retitle 594150 regression in apt-transport-https interop with apt-cacher
reassign 594150 gnutls26
thanks

> My interest is in reducing the RC bug count to get squeeze released.
> So let me ask the questions: 
> 
> 1. There was a minor bug in curl now fixed upstream and in github; is
>    there really an RC bug here?  
> 2. If so, is it in curl or in apt-transport-https?

Johannes' original bug report was (paraphrasing): a-t-h in Lenny worked with a
particular apt-cacher configuration; a-t-h in Squeeze does not. Johannes
believes this to have grave severity and nobody has contradicted that.

According to Neil Williams and Daniel Silverstone (see
<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594150#54>), the bug is
probably in gnutls26, if anything; the curl bug that Daniel Stenberg recently
fixed was just obscuring the cause of failure, by causing a misleading error
message.

I've moved the curl upstream and Debian maintainers to Bcc so they'll get this
message but not its replies, since this doesn't seem to be a curl issue. Thanks
for your help!

On Sun, 14 Nov 2010 at 17:07:24 +0000, Neil Williams wrote:
> gnutls-cli --insecure -p 443
> --x509certfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.crt
> --x509keyfile /etc/apt/client-certs/test-client.apt-test.aviatis.com.key
> apt-test.aviatis.com
[...]
> *** Non fatal error: Rehandshake was requested by the peer.
> *** Received rehandshake request
> *** Fatal error: Unsafe renegotiation denied.
> *** Rehandshake Failed.

That sounds to me as though it might be fallout from CVE-2009-3555. I've
reassigned this to gnutls in the hope that one of its maintainers can shed
some light on it - if this isn't gnutls' fault, please reassign or close
as appropriate.

Johannes, how exactly are you running apt-cacher? Is it running as a CGI
or a standalone server or what? Could you publish the configuration of your
(very useful) test server somewhere?

In particular, if Apache is involved in serving the cache, where do the
SSLVerifyClient and SSLCipherSuite directives appear in your server's
configuration, and is it as recommended in
<http://www.debian.org/security/2009/dsa-1934>?

Thanks,
    Simon



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to