg-ntp-maintainers] Bug#856343: ntpdate: tell kernel time is synced

2017-02-28 Thread Kurt Roeckx
On Tue, Feb 28, 2017 at 10:02:04AM +0100, Daniel Pocock wrote: > > Discussed on debian-devel[1] As also explain there, the only solution I find acceptable is for ntpdate-debian to call hwclock. Kurt

Bug#855342: RFH: ntp

2017-02-23 Thread Kurt Roeckx
On Thu, Feb 23, 2017 at 01:33:09PM +0100, Bernhard Schmidt wrote: > > Will check what could be causing this. That has been fixed in an NMU, see #851803 Kurt

Bug#855541: purple-matrix: Not ready for release yet

2017-02-22 Thread Kurt Roeckx
On Wed, Feb 22, 2017 at 11:21:57PM +0100, Alberto Garcia wrote: > On Wed, Feb 22, 2017 at 10:59:08PM +0100, Kurt Roeckx wrote: > > > > I don't know, I think I would understand you better if I had a > > > list of specific problems that make this software unsuitable for &

Bug#855541: purple-matrix: Not ready for release yet

2017-02-22 Thread Kurt Roeckx
On Wed, Feb 22, 2017 at 01:56:31PM +0100, Alberto Garcia wrote: > On Mon, Feb 20, 2017 at 06:52:58PM +0100, Kurt Roeckx wrote: > > > It's just that each time I mention I'm using this, people tell me > > taht it's experimental, and probably a bug in purple-matrix. But > >

Bug#855342: RFH: ntp

2017-02-21 Thread Kurt Roeckx
On Tue, Feb 21, 2017 at 02:10:09PM -0500, Peter Eisentraut wrote: > On 2/19/17 07:01, Kurt Roeckx wrote: > >>> I could really use some help with the ntp (network time protocol) > >>> package. There have been various bugs filed, and I didn't have the > >>>

Bug#855541: purple-matrix: Not ready for release yet

2017-02-20 Thread Kurt Roeckx
On Mon, Feb 20, 2017 at 11:21:50AM +0100, Alberto Garcia wrote: > On Mon, Feb 20, 2017 at 09:33:55AM +0100, Kurt Roeckx wrote: > > > > Could you be a bit more specific about the problems? In my > > > experience it disconnects (infrequently) and it lacks some > &

Bug#855541: purple-matrix: Not ready for release yet

2017-02-20 Thread Kurt Roeckx
On Mon, Feb 20, 2017 at 08:57:55AM +0100, Alberto Garcia wrote: > On Mon, Feb 20, 2017 at 12:12:35AM +0100, Kurt Roeckx wrote: > > > I think this version shouldn't be shipped with the next > > release. Like the description says, it's "somewhat alpha". > > >

Bug#855541: purple-matrix: Not ready for release yet

2017-02-19 Thread Kurt Roeckx
Package: purple-matrix Version: 0.0.0+git20170105-1 Severity: serious Hi, I think this version shouldn't be shipped with the next release. Like the description says, it's "somewhat alpha". It works some times, but then stops working, it crashes, and so on. Kurt

Bug#855432: unblock: openssl/1.1.0e-1

2017-02-19 Thread Kurt Roeckx
On Sun, Feb 19, 2017 at 07:33:20AM +0100, Cyril Brulebois wrote: > Kurt Roeckx <k...@roeckx.be> (2017-02-18): > > On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote: > > > How soon do you want to see this package in testing? Given I've just > > > fi

Bug#855342: RFH: ntp

2017-02-19 Thread Kurt Roeckx
On Fri, Feb 17, 2017 at 08:56:40AM +0100, Bernhard Schmidt wrote: > On Thu, Feb 16, 2017 at 11:48:49PM +0100, Kurt Roeckx wrote: > > Hi Kurt, > > > I could really use some help with the ntp (network time protocol) > > package. There have been various bugs filed, and I

Bug#855432: unblock: openssl/1.1.0e-1

2017-02-18 Thread Kurt Roeckx
On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote: > Hi, > > Niels Thykier <ni...@thykier.net> (2017-02-18): > > Kurt Roeckx: > > > Package: release.debian.org > > > User: release.debian@packages.debian.org > > > Usertags

