[Bug 2060992] Re: aws: Guest kernel support for clean boot on demand

2024-04-12 Thread dwmw2
of patches is at https://git.infradead.org/users/dwmw2/linux.git/shortlog/refs/heads/psci-hibernate https://git.infradead.org/users/dwmw2/linux.git/shortlog/refs/heads/psci-hibernate-6.8 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https

[Bug 1968790] Re: Webview for SAML does not allow Duo to use a Yubikey

2022-05-20 Thread dwmw2
NetworkManager-openconnect issues would be at https://gitlab.gnome.org/GNOME/NetworkManager-openconnect but most of the hard thinking ends up on the openconnect side. So what is the best solution here? The external browser mode is useful because we get the fully features of Chrome/Firefox and

[Bug 1968790] Re: Webview for SAML does not allow Duo to use a Yubikey

2022-05-20 Thread dwmw2
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect410/release/notes/release- notes- anyconnect-4-10.html#Cisco_Reference.dita_07f4a7eb-b660-4a09-844c-c3ed481aebc0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1968790] Re: Webview for SAML does not allow Duo to use a Yubikey

2022-05-20 Thread dwmw2
Can we take this to https://gitlab.com/openconnect/openconnect/-/issues please? I think you want to enable the "external browser" support which we added in OpenConnect 9.01. cf.

[Bug 1969734] Re: [Jammy] NetworkManager-openconnect 1.2.6 not compatible with openconnect 8.20

2022-05-03 Thread dwmw2
We considered this a regression in OpenConnect and it is fixed in the 9.01 release. We also made NetworkManager more resilient but don't wait for that. ** Also affects: openconnect (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a

[Bug 1934980] Re: NetworkManager does not use openconnect GlobalProtect VPN's DNS

2021-07-08 Thread dwmw2
What does "nmcli con show" say for the offending connection? Does NM know the DNS server? Is this just a case of Ubuntu's NM not working correctly with its systemd DNS setup? If you connect with openconnect on the command line and add the `-v` option, do you see DNS servers? I have a feeling

[Bug 1870745] Re: Routes not being added by nm-openconnect-server-openconnect-helper

2020-04-04 Thread dwmw2
Can you file this upstream at https://gitlab.com/OpenConnect/OpenConnect/issues please? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1870745 Title: Routes not being added by

Re: [Bug 1647285] Re: SSL trust not system-wide

2020-03-19 Thread dwmw2
On Thu, 2020-03-19 at 09:44 +, Olivier Tilloy wrote: > It looks like symlinking firefox and thunderbird's own copies of > libnssckbi.so to the system-wide p11-kit-trust.so is the proper way to > fix this bug, as far as Mozilla's products are concerned. > > Before I proceed to doing this, I'd

Re: [Bug 1857624] Re: Option Protocol gp (Palo Alto GlobalProtect) missing on GUI

2020-02-27 Thread dwmw2
Rather than the hard-coded GP support, it would be better to merge the later fix which just gets the list of protocols directly from libopenconnect. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1609700]

2020-01-13 Thread dwmw2
Now https://gitlab.gnome.org/GNOME/gnome-shell/issues/2105 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1609700 Title: username is not saved in openconnect connection dialog To manage

[Bug 1609700]

2020-01-13 Thread dwmw2
*** Bug 1705711 has been marked as a duplicate of this bug. *** -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1609700 Title: username is not saved in openconnect connection dialog To manage

[Bug 1609700]

2020-01-13 Thread dwmw2
According to https://bugs.launchpad.net/bugs/1609700 this bug has reoccurred in f30. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1609700 Title: username is not saved in openconnect connection

[Bug 1609700]

2020-01-13 Thread dwmw2
Please test the Fedora 30 build with that commit reverted, at https://koji.fedoraproject.org/koji/taskinfo?taskID=36857342 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1609700 Title: username is

[Bug 1609700]

2020-01-13 Thread dwmw2
I wonder if this regression is caused by https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=009f7560867e939 ? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1609700 Title:

[Bug 1609700]

