Your message dated Sun, 3 Jun 2012 01:34:05 +0200 with message-id <20120602233405.GE27700@mraw.org> and subject line Re: Bug#675434: nmu: libnet-ssleay-perl_1.48-1 has caused the Debian Bug report #675434, regarding nmu: libnet-ssleay-perl_1.48-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 675434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675434 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: nmu: libnet-ssleay-perl_1.48-1
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Fri, 01 Jun 2012 08:53:22 +0200
- Message-id: <[🔎] 20120601065322.15581.36884.reportbug@elende.valinor.li>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: binnmu -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi Release Team It was reported [1], that libnet-ssleay-perl does not report the correct constant value for SSL_OP_NO_TLSv1_1. There was the following change in openssl 1.0.1b-1: openssl (1.0.1b-1) unstable; urgency=high . * New upstream version - Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0 can talk to servers supporting TLS 1.1 but not TLS 1.2 - Drop rc4_hmac_md5.patch, applied upstream [1]: http://bugs.debian.org/675424 After rebuilding libnet-ssleay-perl the problem is fixed. Would it be possible to schedule binnmu's for libnet-ssleay-perl? nmu libnet-ssleay-perl_1.48-1 . ALL . -m "Rebuild for remap change for SSL_OP_NO_TLSv1_1 in openssl 1.0.1b-1" Many thanks in advance, Regards, Salvatore - -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJPyGbdAAoJEHidbwV/2GP+E7AQAImjQRluw+gtTh1tnPCBejVA v9nC959uKoXnRA+D7JlQnMCXQex8jJ/iNhqlJ14N4yMHFgOWa0H3BSHriPd2bDRO xzp60RgWXwKjbrX4Yv+z5fB3PRVPR6R0CFizC1vh+VKxrwkoZ2e9gpXDVArAQGrf ds2UylMBIuVIFhL51Y5kWhdBNePILgRpb1huyvG/+5x1qRvoFGbP+LKCZoSwVsGE jcDf7twMhL2nyPx0QkTmOsKJGIsqd6DpiGfu2grrQBUdXXDUM/89LWS2rKKKESNt HuYWazKeRXX1GIB3TojbHWkl63HXvVtbiFvA+my0T35Tez4Vgd1yckFCBxSOU8ov cnP7MiUaO+kVy2FUYWs0gjeS7cQwisZeEQgUnEdbDh/pSev3cU4efnmQ7FCK3dtw lbbEAhTUdY+r5aLtQNwNCh2QfW9U/Y+MRz1/looqeqMa6l+zgKLEHX4vvW2HZRBZ tmF3D5F+S1JppUmjv8vW7qb/nty6h2/eEpbu69ULZC0oAd86n+nmQe8IrxAAUO1z SF/hbJJIoztVwvn/3KnUlboyRvIugUeAuswADyK5HkfUmi/HPH5yy8JruQwzYS/Y wNS5Wu6kimNfwr0Cn1AgsJLiRLxsjdgIehZUcHyNCjtWDN+/2H77sShxQzzWqLgW C7SC2g9/fTTx8VP2D6Mn =j4Dy -----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
- To: Kurt Roeckx <kurt@roeckx.be>, 675434-done@bugs.debian.org
- Cc: Salvatore Bonaccorso <carnil@debian.org>
- Subject: Re: Bug#675434: nmu: libnet-ssleay-perl_1.48-1
- From: Cyril Brulebois <kibi@debian.org>
- Date: Sun, 3 Jun 2012 01:34:05 +0200
- Message-id: <20120602233405.GE27700@mraw.org>
- In-reply-to: <[🔎] 20120602122135.GA9387@roeckx.be>
- References: <[🔎] 20120601065322.15581.36884.reportbug@elende.valinor.li> <[🔎] 20120601090744.GB6375@mraw.org> <[🔎] 20120602122135.GA9387@roeckx.be>
Hi, Kurt Roeckx <kurt@roeckx.be> (02/06/2012): > This change was made to make sure applications build against > 1.0.0 can talk to a server that does TLS 1.1 but not TLS 1.2, > as the changelog says. This is not something I like to change > again, since it will cause problems. > > Everything build against 1.0.1 or 1.0.1a that cares about > SSL_OP_NO_TLSv1_1 should be rebuild against 1.0.1b or later. > If using the defines from the the 1.0.1 and 1.0.1a version, > but using 1.0.1b or laster the SSL_OP_NO_TLSv1_1 will not have > any effect. do we have better ways to detect that than maintainers noticing and pinging us? :/ Salvatore: done, thanks. Mraw, KiBi.Attachment: signature.asc
Description: Digital signature
--- End Message ---