Your message dated Mon, 26 Aug 2019 20:45:00 +0000
with message-id <e1i2lri-000h3t...@fasolo.debian.org>
and subject line Bug#926933: fixed in debian-edu-config 2.10.65+deb10u1
has caused the Debian Bug report #926933,
regarding fetch-ldap-cert fails against LDAP cert on jessie tjener
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926933: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926933
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: debian-edu-config
Version: 2.10.64
Severity: important

I just tested a Debian Edu 10 installation against a Debian Edu 8 TJENER. The LDAP certificate on the jessie TJENER had been created wrongly (subject: CN=localhost, issuer: CN=localhost).

The new gnutls-cli implemenation in fetch-ldap-cert now chokes on that with this error:

```
gnutls-cli --x509cafile /etc/ssl/certs/debian-edu-bundle.crt --save-cert=/etc/ssl/certs/debian-edu-server.crt.new ldap.intern

[...]

Status: The certificate is NOT trusted. The certificate issuer is unknown. The name in the certificate does not match the expected.
```

This probably needs to be addressed by documentation.

Mike
--

DAS-NETZWERKTEAM
c\o Technik- und Ökologiezentrum Eckernförde
Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de

Attachment: pgp5X51FZK1Ti.pgp
Description: Digitale PGP-Signatur


--- End Message ---
--- Begin Message ---
Source: debian-edu-config
Source-Version: 2.10.65+deb10u1

