[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#482047: marked as done (ITP: openssl-blacklist -- list of blacklisted OpenSSL RSA keys)



Your message dated Wed, 21 May 2008 12:37:48 +0000
with message-id <E1JynZk-00038M-M5@ries.debian.org>
and subject line Bug#482047: fixed in openssl-blacklist 0.3
has caused the Debian Bug report #482047,
regarding ITP: openssl-blacklist -- list of blacklisted OpenSSL RSA keys
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
482047: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482047
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Christoph Martin <martin@woodstock.verwaltung.uni-mainz.de>


Contains the list of known-bad OpenSSL keys for openssl-vulnkey to use when
 examining suspect keys.

The Ubuntu openssl maintainers released a openssl-blacklist equivalent
to the openssh-blacklist package. It includes a blacklist with
compromised openssl key hashes and a program with a openssl-vulnkey
program suitable to test your openssl key files.

I think it would be a good think to coordinate the work between debian
and ubuntu and to incorporate this package into debian main.

* Package name    : openssl-blacklist
  Version         : 0.1
  Upstream Author : Jamie Strandboge <jamie@ubuntu.com>
* URL             : https://launchpad.net/ubuntu/+source/openssl-blacklist/
* License         : (GPL.)
  Programming Lang: (Python)
  Description     : list of blacklisted OpenSSL RSA keys

(Include the long description here.)

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (900, 'stable'), (70, 'testing'), (50, 'unstable')
Architecture: i386 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.22-4-amd64
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)



--- End Message ---
--- Begin Message ---
Source: openssl-blacklist
Source-Version: 0.3

We believe that the bug you reported is fixed in the latest version of
openssl-blacklist, which is due to be installed in the Debian FTP archive:

openssl-blacklist_0.3.dsc
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3.dsc
openssl-blacklist_0.3.tar.gz
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3.tar.gz
openssl-blacklist_0.3_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 482047@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kees Cook <kees@outflux.net> (supplier of updated openssl-blacklist package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 21 May 2008 03:58:17 -0700
Source: openssl-blacklist
Binary: openssl-blacklist
Architecture: source all
Version: 0.3
Distribution: unstable
Urgency: low
Maintainer: Jamie Strandboge <jamie@ubuntu.com>
Changed-By: Kees Cook <kees@outflux.net>
Description: 
 openssl-blacklist - list of blacklisted OpenSSL RSA keys
Closes: 482047
Changes: 
 openssl-blacklist (0.3) unstable; urgency=low
 .
   * Initial Debian release (keeping changelog for clarity), Closes: #482047.
Checksums-Sha1: 
 c3057b8a1e880964728a94a895d855f4e2dd13ff 877 openssl-blacklist_0.3.dsc
 2604fb0a8b56776c9b177816494c79b9c95fbd8f 8998602 openssl-blacklist_0.3.tar.gz
 052e72797a69b4bd83a9dc9f5697ef1225496328 4235684 openssl-blacklist_0.3_all.deb
Checksums-Sha256: 
 455b26993e09f882754962a0ef019d86eb85a2e32c4cf78c4c301008faa4231a 877 openssl-blacklist_0.3.dsc
 85930512bef34f3474494aeb56b6f85099847e063ed76cdfb6d7c4afe6142d36 8998602 openssl-blacklist_0.3.tar.gz
 d81b8003ede5ed7127133b0131b654b125258a05e34123dba0d4c2d56f913652 4235684 openssl-blacklist_0.3_all.deb
Files: 
 fd29dc1f7e4566690e8785cac5b3acfa 877 net optional openssl-blacklist_0.3.dsc
 8fa987b283a3d1e6b8e9d5983d749a31 8998602 net optional openssl-blacklist_0.3.tar.gz
 0a92dd424ab00f09a61a64bf6f497daa 4235684 net optional openssl-blacklist_0.3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFINAOrH/9LqRcGPm0RAqa/AJ9BZ6pqRzLj83u1Hk/NOey2ORY4MgCfeRHp
X5B0Gyycov3AonVXmsgLiqE=
=AKB1
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: