Your message dated Fri, 13 Jan 2017 19:05:21 +0000
with message-id <e1cs7a9-0000hp...@fasolo.debian.org>
and subject line Bug#828563: fixed in stunserver 1.2.7-1.1
has caused the Debian Bug report #828563,
regarding stunserver: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
828563: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828563
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: stunserver
Version: 1.2.7-1
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/stunserver_1.2.7-1_amd64-20160529-1540

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: stunserver
Source-Version: 1.2.7-1.1

We believe that the bug you reported is fixed in the latest version of
stunserver, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 828...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated stunserver package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 13 Jan 2017 20:50:55 +0200
Source: stunserver
Binary: stuntman-server stuntman-client
Architecture: source
Version: 1.2.7-1.1
Distribution: unstable
Urgency: medium
Maintainer: Debian VoIP Team <pkg-voip-maintain...@lists.alioth.debian.org>
Changed-By: Adrian Bunk <b...@debian.org>
Description:
 stuntman-client - Test client for STUN
 stuntman-server - Server daemon for STUN
Closes: 828563
Changes:
 stunserver (1.2.7-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix FTBFS by using OpenSSL 1.0.2. (Closes: #828563)
Checksums-Sha1:
 55191c88094980bf193248458f90f0af1c6f9a66 2032 stunserver_1.2.7-1.1.dsc
 b75b7dfd9802ec6749c00732cf23a6773f0c0078 2996 stunserver_1.2.7-1.1.diff.gz
Checksums-Sha256:
 78448dbde3f0ea01c47f9571bd38e439e55a9c7c8d94d7c3cfe24db05597c874 2032 
stunserver_1.2.7-1.1.dsc
 cbdd68981bd72cd02c057b0315a31ab4f269a6b502e2bf032296bf5caa33b322 2996 
stunserver_1.2.7-1.1.diff.gz
Files:
 cde58d2bbd991c8309a2a8969245da68 2032 net optional stunserver_1.2.7-1.1.dsc
 1149af4b2d62fa93b1602b612168b8e8 2996 net optional stunserver_1.2.7-1.1.diff.gz

-----BEGIN PGP SIGNATURE-----
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=BtiF
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to