2020-01-13 Thread dwmw2
That build seems not to fix it. I tried to build locally to bisect, but can't seem to get the local build to work at all. May have to leave this to the NM maintainers. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1838838] Re: username is not saved in openconnect connection dialog

2020-01-13 Thread dwmw2
** Package changed: network-manager-openconnect (Ubuntu) => gnome-shell (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1838838 Title: username is not saved in openconnect connection dialog

[Bug 1838838] Re: username is not saved in openconnect connection dialog

2020-01-08 Thread dwmw2
I moved it to NetworkManager because that's where the regression is. There's not a lot we can do about it in NetworkManager-openconnect. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1838838 Title:

[Bug 1838838] Re: username is not saved in openconnect connection dialog

2020-01-08 Thread dwmw2
** Package changed: network-manager-openconnect (Ubuntu) => network- manager (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1838838 Title: username is not saved in openconnect connection

[Bug 1647285] Re: SSL trust not system-wide

2019-10-29 Thread dwmw2
@kvasko yes, it works here. Are you sure that's the version of libnssckbi.so that is being used? There are lots; I've replaced them all... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1647285 Title:

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-08-21 Thread dwmw2
I have worked out the problem with the new NetworkManager which required me to set ipv4.dns-priority=-1 (which, in turn, messes things up for those with fresh installs that don't get the new NetworkManager). The new NM sets ipv4.dns-search=~. automatically for full-tunnel VPNs but it doesn't also

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-08-19 Thread dwmw2
Any word on when this CVE will be fixed? In the meantime I have put the 1.10.14-0ubuntu2 package into an apt repository at http://david.woodhou.se/cve-2018-1000135/ for users who need it. I couldn't work out how to copy it into a PPA without rebuilding it. In the short term can someone please at

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-07-18 Thread dwmw2
> That's weird, do you understand why? The update was deleted so you should be > back to initial > situation, we had no change to the previous package build Other package changes? Certainly systemd-resolver although we don't use that (because of a previous VPN DNS leak problem) we use dnsmasq.

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-07-18 Thread dwmw2
Do we have any idea when this will be fixed? Most of my users used to get away with the DNS leakage and it was "only" a security problem but stuff actually worked. Then the NM and other updates were shipped, we set ipv4.dns-priority=-1 and ipv4.dns-search=~. and it all worked fine. Then the NM

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-06-04 Thread dwmw2
@ddstreet We don't use systemd-resolver here. It's fairly trivial to set up a VPN service; the openconnect 'make check' uses ocserv automatically, for example. You shouldn't have difficulty reproducing this locally. -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-27 Thread dwmw2
And (in case any of my colleagues are paying attention and inclined to do it before the next time I get to spend any real time in front of a computer, next week), without the dns-priority and dns-search settings that made it work again after the recent NM update. -- You received this bug

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-27 Thread dwmw2
Till, you want that for the case where dnsmasq is being used and is misbehaving? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1754671 Title: Full-tunnel VPN DNS leakage regression To manage

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-22 Thread dwmw2
On the 1.10.14 regression simply making those dns-priority/dns- search settings the *default* behaviour for a full-tunnel VPN would appear to be the correct thing to do (i.e. use the DNS of a full-tunnel VPN for *all* lookups), and I think it should resolve the problems people were seeing. --

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-22 Thread dwmw2
Dammit, "completely unnecessary in bionic but inherited from xenial"... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1754671 Title: Full-tunnel VPN DNS leakage regression To manage notifications

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-22 Thread dwmw2
On the switch to using dnsmasq: that decision predates my tenure so I have limited visibility. I can try to get our IT team to expend effort in moving to systemd-resolved and see what breaks. It may even be completely unnecessary in xenial, and is merely inherited to make our bionic setups less

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-22 Thread dwmw2
This is Bionic. After last week's update to 1.10.14-0ubuntu2 all my VPN users (who are using dnsmasq) reported that DNS supported working for them while they were on the VPN. Some internal names were looked up correctly, others weren't. I resolved it for them as follows: $ sudo nmcli con modify

