To test this modification, I extended the Ubuntu Security Team's QRT testcase for OpenSSL to run through the entire test suite twice -- once with compression enabled, once with compression disabled, and verify that compression has been enabled or disabled where appropriate. These modifications can be found here: http://bazaar.launchpad.net/~ubuntu- bugcontrol/qa-regression-testing/master/revision/1931
Because the 10.04 LTS Python test suite will exit when the test suite is over I special-cased that distribution to run only the tests with compression enabled. I don't foresee this being a problem, and the modification to run the other set of tests would be readily visible for future updates. I ran this test suite on all five currently supported distributions: 10.04 LTS, 12.04 LTS, 12.10, 13.04, and Saucy, on KVM VMs running both i386 and AMD64. Thus, I'd like testing from the larger community to determine if this is suitable for the distribution. Cases when users will need to manually enable compression for compatibility reasons are likely low, as Fedora has shipped with this modification for several months. I want to know which services do not work 'out of the box' before shipping this update to the larger Ubuntu community. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1187195 Title: OpenSSL site-wide compression disable tracking bug To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1187195/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs