Hi, Please unblock gnutls26/2.4.2-5 (and probably bump its urgency to be in time).
It fixes release critical bug #509593. I've explained in the bug log why I think this should indeed be fixed before the release: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509593#37 but to summarise: the problem is that there are major CA's with a V1 cert in their chain, and the problem is not it being disabled by default but the inability to enable it back for those that need to work with these certificates, thus making it completely impossible to use gnutls-enabled services with such a chain. thanks, Thijs -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org