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-22 Thread dwmw2
We aren't using systemd-resolver for various historical reasons; we are using dnsmasq which should be expected to work. It isn't, but we have manually added the dns-priority=-1;dns-search=~. settings which make it work, as an emergency deployment when the latest NM update broke things for

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-15 Thread dwmw2
These systems are using dnsmasq not systemd-resolver. This was done for historical reasons; I'm not sure of the specific bug which caused that choice. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-05-15 Thread dwmw2
I am receiving reports that it isn't fixed in 18.04 either. Users are still seeing DNS lookups on the local network, until they manually edit the VPN config to include: [ipv4] dns-priority=-1 dns-search=~.; I thought that wasn't going to be necessary? -- You received this bug notification

[Bug 543183]

2019-04-19 Thread dwmw2
Are you referring to my comment 16? You do need your distribution to ship p11-kit-trust.so in place of Mozilla's libnssckbi.so, so it has a consistent set of trusted CAs with the rest of the system. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

Re: [Bug 1824312] Re: segfault connecting to cisco vpn

2019-04-11 Thread dwmw2
On Thu, 2019-04-11 at 09:45 +, J Prino wrote: > I agree however there's no 8.02 version for openconnect (disco). Can > libopenconnect be fixed? You are using *different* versions of openconnect vs. libopenconnect. By all means update them both. Together. But don't try to run different builds

Re: [Bug 1824312] [NEW] segfault connecting to cisco vpn

2019-04-11 Thread dwmw2
On Thu, 2019-04-11 at 09:09 +, J Prino wrote: > NetworkManager WARNING: This version of openconnect is v8.02-1 but > NetworkManager the libopenconnect library is v8.02 I stopped reading here :) > kernel openconnect[30840]: segfault at 1 ip 7f5b62cda521 > sp

[Bug 1822467] Re: OpeonConnect fails with generic TLS Fatal Alert Error

2019-04-01 Thread dwmw2
Er, the latter. On request from the reported, after he attached a tcpdump. I've deleted that and made it public again. And also granted you permissions on the gitlab project so you should be able to see it anyway (amongst other things). -- You received this bug notification because you are a

[Bug 1822467] Re: OpeonConnect fails with generic TLS Fatal Alert Error

2019-04-01 Thread dwmw2
Is this https://gitlab.com/openconnect/openconnect/issues/21 ? ** Bug watch added: gitlab.com/openconnect/openconnect/issues #21 https://gitlab.com/openconnect/openconnect/issues/21 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1821055] [NEW] CSD validation doesn't work with DNS round-robin

2019-03-20 Thread dwmw2
Public bug reported: OpenConnect 8.02 fixes an issue with so-called Cisco Secure Desktop. The client is supposed to post a report to the VPN server, but DNS round-robin sometimes means that the report is posted to a server other than the one which OpenConnect is actually trying to log into.

[Bug 1764047] Re: Unable to switch realm on authentication dialog

2019-03-19 Thread dwmw2
There are other important fixes in 8.0x including for CVE-2018-20319 and the CSD handling to make it resilient to round-robin DNS changes. A simple update to 8.02 might be the better option. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-20319 -- You received this bug

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-03-11 Thread dwmw2
@seb128 please see "In 16.04 the NetworkManager package used to carry this patch..." in the bug description above. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1754671 Title: Full-tunnel VPN DNS

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-03-08 Thread dwmw2
Is there a 16.04 package? This was a regression there caused by an earlier update. I have users reporting the same bizarre behaviour I wasn't able to clearly describe before — essentially, DNS being sent out seemingly random interfaces (sometimes VPN, sometimes local). My advice to just install

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-02-04 Thread dwmw2
Not sure what happened there. It was looking up *some* names in the $COMPANY.com domain on the VPN, but others not, consistently. I couldn't see a pattern. I have manually set ipv4.dns-search="~." and ipv4.dns-priority=-1 and now it does seem to be behaving. However, this shouldn't be necessary.

