Your message dated Sat, 17 Dec 2016 17:04:12 +0000
with message-id <e1ciip6-0005z0...@fasolo.debian.org>
and subject line Bug#848346: fixed in libio-socket-ssl-perl 2.040-1
has caused the Debian Bug report #848346,
regarding libio-socket-ssl-perl: default certificate path lost with libssl1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
848346: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848346
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libnet-ssleay-perl
Version: 1.78-1+b1
Severity: important

Dear Maintainer,

libnet-ssleay-perl was broken by the upgrade from 1.78-1 to 1.78-1+b1.

In order to check for unread mail on remote servers (googlemail and
others), I use a script including the following lines:

  my $socket = IO::Socket::SSL->new(
    PeerAddr => 'imap.googlemail.com',
    PeerPort => 993
   )
   or die "socket(): $@";

This worked until yesterday. After upgrading libnet-ssleay-perl to
1.78-1+b1, the script returns the error message:

  socket(): SSL connect attempt failed error:1416F086:SSL
  routines:tls_process_server_certificate:certificate verify failed at
  ./gmail.pl line 13 [the line quoted above]

To make the script work again, I downgraded libnet-ssleay-perl to 1.78-1, 
but I hope the bug to be fixed soon.

Regards, Aldus 

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (500, 'oldstable')
Architecture: i386 (i686)

Kernel: Linux 4.8.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libnet-ssleay-perl depends on:
ii  libc6                       2.24-8
ii  libssl1.1                   1.1.0c-2
ii  perl                        5.24.1~rc4-1
ii  perl-base [perlapi-5.24.1]  5.24.1~rc4-1

libnet-ssleay-perl recommends no packages.

Versions of packages libnet-ssleay-perl suggests:
ii  libperl5.24 [libmime-base64-perl]  5.24.1~rc4-1

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: libio-socket-ssl-perl
Source-Version: 2.040-1

We believe that the bug you reported is fixed in the latest version of
libio-socket-ssl-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 848...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated libio-socket-ssl-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 17 Dec 2016 17:45:47 +0100
Source: libio-socket-ssl-perl
Binary: libio-socket-ssl-perl
Architecture: source
Version: 2.040-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 848346
Description: 
 libio-socket-ssl-perl - Perl module implementing object oriented interface to 
SSL sockets
Changes:
 libio-socket-ssl-perl (2.040-1) unstable; urgency=medium
 .
   * Import upstream version 2.040.
     Fixes "default certificate path lost with libssl1.1".
     Closes: #848346
   * Update years of upstream and packaging copyright.
Checksums-Sha1: 
 6fe680351dd817a11da6911627453dfa19daf3a0 2671 libio-socket-ssl-perl_2.040-1.dsc
 fb1a00874772c86b6fe5b347ce8d8e8bd0c655cf 214139 
libio-socket-ssl-perl_2.040.orig.tar.gz
 ed5b3a10d8fdc03f36e7d9b0f66875aacc2aa2e2 9368 
libio-socket-ssl-perl_2.040-1.debian.tar.xz
Checksums-Sha256: 
 5240165b5f31232142ceeccd47754157515a9d58da2e16f2e0a4efd4c6f5208b 2671 
libio-socket-ssl-perl_2.040-1.dsc
 7472bba199f9b3b88b9b1ece163bb7de4a5bab95bb8784b4f6d66ac030099645 214139 
libio-socket-ssl-perl_2.040.orig.tar.gz
 4ee6a7171c13161df4964039568de01fa8ff2cd075503cbb7c94743f59a224ac 9368 
libio-socket-ssl-perl_2.040-1.debian.tar.xz
Files: 
 d2cd88b646e6e79c5d6cdd3b175b4751 2671 perl optional 
libio-socket-ssl-perl_2.040-1.dsc
 3cc65bee2a5b0d530181353e70617c17 214139 perl optional 
libio-socket-ssl-perl_2.040.orig.tar.gz
 5ad704e455cd95a466d2452cdf0e265b 9368 perl optional 
libio-socket-ssl-perl_2.040-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=A4rv
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to