Your message dated Fri, 29 Aug 2014 13:12:33 -0600
with message-id <[email protected]>
and subject line Re: Bug#759590: mutt: Error in GnuTLS initialization: Failed
to acquire random data.
has caused the Debian Bug report #759590,
regarding mutt: Error in GnuTLS initialization: Failed to acquire random data.
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
759590: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759590
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: mutt
Version: 1.5.23-1.1
Severity: normal
After today's Sid upgrade from 1.5.23-1 to 1.5.23-1.1 mutt is now
emitting this message when starting.
Error in GnuTLS initialization: Failed to acquire random data.
The changelog for 1.5.23-1.1 shows:
* Rebuild against GnuTLS v3. Closes: #668816
Therefore I assume this is related.
Bob
-- Package-specific info:
Mutt 1.5.23 (2014-03-12)
Copyright (C) 1996-2009 Michael R. Elkins and others.
Mutt comes with ABSOLUTELY NO WARRANTY; for details type `mutt -vv'.
Mutt is free software, and you are welcome to redistribute it
under certain conditions; type `mutt -vv' for details.
System: Linux 3.14-2-amd64 (x86_64)
ncurses: ncurses 5.9.20140712 (compiled with 5.9)
libidn: 1.29 (compiled with 1.29)
hcache backend: tokyocabinet 1.4.48
Compiler:
Using built-in specs.
COLLECT_GCC=gcc
COLLECT_LTO_WRAPPER=/usr/lib/gcc/x86_64-linux-gnu/4.9/lto-wrapper
Target: x86_64-linux-gnu
Configured with: ../src/configure -v --with-pkgversion='Debian 4.9.1-6'
--with-bugurl=file:///usr/share/doc/gcc-4.9/README.Bugs
--enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --prefix=/usr
--program-suffix=-4.9 --enable-shared --enable-linker-build-id
--libexecdir=/usr/lib --without-included-gettext --enable-threads=posix
--with-gxx-include-dir=/usr/include/c++/4.9 --libdir=/usr/lib --enable-nls
--with-sysroot=/ --enable-clocale=gnu --enable-libstdcxx-debug
--enable-libstdcxx-time=yes --enable-gnu-unique-object --disable-vtable-verify
--enable-plugin --with-system-zlib --disable-browser-plugin
--enable-java-awt=gtk --enable-gtk-cairo
--with-java-home=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64/jre --enable-java-home
--with-jvm-root-dir=/usr/lib/jvm/java-1.5.0-gcj-4.9-amd64
--with-jvm-jar-dir=/usr/lib/jvm-exports/java-1.5.0-gcj-4.9-amd64
--with-arch-directory=amd64 --with-ecj-jar=/usr/share/java/eclipse-ecj.jar
--enable-objc-gc --enable-multiarch --with-arch-32=i586 --with-abi=m64
--with-multilib-list=m32,m64,mx32 --enable-multilib --with-tune=generic
--enable-checking=release --build=x86_64-linux-gnu --host=x86_64-linux-gnu
--target=x86_64-linux-gnu
Thread model: posix
gcc version 4.9.1 (Debian 4.9.1-6)
Configure options: '--prefix=/usr' '--sysconfdir=/etc'
'--mandir=/usr/share/man' '--with-docdir=/usr/share/doc'
'--with-mailpath=/var/mail' '--disable-dependency-tracking'
'--enable-compressed' '--enable-debug' '--enable-fcntl' '--enable-hcache'
'--enable-gpgme' '--enable-imap' '--enable-smtp' '--enable-pop' '--with-curses'
'--with-gnutls' '--with-gss' '--with-idn' '--with-mixmaster' '--with-sasl'
'--without-gdbm' '--without-bdb' '--without-qdbm' '--build' 'x86_64-linux-gnu'
'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 -fstack-protector-strong -Wformat
-Werror=format-security -Wall' 'LDFLAGS=-Wl,-z,relro'
'CPPFLAGS=-D_FORTIFY_SOURCE=2 -I/usr/include/qdbm'
Compilation CFLAGS: -g -O2 -fstack-protector-strong -Wformat
-Werror=format-security -Wall
Compile options:
-DOMAIN
+DEBUG
-HOMESPOOL +USE_SETGID +USE_DOTLOCK +DL_STANDALONE +USE_FCNTL -USE_FLOCK
+USE_POP +USE_IMAP +USE_SMTP
-USE_SSL_OPENSSL +USE_SSL_GNUTLS +USE_SASL +USE_GSS +HAVE_GETADDRINFO
+HAVE_REGCOMP -USE_GNU_REGEX
+HAVE_COLOR +HAVE_START_COLOR +HAVE_TYPEAHEAD +HAVE_BKGDSET
+HAVE_CURS_SET +HAVE_META +HAVE_RESIZETERM
+CRYPT_BACKEND_CLASSIC_PGP +CRYPT_BACKEND_CLASSIC_SMIME +CRYPT_BACKEND_GPGME
-EXACT_ADDRESS -SUN_ATTACHMENT
+ENABLE_NLS -LOCALES_HACK +COMPRESSED +HAVE_WC_FUNCS +HAVE_LANGINFO_CODESET
+HAVE_LANGINFO_YESEXPR
+HAVE_ICONV -ICONV_NONTRANS +HAVE_LIBIDN +HAVE_GETSID +USE_HCACHE
-ISPELL
SENDMAIL="/usr/sbin/sendmail"
MAILPATH="/var/mail"
PKGDATADIR="/usr/share/mutt"
SYSCONFDIR="/etc"
EXECSHELL="/bin/sh"
MIXMASTER="mixmaster"
To contact the developers, please mail to <[email protected]>.
To report a bug, please visit http://bugs.mutt.org/.
misc/am-maintainer-mode.patch
features/ifdef.patch
features/xtitles.patch
features/trash-folder.patch
features/purge-message.patch
features/imap_fast_trash.patch
features/sensible_browser_position.patch
features-old/patch-1.5.4.vk.pgp_verbose_mime.patch
features/compressed-folders.patch
features/compressed-folders.debian.patch
debian-specific/Muttrc.patch
debian-specific/Md.etc_mailname_gethostbyname.patch
debian-specific/use_usr_bin_editor.patch
debian-specific/correct_docdir_in_man_page.patch
debian-specific/dont_document_not_present_features.patch
debian-specific/document_debian_defaults.patch
debian-specific/assumed_charset-compat.patch
debian-specific/467432-write_bcc.patch
debian-specific/566076-build_doc_adjustments.patch
misc/define-pgp_getkeys_command.patch
misc/gpg.rc-paths.patch
misc/smime.rc.patch
misc/fix-configure-test-operator.patch
upstream/531430-imapuser.patch
upstream/543467-thread-segfault.patch
upstream/542817-smimekeys-tmpdir.patch
upstream/548577-gpgme-1.2.patch
upstream/553321-ansi-escape-segfault.patch
upstream/547980-smime_keys-chaining.patch
upstream/528233-readonly-open.patch
upstream/228671-pipe-mime.patch
upstream/383769-score-match.patch
upstream/603288-split-fetches.patch
upstream/611410-no-implicit_autoview-for-text-html.patch
upstream/path_max.patch
translations/update_german_translation.patch
__separator__mutt.org.patch
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 3.14-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages mutt depends on:
ii libassuan0 2.1.2-1
ii libc6 2.19-10
ii libcomerr2 1.42.11-2
ii libgnutls-deb0-28 3.3.6-2
ii libgpg-error0 1.13-3
ii libgpgme11 1.5.1-1
ii libgssapi-krb5-2 1.12.1+dfsg-7
ii libidn11 1.29-1
ii libk5crypto3 1.12.1+dfsg-7
ii libkrb5-3 1.12.1+dfsg-7
ii libncursesw5 5.9+20140712-2
ii libsasl2-2 2.1.26.dfsg1-11
ii libtinfo5 5.9+20140712-2
ii libtokyocabinet9 1.4.48-2
Versions of packages mutt recommends:
ii libsasl2-modules 2.1.26.dfsg1-11
ii locales 2.19-10
ii locales-all [locales] 2.19-10
ii mime-support 3.56
ii postfix [mail-transport-agent] 2.11.1-1
Versions of packages mutt suggests:
ii aspell 0.60.7~20110707-1.1
ii ca-certificates 20140325
ii gnupg 1.4.18-2
ii ispell 3.3.02-6
pn mixmaster <none>
ii openssl 1.0.1i-2
ii urlview 0.9-19
Versions of packages mutt is related to:
ii mutt 1.5.23-1.1
pn mutt-dbg <none>
pn mutt-patched <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Andreas Metzler wrote:
> Bob Proulx wrote:
> > Error in GnuTLS initialization: Failed to acquire random data.
> [...]
> > If there is a system problem then it arrived by doing a normal Sid
> > apt-get upgrade every day.
> [...]
>
> One way to get this error is to break /dev/*random, e.g. by not
> having it mode 777. Is this perhaps the case?
Nope. It is the same as before and the same as other systems. Thanks
for the idea though.
$ ll /dev/*random
crw-rw-rw- 1 root root 1, 8 Aug 13 11:56 /dev/random
crw-rw-rw- 1 root root 1, 9 Aug 13 11:56 /dev/urandom
I can read /dev/random with dd and the result appears reasonable and
random on a quick browse.
With the updated information I will eventually close or reassign since
this is now obviously something from gnutls not mutt. It must be
something in gnutls. I am tempted to reboot but then if that solves
the problem, since it might be something with the kernel, but then I
will have lost the test case.
I will go ahead and close this bug in mutt. If I can get to the
underlying cause I will open a new bug probably against gnutls. If I
do I will add a link to the new bug in a later response.
Bob
--- End Message ---