Your message dated Sat, 06 Feb 2021 10:39:52 +0000
with message-id <e1l8l0k-0002qz...@fasolo.debian.org>
and subject line Bug#920371: fixed in netkit-telnet-ssl 0.17.41+0.2-3.3
has caused the Debian Bug report #920371,
regarding telnetd-ssl: SSL_CTX_use_certificate, ee key too small
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
920371: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920371
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: telnetd-ssl
Version: 0.17.41+0.2-3.1
Severity: normal

Dear Maintainer,

I installed telnetd-ssl.  It generated a key and self-signed certificate
in /etc/telnetd-ssl/telnetd.pem, which has 1024 bit RSA key.  This
caused an error when attempting to connect:

$ telnet localhost
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Error loading CRT /etc/telnetd-ssl/telnetd.pem: SSL_CTX_use_certificate,
ee key too small
do_ssleay_init() failed
140636104001344:error:140AB18F:SSL routines:SSL_CTX_use_certificate:ee
key too small:../ssl/ssl_rsa.c:310:
Connection closed by foreign host.


I can see that there's a generated cnf file too, which includes the line
default_bits            = 1024


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-1-amd64 (SMP w/16 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages telnetd-ssl depends on:
ii  adduser                           3.118
ii  libc6                             2.28-5
ii  libssl1.1                         1.1.1a-1
ii  openbsd-inetd [inet-superserver]  0.20160825-3
ii  openssl                           1.1.1a-1
ii  passwd                            1:4.5-1.1

telnetd-ssl recommends no packages.

telnetd-ssl suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: netkit-telnet-ssl
Source-Version: 0.17.41+0.2-3.3
Done: Adrian Bunk <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
netkit-telnet-ssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 920...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated netkit-telnet-ssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 05 Feb 2021 15:19:51 +0200
Source: netkit-telnet-ssl
Architecture: source
Version: 0.17.41+0.2-3.3
Distribution: unstable
Urgency: medium
Maintainer: Mats Erik Andersson <mats.anders...@gisladisker.se>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 917349 920371
Changes:
 netkit-telnet-ssl (0.17.41+0.2-3.3) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix FTBFS with cmake 3.18.
   * debian/openssl.cnf: default_bits 1024 -> 4096
     Thanks to Marcos Marado.(Closes: #920371)
   * Remove the alternative build dependency on libssl1.0-dev.
     (Closes: #917349)
Checksums-Sha1:
 547de20aeefc75d44630a98f507a45c1124b5539 1935 
netkit-telnet-ssl_0.17.41+0.2-3.3.dsc
 c6c64c688414fb9f2afc1e499f55cfd934088974 87732 
netkit-telnet-ssl_0.17.41+0.2-3.3.debian.tar.xz
Checksums-Sha256:
 0afa6f8ee9abb7838574fbe10f26ed94748ccc1dcde11f011af51f685a1ff299 1935 
netkit-telnet-ssl_0.17.41+0.2-3.3.dsc
 e95375738a2460c25ed3ff48c6ec7760efeac520ba3d550557fdd896a9430420 87732 
netkit-telnet-ssl_0.17.41+0.2-3.3.debian.tar.xz
Files:
 4c28582ed1ea51ad1b42f72ee2e3310b 1935 net extra 
netkit-telnet-ssl_0.17.41+0.2-3.3.dsc
 cd40599dcbe54304d6356c1d90b9c95c 87732 net extra 
netkit-telnet-ssl_0.17.41+0.2-3.3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Xmb/
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to