Your message dated Mon, 10 Sep 2018 19:05:28 +0000
with message-id <e1fzrv2-000cn5...@fasolo.debian.org>
and subject line Bug#906981: fixed in stunnel4 3:5.49-1
has caused the Debian Bug report #906981,
regarding stunnel4 FTBFS with OpenSSL 1.1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
906981: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906981
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: stunnel4
Version: 3:5.48-1
X-Debbugs-CC: debian...@lists.debian.org, open...@packages.debian.org
User: debian...@lists.debian.org
Usertags: needs-update
Control: affects -1 src:openssl

Dear maintainers,

With a recent upload of openssl the autpkgtest of stunnel4 started to
fail in testing. I copied some of the output below.

Currently this regression is contributing to the delay of the migration
of openssl to testing [1]. Could you please investigate the situation?
If needed, please change the bug's severity as appropriate. If the
current version of your package in testing (I mean the binary packages,
not the autopkgtest) is broken by openssl and you fix the issue, please
ask for the src:openssl package to include the correct versioned Breaks
against your package.

Reading the error log I suspect that openssl dropped support for weak
algorithms on purpose (the latest upload started the transition from
1.1.0 to 1.1.1).

More information about this bug and the reason for filing it can be
found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=openssl

https://ci.debian.net/data/autopkgtest/testing/amd64/s/stunnel4/865956/log.gz

=== logs/010_require_cert.log

[ ] Clients allowed=500
[.] stunnel 5.48 on x86_64-pc-linux-gnu platform
[.] Compiled with OpenSSL 1.1.0h  27 Mar 2018
[.] Running  with OpenSSL 1.1.1-pre9 (beta) 21 Aug 2018
[.] Update OpenSSL shared libraries or rebuild stunnel
[.] Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD
TLS:ENGINE,FIPS,OCSP,PSK,SNI Auth:LIBWRAP
[ ] errno: (*__errno_location ())
[.] Reading configuration from descriptor 0
[.] UTF-8 byte order mark not detected
[.] FIPS mode disabled
[ ] Compression disabled
[ ] No PRNG seeding was required
[ ] Initializing service [client]
[ ] Ciphers: HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK
[ ] TLS options: 0x02100004 (+0x00000000, -0x00000000)
[ ] Loading certificate from file:
/tmp/autopkgtest-lxc.4794mt7u/downtmp/build.ahW/src/tests/certs/client_cert.pem
[!] SSL_CTX_use_certificate_chain_file: 140AB18E: error:140AB18E:SSL
routines:SSL_CTX_use_certificate:ca md too weak
[!] Service [client]: Failed to initialize TLS context
[ ] Deallocating section defaults

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: stunnel4
Source-Version: 3:5.49-1

We believe that the bug you reported is fixed in the latest version of
stunnel4, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 906...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Peter Pentchev <r...@debian.org> (supplier of updated stunnel4 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 10 Sep 2018 12:05:18 +0300
Source: stunnel4
Binary: stunnel4
Architecture: source
Version: 3:5.49-1
Distribution: unstable
Urgency: medium
Maintainer: Peter Pentchev <r...@debian.org>
Changed-By: Peter Pentchev <r...@debian.org>
Description:
 stunnel4   - Universal SSL tunnel for network daemons
Closes: 906981
Changes:
 stunnel4 (3:5.49-1) unstable; urgency=medium
 .
   * Declare compliance with Debian Policy 4.2.1 with no changes.
   * Use the B-D: debhelper-compat (= 11) mechanism.
   * New upstream version:
     - drop the 10-enabled and 11-killproc patches, integrated upstream
     - refresh patch line numbers
     - reenable the upstream test suite, both at build time and as
       an autopkgtest, since this upstream version Closes: #906981
Checksums-Sha1:
 65f2426e192ee8668ac2467d84e48318a2f9553c 2470 stunnel4_5.49-1.dsc
 21a447049329d59aabdc02533201607ecdc85752 713560 stunnel4_5.49.orig.tar.gz
 6f9de3581a7d27f22214f70944706ba212621d9c 963 stunnel4_5.49.orig.tar.gz.asc
 5773f152a8b5abfd058c30e440333bc42461d736 45904 stunnel4_5.49-1.debian.tar.xz
 bbd46c14321b15f3708df57f83136daef84a432a 6330 stunnel4_5.49-1_amd64.buildinfo
Checksums-Sha256:
 65642f62430fe97a8b6e1983f85c0906cd97716d55f3d5fe0d77844dc34a5995 2470 
stunnel4_5.49-1.dsc
 3d6641213a82175c19f23fde1c3d1c841738385289eb7ca1554f4a58b96d955e 713560 
stunnel4_5.49.orig.tar.gz
 ff36e77910881fd4440b5b2552a16bbd3374511214e3f91d6e23a2d4ecacdf07 963 
stunnel4_5.49.orig.tar.gz.asc
 a9135c40f7b6e40ae976165dd04a6f8235ccff0e0005b2497a481ff139d9e196 45904 
stunnel4_5.49-1.debian.tar.xz
 21148e955e9b163b6f57f61acde4054bbfcd8e8cd98df6f80f94b41276c680d5 6330 
stunnel4_5.49-1_amd64.buildinfo
Files:
 37c4e0e3525571161cfe31debcc08177 2470 net optional stunnel4_5.49-1.dsc
 0b41240e5585ec7d55ca343feed5530f 713560 net optional stunnel4_5.49.orig.tar.gz
 ec7b7fce727c5cf5ca81f3d4a9ee5a45 963 net optional stunnel4_5.49.orig.tar.gz.asc
 9d9e603f4668329306ddfaa3985fc60c 45904 net optional 
stunnel4_5.49-1.debian.tar.xz
 4a5e54c8ae598f896bb4e66f3c782a46 6330 net optional 
stunnel4_5.49-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEELuenpRf8EkzxFcNUZR7vsCUn3xMFAluWNIkACgkQZR7vsCUn
3xOB/g//UzzhKw+BAgfB5i2onCnJlHnd3YdT2ziqmQpY20IMG7FFCuXkSyS6i3uF
iPFlbim7WudcjgRcsia4C1P9iA4GEDgl3VXqUi4FymOOXMEeed9bewCx45ItnPUx
nMCaatcE2awZP+YwAt9Sm7JMvMU5vUsIdUGl2PcegYx1JmHZR4LfIo3fj6V0pmdz
DxZH/Jk1g9Pskb8DtW/zwt5ypVs4ZZc/xePDbgLLEQ+E8Lfr/Wb407VqWFM9Dbou
nQyKJ9yhtzPbMhEsKk/I5irtBRhPka5000Z5ZTijzN+PRRg2BmrC108LUoMv8DAp
SfxncjwEnUhnqFvzMkc7Tzhwoio7KD/ne/YVXN9tSHbmbUfGvB82f1LX//c2y8J5
s40TNOEPEIZv0HUA40gJYRULwCBXyATw7LarQURfyo3iV6iPQ1qocCHM3MZHkeUZ
372rl4tROvQQ3EuEF1vGilZ62oSyoP2hhAJJHZxEKcbCCzLN++W7LybIKVaqEpqa
8LB/nv64/rnHRtDVbkgU3Bcr7qTuXYHfohyXRpcvemvi4Joy//DFZ/rqUyu1Z4yI
R3dFesDO5mGBTEJw+BBGYRicVI7F4vvKpOBXRPtXXr1KGsJQ77rZtsS1M1ls9UMZ
qoKPtog7BaqxC+JvFYiEmH14UDoEa00G2OpAZqy1LklwxTfySzE=
=cBWW
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to