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-02-04 Thread dwmw2
Hm, that didn't last long. Now it isn't looking up *anything* in the VPN domains. It's all going to the local VPN server. I don't know what changed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2019-02-04 Thread dwmw2
network-manager-1.10.14-0ubuntu1 does seem to fix the DNS problem here; thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1754671 Title: Full-tunnel VPN DNS leakage regression To manage

[Bug 1647285] Re: SSL trust not system-wide

2018-04-25 Thread dwmw2
Any progress on fixing this? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1647285 Title: SSL trust not system-wide To manage notifications about this bug go to:

[Bug 1764877] Re: glamorgl Xv causes xvimagesink failure

2018-04-17 Thread dwmw2
** Description changed: - On Ubuntu 16.04 with xserver-xorg-1:7.7+13ubuntu3, xvimagesink fails for + On Ubuntu 16.04 with xorg-server-hwe-16.04-1.19.5, xvimagesink fails for certain sizes of image. Originally seen when receiving a meeting screen share in Pidgin, reproducible as follows:

[Bug 1764877] Re: glamorgl Xv causes xvimagesink failure

2018-04-17 Thread dwmw2
** Description changed: - On Ubuntu 16.04 with xserver-xorg-2:1.17.2-2, xvimagesink fails for + On Ubuntu 16.04 with xserver-xorg-1:7.7+13ubuntu3, xvimagesink fails for certain sizes of image. Originally seen when receiving a meeting screen share in Pidgin, reproducible as follows: $

[Bug 1764877] [NEW] glamorgl Xv causes xvimagesink failure

2018-04-17 Thread dwmw2
Public bug reported: On Ubuntu 16.04 with xserver-xorg-2:1.17.2-2, xvimagesink fails for certain sizes of image. Originally seen when receiving a meeting screen share in Pidgin, reproducible as follows: $ gst-launch-1.0 -v videotestsrc ! video/x-raw,width=905,height=720 ! xvimagesink The

[Bug 1762710] [NEW] gnutls_server_name_set() doesn't honour input length

2018-04-10 Thread dwmw2
Public bug reported: gnutls_server_name_set(sess, GNUTLS_NAME_DNS, "stophere.please", 8); Length 8. That's supposed to set the SNI to "stophere". It doesn't in 16.04's 3.4.10-4ubuntu1.4 See attached test case. This was supposed to be fixed upstream with commit c1334fee5ee, I thought.

[Bug 1754671] Re: Full-tunnel VPN DNS leakage regression

2018-03-20 Thread dwmw2
This is CVE-2018-1000135. For some reason the 'Link to CVE' option above doesn't seem to work. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000135 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2018-1000135 -- You received this bug notification because you are a

[Bug 1754671] [NEW] Full-tunnel VPN DNS leakage regression

2018-03-09 Thread dwmw2
*** This bug is a security vulnerability *** Public security bug reported: In 16.04 the NetworkManager package used to carry this patch: http://bazaar.launchpad.net/~network-manager/network-manager/ubuntu/view/head:/debian/patches/Filter-DNS-servers-to-add-to-dnsmasq-based-on-availa.patch It

[Bug 666446] Re: NetworkManager VPN should offer an option to use *only* VPN nameservers

2018-03-09 Thread dwmw2
I don't think this should be considered a 'feature request'. If you have a full-tunnel VPN, your employer will *expect* all your network traffic to go via the VPN as if you were dialled directly into the corporate network. Allowing some of the DNS traffic to "escape" to be seen by potentially

[Bug 1752176] [NEW] Voice calls fail without gst-plugins-bad installed

2018-02-27 Thread dwmw2
Public bug reported: Pidgin requires the "liveadder" element from gstreamer1.0-plugins-bad, and has no error handling for the case where it isn't present: https://developer.pidgin.im/ticket/17290 Perhaps the package should depend on gstreamer1.0-plugins-bad to avoid this failure mode. **

[Bug 1751038] Re: Labelled buttons missing from Pidgin search dialogs

2018-02-22 Thread dwmw2
** Patch added: "0001-Ensure-labelled-buttons-are-shown-for-search-results.patch" https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/1751038/+attachment/5060326/+files/0001-Ensure-labelled-buttons-are-shown-for-search-results.patch -- You received this bug notification because you are a

[Bug 1751039] Re: Search results in finch updated incorrectly

2018-02-22 Thread dwmw2
** Patch added: "0001-Fix-Finch-search-results-display-17238.patch" https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/1751039/+attachment/5060327/+files/0001-Fix-Finch-search-results-display-17238.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1751046] [NEW] Pidgin rewrites buddy icons on each startup

2018-02-22 Thread dwmw2
Public bug reported: Every time Pidgin starts up, it rewrites all the buddy icon files for no good reason. Fixed in 2.13 by #17259: https://developer.pidgin.im/ticket/17259 ** Affects: pidgin (Ubuntu) Importance: Undecided Status: New ** Description changed: Every time Pidgin

[Bug 1751037] Re: Mute status not updated

2018-02-22 Thread dwmw2
** Patch added: "0001-Pidgin-Indicate-mute-unmute-status-when-changed-remo.patch" https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/1751037/+attachment/5060325/+files/0001-Pidgin-Indicate-mute-unmute-status-when-changed-remo.patch -- You received this bug notification because you are a

[Bug 1751046] Re: Pidgin rewrites buddy icons on each startup

2018-02-22 Thread dwmw2
** Patch added: "0001-Do-not-rewrite-custom-buddy-icons-already-in-the-cac.patch" https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/1751046/+attachment/5060328/+files/0001-Do-not-rewrite-custom-buddy-icons-already-in-the-cac.patch -- You received this bug notification because you are a

[Bug 1751039] [NEW] Search results in finch updated incorrectly

2018-02-22 Thread dwmw2
Public bug reported: Finch doesn't clear the previous search results when they are updated in real time. Fixed upstream by #17238: https://developer.pidgin.im/ticket/17238 Please could you pull this fix into the packages, even if 2.13 isn't released in time. ** Affects: pidgin (Ubuntu)

[Bug 1751037] [NEW] Mute status not updated

2018-02-22 Thread dwmw2
Public bug reported: When I am on an audio call and the remote end mutes me, that is not correctly displayed in the local UI. Fixed in Pidgin 2.13 by #17273: https://developer.pidgin.im/ticket/17273 Please could you pull this fix into the packages, even if 2.13 isn't released in time. **

[Bug 1751038] [NEW] Labelled buttons missing from Pidgin search dialogs

2018-02-22 Thread dwmw2
Public bug reported: Pidgin fails to display buttons with custom labels in search dialogs. Fixed in 2.13 by #17188: https://developer.pidgin.im/ticket/17188 (by cherry-picking an existing fix from the master branch for #14821). Please could you pull this fix into the packages, even if 2.13

[Bug 1710626] [NEW] Cannot use non-ASCII password on certificate

2017-08-14 Thread dwmw2
Public bug reported: This ought to work, but doesn't: $ openconnect -v -c ~/git/openconnect/tests/certs/user-key-nonascii-password.p12 facebook.com --key-password ĂŻ POST https://facebook.com/ Attempting to connect to server 31.13.92.36:443 Connected to 31.13.92.36:443 Using certificate file

[Bug 1710626] Re: Cannot use non-ASCII password on certificate

2017-08-14 Thread dwmw2
The above was on Ubuntu 16.04 with 3.4.10-4ubuntu1.3 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1710626 Title: Cannot use non-ASCII password on certificate To manage notifications about this

[Bug 1710618] [NEW] SoftHSM2 package doesn't provide p11-kit module file

2017-08-14 Thread dwmw2
Public bug reported: PKCS#11 modules should generally install a module file for p11-kit so that they appear automatically to applications. (cf. https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/1649796 ) The SoftHSM2 package doesn't do this. Amongst other things, this causes 'make check' to

[Bug 1647285] Re: SSL trust not system-wide

2017-07-26 Thread dwmw2
cf. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741005 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704180 https://lists.freedesktop.org/archives/p11-glue/2013-June/000331.html ** Bug watch added: Debian Bug tracker #741005 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741005

[Bug 420411] Re: vpn connection handshake times out too soon

2017-07-25 Thread dwmw2
This appears to still be broken in 16.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/420411 Title: vpn connection handshake times out too soon To manage notifications about this bug go to:

[Bug 1647285] Re: SSL trust not system-wide

2017-07-24 Thread dwmw2
I believe NSS wants these patches backported from 3.30: https://bugzilla.mozilla.org/show_bug.cgi?id=1334976 Firefox has its own copy of NSS which I think as of Firefox 54 should be fine. Thunderbird also needs fixing, I think. ** Bug watch added: Mozilla Bugzilla #1334976

[Bug 1647285] Re: SSL trust not system-wide

2017-07-24 Thread dwmw2
I believe we need to update p11-kit to v0.23.4 to make the key pinning work correctly in the recommended configuration, by adding the CKA_NSS_MOZILLA_CA_POLICY attribute. https://bugs.freedesktop.org/show_bug.cgi?id=99453 https://bugzilla.mozilla.org/show_bug.cgi?id=1324096 ** Bug watch added:

[Bug 1673015] Re: openconnect config file import cannot handle "(null)" values

2017-03-15 Thread dwmw2
https://git.gnome.org/browse/network-manager- openconnect/commit/?id=f58893e15fc7 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1673015 Title: openconnect config file import cannot handle "(null)"

[Bug 1673015] Re: openconnect config file import cannot handle "(null)" values

2017-03-15 Thread dwmw2
Arguably the problem here is that you have, literally, "(null)" as the string in the config file. IF you have a file with that name, you should be permitted to use that. This is a bug in the *EXPORT* not the import. We shouldn't (ideally) special-case that filename on import. Although we might

[Bug 1666623] [NEW] Windows disappear on disconnecting external monitor

2017-02-21 Thread dwmw2
Public bug reported: When I undock my laptop and the external displays are disconnected, sometimes the windows which were on those displays end up on my laptop's internal display. This is useful. Often, however, they don't. I can still see them in the panel, and I can click on them to bring them

[Bug 1664934] Re: Public key's random art is not displayed correctly

2017-02-15 Thread dwmw2
I think this is already fixed as part of https://bugzilla.gnome.org/show_bug.cgi?id=770880 isn't it? ** Bug watch added: GNOME Bug Tracker #770880 https://bugzilla.gnome.org/show_bug.cgi?id=770880 -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1500826] Re: Missing --no-dtls option

2017-02-06 Thread dwmw2
If it really is resolved by using --no-dtls then show output with DTLS enabled and with '-vv' on the command line. Make sure you're using up- to-date GnuTLS and OpenConnect though. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1651847] [NEW] Cannot decrypt S/MIME messages

2016-12-21 Thread dwmw2
Public bug reported: In Ubuntu 16.04 with Evolution 3.18, I obtained a new S/MIME cert from Comodo and sent myself an encrypted email. Evolution can't decrypt its own message, reporting 'Could not parse S/MIME message: security library: invalid algorithm. (-8186) - Decoder failed'. The same

[Bug 1651451] Re: NSS Shared System Database non-functional

2016-12-20 Thread dwmw2
This of course means that even if I wanted to work around bug 1647285 (where apps using NSS don't honour the system SSL trust settings) by manually adding the company certs to /etc/pki/nssdb, applications can't even use *that*... -- You received this bug notification because you are a member of

[Bug 1651451] [NEW] NSS Shared System Database non-functional

2016-12-20 Thread dwmw2
Public bug reported: Ubuntu 16.04 appears to ship with libnsssysinit.so configured in /etc/pki/nssdb as it should be, but the library isn't *present*. So when applications such as Evolution attempt to open it, they fail: (evolution:20974): camel-WARNING **: Failed to initialize NSS SQL database

[Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread dwmw2
Yes, that fixes the crash. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure To manage notifications about this bug go to:

[Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread dwmw2
On 16.04. Apologies, I looked but couldn't see where Launchpad expects me to enter that information. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1648901 Title: SPNEGO crash on mechanism failure

[Bug 1648901] Re: SPNEGO crash on mechanism failure

2016-12-17 Thread dwmw2
Sure, I can attempt to test. It needs Kerberos to fail, while another mechanism is possible. So fix up the packaging errors noted in bug 1648898 so that GSS-NTLMSSP is actually registered properly, then just KRB5CCNAME=/dev/null google-chrome $SOME_URL_WHICH_USES_NEGOTIATE_AUTH -- You received

[Bug 1643566] Re: [i915_bpo] Intermittent display outage with external monitor

2016-12-15 Thread dwmw2
Not sure if this is a related issue. HP 850 G3 laptop with docking station, external VGA connected. If the display blanks for more than an instant, the external display doesn't come back on until I undock and redock. This is OK: $ xset dpms force off; xset dpms force on This, on the other hand,

[Bug 1609700] Re: username is not saved in openconnect connection dialog

2016-12-14 Thread dwmw2
This is actually a NetworkManager bug. As noted in bug 1648905 it's fixed upstream by https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?h=nm-1-2=bb45adeda0bf427ada23b09daf970b0757e82d60 ** Also affects: network-manager (Ubuntu) Importance: Undecided Status: New ** Bug

[Bug 1648905] Re: VPN username and settings not saved

2016-12-14 Thread dwmw2
*** This bug is a duplicate of bug 1609700 *** https://bugs.launchpad.net/bugs/1609700 Actually, this is probably a duplicate of bug 1609700 ** This bug has been marked a duplicate of bug 1609700 username is not saved in openconnect connection dialog -- You received this bug

[Bug 1648905] Re: VPN username and settings not saved

2016-12-14 Thread dwmw2
When do we get a fix for 16.04? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1648905 Title: VPN username and settings not saved To manage notifications about this bug go to:

[Bug 1649796] [NEW] Missing p11-kit module file for opensc-pkcs11.so

2016-12-14 Thread dwmw2
Public bug reported: I inserted my Yubikey, ensured that the opensc-pkcs11 package was installed, and attempted to connect to the VPN as described at http://www.infradead.org/openconnect/pkcs11.html $ openconnect -c 'pkcs11:manufacturer=piv_II;id=%01' vpn.example.com It didn't work. The OpenSC

[Bug 1649270] Re: Crash in gnutls_x509_privkey_import_pkcs8()

2016-12-13 Thread dwmw2
Testing on Fedora (GnuTLS 3.5.7) shows that GnuTLS returns the wrong error code in this situation but doesn't crash. So probably a separate bug: https://bugzilla.redhat.com/show_bug.cgi?id=1404192 ** Bug watch added: Red Hat Bugzilla #1404192 https://bugzilla.redhat.com/show_bug.cgi?id=1404192

[Bug 1649270] Re: Crash in gnutls_x509_privkey_import_pkcs8()

2016-12-13 Thread dwmw2
And indeed openconnect fails too: $ openconnect -c tests/certs/ec-cert.pem -k tests/certs/ec-key- pkcs8-pbes2-sha1.pem auth.startssl.com It doesn't show up in the openconnect 'make check' because adding '--key-password password' to the command line actually fixes it; it's something to do with

[Bug 1649270] Re: Crash in gnutls_x509_privkey_import_pkcs8()

2016-12-13 Thread dwmw2
Without debugging symbols I can at least strace it. The last file opened was openconnect/tests/certs/ec-key-pkcs8-pbes2-sha1.pem -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1649270 Title: Crash

[Bug 1649227] Re: TPM support

2016-12-13 Thread dwmw2
Isn't that true of Kerberos too? Or do you not build with GSSAPI support either? I really ought to add that to 'openconnect --version' output. Perhaps when addressing the OpenSSL 1.1 build problems, we could port it to GnuTLS instead? -- You received this bug notification because you are a

[Bug 1649270] [NEW] Crash in gnutls_x509_privkey_import_pkcs8()

2016-12-12 Thread dwmw2
Public bug reported: $ git clone git://git.infradead.org/users/dwmw2/openconnect.git $ nm-connection-editor Add a Wifi connection, use EAP-TLS and click the button to select a private key. Navigate to the openconnect/tests/certs/ directory. Watch it segfault instead of displaying the contents

[Bug 1647285] Re: SSL trust not system-wide

2016-12-12 Thread dwmw2
The Mozilla bugs you link are a bit of a red herring. They refer to an abortive attempt by Mozilla/NSS to have a 'shared system database' in sql:/etc/pki/nssdb. The idea is that applications specify that as their NSS database and although it's obviously read-only, it automatically adds the user's

[Bug 1649227] [NEW] TPM support

2016-12-12 Thread dwmw2
Public bug reported: Please enable TPM and Yubikey support in the OpenConnect build. $ openconnect -c .key.pem -k .key.tss vpn.example.com POST https://vpn.example.com/ Attempting to connect to server [fec0::1]:443 This version of OpenConnect was built without TPM support Loading certificate

[Bug 1648898] Re: Installed package does not work

2016-12-09 Thread dwmw2
Even when I fix that so the module gets loaded, it still doesn't seem to work. $ KRB5CCNAME=/dev/null curl -v --negotiate -u : $SERVER ... > GET / HTTP/1.1 > Authorization: Negotiate YEAGBisGAQUFAqA2MDSgDjA... ... < HTTP/1.1 401 Unauthorized * gss_init_sec_context() failed: Not a user credential

[Bug 1648905] [NEW] VPN username and settings not saved

2016-12-09 Thread dwmw2
Public bug reported: The OpenConnect VPN auth-dialog doesn't remember usernames and other settings. See discussion (and fix) in https://bugzilla.redhat.com/show_bug.cgi?id=1332491 ** Affects: network-manager (Ubuntu) Importance: Undecided Status: New -- You received this bug

[Bug 1648901] [NEW] SPNEGO crash on mechanism failure

2016-12-09 Thread dwmw2
Public bug reported: Chrome (and other things) crash when Kerberos fails to authenticate: https://bugs.chromium.org/p/chromium/issues/detail?id=554905 This was fixed in MIT krb5 in January: https://github.com/krb5/krb5/pull/385 Thread 22 "Chrome_IOThread" received signal SIGSEGV, Segmentation

[Bug 1648898] [NEW] Installed package does not work

2016-12-09 Thread dwmw2
Public bug reported: The gss-ntlmssp package installs a file in /etc/gss/mech.d which is supposed to make it get loaded. It doesn't work for two reason. Firstly, it gets completely ignored because its filename doesn't end in ".conf". Secondly, it contains an incorrect entry for the shared

[Bug 893024] Re: Support 802.1x auth requirement detection and fallback

2016-12-08 Thread dwmw2
https://bugzilla.gnome.org/show_bug.cgi?id=723084 ** Bug watch added: GNOME Bug Tracker #723084 https://bugzilla.gnome.org/show_bug.cgi?id=723084 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1648616] Re: Firefox uses its own version of NSS, incompatible with system version

2016-12-08 Thread dwmw2
Setting aside the wisdom of that response, and my surprise at discovering that the distribution even *permits* you to ship your own copy of certain libraries — *especially* security-critical libraries — in your own package instead of using the system's version doesn't that mean you should be

[Bug 1648634] [NEW] opencryptoki breaks p11-kit

2016-12-08 Thread dwmw2
Public bug reported: When opencryptoki is installed, it creates a symlink from /etc/pkcs11 to /var/lib/opencryptoki, which is readable only by root. This means that anything using p11-kit to find the PKCS#11 modules which are configured to be available in the system (which is basically any

[Bug 1648616] Re: Firefox uses its own version of NSS, incompatible with system version

2016-12-08 Thread dwmw2
** Also affects: thunderbird (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1648616 Title: Firefox uses its own version of NSS, incompatible with

  1   2   >