Your message dated Tue, 22 Nov 2016 03:07:09 +0000
with message-id <[email protected]>
and subject line Bug#769952: fixed in ssl-cert-check 3.29-1
has caused the Debian Bug report #769952,
regarding ssl-cert-check: Please support SNI
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
769952: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769952
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ssl-cert-check
Version: 3.27-2
Severity: normal

SNI (server name indication) is becoming more and more widespread,
thanks to WinXP becoming less prevalent.

Unfortunately, ssl-cert-check doesn't expose the required info
and so when checking a cert for a host that does SNI, it looks at
the wrong cert.

Francois

--- End Message ---
--- Begin Message ---
Source: ssl-cert-check
Source-Version: 3.29-1

We believe that the bug you reported is fixed in the latest version of
ssl-cert-check, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
TANIGUCHI Takaki <[email protected]> (supplier of updated ssl-cert-check 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 22 Nov 2016 10:49:34 +0900
Source: ssl-cert-check
Binary: ssl-cert-check
Architecture: source all
Version: 3.29-1
Distribution: unstable
Urgency: medium
Maintainer: TANIGUCHI Takaki <[email protected]>
Changed-By: TANIGUCHI Takaki <[email protected]>
Description:
 ssl-cert-check - proactively handling X.509 certificate expiration
Closes: 769952
Changes:
 ssl-cert-check (3.29-1) unstable; urgency=medium
 .
   * New upstream version 3.29
     + Support SNI (Closes: #769952)
   * Bump Standards-Version to 3.9.8.
Checksums-Sha1:
 798a934d4abc26090bfa83609a7ba33ad949aee5 1913 ssl-cert-check_3.29-1.dsc
 9e84d586099d8cdbcab055a7e44299a82e27ef14 7616 ssl-cert-check_3.29.orig.tar.bz2
 685509fa19602b05083fa174a2cb68037e803f34 1936 
ssl-cert-check_3.29-1.debian.tar.xz
 0b5a5e86b92a2ce51dfad3780b08760b363d5b5e 9076 ssl-cert-check_3.29-1_all.deb
 085e665ddf920691a9c54d629252fe774dd1e704 4808 
ssl-cert-check_3.29-1_amd64.buildinfo
Checksums-Sha256:
 bc5f5cfa3a4a436f8f2efd47e70e3061d5273e2b3d3908d7e44a019bf7fc4268 1913 
ssl-cert-check_3.29-1.dsc
 533d85fed56ff041cebc6cef80eec8991bf49be22892c575aaff835e07805582 7616 
ssl-cert-check_3.29.orig.tar.bz2
 4d0824d08ba6682d28352b333b844bd6889d5004d945bc371138afd370482949 1936 
ssl-cert-check_3.29-1.debian.tar.xz
 823215ebc4e1ba15a0bf388531b8711f86887969d9fe65a80fb841f1ded41db1 9076 
ssl-cert-check_3.29-1_all.deb
 3d5eacdb33c1f1f2bedc82482bcea2e175d587bc539f2f353f059ecc52ae24f6 4808 
ssl-cert-check_3.29-1_amd64.buildinfo
Files:
 7983383c7b7df7fa73e17554d878b432 1913 net extra ssl-cert-check_3.29-1.dsc
 ef6598db753985ac9ad0747a73862d00 7616 net extra 
ssl-cert-check_3.29.orig.tar.bz2
 3eb579b91e78b63b16119d430bed3c7f 1936 net extra 
ssl-cert-check_3.29-1.debian.tar.xz
 47ebd0adf24f236fea858c9f07f15fad 9076 net extra ssl-cert-check_3.29-1_all.deb
 89abb34ce501507a1adbcdb8b5c2dab6 4808 net extra 
ssl-cert-check_3.29-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=BcPg
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to