Bug#855432: unblock: openssl/1.1.0e-1

2017-02-17 Thread Kurt Roeckx
-2017-3733 - Remove patches that are applied upstream. -- Kurt Roeckx <k...@roeckx.be> Thu, 16 Feb 2017 18:57:58 +0100 I've attached the full debdiff between the version in testing and unstable. Kurt diff -Nru openssl-1.1.0d/apps/openssl.c openssl-1.1.0e/apps/openssl.c --- openssl-1.1.0

Bug#855342: RFH: ntp

2017-02-16 Thread Kurt Roeckx
the past few years. Kurt

Bug#852920: [Pkg-openssl-devel] Bug#852920: libnet-ssleay-perl: FTBFS: Test failures

2017-01-28 Thread Kurt Roeckx
On Sat, Jan 28, 2017 at 06:07:02PM +0100, gregor herrmann wrote: > On Sat, 28 Jan 2017 16:35:44 +0100, Kurt Roeckx wrote: > > > On Sat, Jan 28, 2017 at 04:02:02PM +0100, gregor herrmann wrote: > > > Control: forwarded -1 > > > https://rt.cpan.org/Public/Bug/Displa

Bug#852920: [Pkg-openssl-devel] Bug#852920: libnet-ssleay-perl: FTBFS: Test failures

2017-01-28 Thread Kurt Roeckx
On Sat, Jan 28, 2017 at 04:02:02PM +0100, gregor herrmann wrote: > Control: tag -1 + confirmed > Control: forwarded -1 https://rt.cpan.org/Public/Bug/Display.html?id=120006 I've just filed: https://rt.cpan.org/Public/Bug/Display.html?id=120006 Kurt

Bug#851803: [pkg-ntp-maintainers] Bug#851803: Fix uploaded to DELAYED/5

2017-01-28 Thread Kurt Roeckx
On Sat, Jan 28, 2017 at 12:59:43PM +, Daniel Silverstone wrote: > Control: tag -1 pending > > Hi, > > I've uploaded the patch previously sent into DELAYED/5 > > Let me know if this should be expedited. Just upload it to unstable. Kurt

Bug#766838: [pkg-ntp-maintainers] Bug#766838: ntpdate runs before network is up

2017-01-15 Thread Kurt Roeckx
an IP address has > been assigned. This part handles the IPv4 case only since I don't have an > IPv6 network to test with. I don't think we should have a while loop in there, or at least time out after some time. But we really shouldn't get called if it's not up in the first place. And calling us with "--all" doesn't make sense at all. Kurt

Bug#828082: bind9: FTBFS with openssl 1.1

2017-01-13 Thread Kurt Roeckx
s, so please switch > build-deps to libssl1.0-dev for stretch. Upstream has actually added a patch for this already in the stable branch as far as I know, so I expect this to actually have been fixed in 9.10.4-P5. That being set, it's not using libssl, so either solution is fine for me. Kurt

Bug#845193: [Pkg-openssl-devel] Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-12-28 Thread Kurt Roeckx
5193#10) calling link_a.gnu > > instead of the link_o.gnu target, which tries to link a static library > > composed of PIE objects into a shared library, which makes it fail. > > so is there anything we need to do on the openssl side? Figure out why it uses link_a instead of link_o, and maybe fix it? Kurt

Bug#791625: nut: Can't talk to Eaton 5S

2016-12-24 Thread Kurt Roeckx
On Sat, Dec 24, 2016 at 02:56:53PM +0100, Arnaud Quette wrote: > Hi Kurt, > > are you still facing this issue? > As far as I recall, I've tested 5S not long ago (Jessie + NUT 2.7.4), and > everything was fine... As far as I know, it works sometimes. It ussually works when they'

Bug#848652: [Pkg-openssl-devel] Bug#848652: build fails on ppc64el, double free or corruption, stack suggests libssl

