Your message dated Thu, 25 May 2017 21:33:55 +0000
with message-id <e1de0oj-0006ad...@fasolo.debian.org>
and subject line Bug#839575: fixed in openssl 1.1.0f-1
has caused the Debian Bug report #839575,
regarding hangs waiting for openssl
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
839575: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839575
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tinyca
Version: 0.7.5-6

Attempting to create a fresh CA, tinyca hangs awaiting openssl.  OpenSSL
in turn is awaiting input on FD 0, which never arrives.

The line 328 diagnostic is suspicous, but I don't know if it's related.

$ tinyca2
create basedir: /home/richard/.TinyCA
create temp dir: /home/richard/.TinyCA/tmp
DEBUG call: /usr/bin/openssl req -new -keyform PEM -outform PEM -passin
env:SSLPASS -config /home/richard/.TinyCA/test/openssl.cnf -out
/home/richard/.TinyCA/test/cacert.req -key
/home/richard/.TinyCA/test/cacert.key -sha256
DEBUG: add to dn: GB
DEBUG: add to dn:
Use of uninitialized value $_ in concatenation (.) or string at
/usr/share/tinyca/OpenSSL.pm line 328.
DEBUG: add to dn:
DEBUG: add to dn: Anjou
DEBUG: add to dn: Deodand
DEBUG: add to dn: DeodandTest
DEBUG: add to dn: r...@terraraq.uk
DEBUG: add to dn:
DEBUG: add to dn:
DEBUG return: /usr/bin/openssl req -new -keyform PEM -outform PEM
-passin env:SSLPASS -config /home/richard/.TinyCA/test/openssl.cnf -out
/home/richard/.TinyCA/test/cacert.req -key
/home/richard/.TinyCA/test/cacert.key -sha256

You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:State or Province Name (full name)
[Some-State]:Locality Name (eg, city) []:Organization Name (eg, company)
[Internet Widgits Pty Ltd]:Organizational Unit Name (eg, section)
[]:Common Name (eg, YOUR name) []:Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:An optional company name []:




$ ps -ef | grep -E 'tinyca|openssl'
richard   2279  2262  0 10:35 pts/1    00:00:00 /usr/bin/perl -w
/usr/bin/tinyca2
richard   2330  2279  0 10:36 pts/1    00:00:00 /usr/bin/openssl req
-x509 -keyform PEM -outform PEM -passin env:SSLPASS -config
/home/richard/.TinyCA/test/openssl.cnf -out
/home/richard/.TinyCA/test/cacert.pem -key
/home/richard/.TinyCA/test/cacert.key -in
/home/richard/.TinyCA/test/cacert.req -days 3650 -sha256
richard   3227  3204  0 10:41 pts/3    00:00:00 grep -E tinyca|openssl

$ strace -p 2279
strace: Process 2279 attached
read(10, ^Cstrace: Process 2279 detached
 <detached ...>

$ strace -p 2330
strace: Process 2330 attached
read(0, ^Cstrace: Process 2330 detached
 <detached ...>
$ lsof -p 2330
COMMAND  PID    USER   FD   TYPE DEVICE SIZE/OFF    NODE NAME
openssl 2330 richard  cwd    DIR  253,1     4096 1573015 /home/richard
openssl 2330 richard  rtd    DIR  253,1     4096       2 /
openssl 2330 richard  txt    REG  253,1   625588 2109333 /usr/bin/openssl
openssl 2330 richard  mem    REG  253,1  1787812 1175596
/lib/i386-linux-gnu/libc-2.24.so
openssl 2330 richard  mem    REG  253,1    13860 1175599
/lib/i386-linux-gnu/libdl-2.24.so
openssl 2330 richard  mem    REG  253,1  2095268 2101234
/usr/lib/i386-linux-gnu/libcrypto.so.1.0.2
openssl 2330 richard  mem    REG  253,1   432868 2101254
/usr/lib/i386-linux-gnu/libssl.so.1.0.2
openssl 2330 richard  mem    REG  253,1   146716 1052859
/lib/i386-linux-gnu/ld-2.24.so
openssl 2330 richard    0r  FIFO   0,10      0t0   20272 pipe
openssl 2330 richard    1w  FIFO   0,10      0t0   20273 pipe
openssl 2330 richard    2w  FIFO   0,10      0t0   20273 pipe
$ dpkg -l openssl
Desired=Unknown/Install/Remove/Purge/Hold
|
Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name           Version      Architecture Description
+++-==============-============-============-=================================
ii  openssl        1.0.2j-1     i386         Secure Sockets Layer
toolkit - cr

ttfn/rjk

--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.1.0f-1

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 839...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <k...@roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 25 May 2017 18:29:01 +0200
Source: openssl
Binary: openssl libssl1.1 libcrypto1.1-udeb libssl1.1-udeb libssl-dev libssl-doc
Architecture: source
Version: 1.1.0f-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
 libcrypto1.1-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
 libssl-dev - Secure Sockets Layer toolkit - development files
 libssl-doc - Secure Sockets Layer toolkit - development documentation
 libssl1.1  - Secure Sockets Layer toolkit - shared libraries
 libssl1.1-udeb - ssl shared library - udeb (udeb)
 openssl    - Secure Sockets Layer toolkit - cryptographic utility
Closes: 839575 859191 861145
Changes:
 openssl (1.1.0f-1) unstable; urgency=medium
 .
   * New upstream version
     - Fix regression in req -x509 (Closes: #839575)
     - Properly detect features on the AMD Ryzen processor (Closes: #861145)
     - Don't mention -tls1_3 in the manpage (Closes: #859191)
   * Update libssl1.1.symbols for new symbols
   * Update man-section.patch
Checksums-Sha1:
 1278ae2b062e21d6733a690145ea35e2c71ca627 2583 openssl_1.1.0f-1.dsc
 9e3e02bc8b4965477a7a1d33be1249299a9deb15 5278176 openssl_1.1.0f.orig.tar.gz
 20caf5129e5791e14434e80f48e70b397c471c35 455 openssl_1.1.0f.orig.tar.gz.asc
 d912d8d9bd9517ca263a98196fd845193fa7f507 53460 openssl_1.1.0f-1.debian.tar.xz
 412406af3b846ace72ecbc2d20ac2e9d0a855daf 5200 openssl_1.1.0f-1_source.buildinfo
Checksums-Sha256:
 5cf2b7cb18228d5050e86d155f14d03fe2b2a17c7cdccfe7a235285fc45746fb 2583 
openssl_1.1.0f-1.dsc
 12f746f3f2493b2f39da7ecf63d7ee19c6ac9ec6a4fcd8c229da8a522cb12765 5278176 
openssl_1.1.0f.orig.tar.gz
 9f2feb0494ebcc1cf152d95a11bc966cb94bc1957d88650285db3966866801b0 455 
openssl_1.1.0f.orig.tar.gz.asc
 767136df6a4ddce89ea754dbcbfc59e47a7b442a7f8e428b7ec8299293d69ba4 53460 
openssl_1.1.0f-1.debian.tar.xz
 f0c7b27127be34f5745751e80e8ec2204a772c4172197f3bfa41f9430974bf28 5200 
openssl_1.1.0f-1_source.buildinfo
Files:
 d5d4351e78d035bfe07da6c5ca613e10 2583 utils optional openssl_1.1.0f-1.dsc
 7b521dea79ab159e8ec879d2333369fa 5278176 utils optional 
openssl_1.1.0f.orig.tar.gz
 f2299a5b1d38b4113eb909feb0603566 455 utils optional 
openssl_1.1.0f.orig.tar.gz.asc
 fee7fa5ebc564b1ea7314e6cd5554bd5 53460 utils optional 
openssl_1.1.0f-1.debian.tar.xz
 07cd26a236e163063c1a3c452cb21859 5200 utils optional 
openssl_1.1.0f-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUWHm1ANgDdycoJP748TdzR5MEkQFAlknSh0ACgkQ48TdzR5M
EkQFNBAAjwY6DRqFZ09Zp82pXoOq36cyd5mDKMxPyWtfRFG5ND9bZuRsJjN1c7AC
sLms9ioCzS3qKys30TIMTtfWxXZQAFj9NQe82e5XZKGq3HN/5Nuixopkpc8QHIBT
o1RrQ7WDEzDkq8WqZx5sslnBAbtnA/eRy5tgei46ToNM0nITakUql9Rnyi0DfN2t
F8WbpOZHUFHG9ZAtYUC7vc/Oce2P5HVqcnEc4fYZCyMNVhocB62a0TeFNdLJuIfI
BVRRvuGkDP+/6ObxEhwJaKA2fJNFfnNr52YTEvrBO03wgDCnHad9HC5DPRs/7zAH
s5+DADypYN5D8RZF17FQ/ZpI0gQfnwqvH9JP0iC4Q2xHvUccbG8FiZZdb52Js9g0
PErfGRzgSZII4oFm4k8/AOf6yse3Ri6xJyuzLbJGRKeqRcHRGLgAdORWWXMZzUlU
MIq/9LuzK7t17t91eP75pOEEl6kyD8xC6RSZd6+tgH4y7lavV3J+CW5GsKVn6HBM
5W6Ts9nHr8/fvDji6Z6X8SA7iZVuggayAFV3Wxrp0oYf68MjWusB3Cy5bdaCY14f
svbwuja0GfeDFiHO3r3N+arJZEyCvBGGvvAF1wV1Mw8aNN2jwp94Bo0YmPQDoQEd
V8uqptUo2allyD/JOqfMM358FPzrx13A6AaBzGQbwvjubNSrpG8=
=+YLU
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to