Your message dated Sun, 04 Feb 2024 16:51:05 +0000
with message-id <e1rwfhx-005ysw...@fasolo.debian.org>
and subject line Bug#1061660: fixed in liblwp-protocol-https-perl 6.12-2
has caused the Debian Bug report #1061660,
regarding liblwp-protocol-https-perl: Fail to verify certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1061660: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061660
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: liblwp-protocol-https-perl
Version: 6.12-1
Severity: serious

Dear Maintainer,

uscan from devscipts package fail to verify certificates afetr upgrading
to liblwp-protocol-https-perl 6.12-1

,----
| uscan warn: In watchfile debian/watch, reading webpage
|   https://qa.debian.org/watch/sf.php/pcre/ failed: 500 SSL upgrade failed: 
hostname verification failed
| uscan warn: In watchfile debian/watch, reading webpage
|   https://qa.debian.org/watch/sf.php/mjpeg/ failed: 500 SSL upgrade failed: 
hostname verification failed
| uscan warn: In watchfile debian/watch, reading webpage
|   https://gitlab.com/AOMediaCodec/SVT-AV1/-/tags failed: 500 SSL upgrade 
failed: SSL connect attempt failed error:0A000410:SSL routines::sslv3 alert 
handshake failure
| uscan warn: In watchfile debian/watch, reading webpage
|   https://qa.debian.org/watch/sf.php/synfig/ failed: 500 SSL upgrade failed: 
hostname verification failed
`----

Christian


-- System Information:
Debian Release: trixie/sid
  APT prefers buildd-unstable
  APT policy: (500, 'buildd-unstable'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.7.2-1-custom (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages liblwp-protocol-https-perl depends on:
ii  ca-certificates        20230311
ii  libio-socket-ssl-perl  2.085-1
ii  libnet-http-perl       6.23-1
ii  libwww-perl            6.76-1
ii  perl                   5.38.2-3

liblwp-protocol-https-perl recommends no packages.

Versions of packages liblwp-protocol-https-perl suggests:
ii  libcrypt-ssleay-perl  0.73.06-2+b2

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: liblwp-protocol-https-perl
Source-Version: 6.12-2
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
liblwp-protocol-https-perl, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1061...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated 
liblwp-protocol-https-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 04 Feb 2024 17:04:40 +0100
Source: liblwp-protocol-https-perl
Architecture: source
Version: 6.12-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 1061660
Changes:
 liblwp-protocol-https-perl (6.12-2) unstable; urgency=medium
 .
   * Team upload.
   * Add patch from upstream pull request to fix SSL upgrade for regular
     host names observed in connection with proxies.
     Thanks to Christian Marillat for the bug report and the help in debugging.
     (Closes: #1061660)
Checksums-Sha1:
 c775b2dd0c83bd9d73fed31fc3ec1fed2e00a09f 2656 
liblwp-protocol-https-perl_6.12-2.dsc
 087e0c7a0b9784591baa90980dcd877cc1faf995 5324 
liblwp-protocol-https-perl_6.12-2.debian.tar.xz
Checksums-Sha256:
 397681d0c8ecdf8e04c308e1b88e3341a124b2f20a1fac0425fd14db9c269e12 2656 
liblwp-protocol-https-perl_6.12-2.dsc
 10beadee0bf83cc60ec9b2c2da8b52f586e22dec2634b66fe7dfc7b71eea5217 5324 
liblwp-protocol-https-perl_6.12-2.debian.tar.xz
Files:
 bb515553e7d338ab4e31f409767e1530 2656 perl optional 
liblwp-protocol-https-perl_6.12-2.dsc
 71cd53fb8e5e5daa1ada2f6692b18139 5324 perl optional 
liblwp-protocol-https-perl_6.12-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=vdv6
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to