2016-12-20 Thread Kurt Roeckx
On Tue, Dec 20, 2016 at 05:33:12PM +0100, Daniel Pocock wrote: > > > On 19/12/16 23:05, Kurt Roeckx wrote: > > > > > You should use SSL_COMP_free_compression_methods() so that we can > > put the internal pointer to NULL. > > > > Thanks for sug

Bug#848652: [Pkg-openssl-devel] Bug#848652: build fails on ppc64el, double free or corruption, stack suggests libssl

2016-12-19 Thread Kurt Roeckx
me the impression that exploding here is what should be > > expected and libssl is the victim here. > > > > Thanks for taking the time to look at this. > > Is there an example of how this cleanup should be done, or is there a > specific line of code there that you believe is out of place? > > If it is definitely not an openssl issue then the bug can be moved back > to src:resiprocate You should use SSL_COMP_free_compression_methods() so that we can put the internal pointer to NULL. Kurt

Bug#847743: sendmail: STARTTLS server fails with "ca md too weak"

2016-12-11 Thread Kurt Roeckx
On Sun, Dec 11, 2016 at 08:13:08PM +0100, Joerg Dorchain wrote: > On Sun, Dec 11, 2016 at 12:57:06PM +0100, Kurt Roeckx wrote: > > > > > > > Most reproduceable way I found by now is the DANE validator at > > > > https://dane.sys4.de/, which leave a log entry e

Bug#847743: sendmail: STARTTLS server fails with "ca md too weak"

2016-12-11 Thread Kurt Roeckx
shake with "ca md too weak". > > That is probably because the -7 package got built against openssl 1.1 > while -6 was still at openssl 1.0. > > Cc:ing Kurt (the openssl maintainer), maybe he has some hints. > > > Most reproduceable way I found by now is the DANE va

Bug#845193: [Pkg-openssl-devel] Bug#845193: Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-11-30 Thread Kurt Roeckx
On Wed, Nov 30, 2016 at 11:43:13PM +0100, Sebastian Andrzej Siewior wrote: > On 2016-11-30 21:22:38 [+], Thorsten Glaser wrote: > > Kurt Roeckx dixit: > > > > >But the errors I've always been seeing is a segfault during the > > >tests, and

Bug#828142: freerdp: FTBFS with openssl 1.1.0

2016-11-30 Thread Kurt Roeckx
o happen. So I rewrote the openssl part (partially?) to avoid it. Kurt diff --git a/libfreerdp/crypto/crypto.c b/libfreerdp/crypto/crypto.c index 85a28b8..8777ab8 100644 --- a/libfreerdp/crypto/crypto.c +++ b/libfreerdp/crypto/crypto.c @@ -98,7 +98,7 @@ static int crypto_rsa_common(const BYTE* inp

Bug#845193: [Pkg-openssl-devel] Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-11-30 Thread Kurt Roeckx
On Wed, Nov 30, 2016 at 07:55:55PM +, Thorsten Glaser wrote: > Kurt Roeckx dixit: > > >> Unfortunately, I have no idea; 1.1 builds, 1.0 doesn’t. > > > >But both are actually in installed state now? > > Yes because I built it in a chroot in which I do

Bug#846345: elfutils: Fix crash when adding sections to empty ELF files

2016-11-30 Thread Kurt Roeckx
n m68k backend and this differs from the one implemented in > the Debian patch. My diff ignores m68k_backend.diff, which is most > likely not what you want. I think it should be removed. I've already asked the submitter of the patch in the upstream version to look at our patch to see if something else in there is useful, but I didn't get any reply. Kurt

Bug#845193: [Pkg-openssl-devel] Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-11-30 Thread Kurt Roeckx
On Wed, Nov 30, 2016 at 12:07:44PM +, Thorsten Glaser wrote: > Kurt Roeckx dixit: > > >So can someone explain what needs to be fixed in openssl? The > >order of the CFLAGS needs to be changed? > > Unfortunately, I have no idea; 1.1 builds, 1.0 doesn’t. But both a

Bug#845193: [Pkg-openssl-devel] Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-11-30 Thread Kurt Roeckx
so… > > > > >So, I think I'll reassign this to openssl1.0, if no other feedback > > > > … this is probably legit. But I would *still* like to raise > > another point. > > Ok, thanks, doing so now. So can someone explain what needs to be fixed in openssl? The order of the CFLAGS needs to be changed? Kurt

Bug#846085: [Pkg-nginx-maintainers] Bug#846085: nginx-light: "ssl_ecdh_curve X25519" doesn't work

2016-11-29 Thread Kurt Roeckx
On Tue, Nov 29, 2016 at 12:56:39PM +0200, Christos Trochalakis wrote: > Hello Piotr, > > I am not really familiar with EC, and before digging deeper I am CCing > Kurt, one of the OpenSSL maintainers, who can shed some light into the > issue. > > On Mon, Nov 28, 2016 at 12

Bug#828327: gnubiff: FTBFS due to missing #include

2016-11-28 Thread Kurt Roeckx
ckages that fail to build that build-depend on libssl-dev, even if they breakage isn't caused by openssl. You can argue about it either way, it's not important for me. Kurt

Bug#736687: [Pkg-openssl-devel] Bug#736687: libssl1.0.0: default cipher list contains insecure ciphers

2016-11-25 Thread Kurt Roeckx
On Fri, Nov 25, 2016 at 10:56:39AM +0100, Philipp Kern wrote: > On Sun, Oct 30, 2016 at 10:40:42PM +0100, Kurt Roeckx wrote: > > On Sun, Oct 30, 2016 at 11:35:23PM +0200, Adrian Bunk wrote: > > > I am raising this to RC severity since 1.0.2 will likely still be > &

Bug#842806: docker.io: Can't connect to the daemon

2016-11-22 Thread Kurt Roeckx
On Mon, Nov 21, 2016 at 04:18:44PM -0800, Tianon Gravi wrote: > severity 842806 important > thanks > > On 21 November 2016 at 00:18, Kurt Roeckx <k...@roeckx.be> wrote: > > It's not installed. > > So, does installing "cgroupfs-mount" (and making sure

Bug#842806: docker.io: Can't connect to the daemon

2016-11-21 Thread Kurt Roeckx
On Sun, Nov 20, 2016 at 07:10:43PM -0800, Tianon Gravi wrote: > On 2 November 2016 at 00:25, Kurt Roeckx <k...@roeckx.be> wrote: > > I'm guessing this is something systemd sets up, but that I might > > need to manually set up if not using it? > > Ah yeah, sounds

Bug#844715: [Pkg-openssl-devel] Bug#844715: openssl: segfault in shlibloadtest (observed on x32) due to dlopen/dlclose/OPENSSL_atexit/OPENSSL_cleanup ordering

2016-11-18 Thread Kurt Roeckx
On Fri, Nov 18, 2016 at 08:05:15PM +0100, Kurt Roeckx wrote: > On Fri, Nov 18, 2016 at 12:59:57PM +0100, Thorsten Glaser wrote: > > Breakpoint 1, OPENSSL_atexit (handler=handler@entry=0xf6745c50 > > ) at crypto/init.c:604 > > 604 { > > > > There is our 0xf6

Bug#844715: [Pkg-openssl-devel] Bug#844715: openssl: segfault in shlibloadtest (observed on x32) due to dlopen/dlclose/OPENSSL_atexit/OPENSSL_cleanup ordering

2016-11-18 Thread Kurt Roeckx
dso = DSO_dsobyaddr(handlersym.sym, DSO_FLAG_NO_UNLOAD_ON_FREE); DSO_free(dso); } Kurt

Bug#828236: [Pkg-openssl-devel] Bug#844160: openssl 1.1 and apache2

2016-11-17 Thread Kurt Roeckx
On Wed, Nov 16, 2016 at 11:05:13PM +0100, Stefan Fritsch wrote: > Hi, > > [I have trimmed the cc list a bit] > > On Wednesday, 16 November 2016 20:36:49 CET Kurt Roeckx wrote: > > On Mon, Nov 14, 2016 at 03:06:44PM -0800, Russ Allbery wrote: > > > Stefan Fr

<    1   2   3   4   5   6   7   8   9   10   >