tags 826694 pending
thanks

Fixed in repo, commit 54f05beb90124bba1005f4ef5a6e84de4a71b43d

Bye,

Simon


Am 2016-06-08 um 02:25 schrieb Axel Beckert:
> Package: duck
> Version: 0.9
> Severity: normal
> 
> Dear Maintainer,
> 
> http://repo.or.cz/ is one of the earliest if not the earliest free Git
> hoster.
> 
> Some Debian packages refer to code hosted on that website.
> 
> The website is also reachable at http://repo.or.cz/, hence duck argues
> about not using HTTPS:
> 
> I: debian/control: Vcs-Browser: http://repo.or.cz/w/conkeror.git: INFORMATION 
> (Certainty:certain)
>    The web page at http://repo.or.cz/w/conkeror.git works, but is also 
> available via https://repo.or.cz/w/conkeror.git, please consider switching to 
> HTTPS urls.
> 
> I: debian/copyright:4: URL: http://repo.or.cz/w/conkeror.git: INFORMATION 
> (Certainty:possible)
>    The web page at http://repo.or.cz/w/conkeror.git works, but is also 
> available via https://repo.or.cz/w/conkeror.git, please consider switching to 
> HTTPS urls.
> 
> But it uses a self-signed SSL certificate for HTTPS and hence the
> suggested URLs causes a fat warning in every web browser and also in
> OpenSSL:
> 
> $ echo QUIT | openssl s_client -connect repo.or.cz:443 | openssl x509 -in 
> /dev/stdin -noout -text
> depth=1 serialNumber = 
> 6a:ac:44:8f:07:1d:57:0a:1c:cf:12:a2:a7:8f:29:b9:c0:ed:cc:d7, CN = girocco 
> rorcz root certificate
> verify error:num=19:self signed certificate in certificate chain
> DONE
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             36:27:b4:05:67:14:75:a2:bd:e1:e6:9f:61:ea:48:53:de:48:a6:e8
>     Signature Algorithm: sha256WithRSAEncryption
>         Issuer: 
> serialNumber=6a:ac:44:8f:07:1d:57:0a:1c:cf:12:a2:a7:8f:29:b9:c0:ed:cc:d7, 
> CN=girocco rorcz root certificate
>         Validity
>             Not Before: Aug 11 00:00:00 1997 GMT
>             Not After : Dec 31 23:59:59 9999 GMT
>         Subject: CN=repo.or.cz
> […]
> 
> IMHO, duck should only suggest to switch to HTTPS if the used SSL
> certificate can be verified by the SSL certificates shipped in the
> package ca-certificates. Probably for local runs of duck, only those
> certificates should be taken into account, which are verifiable by
> _enabled_ certificates from ca-certificates.
> 
> It's probably debatable if sites with SSL certificates verifiable with
> the package ca-cacert installed or sites with a self-signed certificate
> verifiable via TLSA/DANE should cause such a warning or not. I tend to
> say no here, too.
> 
> -- System Information:
> Debian Release: stretch/sid
> Architecture: amd64 (x86_64)
> 
> Kernel: Linux 4.6.0-trunk-amd64 (SMP w/8 CPU cores)
> Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: sysvinit (via /sbin/init)
> 
> Versions of packages duck depends on:
> ii  devscripts                           2.16.5
> ii  dpkg-dev                             1.18.7
> ii  libconfig-inifiles-perl              2.89-1
> ii  libconfig-simple-perl                4.59-6
> ii  libdomain-publicsuffix-perl          0.10-1
> ii  libfile-which-perl                   1.21-1
> ii  libmailtools-perl                    2.13-1
> ii  libnet-dns-perl                      1.05-2
> ii  libparse-debcontrol-perl             2.005-4
> ii  libpath-class-perl                   0.36-1
> ii  libregexp-common-email-address-perl  1.01-4
> ii  libregexp-common-perl                2016060201-1
> ii  libstring-similarity-perl            1.04-1+b3
> ii  libwww-curl-perl                     4.17-2+b1
> ii  libxml-xpath-perl                    1.36-1
> ii  libyaml-libyaml-perl                 0.41-6+b1
> ii  lynx                                 2.8.9dev9-1
> ii  perl                                 5.22.2-1
> ii  publicsuffix                         20160525-1
> 
> duck recommends no packages.
> 
> Versions of packages duck suggests:
> ii  bzr         2.7.0-7
> ii  git         1:2.8.1-1
> ii  mercurial   3.8.3-1
> ii  subversion  1.9.4-1
> 
> -- no debconf information
> 

Reply via email to