Hi,
Would it possible to add a second part of this fix? Without it, the log
is still spammed with the following errors:
Jan 16 14:44:19 sulphur named[3202]: RSA_verify failed
Jan 16 14:44:20 sulphur named[3202]: error:04091068:rsa
routines:INT_RSA_VERIFY:bad signature:rsa_sign.c:291:
Jan 16 14:44:20 sulphur named[3202]: RSA_verify failed
Jan 16 14:44:20 sulphur named[3202]: error:04091068:rsa
routines:INT_RSA_VERIFY:bad signature:rsa_sign.c:291:
Jan 16 14:44:20 sulphur named[3202]: RSA_verify failed
Jan 16 14:44:20 sulphur named[3202]: error:04091068:rsa
routines:INT_RSA_VERIFY:bad signature:rsa_sign.c:291:
Jan 16 14:44:20 sulphur named[3202]: RSA_verify failed
Patch was mentioned in the same thread [1] and when I apply the patch to
the package it works OK. See patch in attach.
Did you ask for the more recent package to be unblocked for testing? Are
you planning to and/or would you mind if I ask for it to be unblocked
once the additional patch is applied?
Regards,
Rik
[1] http://www.mail-archive.com/bind-users@lists.isc.org/msg14759.html
On 01/10/2013 01:36 AM, Debian Bug Tracking System wrote:
This is an automatic notification regarding your Bug report
which was filed against the bind9 package:
#697681: bind9: DNSSEC validating resolver spams log file after
upgrade to 9.8.4
It has been closed by LaMont Jones <lam...@debian.org>.
--
Rik Theys
System Engineer
KU Leuven - Dept. Elektrotechniek (ESAT)
Kasteelpark Arenberg 10 bus 2440 - B-3001 Leuven-Heverlee
+32(0)16/32.11.07
----------------------------------------------------------------
<<Any errors in spelling, tact or fact are transmission errors>>
diff -ur bind9-9.8.4.dfsg.P1.orig/lib/dns/opensslrsa_link.c bind9-9.8.4.dfsg.P1/lib/dns/opensslrsa_link.c
--- bind9-9.8.4.dfsg.P1.orig/lib/dns/opensslrsa_link.c 2012-10-26 06:52:55.000000000 +0200
+++ bind9-9.8.4.dfsg.P1/lib/dns/opensslrsa_link.c 2013-01-08 14:26:58.996397527 +0100
@@ -633,8 +633,7 @@
#endif
#endif
if (status != 1)
- return (dst__openssl_toresult2("RSA_verify",
- DST_R_VERIFYFAILURE));
+ return (dst__openssl_toresult(DST_R_VERIFYFAILURE));
return (ISC_R_SUCCESS);
}