We believe that the bug you reported is fixed in the latest version of
debian-edu-config, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mike Gabriel <sunwea...@debian.org> (supplier of updated debian-edu-config 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 26 Aug 2019 20:14:26 +0200
Source: debian-edu-config
Architecture: source
Version: 2.10.65+deb10u1
Distribution: buster
Urgency: medium
Maintainer: Debian Edu Developers <debian-edu@lists.debian.org>
Changed-By: Mike Gabriel <sunwea...@debian.org>
Closes: 926933 928756 929964 930122 931366 931413 931680 932828 933183 933580 
934380
Changes:
 debian-edu-config (2.10.65+deb10u1) buster; urgency=medium
 .
   [ Wolfgang Schweer ]
   * Adjust ltsp-build-client/Debian-custom/001-ltsp-setting. (Closes: #928756)
     - Use PXE option 'ipappend 2' for LTSP client boot. This option makes sure
       that all DHCP server information is getting through to LTSP clients.
       (LTSP used this option before, but switched to 'ipappend 3' during the
       Buster development cycle to ease setups with ProxyDHCP.)
   * Adjust share/debian-edu-config/sudo-ldap.conf. (Closes: #929964)
     - Fix sudo-ldap configuration. (The LDAP URI is needed on LDAP clients.)
   * Set environment variable to deal with Firefox profile. (Closes: #930122)
     This is a workaround for bug #930125, preventing firefox-esr startup issues
     if the mozilla profile is on an NFS share).
     - Ship share/debian-edu-config/edu-firefox-nfs with NSS_SDB_USE_CACHE="yes"
       as content. Thanks to Mike Gabriel for spotting the issue and providing
       this information.
     - Add instructions to cf3/cf.workarounds to link the 'edu-firefox-nfs' file
       to appropriate files below '/etc/X11/Xsession.d' and '/etc/profile.d'.
   * Adjust cf3/cf.homes: Set correct LTSP chroot path. (Closes: #931680)
     - While the reported arch is i686, LTSP uses i386. Set arch accordingly.
   * Adjust share/debian-edu-config/tools/kerberos-kdc-init. (Closes: #931366)
     - Remove outdated (and now wrong) logging section.
   * Fix loss of dynamically allocated v4 IP address. (Closes: #933580)
     - Drop etc/network/if-up.d/hostname. This script doesn't work anymore due
       to changed behaviour of the ifupdown/dhclient/systemd combination and now
       also causes the loss of a dynamically allocated ipv4 IP address after 20
       to 30 minutes after booting.
     - Add code to d/debian-edu-config.postinstall to implement the intended
       hostname update just after rebooting the system after a change.
     - Adjust Makefile.
   * Provide Debian Edu RootCA certificate for download. (Closes: #933183)
     - Adjust share/debian-edu-config/tools/create-debian-edu-certs to copy the
       rootCA file to the web server directory at certificate generation time.
     - Adjust cf3/cf.finalize to care for the rootCA file as well.
     - Adjust cf3/cf.workarounds to copy the rootCA file to the web server
       directory upon main server upgrade.
   * Add LDAP server certificate to the initial LTSP NBD image. (Closes: 
#932828)
     - etc/ltsp/ltsp-build-client.conf: Don't create the image by default.
     - cf3/edu.cf: Define new class 'ltspimages'.
     - cf3/cf.finalize: Add code to include the LDAP server certificate for all
       possible use cases, to generate the image and to adjust various rights.
   * Changes to debian-edu-config.fetch-ldap-cert from 2.10.67).
     - Use independent conditions to make sure that the LDAP server certificate
       is only downloaded once for both host and LTSP chroot. (Closes: #934380)
     - Add code to validate the LDAP server certificate in case the Debian Edu
       RootCA certificate is available for download.
 .
   [ Mike Gabriel ]
   * Changes to debian-edu-config.fetch-ldap-cert (from 2.10.66):
     - Make the script (and with it Debian Edu buster workstations) work in a
       Debian Edu environment where the main server (TJENER) is still on Debian
       Edu 8 or 9. (Closes: #926933)
     - Retrieve TJENER's PKI server certificate only once per host to improve
       security. This re-introduces the behaviour of fetch-ldap-cert in stretch
       and earlier. (Closes: #931413).
   * Changes to debian-edu-config.fetch-ldap-cert (from 2.10.67):
     - White-space-only change: Fix broken and inconsistent indentations.
     - Fully inline-document fetch-ldap-cert script.
     - Add "-f" option to all curl calls that don't have it set so far.
       This assures that curl bails out with a non-zero exit code, if anything
       goes wrong while retrieving certificate files.
     - Also report a successful certificate verification if we verified the
       LDAP server certificate using the Debian Edu RootCA.
     - Really check that the LDAP server uses a certificate issued by the
       "Debian Edu RootCA", not just by (some) "RootCA".
     - Add 2x FIXME about BUNDLECRT file removal from host and from LTSP 
chroots.
     - LTSP chroot certificate copying: only log those actions, if they are
       actually about to happen..
     - Silence curl stderr and gnutls-cli stdout+stderr.
     - Certificate retrieval: Fix upgrade path for RootCA deployment. Re-run
       CERTFILE (and ROOTCACRT retrieval) until we have both on the client.
       This will lead to repetitive downloads of the CERTFILE on system boot.
       To get rid of this, people must upgrade their TJENERs from Debian Edu
       10.0 to 10.1. Then it will stop. This hack is necessary to assure
       distribution of the RootCA to all clients that don't have it, yet.
     - Detach dependency of ROOTCACRT chroot copying and BUNDLECRT chroot
       copying from chroot copying of the CERTFILE. The chroot may have the
       CERTFILE, but not the ROOTCACRT, yet. This assures a smooth upgrade
       path from Debian Edu 10.0 to Debian Edu 10.1.
     - Do a simple validity check if a directory under /opt/ltsp really is
       a chroot (and e.g. not the SquashFS images' directory).
Checksums-Sha1:
 b607dc7c6bbebfac539d247d0ed0f44fa21f9aa8 1979 
debian-edu-config_2.10.65+deb10u1.dsc
 9dbd2f6629a2582012d38990fa79aca5341c2581 345200 
debian-edu-config_2.10.65+deb10u1.tar.xz
 a6c2cdf305c8f044a8bfa713172184e9f9fd738e 6268 
debian-edu-config_2.10.65+deb10u1_source.buildinfo
Checksums-Sha256:
 0835ba945745662431a159177d3b523a1282e15a89648b52094a31d8480a0245 1979 
debian-edu-config_2.10.65+deb10u1.dsc
 0309a33dbf4c5ee6fe6c41fcb37b189f63c28788f5777237c64fc89d439d3bf8 345200 
debian-edu-config_2.10.65+deb10u1.tar.xz
 87c384785f4d80d00083de666a3feff6399f37e7d0bd554f3017923af116d9d6 6268 
debian-edu-config_2.10.65+deb10u1_source.buildinfo
Files:
 71346dbd768946f9e70480b6f81fb492 1979 misc optional 
debian-edu-config_2.10.65+deb10u1.dsc
 49104c49362dc4d406782f6f359aab7b 345200 misc optional 
debian-edu-config_2.10.65+deb10u1.tar.xz
 63cf6b6c00ba8f68207f7b6bf8165677 6268 misc optional 
debian-edu-config_2.10.65+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=EjMw
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to