Your message dated Sun, 18 Dec 2016 21:09:34 +0000
with message-id <e1ciii6-000e76...@fasolo.debian.org>
and subject line Bug#848339: fixed in unbound 1.6.0-2
has caused the Debian Bug report #848339,
regarding unbound-anchor: libunbound.so.2 unknown symbol fake_dsa
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
848339: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848339
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: unbound-anchor
Version: 1.6.0-1
Severity: important

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
     Upgrade unbound this morning to level 1.6.0-1
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
     apt-get update 
     apt-get dist-upgrade
     Debian apt-listbugs is installed and it didn't catch it.
     DNSSEC is still functional with the current key but I'm assuming this also 
breaks dnssec-trigger.
   * What was the outcome of this action?
   * What outcome did you expect instead?
     If I run 'service unbound status' I get 'Dec 16 05:47:34 
package-helper[11206]: /usr/sbin/unbound-anchor: symbol lookup: error: 
/usr/lib/x86_64-linux-gnu/libunbound.so.2: undefined symbol: fake_dsa'  This 
also happens if I manually run 'unbound-anchor -a /etc/unbound/root.key' where 
I keep my DNSSEC key.  I'm assuming libunbound2 is broken. 
*** End of the template - remove these template lines ***


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (800, 'unstable'), (700, 'experimental'), (600, 'stable'), (500, 
'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.8.0-2-grsec-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages unbound-anchor depends on:
ii  libc6        2.24-8
ii  libexpat1    2.2.0-1
ii  libssl1.1    1.1.0c-2
ii  libunbound2  1.6.0-1

unbound-anchor recommends no packages.

unbound-anchor suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: unbound
Source-Version: 1.6.0-2

We believe that the bug you reported is fixed in the latest version of
unbound, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 848...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Robert Edmonds <edmo...@debian.org> (supplier of updated unbound package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 18 Dec 2016 15:00:12 -0500
Source: unbound
Binary: libunbound-dev libunbound2 python-unbound python3-unbound unbound 
unbound-anchor unbound-host
Architecture: source
Version: 1.6.0-2
Distribution: unstable
Urgency: high
Maintainer: Debian DNS Packaging <pkg-dns-de...@lists.alioth.debian.org>
Changed-By: Robert Edmonds <edmo...@debian.org>
Description:
 libunbound-dev - static library, header files, and docs for libunbound
 libunbound2 - library implementing DNS resolution and validation
 python-unbound - library implementing DNS resolution and validation (Python 
bindin
 python3-unbound - library implementing DNS resolution and validation (Python3 
bindi
 unbound    - validating, recursive, caching DNS resolver
 unbound-anchor - utility to securely fetch the root DNS trust anchor
 unbound-host - reimplementation of the 'host' command
Closes: 848339
Changes:
 unbound (1.6.0-2) unstable; urgency=high
 .
   [ Helmut Grohne ]
   * Only use fake_dsa when HAVE_SSL is defined (Closes: #848339)
Checksums-Sha1:
 4b92daa41493584fda939e337bbb316d2e3053b7 3021 unbound_1.6.0-2.dsc
 be9d65a8f8d35299da9289e4554be5dccda72ef5 16212 unbound_1.6.0-2.debian.tar.xz
Checksums-Sha256:
 c57490cf2f46a5e53859e3e3de43c5e751fd8ee61ac10ddd98fd77c68e9c9bc1 3021 
unbound_1.6.0-2.dsc
 ce65e07e9e687282b41471ae4c0c0c8a7740c433f0be37651c443d512629fc9f 16212 
unbound_1.6.0-2.debian.tar.xz
Files:
 b1f331e20f9d0cce30f4f1cee265d059 3021 net optional unbound_1.6.0-2.dsc
 8fbc08695dad1f261d01c29e70a94ba3 16212 net optional 
unbound_1.6.0-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=HxO4
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to