Package: stunnel4
Version: 3:5.73-1
Severity: minor

   * What led up to the situation?

     Checking for defects with

test-[g|n]roff -mandoc -t -K utf8 -rF0 -rHY=0 -ww -b -z < "man page"

  [Use "groff -e ' $' <file>" to find trailing spaces.]

  ["test-groff" is a script in the repository for "groff"; is not shipped]
(local copy and "troff" slightly changed by me).

  [The fate of "test-nroff" was decided in groff bug #55941.]

   * What was the outcome of this action?


troff: backtrace: '<stdin>':11: macro 'Vb'
troff: backtrace: file '<stdin>':336
troff:<stdin>:336: warning: font name 'CW' is deprecated
troff: backtrace: file '<stdin>':440
troff:<stdin>:440: warning: [page 5, 9.1i]: cannot break line

Output from "test-nroff  -mandoc -t -K utf8 -rF0 -rHY=0 -ww -b -z ":

troff: backtrace: file '<stdin>':440
troff:<stdin>:440: warning: [page 6, line 27]: cannot break line
troff: backtrace: file '<stdin>':755
troff:<stdin>:755: warning: [page 10, line 41]: cannot break line


   * What outcome did you expect instead?

     No output (no warnings).

-.-

  General remarks and further material, if a diff-file exist, are in the
attachments.


-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.11.7-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=is_IS.iso88591, LC_CTYPE=is_IS.iso88591 (charmap=ISO-8859-1), 
LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages stunnel4 depends on:
ii  adduser                     3.137
ii  init-system-helpers         1.67
ii  libc6                       2.40-3
ii  libssl3t64                  3.3.2-2
ii  libsystemd0                 256.7-3
ii  libwrap0                    7.6.q-33+b1
ii  netbase                     6.4
ii  openssl                     3.3.2-2
ii  perl                        5.40.0-7
ii  systemd [systemd-sysusers]  256.7-3

stunnel4 recommends no packages.

Versions of packages stunnel4 suggests:
pn  logcheck-database  <none>

-- no debconf information
  Any program (person), that produces man pages, should check the output
for defects by using (both groff and nroff)

[gn]roff -mandoc -t -ww -b -z -K utf8  <man page>

  The same goes for man pages that are used as an input.

  For a style guide use

  mandoc -T lint

-.-

  So any 'generator' should check its products with the above mentioned
'groff', 'mandoc',  and additionally with 'nroff ...'.

  This is just a simple quality control measure.

  The 'generator' may have to be corrected to get a better man page,
the source file may, and any additional file may.

  Common defects:

  Input text line longer than 80 bytes.

  Not removing trailing spaces (in in- and output).
  The reason for these trailing spaces should be found and eliminated.

  Not beginning each input sentence on a new line.
Lines should thus be shorter.

  See man-pages(7), item 'semantic newline'.

-.-

The difference between the formatted output of the original and patched file
can be seen with:

  nroff -mandoc <file1> > <out1>
  nroff -mandoc <file2> > <out2>
  diff -u <out1> <out2>

and for groff, using

"printf '%s\n%s\n' '.kern 0' '.ss 12 0' | groff -mandoc -Z - "

instead of 'nroff -mandoc'

  Add the option '-t', if the file contains a table.

  Read the output of 'diff -u' with 'less -R' or similar.

-.-.

  If 'man' (man-db) is used to check the manual for warnings,
the following must be set:

  The option "-warnings=w"

  The environmental variable:

export MAN_KEEP_STDERR=yes (or any non-empty value)

  or

  (produce only warnings):

export MANROFFOPT="-ww -b -z"

export MAN_KEEP_STDERR=yes (or any non-empty value)

-.-.

Output from "mandoc -T lint stunnel4.8": (shortened list)

      5 empty block
     32 input text line longer than 80 bytes

-.-.

Output from "test-groff -mandoc -t -ww -b -z stunnel4.8": (shortened list)

      1 cannot break line
      1 font name 'CW' is deprecated
-.-.


Strings longer than 3/4 of a standard line length (80)
Use "\:" to split the string at the end of an output line, for example a
long URLs (web address)

440 default: 
TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256
755 
\&\fIhttp://www.postgresql.org/docs/8.3/static/protocol\-flow.html#AEN73982\fR
762 \&\fIhttps://www.haproxy.org/download/1.8/doc/proxy\-protocol.txt\fR
869 \&\fIhttp://vincent.bernat.im/en/blog/2011\-ssl\-dos\-mitigation.html\fR

-.-.

Add a comma (or \&) after "e.g." and "i.e.", or use English words
(man-pages(7)).
Abbreviation points should be protected against being interpreted as
an end of sentence, if they are not, and that independent of the
current place on the line.

