[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#954264: marked as done (openvpn-auth-radius: Support for verify-client-cert openvpn 2.4 directive)



Your message dated Sat, 26 Nov 2022 13:02:17 +0000
with message-id <E1oyuoz-006FG5-AX@fasolo.debian.org>
and subject line Bug#954264: fixed in openvpn-auth-radius 2.1-7+deb11u1
has caused the Debian Bug report #954264,
regarding openvpn-auth-radius: Support for verify-client-cert openvpn 2.4 directive
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
954264: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954264
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openvpn-auth-radius
Version: 2.1-7
Severity: normal
Tags: upstream

Dear Maintainer,

the current version only checks for the 'client-cert-not-required' directive in
the  openvpn server configuration. This directive has become deprecated since 
version 2.4 of openvpn.

A potential fix has been discussed at the corresponding github issue #14.

A currently available remedy for users is to include both the 
'client-cert-not-required' and the 'verify-client-cert [none|optional]' 
directives in the server configuration. This works for openvpn version 2.4, as
the option is marked as deprecated, but will stop working for version >=2.5. 

All the best.


-- System Information:
Debian Release: 10.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-8-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openvpn-auth-radius depends on:
ii  libc6        2.28-10
ii  libgcc1      1:8.3.0-6
ii  libgcrypt20  1.8.4-5
ii  libstdc++6   8.3.0-6
ii  openvpn      2.4.7-1

openvpn-auth-radius recommends no packages.

openvpn-auth-radius suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: openvpn-auth-radius
Source-Version: 2.1-7+deb11u1
Done: Shengjing Zhu <zhsj@debian.org>

We believe that the bug you reported is fixed in the latest version of
openvpn-auth-radius, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 954264@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Shengjing Zhu <zhsj@debian.org> (supplier of updated openvpn-auth-radius package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 19 Nov 2022 00:59:14 +0800
Source: openvpn-auth-radius
Architecture: source
Version: 2.1-7+deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Shengjing Zhu <zhsj@debian.org>
Closes: 954264
Changes:
 openvpn-auth-radius (2.1-7+deb11u1) bullseye; urgency=medium
 .
   * Add patch to support verify-client-cert directive in openvpn 2.4
     (Closes: #954264)
Checksums-Sha1:
 1963b3f3accf2bd5d2c527907dc89a202cf78de8 1268 openvpn-auth-radius_2.1-7+deb11u1.dsc
 335119d3f2ec376f8805571193a446d914643cf4 5256 openvpn-auth-radius_2.1-7+deb11u1.debian.tar.xz
 ddfeb40fb0a2a47724f69730c96024b754be3512 5913 openvpn-auth-radius_2.1-7+deb11u1_amd64.buildinfo
Checksums-Sha256:
 44c237c8b6fcc81ab7e94e6e5cbe1f499a6eff6db468514d663e571cec3e0e55 1268 openvpn-auth-radius_2.1-7+deb11u1.dsc
 c406bad44868f6c27db92cb4def18c337a6645c30c350a256885cf338a8fb925 5256 openvpn-auth-radius_2.1-7+deb11u1.debian.tar.xz
 494d941fc6af82df0afb18c7645cd91f0b3ad689e8363f2a8a5c5fc0851e4e56 5913 openvpn-auth-radius_2.1-7+deb11u1_amd64.buildinfo
Files:
 d0bb80ba993b39674f4790472193f805 1268 net optional openvpn-auth-radius_2.1-7+deb11u1.dsc
 3da191cd7cea108679c01d1f19e9193e 5256 net optional openvpn-auth-radius_2.1-7+deb11u1.debian.tar.xz
 0b9babec5664fad11dbe817edcae3bec 5913 net optional openvpn-auth-radius_2.1-7+deb11u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iIYEARYIAC4WIQSRhdT1d2eu7mxV1B5/RPol6lUUywUCY37drxAcemhzakBkZWJp
YW4ub3JnAAoJEH9E+iXqVRTLZlUA/1PIp3rlsThRj7M8S5d0EMO+wmX12nvVOkf4
oULEh/BsAQC9WC7MkPMbkWXlDjNK7+RVKnSqu3MQD6+L8VLV01nJBg==
=WmTy
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: