Bug#1028565: Acknowledgement (upgrade-reports: Audio breaks between 5.10.0-19-amd64 and 5.10.0-20-amd64)

2023-01-24 Thread Michael Shuler
This audio issue was resolved for me with the SoC updates included in stable linux-image: 5.10.0-21-amd64 5.10.162-1 (2023-01-21) x86_64 For reference, my machine info: Product Name: 20QDCTO1WW Version: ThinkPad X1 Carbon 7th BIOS Version: N2HET68W (1.51) Audio PCI info: 00:1f.3

Bug#996005: ca-certificates: fails upgrading when no new certs selected

2021-10-10 Thread Michael Shuler
-git a/debian/changelog b/debian/changelog index 2a146c2..7b1e0bc 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +ca-certificates (20211010) UNRELEASED; urgency=medium + + [ Michael Shuler ] + * Fix error on install when TEMPBUNDLE missing. Closes: #996005 + + -- Michael Sh

Bug#992300: ca-certificates: ca-certificate update fails because of missing /usr/bin/cert-sync

2021-08-17 Thread Michael Shuler
On 8/17/21 9:40 AM, Alex wrote: I am not sure if ca-certificates-mono was installed at all. I do not have mono on the system. The machine did have the packages below installed at some point. $ dpkg -l|grep mono|grep -v fonts-|grep -v python3-monotonic rc ca-certificates-mono

Bug#992300: ca-certificates: ca-certificate update fails because of missing /usr/bin/cert-sync

2021-08-17 Thread Michael Shuler
Control: notfound -1 20210119 Control: reassign -1 ca-certificates-mono Control: tags -1 + moreinfo On 8/16/21 4:58 PM, Alex wrote: ... Updating Mono key store /etc/ca-certificates/update.d/mono-keystore: 10: /usr/bin/cert-sync: not found Done Reassigning to appropriate package,

Bug#976406: O: ca-certificates -- Common CA certificates

2020-12-04 Thread Michael Shuler
properly. Some information about this package: Package: ca-certificates Binary: ca-certificates, ca-certificates-udeb Version: 20190110 Maintainer: Michael Shuler Uploaders: Raphael Geissert , Thijs Kinkhorst Build-Depends: debhelper-compat (= 12), po-debconf Build-Depends-Indep: python, openssl

Bug#962669: Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-12 Thread Michael Shuler
, Michael Shuler wrote: On 6/11/20 1:33 PM, Adam D. Barratt wrote: Just to confirm - will the certificates be automatically re- added (assuming that users have either the automatically trust or prompt options enabled)? (stretch-pu report cc'ed, since same applies) Excellent question. I believe

Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-11 Thread Michael Shuler
On 6/11/20 1:33 PM, Adam D. Barratt wrote: Just to confirm - will the certificates be automatically re-added (assuming that users have either the automatically trust or prompt options enabled)? (stretch-pu report cc'ed, since same applies) Excellent question. I believe we're going to hit

Bug#962674: stretch-pu: package ca-certificates/20200611~deb9u1

2020-06-11 Thread Michael Shuler
611~deb9u1 with the following changes: ca-certificates (20200611~deb9u1) stretch; urgency=medium * Rebuild for stretch. * This oldstable release Closes: #962596, #942915 -- Michael Shuler Thu, 11 Jun 2020 09:11:56 -0500 ca-certificates (20200611) unstable; urgency=medium

Bug#962672: buster-pu: package ca-certificates/20200611~deb10u1

2020-06-11 Thread Michael Shuler
11~deb10u1 with the following changes: ca-certificates (20200611~deb10u1) buster; urgency=medium * Rebuild for buster. * This stable release Closes: #962596, #942915 -- Michael Shuler Thu, 11 Jun 2020 09:07:27 -0500 ca-certificates (20200611) unstable; urgency=medium * mozilla

Bug#962669: RFS: ca-certificates/20200611 [RC] -- Common CA certificates

2020-06-11 Thread Michael Shuler
ss 3 Public Primary Certification Authority - G5" + "VeriSign Universal Root Certification Authority" . [ Gianfranco Costamagna ] * debian/{rules,control}: Merge Ubuntu patch from Matthias Klose to use Python3 during build. Closes: #942915 Regards, -- Michael Shuler

Bug#962596: ca-certificates: Removal of GeoTrust Global CA requires investigation

2020-06-11 Thread Michael Shuler
Control: severity -1 serious Control: tags -1 + pending Control: tags 942915 + pending Bump severity. Pending branch commits: master: commit 679daf6e9bf6fcdcb574b8029297d24836fafde0 Revert "Set release 20200601; add Symantec CAs to blacklist" This reverts commit

