Your message dated Sat, 17 Dec 2016 17:04:12 +0000 with message-id <[email protected]> and subject line Bug#848346: fixed in libio-socket-ssl-perl 2.040-1 has caused the Debian Bug report #848346, regarding libio-socket-ssl-perl: default certificate path lost with libssl1.1 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 848346: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848346 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: libnet-ssleay-perl Version: 1.78-1+b1 Severity: important Dear Maintainer, libnet-ssleay-perl was broken by the upgrade from 1.78-1 to 1.78-1+b1. In order to check for unread mail on remote servers (googlemail and others), I use a script including the following lines: my $socket = IO::Socket::SSL->new( PeerAddr => 'imap.googlemail.com', PeerPort => 993 ) or die "socket(): $@"; This worked until yesterday. After upgrading libnet-ssleay-perl to 1.78-1+b1, the script returns the error message: socket(): SSL connect attempt failed error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed at ./gmail.pl line 13 [the line quoted above] To make the script work again, I downgraded libnet-ssleay-perl to 1.78-1, but I hope the bug to be fixed soon. Regards, Aldus -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (500, 'oldstable') Architecture: i386 (i686) Kernel: Linux 4.8.0-2-686-pae (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages libnet-ssleay-perl depends on: ii libc6 2.24-8 ii libssl1.1 1.1.0c-2 ii perl 5.24.1~rc4-1 ii perl-base [perlapi-5.24.1] 5.24.1~rc4-1 libnet-ssleay-perl recommends no packages. Versions of packages libnet-ssleay-perl suggests: ii libperl5.24 [libmime-base64-perl] 5.24.1~rc4-1 -- no debconf information
--- End Message ---
--- Begin Message ---Source: libio-socket-ssl-perl Source-Version: 2.040-1 We believe that the bug you reported is fixed in the latest version of libio-socket-ssl-perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. gregor herrmann <[email protected]> (supplier of updated libio-socket-ssl-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 17 Dec 2016 17:45:47 +0100 Source: libio-socket-ssl-perl Binary: libio-socket-ssl-perl Architecture: source Version: 2.040-1 Distribution: unstable Urgency: medium Maintainer: Debian Perl Group <[email protected]> Changed-By: gregor herrmann <[email protected]> Closes: 848346 Description: libio-socket-ssl-perl - Perl module implementing object oriented interface to SSL sockets Changes: libio-socket-ssl-perl (2.040-1) unstable; urgency=medium . * Import upstream version 2.040. Fixes "default certificate path lost with libssl1.1". Closes: #848346 * Update years of upstream and packaging copyright. Checksums-Sha1: 6fe680351dd817a11da6911627453dfa19daf3a0 2671 libio-socket-ssl-perl_2.040-1.dsc fb1a00874772c86b6fe5b347ce8d8e8bd0c655cf 214139 libio-socket-ssl-perl_2.040.orig.tar.gz ed5b3a10d8fdc03f36e7d9b0f66875aacc2aa2e2 9368 libio-socket-ssl-perl_2.040-1.debian.tar.xz Checksums-Sha256: 5240165b5f31232142ceeccd47754157515a9d58da2e16f2e0a4efd4c6f5208b 2671 libio-socket-ssl-perl_2.040-1.dsc 7472bba199f9b3b88b9b1ece163bb7de4a5bab95bb8784b4f6d66ac030099645 214139 libio-socket-ssl-perl_2.040.orig.tar.gz 4ee6a7171c13161df4964039568de01fa8ff2cd075503cbb7c94743f59a224ac 9368 libio-socket-ssl-perl_2.040-1.debian.tar.xz Files: d2cd88b646e6e79c5d6cdd3b175b4751 2671 perl optional libio-socket-ssl-perl_2.040-1.dsc 3cc65bee2a5b0d530181353e70617c17 214139 perl optional libio-socket-ssl-perl_2.040.orig.tar.gz 5ad704e455cd95a466d2452cdf0e265b 9368 perl optional libio-socket-ssl-perl_2.040-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAlhVbF5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ qgbjlhAAuatiWkSbpzEqwqcU4j8LAtdqy6Zit9opwm2HY3CahfNN5tj6dlWcPFBs XyEp3A8auz+S9dpjaeP5IzYvIIz08lrb3EK9eQV+kP3E7nVzW8sv7WSny9xhzJ71 3mu2S3RjwJTDcEABEo+BLJe7afHmFTXmYtPT+xVDChlhWyrxxw9ilUY6nSVstZH8 Q8VQJO50ef65YDnEJepDqXzR3zunE6k+Z5RNpDMOQUjv4ykyF+La2X+39KTFujGS fU+TIk0eO9XVlD5tA8SDUpX3BLRUK21jli6gJJ36BTxrBb1ZFQzI+mdfb6XDgIzS aAtxGiaVoyjDsV2MMzWdEHf9UpQCdr2whf9Iqpbes+kkkDdsU3hbk7xtjgCRe+eu 2IF9xDiMQsnPzji4k38aWwFIgE7UOstkv9O07OQNSYJs3SGIWzXJ1uePHJ9P1gbo fG+do7wVmPwTPtFGO4Ukm9FN9n59zNwvVI4p6bHSEZGUtgx+ErN6YwWpzPzPt/I3 2S6Csmdc73g1i/38NwuClxqR4UhWf17+lvD8nPVSySptcPiRA4/DrXhlEOJ6iByW tjNh89GBwd8axVSPnV0+Xp6ptoAMQnUwedSS+DLJh9sXzsnwmoNPMq6FHE4LeqZs eo7TWfxYz7lncqdr6TefSaqhFkJ21b13jLb+honqgLKYUr4pCUE= =A4rv -----END PGP SIGNATURE-----
--- End Message ---

