On 04/21/2016 11:59 PM, Sebastian Andrzej Siewior wrote:
> On 2016-03-28 18:57:59 [+0200], Christian Seiler wrote:
>> For example, this breaks curl with those sites, which is used in a
>> large variety of contexts, especially scripting languages. This might
>> lead some people to disable certificat
On 2016-03-28 18:57:59 [+0200], Christian Seiler wrote:
control: fixed -1 1.0.2b-1
> Hi,
Hi,
> For example, this breaks curl with those sites, which is used in a
> large variety of contexts, especially scripting languages. This might
> lead some people to disable certificate checking altogether b
Control: block 812708 by -1
Control: severity -1 important
Hi,
I wanted to ask if there's any progress on this? Since 1024bit root CAs
were removed from ca-certificates in January this year, this has become
a real issue, since openssl-based software won't accept some valid
certificate chains anym
FYI: To disable 1024bit Root CAs
# dpkg-reconfigure ca-certificates
(uncheck disable items in dialog box.)
Thank you.
--
Hiroyuki YAMAMORI
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On Fri, Jan 09, 2015 at 12:24:03AM +0900, Hiroyuki YAMAMORI wrote:
> Package: openssl
> Version: 1.0.1j-1
> Severity: normal
>
> Dear Maintainer,
>
> To avoid security weakness, when 1024-bit RSA root CAs removed,
> verify error occurs in some sites with cross root CA.
>
> I've seen following,
Package: openssl
Version: 1.0.1j-1
Severity: normal
Dear Maintainer,
To avoid security weakness, when 1024-bit RSA root CAs removed,
verify error occurs in some sites with cross root CA.
I've seen following,
https://bugzilla.mozilla.org/show_bug.cgi?id=986005#c4
And fixed patch is following,
h
6 matches
Mail list logo