Your message dated Sat, 05 Nov 2016 15:49:10 +0000
with message-id <e1c33ds-0009jq...@fasolo.debian.org>
and subject line Bug#828433: fixed in medusa 2.2-4
has caused the Debian Bug report #828433,
regarding medusa: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
828433: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828433
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: medusa
Version: 2.2~rc3-1
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/medusa_2.2~rc3-1_amd64-20160529-1450

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: medusa
Source-Version: 2.2-4

We believe that the bug you reported is fixed in the latest version of
medusa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 828...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luciano Bello <luci...@debian.org> (supplier of updated medusa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 05 Nov 2016 00:45:00 -0400
Source: medusa
Binary: medusa
Architecture: source amd64
Version: 2.2-4
Distribution: unstable
Urgency: high
Maintainer: Debian Security Tools Packaging Team 
<pkg-security-t...@lists.alioth.debian.org>
Changed-By: Luciano Bello <luci...@debian.org>
Description:
 medusa     - fast, parallel, modular, login brute-forcer for network services
Closes: 828433
Changes:
 medusa (2.2-4) unstable; urgency=high
 .
   * OpenSSL 1.1 support (RC bug) closes: #828433
   * debian/source/options: do not store autogenerated files.
Checksums-Sha1:
 6db0bbf7c26df8eb1088f5c7f5c1e986bfc2a044 2012 medusa_2.2-4.dsc
 74063c193d722f58cfecbd8991678a6752280dd9 8728 medusa_2.2-4.debian.tar.xz
 a10ee0f0a962f30ff52e0a2b0a22fe8159b0f0eb 597286 medusa-dbgsym_2.2-4_amd64.deb
 4d6f1799ab7afae1edc88efa1735b8e77653deaa 155056 medusa_2.2-4_amd64.deb
Checksums-Sha256:
 9e9897522b0b322e1a50c04273737351f15451524496e1800cc00ae784d201bc 2012 
medusa_2.2-4.dsc
 032832d5b27b4eb2b3acabc375096bfd7269ab9da53a3f4c7b3ea655735a396c 8728 
medusa_2.2-4.debian.tar.xz
 00957c6f59f2c5dde42d3f9c964765719b587f60e3a4b5bf4911c1f3884522b3 597286 
medusa-dbgsym_2.2-4_amd64.deb
 c3131511e282b1b4b6f9617a9c5262e6f3c7add14e815f40b72c27470ef7b85f 155056 
medusa_2.2-4_amd64.deb
Files:
 a89aa52ace8a69748ef71a31cb093e97 2012 admin optional medusa_2.2-4.dsc
 a7caf9e0210be688c565067609290d68 8728 admin optional medusa_2.2-4.debian.tar.xz
 922b982dd56eb8c1d62f7d2dc4403fe2 597286 debug extra 
medusa-dbgsym_2.2-4_amd64.deb
 0e00424b66341ba22d55b6d938647c8e 155056 admin optional medusa_2.2-4_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=ybGy
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to