Your message dated Fri, 9 Jan 2026 18:00:47 +0100
with message-id <[email protected]>
and subject line Re: Bug#1076785: osslsigncode: Version 2.5 unable to process 
(some?) SafeNet tokens, online advice is to move to 2.4 or 2.6
has caused the Debian Bug report #1076785,
regarding osslsigncode: Version 2.5 unable to process (some?) SafeNet tokens, 
online advice is to move to 2.4 or 2.6
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1076785: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076785
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: osslsigncode
Version: 2.5-4
Severity: important
X-Debbugs-Cc: [email protected]

Dear Maintainer,

version 2.5 is apparently unable t process (some? - all my) SafeNet tokens, 
with online advice being to either downgrade to 2.4 or upgrade to 2.6: 
https://stackoverflow.com/a/78308879 .
Unfortunately it would seem that right now there are no other versions but 2.5 
available for Bookworm and installing those available on SID transitively 
requires several library versions themselves not (yet?) available on Bookworm.

Could you please provide a version 2.6+?

   * What led up to the situation?

Switching to Debian 12 and
- osslsigncode 2.5-4
- openssl 3.0.13-1~deb12u1
- libp11-kit0 0.24.1-2
- libengine-pkcs11-openssl 0.4.12-0.1

from Debian 10 and
- osslsigncode 2.0+really2.5-4+deb10u1
- openssl 1.1.1n-0+deb10u6
- libp11-kit0 0.23.15-2+deb10u1
- libengine-pkcs11-openssl 0.4.9-4

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

This invocation works on Debian 10:

osslsigncode sign -pkcs11engine /usr/lib/x86_64-linux-gnu/engines-1.1/pkcs11.so 
\
                  -pkcs11module /usr/lib/libIDPrimePKCS11.so \
-pkcs11cert <certificate uri obtained from p11tool> \
-h sha2 \
-n <application name> \
-i <vendor url> \
-t <time server> \
-in <unsigned file> -out <signed file>

This invocation fails on Debian 12:

osslsigncode sign -pkcs11engine /usr/lib/x86_64-linux-gnu/engines-3/pkcs11.so \
                  -pkcs11module /usr/lib/libIDPrimePKCS11.so \
-pkcs11cert <certificate uri obtained from p11tool> \
-h sha2 \
-n <application name> \
-i <vendor url> \
-t <time server> \
-in <unsigned file> -out <signed file>

with error message

$ <invocation>
bad engine id
Failed to set 'dynamic' engine
40D912A3047F0000:error:1300006D:engine routines:dynamic_load:init 
failed:../crypto/engine/eng_dyn.c:514:
Failed

To troubleshoot, I tried:
- read certificates via p11tool to ascertain lib11-kit0 is not responsible 
(still works as in Debian 10)
- find https://mta.openssl.org/pipermail/openssl-users/2024-July/017278.html , 
downgrade to openssl 3.0.11 (no effect; reverted)
- downgrade to libengine-pkcs11-openssl 0.4.9-4, which had engine-1.1/pkcs.so, 
that worked on Buster (failed: error was replaced with 'Failed to init crypto'; 
reverted)
- find https://stackoverflow.com/a/78308879
- add engine to openssl via 
https://github.com/OpenSC/libp11#using-the-engine-from-the-command-line , test 
it via https://github.com/OpenSC/libp11#testing-the-engine-operation (fixed 
error "bad engine id")
  - This step seems new - I checked /etc/ssl/openssl.cnf on Debian 10 and no 
such lines exist there, nor are they necessary. Feels like a regression to me, 
but nb.
- check for additional versions at 
https://packages.debian.org/bookworm/osslsigncode (none available)
- check for additional versions using 'sudo apt list --all-versions 
osslsigncode', including on bookworm-backports, bookworm-backports-sloppy (none 
available)
- install osslsigncode_2.9-1_amd64.deb (failed: dependencies transitively 
require newer packages than available on Bookworm, not ready to open this can 
of... worms)

   * What was the outcome of this action?

I managed to eliminate one line of error, but now I am stuck.

   * What outcome did you expect instead?

It would be nice if some combination of Bookworm-available packages worked. I 
hope that, as long as Bookworm is supported, newer already-released versions of 
programs will keep arriving.

Another nb.: I would expect the necessary packages to be listed as / similar to 
dependencies, e.g. evidently osslsigncode uses openssl and can fail from 
openssl misconfiguration, but it has no mention of openssl and only by blind 
internet search was I able to find whence the "bad engine id" came.
packages.debian.org has e.g. relations 'Depends', 'Recommends', 'Suggests' to 
document soft dependencies like this. (Can I add to those myself? It is 
presumably a thankless task to keep them up-to-date.)

Yours sincerely
Simon Beyer

-- System Information:
Debian Release: 12.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-23-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages osslsigncode depends on:
ii  libc6     2.36-9+deb12u7
ii  libcurl4  7.88.1-10+deb12u6
ii  libssl3   3.0.13-1~deb12u1

osslsigncode recommends no packages.

osslsigncode suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Version: 2.8-1

Hi Adi,

On Fri, 9 Jan 2026 16:35:05 +0100, Adi Kriegisch <[email protected]> wrote:
> a recent security upgrade for bullseye (version 2.5-4~deb11u1) backported
> the issue to bullseye as well. All versions above 2.5 do have the issue
> fixed; I'm trying to tag the issue accordingly.

That’s unfortunate — Abhijith, the security update in bullseye broke the
package in a few important use-cases...

I see this bug was never closed, I’m closing it for version 2.8-1 and later.
Of course that doesn’t mean it shouldn’t be fixed for bullseye!
(Incidentally, buster had the same problem, see
https://tracker.debian.org/news/1489096/accepted-osslsigncode-20really25-4deb10u1-source-into-oldoldstable/.)

Regards,

Stephen

Attachment: pgpJVua01ssMT.pgp
Description: OpenPGP digital signature


--- End Message ---

Reply via email to