Your message dated Tue, 10 Apr 2018 07:50:48 +0000
with message-id <e1f5o3e-0000ye...@fasolo.debian.org>
and subject line Bug#895075: fixed in ca-certificates 20180409
has caused the Debian Bug report #895075,
regarding ca-certificates: Please replace 'c_rehash' with 'openssl rehash'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
895075: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895075
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ca-certificates
Version: 20170717
Severity: normal
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: c_rehash

This package is using the c_rehash command which is part of the
openssl package. The c_rehash script is considered by upstream as a
fallback script and will disappear at some point. The recommended way
is to use the "openssl rehash" command instead which appeared in
1.1.0. Please make sure that this package does not use the c_rehash
command anymore.

The "openssl rehash" command creates half that many symlinks (one per
certificate instead of two) because it uses only the newer hash.
There is also the -compat option which creates both symlinks (and
behaves like c_rehash currently does). The hash changed from md5 to
sha1 during the 0.9.8 to 1.0.0 transition so I doubt that the
"compat" mode will be required.

Should the c_rehash script be mentioned in the source code or script
of this package but is not used during the build process or in the
final package then feel free to close the bug saying so.

Sebastian 

--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20180409

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 895...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Shuler <mich...@pbandjelly.org> (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 09 Apr 2018 18:43:49 -0500
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20180409
Distribution: unstable
Urgency: medium
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
 ca-certificates - Common CA certificates
 ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 894070 895075
Changes:
 ca-certificates (20180409) unstable; urgency=medium
 .
   [ Michael Shuler ]
   * mozilla/{certdata.txt,nssckbi.h}:
     Update Mozilla certificate authority bundle to version 2.22.
     The following certificate authorities were added (+):
     + "GDCA TrustAUTH R5 ROOT"
     + "SSL.com EV Root Certification Authority ECC"
     + "SSL.com EV Root Certification Authority RSA R2"
     + "SSL.com Root Certification Authority ECC"
     + "SSL.com Root Certification Authority RSA"
     + "TrustCor ECA-1"
     + "TrustCor RootCert CA-1"
     + "TrustCor RootCert CA-2"
     The following certificate authorities were removed (-):
     - "ACEDICOM Root"
     - "AddTrust Low-Value Services Root"
     - "AddTrust Public Services Root"
     - "AddTrust Qualified Certificates Root"
     - "CA Disig Root R1"
     - "CNNIC ROOT"
     - "Camerfirma Chambers of Commerce Root"
     - "Camerfirma Global Chambersign Root"
     - "Certinomis - Autorité Racine"
     - "Certum Root CA"
     - "China Internet Network Information Center EV Certificates Root"
     - "Comodo Secure Services root"
     - "Comodo Trusted Services root"
     - "DST ACES CA X6"
     - "GeoTrust Global CA 2"
     - "PSCProcert"
     - "Security Communication EV RootCA1"
     - "Swisscom Root CA 1"
     - "Swisscom Root CA 2"
     - "Swisscom Root EV CA 2"
     - "TURKTRUST Certificate Services Provider Root 2007"
     - "TUBITAK UEKAE Kok Sertifika Hizmet Saglayicisi - Surum 3"
     - "UTN USERFirst Hardware Root CA"
   * mozilla/blacklist.txt
     Update blacklist to remove certificates no longer in certdata.txt and
     explicitly ignore distrusted certificates.
   * debian/copyright:
     Fix lintian insecure-copyright-format-uri with https URL.
   * debian/changelog:
     Fix lintian file-contains-trailing-whitespace.
   * debian/{compat,control}:
     Set to debhelper compat 11.
   * Update openssl dependency to >= 1.1.0 to support `openssl rehash` and drop
     usage of `c_rehash` script. Closes: #895075
 .
   [ Thijs Kinkhorst ]
   * Remove Christian Perrier from uploaders at his request (closes: #894070).
   * Checked for policy 4.1.4, no changes.
Checksums-Sha1:
 bfd2cbe5a401853d78bab82483a31499e7a26769 1420 ca-certificates_20180409.dsc
 edf0ec04b02fcbc90cc65906ff83fb042894a3b7 246908 ca-certificates_20180409.tar.xz
 4198a35fc6c0562a8b69011ec0f8972eedf63203 121132 
ca-certificates-udeb_20180409_all.udeb
 0e421ca28489d0e9bdd7dbb84eaed2777ba24d40 161152 
ca-certificates_20180409_all.deb
 ac18044bc5351b6b13f87164a33745e5d930b74d 5682 
ca-certificates_20180409_amd64.buildinfo
Checksums-Sha256:
 cd1f6540d0dab28f897e0e0cb2191130cdbf897f8ce3f52c8e483b2ed1555d30 1420 
ca-certificates_20180409.dsc
 7af6f5bfc619fd29cbf0258c1d95107c38ce840ad6274e343e1e0d971fc72b51 246908 
ca-certificates_20180409.tar.xz
 786bb8fcc980d05e0e64f8b162ef5a1c4ec5c24ad7d640eba9001b048df2aad3 121132 
ca-certificates-udeb_20180409_all.udeb
 5ed9c73e8c6057c0a8e8e7b7e955c68276a309c31f800239bf9ba0f7a3b5f80b 161152 
ca-certificates_20180409_all.deb
 69d98ba93e7f0412e010143d220334186b782642fbd883e65f8dc104c0340242 5682 
ca-certificates_20180409_amd64.buildinfo
Files:
 2129bcf6e3594d346cc20266c54436af 1420 misc optional 
ca-certificates_20180409.dsc
 8425f4b1219e4e528db2de764e4c6586 246908 misc optional 
ca-certificates_20180409.tar.xz
 8dfeb1d0e214e406fb8fd1f46f6e145b 121132 debian-installer optional 
ca-certificates-udeb_20180409_all.udeb
 1658e8d73dbc97ec83ee2cac18acbc45 161152 misc optional 
ca-certificates_20180409_all.deb
 4a4185ac3bb20f19e4483dd044942c23 5682 misc optional 
ca-certificates_20180409_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJazE0XAAoJEFb2GnlAHawE9NEH/jBc/pToWPasudVJy5F9LZOg
LfRSZJ/9CeNiqQi8G2gmxIBF/aKdGqC11vPsfcVKmxHVtUNv/CEkA5Mqu0NnYKWD
nhc/hUGLt7+siEMmZZ/DAwfnuoeYFn8sluXOftc0xVqRLYrKFoZPsNzl1OgGIObM
1ou6UR0WBBDj5obRlqXixaPqlGtwH7urQELdTdhEzGk1LrnwWPfWaD2u9xLwle18
TAfwoOgd9tKOu6RtBQO+oh7y/bcupw5quM3HWoP4XPjF/DJ4PVKg0/oGdS/6JuUY
Sf3zFUtd0Glfg1H1GKjsOkeKh6oH6CZRLfYai42Q+oHaiu64lyd/42pKZ+BX9uk=
=RUIW
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to