Your message dated Mon, 10 Sep 2018 19:05:28 +0000 with message-id <e1fzrv2-000cn5...@fasolo.debian.org> and subject line Bug#906981: fixed in stunnel4 3:5.49-1 has caused the Debian Bug report #906981, regarding stunnel4 FTBFS with OpenSSL 1.1.1 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 906981: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906981 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: stunnel4 Version: 3:5.48-1 X-Debbugs-CC: debian...@lists.debian.org, open...@packages.debian.org User: debian...@lists.debian.org Usertags: needs-update Control: affects -1 src:openssl Dear maintainers, With a recent upload of openssl the autpkgtest of stunnel4 started to fail in testing. I copied some of the output below. Currently this regression is contributing to the delay of the migration of openssl to testing [1]. Could you please investigate the situation? If needed, please change the bug's severity as appropriate. If the current version of your package in testing (I mean the binary packages, not the autopkgtest) is broken by openssl and you fix the issue, please ask for the src:openssl package to include the correct versioned Breaks against your package. Reading the error log I suspect that openssl dropped support for weak algorithms on purpose (the latest upload started the transition from 1.1.0 to 1.1.1). More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=openssl https://ci.debian.net/data/autopkgtest/testing/amd64/s/stunnel4/865956/log.gz === logs/010_require_cert.log [ ] Clients allowed=500 [.] stunnel 5.48 on x86_64-pc-linux-gnu platform [.] Compiled with OpenSSL 1.1.0h 27 Mar 2018 [.] Running with OpenSSL 1.1.1-pre9 (beta) 21 Aug 2018 [.] Update OpenSSL shared libraries or rebuild stunnel [.] Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,FIPS,OCSP,PSK,SNI Auth:LIBWRAP [ ] errno: (*__errno_location ()) [.] Reading configuration from descriptor 0 [.] UTF-8 byte order mark not detected [.] FIPS mode disabled [ ] Compression disabled [ ] No PRNG seeding was required [ ] Initializing service [client] [ ] Ciphers: HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK [ ] TLS options: 0x02100004 (+0x00000000, -0x00000000) [ ] Loading certificate from file: /tmp/autopkgtest-lxc.4794mt7u/downtmp/build.ahW/src/tests/certs/client_cert.pem [!] SSL_CTX_use_certificate_chain_file: 140AB18E: error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md too weak [!] Service [client]: Failed to initialize TLS context [ ] Deallocating section defaults
signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: stunnel4 Source-Version: 3:5.49-1 We believe that the bug you reported is fixed in the latest version of stunnel4, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 906...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Peter Pentchev <r...@debian.org> (supplier of updated stunnel4 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 10 Sep 2018 12:05:18 +0300 Source: stunnel4 Binary: stunnel4 Architecture: source Version: 3:5.49-1 Distribution: unstable Urgency: medium Maintainer: Peter Pentchev <r...@debian.org> Changed-By: Peter Pentchev <r...@debian.org> Description: stunnel4 - Universal SSL tunnel for network daemons Closes: 906981 Changes: stunnel4 (3:5.49-1) unstable; urgency=medium . * Declare compliance with Debian Policy 4.2.1 with no changes. * Use the B-D: debhelper-compat (= 11) mechanism. * New upstream version: - drop the 10-enabled and 11-killproc patches, integrated upstream - refresh patch line numbers - reenable the upstream test suite, both at build time and as an autopkgtest, since this upstream version Closes: #906981 Checksums-Sha1: 65f2426e192ee8668ac2467d84e48318a2f9553c 2470 stunnel4_5.49-1.dsc 21a447049329d59aabdc02533201607ecdc85752 713560 stunnel4_5.49.orig.tar.gz 6f9de3581a7d27f22214f70944706ba212621d9c 963 stunnel4_5.49.orig.tar.gz.asc 5773f152a8b5abfd058c30e440333bc42461d736 45904 stunnel4_5.49-1.debian.tar.xz bbd46c14321b15f3708df57f83136daef84a432a 6330 stunnel4_5.49-1_amd64.buildinfo Checksums-Sha256: 65642f62430fe97a8b6e1983f85c0906cd97716d55f3d5fe0d77844dc34a5995 2470 stunnel4_5.49-1.dsc 3d6641213a82175c19f23fde1c3d1c841738385289eb7ca1554f4a58b96d955e 713560 stunnel4_5.49.orig.tar.gz ff36e77910881fd4440b5b2552a16bbd3374511214e3f91d6e23a2d4ecacdf07 963 stunnel4_5.49.orig.tar.gz.asc a9135c40f7b6e40ae976165dd04a6f8235ccff0e0005b2497a481ff139d9e196 45904 stunnel4_5.49-1.debian.tar.xz 21148e955e9b163b6f57f61acde4054bbfcd8e8cd98df6f80f94b41276c680d5 6330 stunnel4_5.49-1_amd64.buildinfo Files: 37c4e0e3525571161cfe31debcc08177 2470 net optional stunnel4_5.49-1.dsc 0b41240e5585ec7d55ca343feed5530f 713560 net optional stunnel4_5.49.orig.tar.gz ec7b7fce727c5cf5ca81f3d4a9ee5a45 963 net optional stunnel4_5.49.orig.tar.gz.asc 9d9e603f4668329306ddfaa3985fc60c 45904 net optional stunnel4_5.49-1.debian.tar.xz 4a5e54c8ae598f896bb4e66f3c782a46 6330 net optional stunnel4_5.49-1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEELuenpRf8EkzxFcNUZR7vsCUn3xMFAluWNIkACgkQZR7vsCUn 3xOB/g//UzzhKw+BAgfB5i2onCnJlHnd3YdT2ziqmQpY20IMG7FFCuXkSyS6i3uF iPFlbim7WudcjgRcsia4C1P9iA4GEDgl3VXqUi4FymOOXMEeed9bewCx45ItnPUx nMCaatcE2awZP+YwAt9Sm7JMvMU5vUsIdUGl2PcegYx1JmHZR4LfIo3fj6V0pmdz DxZH/Jk1g9Pskb8DtW/zwt5ypVs4ZZc/xePDbgLLEQ+E8Lfr/Wb407VqWFM9Dbou nQyKJ9yhtzPbMhEsKk/I5irtBRhPka5000Z5ZTijzN+PRRg2BmrC108LUoMv8DAp SfxncjwEnUhnqFvzMkc7Tzhwoio7KD/ne/YVXN9tSHbmbUfGvB82f1LX//c2y8J5 s40TNOEPEIZv0HUA40gJYRULwCBXyATw7LarQURfyo3iV6iPQ1qocCHM3MZHkeUZ 372rl4tROvQQ3EuEF1vGilZ62oSyoP2hhAJJHZxEKcbCCzLN++W7LybIKVaqEpqa 8LB/nv64/rnHRtDVbkgU3Bcr7qTuXYHfohyXRpcvemvi4Joy//DFZ/rqUyu1Z4yI R3dFesDO5mGBTEJw+BBGYRicVI7F4vvKpOBXRPtXXr1KGsJQ77rZtsS1M1ls9UMZ qoKPtog7BaqxC+JvFYiEmH14UDoEa00G2OpAZqy1LklwxTfySzE= =cBWW -----END PGP SIGNATURE-----
--- End Message ---