Bug#962596: ca-certificates: Removal of GeoTrust Global CA requires investigation

2020-06-11 Thread Michael Shuler
Control: severity -1 important (cc'ed bug reporters and those on a direct email to ack) On 6/10/20 3:27 PM, Carlos Alberto Lopez Perez wrote: On 10/06/2020 16:51, Philippe Normand wrote: Since the update of ca-certificates to version 20200601 I can no longer access webkit.org websites. The

Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler
On 6/5/20 10:35 AM, Adrian Bunk wrote: Except for keeping debian/NEWS you were actually backporting everything that was possible, this was not a 20161130+nmu1+deb9u2 release that cherry-picked only one or few changes. Given the nature of ca-certificates it was IMHO the correct decision to

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-05 Thread Michael Shuler
On 6/5/20 10:37 AM, Adam D. Barratt wrote: On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote: Thanks again, uploaded to mentors: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates https://bugs.debian.org/962245 I re-uploaded to mentors the updated 20200601~deb9u1

Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-05 Thread Michael Shuler
On 6/5/20 4:15 AM, Adrian Bunk wrote: Compared to 20200601 and 20200601~deb10u1 this contains the following additional files: /usr/share/ca-certificates/mozilla/AddTrust_Low-Value_Services_Root.crt /usr/share/ca-certificates/mozilla/Camerfirma_Chambers_of_Commerce_Root.crt

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-04 Thread Michael Shuler
Thanks again, uploaded to mentors: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates https://bugs.debian.org/962245 -- Kind regards, Michael

Bug#962152: buster-pu: package ca-certificates/20200601~deb10u1

2020-06-04 Thread Michael Shuler
Thank you. Uploaded to mentors: RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates https://bugs.debian.org/962244 -- Kind regards, Michael

Bug#962245: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-04 Thread Michael Shuler
Root". Closes: #956411, #955038, #911289, #961907 * Fix permissions on /usr/local/share/ca-certificates when using symlinks. Closes: #916833 Thank you sponsor! -- Kind regards, Michael Shuler

Bug#962244: RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates

2020-06-04 Thread Michael Shuler
ts expired "AddTrust External Root". Closes: #956411, #955038, #911289, #961907 Thank you sponsor! -- Kind regards, Michael Shuler

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-03 Thread Michael Shuler
/nssckbi.h |6 7 files changed, 2731 insertions(+), 2518 deletions(-) Full debdiff.gz attached, due to the size of certdata changes. -- Kind regards, Michael Shuler ca-certificates_20200601~deb9u1.debdiff.gz Description: application/gzip

Bug#962152: buster-pu: package ca-certificates/20200601~deb10u1

2020-06-03 Thread Michael Shuler
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu * Note: Please, upload this to buster-updates as well to fix ongoing issues with failing web services from the expired AddTrust certificate. See #961907 for details. I would

Bug#942915: ca-certificates: Python2 removal in sid/bullseye

2020-06-03 Thread Michael Shuler
tags 942915 + pending thanks On 6/3/20 6:25 AM, Gianfranco Costamagna wrote: the patch is now committed on the shared git, but I don't plan to upload it. (I don't like to touch native packages when possible) I was just looking at this exact change last night, thanks for the commit. It

Bug#962008: RFS: ca-certificates/20200601 [RC] -- Common CA certificates

2020-06-03 Thread Michael Shuler
since there is no secret info in here: Forwarded Message Subject: ca-certificates: buster-security & stretch-security (and sid) uploads Date: Mon, 1 Jun 2020 22:22:47 -0500 From: Michael Shuler To: t...@security.debian.org Hi Security Team, I committed changes to to git

Bug#962079: Blacklist Expired Certificate: CN=Staat der Nederlanden Root CA - G2

2020-06-02 Thread Michael Shuler
ficate can be blacklisted to effectively remove it. CCing #955038 (remove in later replies, please) and BCCing the original and secondary reporters to acknowledge. Thanks for report and follow up on the error. Kind regards, Michael Shuler -- $ openssl x509 -noout -startdate -enddate -in /us

Bug#962010: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler
ge changes from 20200601 - d/control * This security release updates the Mozilla CA bundle and blacklists distrusted Symantec roots and the expired AddTrust External Root. Regards, Michael Shuler

Bug#962009: RFS: ca-certificates/20200601~deb10u1 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler
ge changes from 20200601 - d/control; set d/gbp.conf branch to debian-buster * This security release updates the Mozilla CA bundle and blacklists distrusted Symantec roots and the expired AddTrust External Root. Regards, Michael Shuler

Bug#962008: RFS: ca-certificates/20200601 [RC] -- Common CA certificates

2020-06-01 Thread Michael Shuler
- "thawte Primary Root CA" - "thawte Primary Root CA - G2" - "thawte Primary Root CA - G3" - "VeriSign Class 3 Public Primary Certification Authority - G4" - "VeriSign Class 3 Public Primary Certification Authority - G5" - "VeriSign Universal Root Certification Authority" Regards, Michael Shuler

Bug#911289: Tagging Pending Bugs

2020-06-01 Thread Michael Shuler
tags 911289 + pending tags 955038 + pending tags 956411 + pending tags 961907 + pending thanks This commit on master is good to go to fix the above bugs in unstable - marking them pending: commit b3a8980b781bc9a370e42714a605cd4191bb6c0b Commit: Michael Shuler CommitDate: Mon Jun 1 14:38

Bug#956411: ca-certificates: please update to latest Mozilla bundle

2020-04-10 Thread Michael Shuler
Thanks for the bug report. I've checked in the latest release branch certdata, so the recent adds/removes will be up in the next release. I'll try to get that release built soon, it has indeed been a while. Kind regards, Michael

Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2020-02-05 Thread Michael Shuler
On 2/5/20 11:12 AM, Dan Nicholson wrote: I recently ran into this same issue and dug into it for a while. The real problem stems from https://sourceware.org/bugzilla/show_bug.cgi?id=23960. The issue is that glibc 2.28 changed readdir to always use getdents64. This causes problems when you're

Bug#927879: ca-certificates should not hardcode QuoVadis certificate authorities in /etc/ca-certificates.conf

2019-04-24 Thread Michael Shuler
On 4/24/19 5:22 PM, Soppy bear wrote: 1. This is a Debian problem because the end user should be able to use TLS without having to import/use certificates without any practical use for normal operations. Users *can* configure the ca-certificate package and set CA trust for each and every CA,

Bug#923942: postinst script error: mv: cannot move '/tmp/ca-certificates.crt.tmp.hi8W7j' to a subdirectory of itself, 'ca-certificates.crt'

2019-03-19 Thread Michael Shuler
On 3/19/19 3:29 AM, Michael Stapelberg wrote: > So I debugged this some more, and found out that the problem is that > moving *any files* from /tmp to /etc does not work, but only within the > Docker container running on travis-ci, and only when configured with > “group: deprecated-2017Q3”. The

Bug#923784: update-ca-certificates: corrupts ca-certificates.crt on full root file system

2019-03-07 Thread Michael Shuler
On 3/5/19 11:47 AM, Arthur de Jong wrote: > I have created a merge request in Salsa for this: > https://salsa.debian.org/debian/ca-certificates/merge_requests/2 Thank for the MR. I'll take a look. -- Kind regards, Michael

Bug#923942: postinst script error: mv: cannot move '/tmp/ca-certificates.crt.tmp.hi8W7j' to a subdirectory of itself, 'ca-certificates.crt'

2019-03-07 Thread Michael Shuler
On 3/7/19 8:13 AM, Michael Stapelberg wrote: > Package: ca-certificates > Version: 20190110 > Severity: normal > > The i3 continuous integration testing on travis-ci.org currently fails: > > Setting up ca-certificates (20190110) ... > Updating certificates in /etc/ssl/certs... > mv: cannot move

Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
On 2/28/19 7:37 PM, James Pooton wrote: > So installing ca-certificates (20170717) with the latest openssl > (1.1.1a-1), does produce the hashes in /etc/ssl/certs when doing an ARM > 32bit build via QEMU. > > One interesting thing is that the 382 syscalls were still present in the > build, so

Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
On 2/28/19 4:30 PM, James Pooton wrote: > >> What version of the openssl package is installed? > > Currently we’ve got the following versions getting installed: > > openssl: Installed: 1.1.1a-1 Candidate: 1.1.1a-1 Version table: *** > 1.1.1a-1 500 500 http://deb.debian.org/debian buster/main

Bug#923479: update-ca-certificates fails to create hashes under 32-bit ARM (qemu)

2019-02-28 Thread Michael Shuler
What version of the openssl package is installed? This does sound like a potential issue with `openssl rehash`. Your workaround looks OK for the moment, but the problem is that the openssl devs would like to remove the deprecated `c_rehash` utility. At this point in the release cycle, it's

Bug#922062: ca-certificates package post-installation script subprocess returned error exit status 1

2019-02-11 Thread Michael Shuler
On 2/11/19 12:51 PM, Michel Meyers wrote: > Mystery solved: Somebody (or something) placed a private key in a file > called privkey.pem and stored it in /etc/ssl/certs. This caused openssl > rehash to silently exit with error code 1, thus causing the whole > postinst script to fail. > > After