172:Some other functions may need devices, e.g. /dev/zero or /dev/null.
675:internal (e.g. corporate) responders, and not on public OCSP responders.
993:be redirected.  The pattern may start with the '*' character, e.g.

-.-.

Wrong distance between sentences in the input file.

  Separate the sentences and subordinate clauses; each begins on a new
line.  See man-pages(7) ("Conventions for source file layout") and
"info groff" ("Input Conventions").

  The best procedure is to always start a new sentence on a new line,
at least, if you are typing on a computer.

Remember coding: Only one command ("sentence") on each (logical) line.

E-mail: Easier to quote exactly the relevant lines.

Generally: Easier to edit the sentence.

Patches: Less unaffected text.

Search for two adjacent words is easier, when they belong to the same line,
and the same phrase.

  The amount of space between sentences in the output can then be
controlled with the ".ss" request.

79:servers. The concept is that having non-TLS aware daemons running on
172:Some other functions may need devices, e.g. /dev/zero or /dev/null.
476:\&\fIverifyChain\fR and \fIverifyPeer\fR options. Note that the CRLs in 
this directory
610:The files are included in the ascending alphabetical order of their names. 
The
675:internal (e.g. corporate) responders, and not on public OCSP responders.
901:The security level corresponds to a minimum of 80 bits of security. Any
902:parameters offering below 80 bits of security are excluded. As a result RSA,
904:prohibited. All export cipher suites are prohibited since they all offer 
less
905:than 80 bits of security. SSL version 2 is prohibited. Any cipher suite 
using
909:Security level set to 112 bits of security. As a result RSA, DSA and DH keys
910:shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited. In
912:prohibited. SSL version 3 is also not allowed. Compression is disabled.
915:Security level set to 128 bits of security. As a result RSA, DSA and DH keys
916:shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited. In
918:are prohibited. TLS versions below 1.1 are not permitted. Session tickets 
are
922:Security level set to 192 bits of security. As a result RSA, DSA and DH keys
924:Cipher suites using SHA1 for the MAC are prohibited. TLS versions below 1.2 
are
928:Security level set to 256 bits of security. As a result RSA, DSA and DH keys
1230:\&        \-m ! \-\-uid\-owner <stunnel_user_id> \e
1534:to the peer. It also needs a private key to decrypt the incoming
1535:data. The easiest way to obtain a certificate and a key is to
1536:generate them with the free \fBOpenSSL\fR package. You can find more
1574:(mouse movements, creating windows, etc.) the screen contents are not

-.-.

Split lines longer than 80 characters into two or more lines.
Appropriate break points are the end of a sentence and a subordinate
clause; after punctuation marks.


Line 83, length 87

\&\fBstunnel\fR can be used to add \fITLS\fR functionality to commonly used 
\fIInetd\fR

Line 160, length 94

\&\fBchroot\fR keeps \fBstunnel\fR in a chrooted jail.  \fICApath\fR, 
\fICRLpath\fR, \fIpid\fR

Line 232, length 82

This option allows you to disable entering FIPS mode if \fBstunnel\fR was 
compiled

Line 303, length 81

The specified service name is used for syslog and as the \fIinetd\fR mode 
service

Line 362, length 81

c_rehash the directory on upgrade from \fBOpenSSL 0.x.x\fR to \fBOpenSSL 
1.x.x\fR

Line 436, length 102

The \fIciphersuites\fR option ignores unknown ciphers when compiled with 
\fBOpenSSL 3.0.0\fR or later.

Line 440, length 83

default: 
TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256

Line 450, length 81

The \fBOpenSSL\fR configuration command is executed with the specified 
parameter.

Line 455, length 82

Several \fIconfig\fR lines can be used to specify multiple configuration 
commands.

Line 476, length 86

\&\fIverifyChain\fR and \fIverifyPeer\fR options. Note that the CRLs in this 
directory

Line 480, length 82

c_rehash the directory on upgrade from \fBOpenSSL 0.x.x\fR to \fBOpenSSL 
1.x.x\fR.

Line 548, length 81

While the \fIdebug = debug\fR or \fIdebug = 7\fR level generates the most 
verbose

Line 690, length 88

\&\fR\f(BISSL_CTX_set_options\fR\fI\|(3ssl)\fR manual, but without 
\fISSL_OP_\fR prefix.

Line 712, length 83

Use \fIsslVersionMax\fR or \fIsslVersionMin\fR option instead of disabling 
specific

Line 720, length 84

The \fIprotocol\fR option should not be used with TLS encryption on a separate 
port.

