[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#664383: marked as done (openssh: Too strict openssl check again.)



Your message dated Mon, 19 Mar 2012 12:19:09 +0000
with message-id <E1S9bYL-0000Dd-Cb@franck.debian.org>
and subject line Bug#664383: fixed in openssh 1:5.9p1-4
has caused the Debian Bug report #664383,
regarding openssh: Too strict openssl check again.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
664383: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664383
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: openssh
Version: 1:5.9p1-3
Severity: important

Hi,

I was preparing a new version of openssl 1.0.1, and after I
installed it and wanted to use ssh, I got this:
OpenSSL version mismatch. Built against 1000007f, you have 1000100f

At some point we removed that check, but then there is this
changelog entry in 1:5.4p1-1:
  * Drop Debian-specific removal of OpenSSL version check.  Upstream ignores
    the two patchlevel nybbles now, which is sufficient to address the
    original reason this change was introduced, and it appears that any
    change in the major/minor/fix nybbles would involve a new libssl package
    name.  (We'd still lose if the status nybble were ever changed, but that
    would mean somebody had packaged a development/beta version rather than
    a proper release, which doesn't appear to be normal practice.)

And we have the same problem again.

Openssl has changed the way it numbers it's versions, and now
1.0.x would stay abi compatible with 1.0.0.  But I think the
check is bogus in any case.

So I'm waiting with uploading the 1.0.1 version until openssh
is fixed, and I'll add a Breaks.


Kurt




--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:5.9p1-4

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_5.9p1-4_i386.udeb
  to main/o/openssh/openssh-client-udeb_5.9p1-4_i386.udeb
openssh-client_5.9p1-4_i386.deb
  to main/o/openssh/openssh-client_5.9p1-4_i386.deb
openssh-server-udeb_5.9p1-4_i386.udeb
  to main/o/openssh/openssh-server-udeb_5.9p1-4_i386.udeb
openssh-server_5.9p1-4_i386.deb
  to main/o/openssh/openssh-server_5.9p1-4_i386.deb
openssh_5.9p1-4.debian.tar.gz
  to main/o/openssh/openssh_5.9p1-4.debian.tar.gz
openssh_5.9p1-4.dsc
  to main/o/openssh/openssh_5.9p1-4.dsc
ssh-askpass-gnome_5.9p1-4_i386.deb
  to main/o/openssh/ssh-askpass-gnome_5.9p1-4_i386.deb
ssh-krb5_5.9p1-4_all.deb
  to main/o/openssh/ssh-krb5_5.9p1-4_all.deb
ssh_5.9p1-4_all.deb
  to main/o/openssh/ssh_5.9p1-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 664383@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 19 Mar 2012 11:06:30 +0000
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source i386 all
Version: 1:5.9p1-4
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - secure shell (SSH) client, for secure access to remote machines
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell (SSH) server, for secure access from remote machines
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 664383
Changes: 
 openssh (1:5.9p1-4) unstable; urgency=low
 .
   * Disable OpenSSL version check again, as its SONAME is sufficient
     nowadays (closes: #664383).
Checksums-Sha1: 
 df0ce64a304baccd6271403b073e3e7cf6b48921 2536 openssh_5.9p1-4.dsc
 7092b448069607c9135704438824ae1a3edcda97 238145 openssh_5.9p1-4.debian.tar.gz
 011664a2821ccefbe9941d310ac42f33468df7ce 1037142 openssh-client_5.9p1-4_i386.deb
 8fa1a7d4c9aa98dc0742888f021b2c82de5855eb 340700 openssh-server_5.9p1-4_i386.deb
 c48088d854bdaf64a17b7d901063e345a4a0f330 1246 ssh_5.9p1-4_all.deb
 ae34450054547c12791b3de1bf62781bd10f9eea 83652 ssh-krb5_5.9p1-4_all.deb
 cc3173bfa21741bd0abd688b131f6f641f5f8913 91136 ssh-askpass-gnome_5.9p1-4_i386.deb
 f950900ad34fc0dfc63de87f1475a9863f6d14d6 258626 openssh-client-udeb_5.9p1-4_i386.udeb
 7968964f3fa267469dffc429b68519188ef83ee6 291150 openssh-server-udeb_5.9p1-4_i386.udeb
Checksums-Sha256: 
 4ec07fdf38ef974b4c647a92ca525884a9b304a706e8f5d7f6518bd2e35cfba6 2536 openssh_5.9p1-4.dsc
 2331cf616bcf8ddc1c8249a8e6c1d12491be2bb3e20ada00fcde97a023eb3c13 238145 openssh_5.9p1-4.debian.tar.gz
 6ebf26aa8bcc7f752fd88f890d390fe5b8afd814ca15a9931bea56637485c3e0 1037142 openssh-client_5.9p1-4_i386.deb
 f5acc48cd0033b0789d0e5963ff8841e2a5f514182ff5fe587bea2efff8f131f 340700 openssh-server_5.9p1-4_i386.deb
 409bd4a8fc7dabcfedc178cc8a734b694f67fc45c6620716a4d4636367780ac9 1246 ssh_5.9p1-4_all.deb
 f836baa0a95e46d90628f9ff9d24409c79f86f85cd8f7a2422434bb67f19e73c 83652 ssh-krb5_5.9p1-4_all.deb
 51ec0b041b6ec5e68cae16604657b23fc4a27ec8ff1cfca4f1d6190d5452e52f 91136 ssh-askpass-gnome_5.9p1-4_i386.deb
 7cd6a857dde5fe7bb2267943bf21e64cda44bd1e4e6548bcb719c03adafb84e4 258626 openssh-client-udeb_5.9p1-4_i386.udeb
 74146f3253190ab9c155cae9bbb7126a56ffd2c4ea852ef006ed7f7174718aac 291150 openssh-server-udeb_5.9p1-4_i386.udeb
Files: 
 e839dcabea01b0155bc1b0378eb962db 2536 net standard openssh_5.9p1-4.dsc
 12aabaf87c84481a83d45195595f0626 238145 net standard openssh_5.9p1-4.debian.tar.gz
 092eb67946510db60e8639f4485b7e4f 1037142 net standard openssh-client_5.9p1-4_i386.deb
 629ca5da5e281c2368be2608f52eb027 340700 net optional openssh-server_5.9p1-4_i386.deb
 2f215448431a12aac09457ccbc151d6c 1246 net extra ssh_5.9p1-4_all.deb
 787ffa4ebde19911ab148e1cbfa07218 83652 oldlibs extra ssh-krb5_5.9p1-4_all.deb
 9fab43f36f1d6cbc8ac637ff15ea6492 91136 gnome optional ssh-askpass-gnome_5.9p1-4_i386.deb
 da604a0b7ae9651903dc961d86398546 258626 debian-installer optional openssh-client-udeb_5.9p1-4_i386.udeb
 f1fe187fd09a11acd4b833f89d7d9f63 291150 debian-installer optional openssh-server-udeb_5.9p1-4_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iQIVAwUBT2cgkzk1h9l9hlALAQgxShAAt9H+lJK4tI2aT3YCKMv1+6uG8quxrF66
+FhYkX1pr3eu55wRjCc6cEw0YvtxpmJt+2ArMTA1C2tpX3XIR9huOotCvB7LgFFG
rleA6I5c6UuIDY3prpOgAGi2ReT+z5K6snH96hBmmmjxzyR81u5uPI9R1l0Hm0vk
XePkmRCZDx/0HVs5u/RET+jz9+FFnkOnYodaCLKtNj2lQJajNt727S+riCwiS13G
386Cvca2B7A4ds29EfzjAFmiPP0w89TZcbkvKMRLoJitWeMsqb1aJmsxIBVaTRlq
WgoGF6bg2NjBg6bSkdsrNi68FNFZTgPDQbjuL6fyQD582Zk6mZkNHueE67ce/pIL
8DmaasCMMRuTlWO403vMfpO4ScsVBLct6SxM78+g7T5vZEL2+75gSFApVJXrplef
g3M9q363OxWuKKtZ9vIaYnIxAW5chVwhDkL/ciyZeKvfAoMCZ5xvPmGHR09QARJJ
VeA3Vx8OahGrVopp4ygUOamXmPYFaayE5dx6bx862niUF2o3a8UtKWDfm2SXnicy
B5SpHQ2nAMWKrqLsbKLdCf53g9QnhvC/e8dY9eRs3cJBYaMO5ruFFRxRNxlJojPI
GIpKj9vBS637XPw/CRLJdpUQUsm1KMi5kqhL5947lzleaMzCb9aea/7AEu7nwK0I
hDPLC0kh4aU=
=qV15
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: