Your message dated Thu, 29 May 2008 23:02:31 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#482427: fixed in openssl-blacklist 0.3.2
has caused the Debian Bug report #482427,
regarding openssl-blacklist: openssl blacklist should be able to accept data 
from stdin
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
482427: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482427
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openssl-blacklist
Version: 0.3
Severity: wishlist
Tags: patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It would be nice if you could run openssl-blacklist against a
certificate supplied on stdin, rather than needing to create a local
file.

This would allow simple loops like:

 for foo in hosta hostb hostc; do
  echo | openssl s_client -connect $foo | openssl-vulnkey -
 done

and similar conveniences for beleaguered system administrators.

I've attached a patch which allows for this (by creating a tempfile,
since so much of the code is predicated on the tested cert's existence
in the filesystem), and i've patched the documentation as well.

This patch includes a fix for a minor bug in the man page, as well as
what appears to be a variable substitution in the handling of the
"Problem finding modulus".  If you'd like, i can file those minor bugs
separately.

Thanks for providing this tool -- it's useful in a time like this.

Regards,

       --dkg

- -- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages openssl-blacklist depends on:
ii  openssl                       0.9.8g-10  Secure Socket Layer (SSL) binary a
ii  python                        2.5.2-1    An interactive high-level object-o

openssl-blacklist recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
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=cqIw
-----END PGP SIGNATURE-----
Common subdirectories: openssl-blacklist-0.3/debian and openssl-blacklist-0.3.dkg/debian
Common subdirectories: openssl-blacklist-0.3/examples and openssl-blacklist-0.3.dkg/examples
diff -u openssl-blacklist-0.3/openssl-vulnkey openssl-blacklist-0.3.dkg/openssl-vulnkey
--- openssl-blacklist-0.3/openssl-vulnkey	2008-05-20 12:16:47.000000000 -0400
+++ openssl-blacklist-0.3.dkg/openssl-vulnkey	2008-05-22 13:31:39.000000000 -0400
@@ -24,6 +24,8 @@
 import sha
 import subprocess
 import sys
+import tempfile
+import shutil
 
 version = "0.1.1"
 db_prefix = "/usr/share/openssl-blacklist/blacklist.RSA-"
@@ -109,23 +111,37 @@
 
 # Check each file
 found = False
+tempname = False
 for f in args:
+    realname = f
+
+    if f == "-":
+        os.umask(077)
+        if (tempname):
+            os.unlink(tempname)            
+        # dump stdin to tmpfile, operate on tmpfile instead
+        (temph,tempname) = tempfile.mkstemp()
+        temph = os.fdopen(temph, 'w')
+        shutil.copyfileobj(sys.stdin,temph)
+        temph.close()
+        f = tempname
+
     if not os.path.exists(f):
         if not options.quiet:
-            print >> sys.stderr, "'%s' could not be opened (skipping)" % (f)
+            print >> sys.stderr, "'%s' could not be opened (skipping)" % (realname)
         continue
 
     type = get_type(f)
     if type == "":
         if not options.quiet:
-            print >> sys.stderr, "'%s' is not x509 or rsa (skipping)" % (f)
+            print >> sys.stderr, "'%s' is not x509 or rsa (skipping)" % (realname)
         continue
 
     last_bits = ""
     bits = get_bits(f, type)
     if bits == "":
         if not options.quiet:
-            print >> sys.stderr, "Key has unknown validity: %s" % (f)
+            print >> sys.stderr, "Key has unknown validity: %s" % (realname)
         continue
 
     if last_bits != bits:
@@ -136,7 +152,7 @@
         except:
             try:
                 print >> sys.stderr, "WARN: could not open database for %s " \
-                                     "bits (skipping %s)" % (bits, f)
+                                     "bits (skipping %s)" % (bits, realname)
             except IOError:
                 pass
             continue
@@ -148,18 +164,21 @@
     modulus = get_modulus(f, type)
     if modulus == "":
         if not options.quiet:
-            print >> sys.stderr, "Problem finding modulus: %s" % (file)
+            print >> sys.stderr, "Problem finding modulus: %s" % (realname)
         continue
 
     key = sha.sha(modulus).hexdigest()
     #print "bits: %s\nmodulus: %s\nkey: %s\nkey80: %s" % (bits, modulus, key, key[20:])
     if key[20:] in db_lines:
         if not options.quiet:
-            print "COMPROMISED: %s %s" % (key, f)
+            print "COMPROMISED: %s %s" % (key, realname)
         found = True
     else:
         if not options.quiet:
-            print "Not blacklisted: %s %s" % (key, f)
+            print "Not blacklisted: %s %s" % (key, realname)
+
+if tempname:
+    os.unlink(tempname)
 