Line 738, length 114

Based on RFC 2817 \- \fIUpgrading to TLS Within HTTP/1.1\fR, section 5.2 \- 
\fIRequesting a Tunnel with CONNECT\fR

Line 746, length 109

Based on RFC 2830 \- \fILightweight Directory Access Protocol (v3): Extension 
for Transport Layer Security\fR

Line 749, length 106

Based on RFC 4642 \- \fIUsing Transport Layer Security (TLS) with Network News 
Transfer Protocol (NNTP)\fR

Line 810, length 82

For the 'connect' protocol negotiations, \fIprotocolHost\fR specifies HOST:PORT 
of

Line 812, length 84

directly connected by \fBstunnel\fR must be specified with the \fIconnect\fR 
option.

Line 814, length 81

For the 'smtp' protocol negotiations, \fIprotocolHost\fR controls the client 
SMTP

Line 832, length 83

\&\fIPSKidentity\fR can be used on \fBstunnel\fR clients to select the PSK 
identity

Line 935, length 98

The \fIsecurityLevel\fR option is only available when compiled with \fBOpenSSL 
1.1.0\fR and later.

Line 944, length 86

Both \fIverifyChain = yes\fR and \fIverifyPeer = yes\fR imply \fIrequireCert = 
yes\fR.

Line 951, length 82

As a global option: \fBsetgid()\fR to the specified group in daemon mode and 
clear

Line 968, length 83

\&\fIsessionCacheSize\fR specifies the maximum number of the internal session 
cache

Line 991, length 82

\&\fISERVICE_NAME\fR specifies the primary service that accepts client 
connections

Line 992, length 83

with the \fIaccept\fR option.  \fISERVER_NAME_PATTERN\fR specifies the host 
name to

Line 1001, length 84

The \fIconnect\fR option of the secondary service is ignored when the 
\fIprotocol\fR

Line 1009, length 81

The \fIsni\fR option is only available when compiled with \fBOpenSSL 1.0.0\fR 
and

Line 1018, length 81

The \fIsni\fR option is only available when compiled with \fBOpenSSL 1.0.0\fR 
and

Line 1112, length 83

Combining \fIticketKeySecret\fR and \fIticketMacSecret\fR options allow to 
resume a

Line 1189, length 85

\&\fBstunnel\fR must also to be executed as root and without the \fIsetuid\fR 
option.

Line 1192, length 86

This configuration requires the kernel to be compiled with the \fItransparent 
proxy\fR

Line 1197, length 85

\&\fBstunnel\fR must also to be executed as root and without the \fIsetuid\fR 
option.

Line 1201, length 85

\&\fBstunnel\fR must also to be executed as root and without the \fIsetuid\fR 
option.

Line 1237, length 83

\&    /sbin/iptables \-I INPUT \-i eth0 \-p tcp \-\-dport <stunnel_port> \-j 
ACCEPT

Line 1238, length 82

\&    /sbin/iptables \-t nat \-I PREROUTING \-p tcp \-\-dport <redirected_port> 
\e

Line 1333, length 89

The use of the 'setuid' option will also prevent \fBstunnel\fR from binding to 
privileged

Line 1336, length 86

When the 'chroot' option is used, \fBstunnel\fR will look for all its files 
(including

Line 1337, length 86

the configuration file, certificates, the log file and the pid file) within the 
chroot

Line 1453, length 87

An example of advanced engine configuration allows for authentication with 
private keys

Line 1456, length 88

The client key is automatically selected based on the list of CAs trusted by 
the server.

Line 1520, length 83

\&    imaps stream tcp nowait root /usr/bin/stunnel stunnel 
/etc/stunnel/imaps.conf

Line 1587, length 82

\&\fBOpenSSL\fR is likely to use it even though it is listed at the very bottom 
of

Line 1591, length 84

\&\fBstunnel\fR 4.40 and later contains hardcoded 2048\-bit DH parameters.  
Starting

Line 1592, length 82

with \fBstunnel\fR 5.18, these hardcoded DH parameters are replaced every 24 
hours


-.-.

Add a zero (0) in front of a decimal fraction that begins with a period
(.)

7:.if t .sp .5v

-.-.

Output from "test-groff  -mandoc -t -K utf8 -rF0 -rHY=0 -ww -b -z ":

troff: backtrace: '<stdin>':11: macro 'Vb'
troff: backtrace: file '<stdin>':336
troff:<stdin>:336: warning: font name 'CW' is deprecated
troff: backtrace: file '<stdin>':440
troff:<stdin>:440: warning: [page 5, 9.1i]: cannot break line

Output from "test-nroff  -mandoc -t -K utf8 -rF0 -rHY=0 -ww -b -z ":

troff: backtrace: file '<stdin>':440
troff:<stdin>:440: warning: [page 6, line 27]: cannot break line
troff: backtrace: file '<stdin>':755
troff:<stdin>:755: warning: [page 10, line 41]: cannot break line

Reply via email to