Bug#922062: ca-certificates package post-installation script subprocess returned error exit status 1

2019-02-11 Thread Michael Shuler
Control: tag -1 moreinfo On 2/11/19 9:58 AM, Michel Meyers wrote: > > Setting up ca-certificates (20190110) ... > Updating certificates in /etc/ssl/certs... > dpkg: error processing package ca-certificates (--configure): > installed ca-certificates package post-installation script

Bug#920348: ca-certificates.crt bundle gets temporarily removed during update-ca-certificates

2019-01-24 Thread Michael Shuler
On 1/24/19 7:54 AM, Dimitris Aragiorgis wrote: > > It seems that update-ca-certificates temporarily removes the > /etc/ssl/certs/ca-certificates.crt bundle. I remember this bug. c_rehash behavior was "fixed" at some point and resulted in multiple symlinks to ca-certificates.crt, so moving it out

Bug#919433: RFS: ca-certificates/20190110 [RC;Security]

2019-01-15 Thread Michael Shuler
"Certplus Root CA G2" - "OpenTrust Root CA G1" - "OpenTrust Root CA G2" - "OpenTrust Root CA G3" - "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5" - "Visa eCommerce Root" -- Michael Shuler Thu, 10 Jan 2019 19:31:31 -0600 -- Kind regards, Michael signature.asc Description: OpenPGP digital signature

Bug#918957: RFS: ifmetric/0.3-5

2019-01-10 Thread Michael Shuler
nel 4.4+. Thanks for the patch, Jim Paris. Closes: #864889 -- Michael Shuler Thu, 10 Jan 2019 13:17:26 -0600 The package is lintian clean with a couple pedantic warnings. The package shows 2 warnings on the mentors site that I have not been able to resolve (bugs with mentors site?): - Build

Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2019-01-10 Thread Michael Shuler
Control: tags -1 + pending Quick update for the new git repo location and tag pending. https://salsa.debian.org/mshuler-guest/ifmetric -- Kind regards, Michael

Bug#911303: Symlink not removed when certificates from /usr/local/share/ca-certificates is removed

2018-12-20 Thread Michael Shuler
On 10/18/18 8:08 AM, Laurent Bigonville wrote: > > In the past I've added certificates in /usr/local/share/ca-certificates > > After running update-ca-certificates symlinks were added in > /etc/ssl/certs > > After removing the files from /usr/local/share/ca-certificates and > running

Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-12-20 Thread Michael Shuler
I've been able to test this error by creating a bogus symlink in /etc/ssl/certs and I committed a patch that removes any orphan symlinks, prior to running `openssl rehash`. https://salsa.debian.org/debian/ca-certificates/commit/cfe7064cb707ed2e8ac587877c1153029d46dc28 -- Kind regards, Michael.

Bug#916833: SECURITY: world writable /srv/local/share/ca-certificates

2018-12-19 Thread Michael Shuler
On 12/19/18 3:10 AM, Maurizio Sartori wrote: > >* Possible correction > The problem seems to be in > /var/lib/dpkg/info/ca-certificates.postinst > the stat command should have the '-L' switch > > So for example: > chmod $(stat -c %a /usr/local)

Bug#911289: ca-certificates should remove Symantec certs

2018-10-18 Thread Michael Shuler
Thanks, I'll take a look. From memory, I recall this was a "certificates after X date" logic in NSS, but the CAs are still in certdata.txt. -- Kind regards, Michael

Bug#911303: Symlink not removed when certificates from /usr/local/share/ca-certificates is removed

2018-10-18 Thread Michael Shuler
Did you run `update-ca-certificates --fresh`? That's the flag that clears all symlinks, then updates. -- Kind regards, Michael On 10/18/18 8:08 AM, Laurent Bigonville wrote: > Package: ca-certificates > Version: 20180409 > Severity: normal > File: /usr/sbin/update-ca-certificates > > Hi, > >

Bug#908858: ca-certificates: hidden dependency on default-jre

2018-09-17 Thread Michael Shuler
Control: reassign -1 ca-certificates-java 20180516 Purge (not just remove) of the ca-certificates-java package should remove config files, including /etc/ca-certificates/update.d/jks-keystore. Reassigning to appropriate package, ca-certificates-java, but perhaps this is wontfix. -- Kind

Bug#903204: ca-certificates: Errors on updating to 20141019+deb8u4

2018-07-07 Thread Michael Shuler
Control: tags -1 + moreinfo On 07/07/2018 10:21 AM, guidot wrote: > I just updated from 20141019+deb8u3 to 20141019+deb8u4 using > > aptitude safe-upgrade > > and got these errors: > > Updating certificates in /etc/ssl/certs... unable to load certificate >

Bug#901288: stretch-pu: package ca-certificates/20161130+nmu1

2018-07-05 Thread Michael Shuler
On 07/05/2018 03:37 PM, Adam D. Barratt wrote: On Sun, 2018-06-10 at 21:22 -0500, Michael Shuler wrote: I would like to upload ca-certificates_20161130+nmu1+deb9u1 with the following fixes: - update Mozilla CA bundle in Stretch to 2.22 (#858064) - fix postinst failure on read-only /usr/local

Bug#895482: Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-06-21 Thread Michael Shuler
On 06/20/2018 04:33 PM, Sebastian Andrzej Siewior wrote: On 2018-06-13 08:19:32 [+0200], To Axel Beckert wrote: I asked upstream what they thing about ignoring these errors because the perl script does so. On the other hand what about cleaning up these dangling symlinks? ca-certificate

Bug#901352: unblock: ca-certificates/20180409

2018-06-13 Thread Michael Shuler
On 06/13/2018 02:35 AM, Cyril Brulebois wrote: It seems the block-udeb isn't the only blocker though: Migration status: BLOCKED: Rejected/introduces a regression Updating ca-certificates introduces new bugs: #895482 and I see no severity downgrade in that bug report? It was upgraded

Bug#901352: unblock: ca-certificates/20180409

2018-06-11 Thread Michael Shuler
frozen[1], as noted a couple days ago on d-d-announce (thank you for this note!). Kind regards, Michael Shuler [0] https://bugs.debian.org/895482 [1] https://qa.debian.org/excuses.php?package=ca-certificates

Bug#889852: ca-certificates: piuparts failure causes piuparts failures in (all?) dependent packages

2018-06-11 Thread Michael Shuler
Control: tags -1 + moreinfo On 02/07/2018 03:29 PM, Nicholas D Steeves wrote: https://piuparts.debian.org/stretch2buster-rcmd/fail/ca-certificates_20170717.log 1m9.6s DEBUG: Modified(user, group, mode, size, target): /etc/ca-certificates.conf expected(root, root, - 100644, 6488, None) !=

Bug#867461: Bug#858539: should ca-certificates certdata.txt synchronize across all suites?

2018-06-10 Thread Michael Shuler
On 06/08/2018 03:37 PM, Adam D. Barratt wrote: Ping? We're a week away from the final chance to get an update into jessie-as-oldstable before it becomes jessie-lts. Thanks for the ping. I updated the debian-jessie branch of ca-certificates with mozilla bundle 2.22, and it's ready to be

Bug#895482: severity 895482 important

2018-06-10 Thread Michael Shuler
severity 895482 important thanks Dropped severity to allow testing migration. -- Michael

Bug#895473: Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-05-30 Thread Michael Shuler
On 05/30/2018 12:46 PM, Sebastian Andrzej Siewior wrote: I've read about this bug (and the other one) on d-devel. I uploaded recently a new version of openssl to unstable (1.1.0h-3)which changes the exit code of "openssl rehash" to zero in case of a duplicate or if a certificate can no be open.

Bug#895482: Fails to upgrade: installed ca-certificates package post-installation script subprocess returned error exit status 4

2018-04-16 Thread Michael Shuler
Thanks for the details. #895473 reported a similar error on locally installed CA certificates, which I think may be related. Each of the list of `rehash: skipping .. cannot open file` in your errors appears to be on CAs that were removed in the package during this update, so somewhere we have a

Bug#895473: ca-certificates: Post-install script subprocess return error exit status 3 while upgrading

2018-04-16 Thread Michael Shuler
On 04/11/2018 04:01 PM, Pr0metheus wrote: > >* What led up to the situation? > > apt-get upgrade > >* What exactly did you do (or not do) that was effective (or > ineffective)? > > Cannot fix the problem > >* What was the outcome of this action? > > Setting up

Bug#894295: ca-certificates fails to install: Execution of /usr/bin/c_rehash aborted due to compilation errors

2018-03-28 Thread Michael Shuler
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894282 This appears to be a bug in openssl with a new version to address the regression. -- Kind regards, Michael On 03/28/2018 09:07 AM, Helmut Grohne wrote: > Package: ca-certificates > Version: 20170717 > Severity: grave > Justification:

Bug#874120: ca-certificates: should "TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1" be trusted by default?