 if found:
     sys.exit(1)
diff -u openssl-blacklist-0.3/openssl-vulnkey.1 openssl-blacklist-0.3.dkg/openssl-vulnkey.1
--- openssl-blacklist-0.3/openssl-vulnkey.1	2008-05-20 12:16:47.000000000 -0400
+++ openssl-blacklist-0.3.dkg/openssl-vulnkey.1	2008-05-22 13:51:54.000000000 -0400
@@ -45,10 +45,25 @@
 must be generated using 
 .Xr openssl 8 .
 .Pp
+If
+.Dq -
+is given as an argument,
+.Nm
+will read from standard input.
+This can be used to process certificate output from
+.Xr s_client 1ssl ,
+for example:
+.Pp
+.Dl $ echo | openssl s_client -connect remote.example.org:https | openssl-vulnkey -
+.Pp
+will test the certificate used by remote.example.org for HTTPS.
+.Pp
+The options are as follows:
+.Bl -tag -width Ds
 .It Fl q
 Quiet mode.
 Normally,
-.Xr openssl-vulnkey 1
+.Nm
 outputs the fingerprint of each file scanned, with a description of its
 status.
 This option suppresses that output.

--- End Message ---
--- Begin Message ---
Source: openssl-blacklist
Source-Version: 0.3.2

We believe that the bug you reported is fixed in the latest version of
openssl-blacklist, which is due to be installed in the Debian FTP archive:

openssl-blacklist_0.3.2.dsc
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3.2.dsc
openssl-blacklist_0.3.2.tar.gz
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3.2.tar.gz
openssl-blacklist_0.3.2_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.3.2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kees Cook <[EMAIL PROTECTED]> (supplier of updated openssl-blacklist package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 29 May 2008 15:19:16 -0700
Source: openssl-blacklist
Binary: openssl-blacklist
Architecture: source all
Version: 0.3.2
Distribution: unstable
Urgency: low
Maintainer: Kees Cook <[EMAIL PROTECTED]>
Changed-By: Kees Cook <[EMAIL PROTECTED]>
Description: 
 openssl-blacklist - list of blacklisted OpenSSL RSA keys
Closes: 482427 482435 483310 483542
Changes: 
 openssl-blacklist (0.3.2) unstable; urgency=low
 .
   * debian/{rules,dirs,openssl-blacklist.install}: move openssl-vulnkey to
     /usr/bin (Closes: #482435).
   * examples/gen_certs.sh:
     - test for fixed libssl versions (Closes: #483310).
     - correctly skip pre-existing PEM files, thanks to Michel Meyers
       (Closes: #483542).
     - skip invalid pid 32768.
   * openssl-vulnkey: allow reading from stding, based on patch from
     Daniel Kahn Gillmor (Closes: #482427).
   * debian/control: swap maintainer so Ubuntu syncs do not get confused.
Checksums-Sha1: 
 47cf8a94f2326d3ddd083e981fbc42fc2fa150fb 1053 openssl-blacklist_0.3.2.dsc
 04677b7b283acfa3b679d5451239c9a21bd7825c 8999539 openssl-blacklist_0.3.2.tar.gz
 5887811f5a7060a378843cea93e0d11d78706f81 4237568 
openssl-blacklist_0.3.2_all.deb
Checksums-Sha256: 
 f3e78a110193a7e993d6f8c2cfe2bebd3d9bc3d39032f9f96388e74e974ff194 1053 
openssl-blacklist_0.3.2.dsc
 e2a9c889258d1034f79693ee500f44dbea2f4d29311652f17f830eb8069df207 8999539 
openssl-blacklist_0.3.2.tar.gz
 90f01192e5503f9056b4b1bab7597471d962806c146293d67b2a628fbf7cc945 4237568 
openssl-blacklist_0.3.2_all.deb
Files: 
 ba0b1be8481f76bb3ab8defa8f1587c6 1053 net optional openssl-blacklist_0.3.2.dsc
 30522095442919bff38cf7d4febea798 8999539 net optional 
openssl-blacklist_0.3.2.tar.gz
 736875b7b198616a11c9cb133a5fa5f0 4237568 net optional 
openssl-blacklist_0.3.2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Kees Cook <[EMAIL PROTECTED]>

iD8DBQFIPzFLH/9LqRcGPm0RAsnhAJ4+JM3/yR06BkRIiKGGq264tkux4gCfdwto
2O3vL3as+Qd+qw74aYsNJXQ=
=Un/9
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to