Your message dated Sun, 04 Jan 2026 00:02:23 +0000
with message-id <[email protected]>
and subject line Bug#1099497: fixed in openconnect 9.12-3+deb13u2
has caused the Debian Bug report #1099497,
regarding Got inappropriate HTTP CONNECT response: HTTP/1.1 401 Unauthorized -
Cisco AnyConnect external authentication (SAML) when connecting to
/CSCOSSLC/tunnel
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1099497: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099497
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: openconnect
Version: 9.12-3
Severity: important
Tags: fixed-upstream
See:
https://gitlab.com/openconnect/openconnect/-/commit/94e0b16c011b7b88708b8a8505fac6bfbe2e3cca
There have also number of fixes:
https://gitlab.com/openconnect/openconnect/-/blob/master/www/changelog.xml
Please release an updated version.
Thanks,
Siddh
--- End Message ---
--- Begin Message ---
Source: openconnect
Source-Version: 9.12-3+deb13u2
Done: Salvatore Bonaccorso <[email protected]>
We believe that the bug you reported is fixed in the latest version of
openconnect, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated openconnect
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 02 Jan 2026 10:12:05 +0100
Source: openconnect
Architecture: source
Version: 9.12-3+deb13u2
Distribution: trixie
Urgency: medium
Maintainer: Mike Miller <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1099497
Changes:
openconnect (9.12-3+deb13u2) trixie; urgency=medium
.
* Non-maintainer upload.
* use the unsigned printf qualifier for size_t : fixes MinGW{32,64} build
* Use RFC9266 'tls-exporter' channel bindings for Cisco STRAP with TLSv1.3
(Closes: #1099497)
Checksums-Sha1:
6fd340b6bc8d2e07d9c1ccd5437595474b2699e9 2751 openconnect_9.12-3+deb13u2.dsc
52cfca995a0df20d7bebee81809b3b13c4075338 17912
openconnect_9.12-3+deb13u2.debian.tar.xz
55406da1755901a173ae7451ac81e84d058a931e 6839
openconnect_9.12-3+deb13u2_source.buildinfo
Checksums-Sha256:
11709df407644eed19ceba7393ceb0d9ba87099a8548899a1ecda641e29210ab 2751
openconnect_9.12-3+deb13u2.dsc
103cb367a34bc04af63f685ca22aaa7071f22b4874dd850f4b7cde2cc80f1dea 17912
openconnect_9.12-3+deb13u2.debian.tar.xz
8ca85ee9b5fe70b70ef6da84ff44c31f7e64db2b01e2b86c543f5b3b7b50114f 6839
openconnect_9.12-3+deb13u2_source.buildinfo
Files:
05d6af4beaaa3b95f7a1d55baf477c3f 2751 net optional
openconnect_9.12-3+deb13u2.dsc
c5f3e1825ec454000c6e3efdabf5d6b8 17912 net optional
openconnect_9.12-3+deb13u2.debian.tar.xz
98ef6c7235b516ee05bf2cc68d306a65 6839 net optional
openconnect_9.12-3+deb13u2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=ZR+7
-----END PGP SIGNATURE-----
pgpZEw3qyD9HG.pgp
Description: PGP signature
--- End Message ---