2017-09-06 Thread Michael Shuler
On 09/03/2017 09:09 AM, Julien Cristau wrote: > ca-certificates 20170717 added the "TUBITAK Kamu SM SSL Kok Sertifikasi > - Surum 1" CA, but when that was added to nss it was restricted to a > small set of domains[1]. Thus I wonder if it wouldn't be better to > blacklist it from ca-certificates,

Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-07-21 Thread Michael Shuler
On 07/21/2017 12:46 AM, Michael Shuler wrote: > I committed this patch to git and started to test, but it fails to > compile for me. Quick repro: > > git clone https://anonscm.debian.org/git/collab-maint/ifmetric.git > cd ifmetric/ > git-buildpackage > > Due to harde

Bug#767272: Bug#866670: ca-certificates: update-ca-certificates -f does not pass removed certs to hooks

2017-07-21 Thread Michael Shuler
Testing against a new build for jessie, it looks as if the ca-certificates-java hook does nothing with new CA certificate additions, either? None of the newly added CAs appear to have made it to the keystore upon package upgrade, but were added in --fresh. It appears the hook is not doing the

Bug#721976: ca-certificates contains both server and email certificates

2017-07-21 Thread Michael Shuler
The patch was committed to collab-maint master a few days ago and I tagged this bug as pending yesterday. It's on the way :) -- Kind regards, Michael

Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-07-20 Thread Michael Shuler
. -- Kind regards, Michael (master)mshuler@hana:~/git/ifmetric$ git-buildpackage dpkg-buildpackage -rfakeroot -D -us -uc -i -I dpkg-buildpackage: source package ifmetric dpkg-buildpackage: source version 0.3-5 dpkg-buildpackage: source distribution UNRELEASED dpkg-buildpackage: source changed by Michael

Bug#858539: should ca-certificates certdata.txt synchronize across all suites?

2017-07-19 Thread Michael Shuler
On 07/06/2017 11:13 PM, Paul Wise wrote: > On Fri, Jul 7, 2017 at 2:01 AM, Antoine Beaupré wrote: > >> For what it's worth, my opinion is that we should attempt to synchronize >> certdata.txt (and blacklist.txt, for that matter) across all suites (but >> not other changes to the packaging). This

Bug#864889: ifmetric: "NETLINK: Error: Invalid argument" for links that are down, in kernel 4.4+

2017-06-20 Thread Michael Shuler
Hi Jim, Thanks for the patch. Do you happen to know if this patch presents any adverse behavior on kernel versions <4.4, or if this ends up being a no-op? I ask because Jessie is 3.16 by default, with a 4.9 kernel version in backports. Thanks! Michael

Bug#721976: ca-certificates contains both server and email certificates

2017-05-26 Thread Michael Shuler
On 05/26/2017 02:18 PM, Jacob Hoffman-Andrews wrote: > Hi, just checking in on the status of this. I provided a patch above; > does it look good to you? The patch is simple, so I see no particular issue with it. My time has been crunched lately, but I have some vacation soon with plans for some

Bug#858539: ca-certificates: Contains untrusted StartCom and WoSign certificates

2017-05-19 Thread Michael Shuler
On 05/19/2017 10:07 AM, Chris Lamb wrote: > I've uploaded ca-certificates 20161130+nmu1 to DELAYED/5: > > ca-certificates (20161130+nmu1) unstable; urgency=medium > > * Non-maintainer upload. > * Add StartCom and WoSign certificates to mozilla/blacklist.txt as they > are >

Bug#852040: jessie-pu: package ca-certificates/20141019+deb8u3

2017-04-28 Thread Michael Shuler
On 04/28/2017 11:39 AM, Adam D. Barratt wrote: > On Fri, 2017-04-28 at 00:58 +0200, Andreas Beckmann wrote: >> >> Attached is the combined debdiff of the commits backported by Michael >> and me. I verified in piuparts that "running update-certificates without >> hooks initially" now actually works

Bug#843722: I've tested the fix

2017-04-17 Thread Michael Shuler
On 04/17/2017 03:22 PM, Thomas Lange wrote: > The fix works for me. Please try to fix it soon, so the fixed version > will be going into the stretch release. Thanks for the patch, Antoine, and confirmation, Thomas - I'll get an upload ready as soon as I can. -- Kind regards, Michael

Bug#858539: ca-certificates: Contains untrusted StartCom and WoSign certificates

2017-03-23 Thread Michael Shuler
On 03/23/2017 04:02 AM, Chris Lamb wrote: > StartCom and WoSign certificates are now untrusted by the major browser > vendors[0][1], making websites that use certs from these vendors > inaccessible. I followed these events on dev-security-policy and libnss performs date checks on certs signed by

Bug#721976: ca-certificates contains both server and email certificates

2017-03-20 Thread Michael Shuler
I appreciate the research and suggestions. I'd be happy to review a patch submission to fix this. I'm not a mutt nor S/MIME user, so perhaps there may be some fallout from simple removal of email-only roots, if there are people using them. There's no way I know of to tell how many users use

Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
On 03/20/2017 12:59 PM, Alex Gaynor wrote: > Confirmed that with the package from `git`, this is resolved! Awesome. Great! Thanks a bunch for the confirmation. -- Warm regards, Michael

Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Clone the repo and `dpkg-buildpackage`. -- Kind regards, Michael

Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Control: tags -1 - moreinfo + pending Thanks for the details. Those appear to be a few of the removals in the 2.11 bundle, which are committed, but not released yet. Those will make it to a stable proposed update, too.

Bug#858064: ca-certificates: Remove 1024-bit root certificates

2017-03-20 Thread Michael Shuler
Control: tags -1 + moreinfo On 03/17/2017 04:38 PM, Alex Gaynor wrote: > Package: ca-certificates > Severity: normal What version of ca-certificates? > The ca-certificates package includes legacy root certificates which have > 1024-bit RSA keys. These are considered weak by modern standards,

Bug#825730: jessie-pu: package ca-certificates/20141019+deb8u3

2017-01-23 Thread Michael Shuler
Thanks for the follow up. I'll get this fixed and resubmit a new debdiff for stable update. -- Kind regards, Michael

Bug#783615: "update-ca-certificates --fresh" doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2017-01-20 Thread Michael Shuler
PU request sent! https://bugs.debian.org/852040 Thanks again, Michael

Bug#852040: jessie-pu: package ca-certificates/20141019+deb8u3

2017-01-20 Thread Michael Shuler
-certificates (20141019+deb8u3) stable; urgency=medium + + * sbin/update-ca-certificates: +Update local certificates directory when calling --fresh. Closes: #783615 + + -- Michael Shuler <mich...@pbandjelly.org> Wed, 18 Jan 2017 15:54:56 -0600 + ca-certificates (20141019+deb8u2) stable; u

Bug#783615: "update-ca-certificates --fresh" doesn't correctly re-add certificates in /usr/local/share/ca-certificates

2017-01-18 Thread Michael Shuler
On 01/18/2017 03:25 PM, Adrian Bunk wrote: > after a discussion with someone who ran into this bug in stable I have > set the severity to serious, since this should IMHO also be fixed in > stable. This does look like a good patch to backport to stable. I'll get this commited to git and work on

Bug#843722: (no subject)

2017-01-03 Thread Michael Shuler
On 01/01/2017 12:40 PM, Thomas Lange wrote: > There's still no fix. Do you need help for a fix? If you have a patch idea, that would be great! Apologies for the delay in getting something together to reproduce and test a fix. -- Kind regards, Michael

Bug#845456: Please add a udeb to ca-certificates

2016-12-01 Thread Michael Shuler
Just a quick follow up. Thijs uploaded ca-certificates_20161130 this morning, and it is currently in the NEW binary-BYHAND queue for approval. -- Kind regards, Michael

Bug#845456: Please add a udeb to ca-certificates

2016-11-28 Thread Michael Shuler
Thanks for the patches to enable the use of HTTPS in the installer. This does sound useful. (And apologies for the holiday delay in replying.) I'd like to complete a pending stable upload, first, then I'll work on this request. -- Kind regards, Michael

Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-11-18 Thread Michael Shuler
Stable update requested! Thanks again for the report, Andreas. https://bugs.debian.org/844746 "jessie-pu: package ca-certificates/20141019+deb8u2" -- Kind regards, Michael Shuler signature.asc Description: OpenPGP digital signature

Bug#843722: wants to write to /usr/local

2016-11-09 Thread Michael Shuler
On 11/08/2016 10:07 PM, Thomas Lange wrote: > My /usr/local file system is mounted read-only via NFS. This results > in an error: > > > stretch[~]# dpkg --configure ca-certificates > Setting up ca-certificates (20161102) ... > chmod: changing permissions of '/usr/local/share/ca-certificates':

Bug#843121: RFS: ifmetric/0.3-4

2016-11-03 Thread Michael Shuler
d flag for all options. * debian/patches/ifmetric.8_typo: Fix typo in man page. -- Michael Shuler <mich...@pbandjelly.org> Thu, 03 Nov 2016 18:09:20 -0500 Thanks for your time! -- Kind regards, Michael signature.asc Description: OpenPGP digital signature

Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-09-16 Thread Michael Shuler
On 09/11/2016 03:48 AM, Andreas Beckmann wrote: > The fix is quite easy: we just need to run update-ca-certificates > *without* processing the hooks during postinst configure: > > update-ca-certificates --hooksdir "" Thanks Andreas! I'll test this out as soon as I can. > This should be

Bug#828845: ca-certificates: update to Mozilla bundle 2.7

2016-08-17 Thread Michael Shuler
Control: tags -1 + pending On 08/04/2016 07:02 AM, Jonathan Wiltshire wrote: > Can I be any help in moving this along? It would be nice to get a stable > update underway too, and the next point release isn't far away. Thanks for the ping. I have committed the 2.7 bundle to the collab-maint

Bug#825730: ca-certificates: using --noawait triggers breaks downloader packages

2016-08-16 Thread Michael Shuler
The ca-certificates triggers were added to deal with installation/upgrade problems in https://bugs.debian.org/537051 Do you have a suggested patch that also properly handles the issues presented in #537051? I would suggest that downloader packages possibly might pre-depend on ca-certificates, if

Bug#828845: ca-certificates: update to Mozilla bundle 2.7

2016-06-28 Thread Michael Shuler
On 06/28/2016 07:57 AM, Jonathan Wiltshire wrote: > > The attached patch updates the package to the latest Mozilla bundle. Thanks for the update patch and the recent bug triage, Jonathan. I appreciate the help! -- Warm regards, Michael signature.asc Description: OpenPGP digital signature

Bug#807274: wheezy-pu: package ca-certificates/20130119+deb7u2

2016-03-24 Thread Michael Shuler
Backlog of $REAL_LIFE work has kept me super busy. I ran into upgrade issues (sorry, don't have the existing bts#), and it looks like Ubuntu did a similar addition using a 'mozilla-1024/' directory, which may solve the immediate upgrade problem with previously removed certificates. I have not

Bug#816541: ca-certificates: avoid creating an empty /etc/java-6-sun

2016-03-02 Thread Michael Shuler
reassign 816541 ca-certificates-java 20140324 thanks See /etc/ca-certificates/update.d/jks-keystore hook, which is run by update-ca-certificates, but is from the ca-certificates-java. There are still users of Sun Java 6, so IMO, this is a non-issue, but I'll let the package maintainer decide

Bug#812488: update of openssl still in limbo

2016-02-25 Thread Michael Shuler
On 02/22/2016 04:12 AM, Christian Beer wrote: > It seems that the openssl update is not happening soon. Can you please > include the 1024bit certificates again to solve this regression? Yeah, I have a work in progress branch that re-includes the 1024-bit CAs. Ran back into #743339 on upgrade, so

Bug#812708: works ok on testing

2016-02-25 Thread Michael Shuler
On 02/25/2016 08:58 AM, Tony den Haan wrote: > That is the problem, it requires -CApath, while /etc/ssl/certs should be > default. On testing it works ok without it. Which is unrelated to the ca-certificates package - that's my point :) Feel free to open a new bug report for the openssl package

Bug#812708: works ok on testing

2016-02-25 Thread Michael Shuler
On 02/16/2016 11:22 AM, Tony den Haan wrote: > openssl s_client -connect gmail-smtp-in.l.google.com:25 -starttls smtp > > on jessie: (and ubuntu lts :) > Verify return code: 20 (unable to get local issuer certificate) > > on testing: > Verify return code: 0 (ok) > This appears to be unrelated

Bug#807274: wheezy-pu: package ca-certificates/20130119+deb7u2

2016-02-22 Thread Michael Shuler
On 02/20/2016 06:53 AM, Adam D. Barratt wrote: > For reference, neither the above nor the message opening the bug made it > to debian-release, presumably for size reasons. Thanks for the follow up. > Looking at the diff: > > diff -Nru ca-certificates-20130119+deb7u1/debian/config >

Bug#812708: Also affected: Baltimore CyberTrust Root used by Mailchimp

2016-02-05 Thread Michael Shuler
On 02/05/2016 05:49 AM, Rich wrote: subject says it all. Please provide a specific URL to test. The "Baltimore CyberTrust Root" CA may be a different issue, looking at several mozilla bugzilla tickets, but I can't tell without any detail. Thanks, Michael

Bug#812488: libsms-send-perl: After upgrade: Can't send SMS: 500 Can't connect to api.twilio.com:443 (certificate verify failed)

2016-02-02 Thread Michael Shuler
On 02/02/2016 02:22 PM, Tim Small wrote: #813468 is similar but impacting a different application. I did come across a patch which backports the fix included in newer versions of the upstream OpenSSL 1.0.1 branch, to the 1.0.1k derived package in Jessie. I haven't reviewed or tested the fix

  1   2   3   4   >