Your message dated Sat, 01 Nov 2014 22:49:04 +0000
with message-id <e1xkhtk-0004yv...@franck.debian.org>
and subject line Bug#767692: fixed in libio-socket-ssl-perl 2.002-2
has caused the Debian Bug report #767692,
regarding libio-socket-ssl-perl: Uses public suffix list to restrict wildcard 
certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
767692: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767692
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libio-socket-ssl-perl
Version: 2.002-1
Severity: normal
Tags: upstream

Initially ran into this with uscan, refusing to fetch source from google
code. Dug in a bit, and discovered that Perl is using the Public Suffix
List (https://publicsuffix.org/) to restrict wildcard certificates.

e.g.
HEAD https://re2.googlecode.com/files/re2-20140304.tgz
500 Can't connect to re2.googlecode.com:443 (certificate verify failed)

Yet gnutls-cli and openssl s_client both have no issue with this
certificate.

I don't believe that this is a correct use of the PSL. The PSL lists
domains that users can register/receive subdomains of, but this doesn't
mean that the users control the DNS/hosting of these subdomains.

There are quite a few domains in the PSL that I know have wildcard
certificates issued for them:
cloudfront.net
s3.amazonaws.com
github.io
appspot.com
herokuapp.com

and probably many others. I even have a domain in there, that we intend
to provide wildcard SSL for, in the future.

Blocking wildcard certificates for TLDs makes sense. For other public
suffix domains, doesn't.

SR

-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_ZA.UTF-8, LC_CTYPE=en_ZA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libio-socket-ssl-perl depends on:
ii  libnet-ssleay-perl  1.65-1+b1
ii  netbase             5.2
ii  perl                5.20.1-2

Versions of packages libio-socket-ssl-perl recommends:
ii  libio-socket-inet6-perl     2.72-1
ii  libio-socket-ip-perl        0.32-1
ii  libsocket6-perl             0.25-1+b1
ii  liburi-perl                 1.64-1
ii  perl                        5.20.1-2
ii  perl-base [libsocket-perl]  5.20.1-2

Versions of packages libio-socket-ssl-perl suggests:
ii  ca-certificates  20141019

-- no debconf information

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: libio-socket-ssl-perl
Source-Version: 2.002-2

We believe that the bug you reported is fixed in the latest version of
libio-socket-ssl-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 767...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated 
libio-socket-ssl-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 01 Nov 2014 23:39:14 +0100
Source: libio-socket-ssl-perl
Binary: libio-socket-ssl-perl
Architecture: source all
Version: 2.002-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Description:
 libio-socket-ssl-perl - Perl module implementing object oriented interface to 
SSL sockets
Closes: 767692
Changes:
 libio-socket-ssl-perl (2.002-2) unstable; urgency=medium
 .
   * Add 0001-use-only-ICANN-part-in-public-suffix-list.patch.
     Fixes "Don't use public suffix list to restrict wildcard certificates."
     Thanks to Stefano Rivera (Closes: #767692)
Checksums-Sha1:
 a9b1e79139ba8992b9edbfaf4edde7a30b37ca33 2604 libio-socket-ssl-perl_2.002-2.dsc
 79d2e94930881ac4eeab9f3cf7943c1224e26b48 9220 
libio-socket-ssl-perl_2.002-2.debian.tar.xz
 f8465ec656756743ef62354b764f4fce451c736d 171954 
libio-socket-ssl-perl_2.002-2_all.deb
Checksums-Sha256:
 c83926f964a24bebb754d14bb29fd5d90dc75926f97637fd3d845c740249e623 2604 
libio-socket-ssl-perl_2.002-2.dsc
 5409dbc2ad0f68a7c5053dcdbf4ec106094b974877ab6bb133ae83d38cd13cf7 9220 
libio-socket-ssl-perl_2.002-2.debian.tar.xz
 50dd16442bcb673304231163a7d90b2fad94e6684a83b98eaa3fdc3e5c0b9202 171954 
libio-socket-ssl-perl_2.002-2_all.deb
Files:
 89354c3828c564bb8a59cc5da512c489 2604 perl optional 
libio-socket-ssl-perl_2.002-2.dsc
 4fe5cb2c785e3c2a2c1b9a07205b1946 9220 perl optional 
libio-socket-ssl-perl_2.002-2.debian.tar.xz
 8bf85c3dbec5561137e7a875ed180097 171954 perl optional 
libio-socket-ssl-perl_2.002-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EbjH
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to