Your message dated Sat, 16 Feb 2019 11:36:33 +0000 with message-id <1550316993.21192.50.camel@adam-barratt.org.uk> and subject line Closing bugs for updates included in 9.8 has caused the Debian Bug report #887399, regarding stretch-pu: package python-certbot/0.10.2-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 887399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887399 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: stretch-pu: package python-certbot/0.10.2-1
- From: Harlan Lieberman-Berg <hlieberman@debian.org>
- Date: Mon, 15 Jan 2018 18:04:59 -0500
- Message-id: <151605749911.30780.8281113995162562151.reportbug@aztlan>
Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org@packages.debian.org Usertags: pu Hello Release Team, Due to a security issue in the underlying Let's Encrypt protocol, one of the main methods of getting certificates from Let's Encrypt has been disabled (the TLS-SNI-01 protocol; https://community.letsencrypt.org/t/tls-sni-challenges-disabled-for-most-new-issuance/50316 for more info). This puts us in a bit of an awkward spot. The upstream certbot provider is preparing to do a new release that has support for HTTP-01 inside the python-certbot-apache and python-certbot-nginx plugins, as well as the required work in python-acme and python-certbot (and certbot), but I'm not sure backporting the patches is realistic. A lot of development has been done in the interim, both in the certbot packaging and in the upstream software. Without those patches, users with the apache or nginx plugins will fail to update their certificates starting 2018-04-09. I can talk to the certbot upstream to see if they'd be willing to help backport the patches (CCed), but initial conversations seem to indicate that doing so will be difficult. The other approach that we can take is to backport the next version that supports the new challenge through to s-p-u and into stable. I'm guessing that you will ask me to unwind the work I did to convert to python3 in the last release (sadface), but I can do that if that's what it needs to get this fixed in stable. Gurus and Wise Ones, I beseech you for guidance! -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (900, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.14.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: 871937-done@bugs.debian.org, 878816-done@bugs.debian.org, 880622-done@bugs.debian.org, 882824-done@bugs.debian.org, 887157-done@bugs.debian.org, 887399-done@bugs.debian.org, 891569-done@bugs.debian.org, 891649-done@bugs.debian.org, 891660-done@bugs.debian.org, 892845-done@bugs.debian.org, 892853-done@bugs.debian.org, 893541-done@bugs.debian.org, 893543-done@bugs.debian.org, 893550-done@bugs.debian.org, 896811-done@bugs.debian.org, 906142-done@bugs.debian.org, 906239-done@bugs.debian.org, 906813-done@bugs.debian.org, 908957-done@bugs.debian.org, 908960-done@bugs.debian.org, 908965-done@bugs.debian.org, 909127-done@bugs.debian.org, 909131-done@bugs.debian.org, 909213-done@bugs.debian.org, 913085-done@bugs.debian.org, 913525-done@bugs.debian.org, 913529-done@bugs.debian.org, 913801-done@bugs.debian.org, 913881-done@bugs.debian.org, 913885-done@bugs.debian.org, 913942-done@bugs.debian.org, 914032-done@bugs.debian.org, 914081-done@bugs.debian.org, 914184-done@bugs.debian.org, 914265-done@bugs.debian.org, 914475-done@bugs.debian.org, 914594-done@bugs.debian.org, 914841-done@bugs.debian.org, 914961-done@bugs.debian.org, 915715-done@bugs.debian.org, 915875-done@bugs.debian.org, 916435-done@bugs.debian.org, 916627-done@bugs.debian.org, 916632-done@bugs.debian.org, 916882-done@bugs.debian.org, 916912-done@bugs.debian.org, 917560-done@bugs.debian.org, 917620-done@bugs.debian.org, 917820-done@bugs.debian.org, 917900-done@bugs.debian.org, 917911-done@bugs.debian.org, 918337-done@bugs.debian.org, 918601-done@bugs.debian.org, 918762-done@bugs.debian.org, 919106-done@bugs.debian.org, 919712-done@bugs.debian.org, 919990-done@bugs.debian.org, 920372-done@bugs.debian.org, 920379-done@bugs.debian.org, 920381-done@bugs.debian.org, 920382-done@bugs.debian.org, 920632-done@bugs.debian.org, 920804-done@bugs.debian.org, 921107-done@bugs.debian.org, 921117-done@bugs.debian.org, 921281-done@bugs.debian.org, 921475-done@bugs.debian.org, 921620-done@bugs.debian.org, 921642-done@bugs.debian.org, 921643-done@bugs.debian.org, 921743-done@bugs.debian.org, 921811-done@bugs.debian.org, 921825-done@bugs.debian.org, 921844-done@bugs.debian.org, 921857-done@bugs.debian.org, 921864-done@bugs.debian.org, 921876-done@bugs.debian.org, 921885-done@bugs.debian.org, 921893-done@bugs.debian.org, 921907-done@bugs.debian.org, 921908-done@bugs.debian.org, 921910-done@bugs.debian.org, 921911-done@bugs.debian.org, 921997-done@bugs.debian.org, 922221-done@bugs.debian.org
- Subject: Closing bugs for updates included in 9.8
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 16 Feb 2019 11:36:33 +0000
- Message-id: <1550316993.21192.50.camel@adam-barratt.org.uk>
Version: 9.8 Hi, The update referenced by each of these bugs was included in this morning's stretch point release. Regards, Adam
--- End Message ---