[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#954264: marked as done (openvpn-auth-radius: Support for verify-client-cert openvpn 2.4 directive)



Your message dated Sat, 12 Nov 2022 11:49:06 +0000
with message-id <E1otp0U-000J6b-4s@fasolo.debian.org>
and subject line Bug#954264: fixed in openvpn-auth-radius 2.1-8
has caused the Debian Bug report #954264,
regarding openvpn-auth-radius: Support for verify-client-cert openvpn 2.4 directive
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
954264: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954264
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openvpn-auth-radius
Version: 2.1-7
Severity: normal
Tags: upstream

Dear Maintainer,

the current version only checks for the 'client-cert-not-required' directive in
the  openvpn server configuration. This directive has become deprecated since 
version 2.4 of openvpn.

A potential fix has been discussed at the corresponding github issue #14.

A currently available remedy for users is to include both the 
'client-cert-not-required' and the 'verify-client-cert [none|optional]' 
directives in the server configuration. This works for openvpn version 2.4, as
the option is marked as deprecated, but will stop working for version >=2.5. 

All the best.


-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-8-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openvpn-auth-radius depends on:
ii  libc6        2.28-10
ii  libgcc1      1:8.3.0-6
ii  libgcrypt20  1.8.4-5
ii  libstdc++6   8.3.0-6
ii  openvpn      2.4.7-1

openvpn-auth-radius recommends no packages.

openvpn-auth-radius suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: openvpn-auth-radius
Source-Version: 2.1-8
Done: Shengjing Zhu <zhsj@debian.org>

We believe that the bug you reported is fixed in the latest version of
openvpn-auth-radius, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 954264@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu <zhsj@debian.org> (supplier of updated openvpn-auth-radius package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 12 Nov 2022 19:31:32 +0800
Source: openvpn-auth-radius
Architecture: source
Version: 2.1-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Shengjing Zhu <zhsj@debian.org>
Closes: 954264
Changes:
 openvpn-auth-radius (2.1-8) unstable; urgency=medium
 .
   * QA upload.
   * Add patch to support verify-client-cert directive in openvpn 2.4
     (Closes: #954264)
   * Bump debhelper-compat to 13
   * Drop ddeb-migration
   * Move package source to salsa.debian.org
Checksums-Sha1:
 7b0f5687d97ac248d3b8a1eacd3c9e525397908f 1372 openvpn-auth-radius_2.1-8.dsc
 0054b32c5754855cb1928bc1c59ed8c77472ffa8 5216 openvpn-auth-radius_2.1-8.debian.tar.xz
 881ee43d3f588a79cf30057fc08da9f44f34fb12 5962 openvpn-auth-radius_2.1-8_amd64.buildinfo
Checksums-Sha256:
 88e8a02e1bed86cfa31c8bdfda36b29face8aed847f9c37f7c717a4337141a06 1372 openvpn-auth-radius_2.1-8.dsc
 0b8352802a445d0f246555f85106286d620c99748d83ae69a302cb2670e1826d 5216 openvpn-auth-radius_2.1-8.debian.tar.xz
 7eaeff6a7241e9b7cd568ae830a97792e465fe248462204b521eb2aedf962f2c 5962 openvpn-auth-radius_2.1-8_amd64.buildinfo
Files:
 ed810eb101980863ca96a3f64d862bff 1372 net optional openvpn-auth-radius_2.1-8.dsc
 89666ef9adce003f599639db1b5a3b4b 5216 net optional openvpn-auth-radius_2.1-8.debian.tar.xz
 c8c84a747a3e4cbb0c969b36d25687d3 5962 net optional openvpn-auth-radius_2.1-8_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iIYEARYIAC4WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCY2+GEhAcemhzakBkZWJp
YW4ub3JnAAoJEH9E+iXqVRTLHewA/2jmpmQSfeOfpYac0HfAIo229/r+4JMpAf8p
5fOKXiJJAP4/VQLb87dExhBDo950aAB0Brtebs/N9cu84Y6ELxcVCQ==
=MiYc
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: