mercurial-crecord is marked for autoremoval from testing

2020-08-06 Thread Debian testing autoremoval watch
mercurial-crecord 0.20151121-2 is marked for autoremoval from testing on 
2020-08-21

It is affected by these RC bugs:
804267: mercurial-crecord: remove mercurial-crecord from the archive
 https://bugs.debian.org/804267



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



ident2 is marked for autoremoval from testing

2020-08-06 Thread Debian testing autoremoval watch
ident2 1.07-2 is marked for autoremoval from testing on 2020-08-16

It is affected by these RC bugs:
957356: ident2: ftbfs with GCC-10
 https://bugs.debian.org/957356



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



bandwidthd_2.0.1+cvs20090917-12_source.changes ACCEPTED into unstable

2020-08-06 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 06 Aug 2020 21:45:40 +0100
Source: bandwidthd
Architecture: source
Version: 2.0.1+cvs20090917-12
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Sudip Mukherjee 
Closes: 957034
Changes:
 bandwidthd (2.0.1+cvs20090917-12) unstable; urgency=medium
 .
   * QA upload.
   * Fix ftbfs with GCC-10. (Closes: #957034)
   * Add dependency on lsb-base.
Checksums-Sha1:
 c414fdc50bb4e610ca5985097ab4582dd1c54ed9 1990 
bandwidthd_2.0.1+cvs20090917-12.dsc
 19736b9f780ce2932b7c5bb7a129118b29e30f76 46584 
bandwidthd_2.0.1+cvs20090917-12.debian.tar.xz
 d18a642ec5bf7da3d793b518ca2707af9901c303 8052 
bandwidthd_2.0.1+cvs20090917-12_amd64.buildinfo
Checksums-Sha256:
 c2f35806f9851753af223dd61968587f0cc7492900dd6a529ad1690882f2d22d 1990 
bandwidthd_2.0.1+cvs20090917-12.dsc
 95372fcb76419d34bec9f24d5a4437fd6eadfa0b2d2deb8918979439d1656bdd 46584 
bandwidthd_2.0.1+cvs20090917-12.debian.tar.xz
 55e807596f687d1b96ee4afdadf481aa5d6956a2b6c17fb8437247ce569e1be7 8052 
bandwidthd_2.0.1+cvs20090917-12_amd64.buildinfo
Files:
 3b8aef841b474de9a7a345634b7cfdaa 1990 net optional 
bandwidthd_2.0.1+cvs20090917-12.dsc
 e5625c450df4c9db1cf7360a08f50768 46584 net optional 
bandwidthd_2.0.1+cvs20090917-12.debian.tar.xz
 b7649babb11da93f414a074c1425a376 8052 net optional 
bandwidthd_2.0.1+cvs20090917-12_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEuDQJkCg9jZvBlJrHR5mjUUbRKzUFAl8sbgsACgkQR5mjUUbR
KzWEjQ/+MpAbBmX1edr6VVq5vG9PdlDOGPlReWPHSH0Y+aRoOHrmSwdGkVg+5ue5
vk85ECslFrMvdFMyp+7oIe0GJi8eWnZnfyRx5k24j9jPApxjTElvI5NDSrtvgla2
xjIs2Kzt0LRQguUwHOyc4kVL10yHdDbgV8r9axamATJI8o9qSqAviP9BeBTEHlTr
9BNjvxVBfaqkXd/h4MFRR4tc0XgZJktpVWDvQ2SiNs+MHWMXgCehNVUYeyOE6wEY
zDlzVhNlnRNFShNFr7e+Mxr4M89Nl8xyR08HbD3BaprWVXrkJez4QK6Ccp1U8M1e
yykCl4+99fAlsliBZVQrd9YTeUSD5BQ6+3V9mqx/Mg+XzuxHWNkTsT1h7gcQo/xS
dhuN0aeIeBRCVFwjC63RP4SDFrmfWANKfynpt0XCG7TtHK0x18ucVP0Vg5a1H5iT
adtJOdH+s6I8yNiFIaqnNqSwDW65LqeQbQpMZuJb6iMn5uICm/n+QPp9YNwNisAb
SMGkuPjDKF8SINR9/rZjd5f9E1nUr3/88gtOKYyo+Kilr8+AwvtMSC3BX3+TjWFS
OzriTzpDb7YdnvJ+p4Ug9w64mGd4WvpQD/Ewy6hj6hm0aG5JsGWTKiArlCErj43i
7ulw8y0r3WIMhvLspO4JWxVWNgD2WC4NwYzGt87MOT233Zx56YA=
=uwj5
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of bandwidthd_2.0.1+cvs20090917-12_source.changes

2020-08-06 Thread Debian FTP Masters
bandwidthd_2.0.1+cvs20090917-12_source.changes uploaded successfully to 
localhost
along with the files:
  bandwidthd_2.0.1+cvs20090917-12.dsc
  bandwidthd_2.0.1+cvs20090917-12.debian.tar.xz
  bandwidthd_2.0.1+cvs20090917-12_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#957034: marked as done (bandwidthd: ftbfs with GCC-10)

2020-08-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Aug 2020 21:18:27 +
with message-id 
and subject line Bug#957034: fixed in bandwidthd 2.0.1+cvs20090917-12
has caused the Debian Bug report #957034,
regarding bandwidthd: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957034: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957034
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:bandwidthd
Version: 2.0.1+cvs20090917-11
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/bandwidthd_2.0.1+cvs20090917-11_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
In file included from conf.y:12:
bandwidthd.h:250:17: warning: inline function ‘DstCredit’ declared but never 
defined
  250 | inline void DstCredit(uint32_t ipaddr, unsigned int psize);
  | ^
In file included from conf.y:12:
bandwidthd.h:237:23: warning: inline function ‘FindIp’ declared but never 
defined
  237 | inline struct IPData *FindIp(uint32_t ipaddr);
  |   ^~
bandwidthd.h:234:17: warning: inline function ‘Credit’ declared but never 
defined
  234 | inline void Credit(struct Statistics *Stats, const struct ip *ip);
  | ^~
bandwidthd.h:231:17: warning: inline function ‘IpAddr’ declared but never 
defined
  231 | inline uint32_t IpAddr(unsigned char q1, unsigned char q2, unsigned 
char q3, unsigned char q4);
  | ^~
flex -Pbdconfig_ -s -i -t -I conf.l > conf.l.c
gcc -g -O2  -I/usr/local/include -DHAVE_CONFIG_H -c -o conf.l.o conf.l.c
gcc -Wall -g -O2  -I/usr/local/include -DHAVE_CONFIG_H   -c -o pgsql.o pgsql.c
In file included from pgsql.c:1:
bandwidthd.h:250:17: warning: inline function ‘DstCredit’ declared but never 
defined
  250 | inline void DstCredit(uint32_t ipaddr, unsigned int psize);
  | ^
In file included from pgsql.c:1:
bandwidthd.h:237:23: warning: inline function ‘FindIp’ declared but never 
defined
  237 | inline struct IPData *FindIp(uint32_t ipaddr);
  |   ^~
bandwidthd.h:234:17: warning: inline function ‘Credit’ declared but never 
defined
  234 | inline void Credit(struct Statistics *Stats, const struct ip *ip);
  | ^~
bandwidthd.h:231:17: warning: inline function ‘IpAddr’ declared but never 
defined
  231 | inline uint32_t IpAddr(unsigned char q1, unsigned char q2, unsigned 
char q3, unsigned char q4);
  | ^~
pgsql.c:418:13: warning: ‘pgsqllngjmp’ defined but not used [-Wunused-function]
  418 | static void pgsqllngjmp(int signal)
  | ^~~
gcc -Wall -g -O2  -I/usr/local/include -DHAVE_CONFIG_H   -c -o extensions.o 
extensions.c
In file included from extensions.c:1:
bandwidthd.h:250:17: warning: inline function ‘DstCredit’ declared but never 
defined
  250 | inline void DstCredit(uint32_t ipaddr, unsigned int psize);
  | ^
In file included from extensions.c:1:
bandwidthd.h:237:23: warning: inline function ‘FindIp’ declared but never 
defined
  237 | inline struct IPData *FindIp(uint32_t ipaddr);
  |   ^~
bandwidthd.h:234:17: warning: inline function ‘Credit’ declared but never 
defined
  234 | inline void Credit(struct Statistics *Stats, const struct ip *ip);
  | ^~
bandwidthd.h:231:17: warning: inline function ‘IpAddr’ declared but never 
defined
  231 | 

Bug#966453: Removed package(s) from unstable

2020-08-06 Thread Debian FTP Masters
Version: 0.0~git20160715.0.c6aac99-4+rm

Dear submitter,

as the package golang-github-unknwon-cae has just been removed from the Debian 
archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/966453

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Sean Whitton (the ftpmaster behind the curtain)



Bug#966453: Removed package(s) from unstable

2020-08-06 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:

golang-github-unknwon-cae | 0.0~git20160715.0.c6aac99-4 | source
golang-github-unknwon-cae-dev | 0.0~git20160715.0.c6aac99-4 | all

--- Reason ---
RoQA; Orphaned, open security issues, dead upstream, no rdeps
--

Note that the package(s) have simply been removed from the tag
database and may (or may not) still be in the pool; this is not a bug.
The package(s) will be physically removed automatically when no suite
references them (and in the case of source, when no binary references
it).  Please also remember that the changes have been done on the
master archive and will not propagate to any mirrors until the next
dinstall run at the earliest.

Packages are usually not removed from testing by hand. Testing tracks
unstable and will automatically remove packages which were removed
from unstable when removing them from testing causes no dependency
problems. The release team can force a removal from testing if it is
really needed, please contact them if this should be the case.

We try to close bugs which have been reported against this package
automatically. But please check all old bugs, if they were closed
correctly or should have been re-assigned to another package.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 966...@bugs.debian.org.

The full log for this bug can be viewed at https://bugs.debian.org/966453

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Sean Whitton (the ftpmaster behind the curtain)



Bug#967955: marked as done (golang-github-unknwon-cae: CVE-2020-7664)

2020-08-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Aug 2020 17:19:32 +
with message-id 
and subject line Bug#966453: Removed package(s) from unstable
has caused the Debian Bug report #967955,
regarding golang-github-unknwon-cae: CVE-2020-7664
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
967955: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967955
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-unknwon-cae
Version: 0.0~git20160715.0.c6aac99-4
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for golang-github-unknwon-cae.

CVE-2020-7664[0]:
| In all versions of the package github.com/unknwon/cae/zip, the
| ExtractTo function doesn't securely escape file paths in zip archives
| which include leading or non-leading "..". This allows an attacker to
| add or replace files system-wide.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-7664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7664
[1] https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Version: 0.0~git20160715.0.c6aac99-4+rm

Dear submitter,

as the package golang-github-unknwon-cae has just been removed from the Debian 
archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/966453

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Sean Whitton (the ftpmaster behind the curtain)--- End Message ---


Bug#967956: marked as done (golang-github-unknwon-cae: CVE-2020-7668)

2020-08-06 Thread Debian Bug Tracking System
Your message dated Thu, 06 Aug 2020 17:19:32 +
with message-id 
and subject line Bug#966453: Removed package(s) from unstable
has caused the Debian Bug report #967956,
regarding golang-github-unknwon-cae: CVE-2020-7668
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
967956: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967956
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-unknwon-cae
Version: 0.0~git20160715.0.c6aac99-4
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for golang-github-unknwon-cae.

CVE-2020-7668[0]:
| In all versions of the package github.com/unknwon/cae/tz, the
| ExtractTo function doesn't securely escape file paths in zip archives
| which include leading or non-leading "..". This allows an attacker to
| add or replace files system-wide.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-7668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7668

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Version: 0.0~git20160715.0.c6aac99-4+rm

Dear submitter,

as the package golang-github-unknwon-cae has just been removed from the Debian 
archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/966453

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Sean Whitton (the ftpmaster behind the curtain)--- End Message ---


Offrez-vous le calme, la sérénité et le confort

2020-08-06 Thread RESIDENCE PALM GARDEN
Afin de voir votre message, cliquez sur le lien: 
http://link.pfmorocco.ma/v/443/de86ac2aa9610f177334790c708c69b6cf48e23edc4d8893

Bug#967990: mmorph: Removal of sys_nerr and sys_errlist

2020-08-06 Thread Samuel Thibault
Package: mmorph
Version: 2.3.4.2-17
Severity: important

Hello,

Version 2.32 of glibc will not ship the sys_nerr and sys_errlist symbols any
more.  This package is using them, so will start FTBFS when we upload version
2.32 of glibc.

Samuel



Processed: severity of 804267 is serious

2020-08-06 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 804267 serious
Bug #804267 [mercurial-crecord] mercurial-crecord: remove mercurial-crecord 
from the archive
Severity set to 'serious' from 'normal'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
804267: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804267
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#967983: gsimplecal: Removal of sys/sysctl.h

2020-08-06 Thread Samuel Thibault
Package: gsimplecal
Version: 2.1-1
Severity: important

Hello,

Version 2.32 of glibc will not ship the sysctl() function and the
 header any more. sysctl itself has been deprecated in
Linux and will be removed. This package is using it, so will start FTBFS
when we upload version 2.32 of glibc.

Samuel



Bug#967086: marked as done (Empty pages when authenticated)

2020-08-06 Thread Debian Bug Tracking System
Your message dated Thu, 6 Aug 2020 11:30:38 +0200
with message-id 
and subject line Re: Bug#967086: Empty pages when authenticated
has caused the Debian Bug report #967086,
regarding Empty pages when authenticated
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
967086: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967086
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tracker.debian.org
Severity: important

Dear Maintainer,

tracker.debian.org does not seem to respond or responds always empty
pages (no error) when I use a client certificate.


Cheers,

-- 
Stéphane

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU threads)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Le 06/08/2020 à 10:43, Julien Cristau a écrit :
> tracker.debian.org does not seem to respond or responds always empty
> pages (no error) when I use a client certificate.

 I don't have the issue with my own certificate.

 I see this in the error log:
 [Wed Aug 05 11:17:05.798925 2020] [ssl:error] [pid 31979:tid 
 140564909500160] [client 80.227.5.106:40019] AH02039: Certificate 
 Verification: Error (66): EE certificate key too weak
 [Wed Aug 05 11:59:09.029731 2020] [ssl:error] [pid 31979:tid 
 140565890987776] [client 80.227.5.106:9418] AH02039: Certificate 
 Verification: Error (66): EE certificate key too weak
>>>
>>> This is not my IP address.
>>
>> Looking at your mail headers, I found 152.81.9.54 and I got similar logs:
>> hertzog@ticharich:~$ grep 152.81.9.54 
>> /var/log/apache2/tracker.debian.org-error.log
>> [Thu Aug 06 07:57:16.520838 2020] [ssl:error] [pid 29597:tid 
>> 140564724860672] [client 152.81.9.54:55460] AH02039: Certificate 
>> Verification: Error (66): EE certificate key too weak
>> [Thu Aug 06 07:57:48.093622 2020] [ssl:error] [pid 29597:tid 
>> 140564909500160] [client 152.81.9.54:55462] AH02039: Certificate 
>> Verification: Error (10): certificate has expired
>>
>>> When I first encountered the error, I realised my certificate was
>>> expired. Then, I generated a new certificate. I still get the
>>> undesirable behaviour with the new certificate.
>>
>> I'm not sure what else I can do to help you here. I'm putting DSA in copy
>> in case they know what's going on here. I never had such an issue.
>>
>> Did you drop you old certificate and restart your browser?
>>
> Maybe also provide the output of "openssl x509 -noout -text" on the cert.

Indeed it's weak: RSA 1024.

I used the sso.debian.org portal to generate it.

Oh, I misunderstood the "Enrollment type" and chose medium, which I
guess caused the weak certificate. What's the purpose of this choice?

Anyway, problem solved.


Cheers,

-- 
Stéphane--- End Message ---


Bug#967086: Empty pages when authenticated

2020-08-06 Thread Julien Cristau
On Thu, Aug 06, 2020 at 10:37:27AM +0200, Raphael Hertzog wrote:
> On Thu, 06 Aug 2020, Stéphane Glondu wrote:
> > Le 05/08/2020 à 14:36, Raphael Hertzog a écrit :
> > >> tracker.debian.org does not seem to respond or responds always empty
> > >> pages (no error) when I use a client certificate.
> > > 
> > > I don't have the issue with my own certificate.
> > > 
> > > I see this in the error log:
> > > [Wed Aug 05 11:17:05.798925 2020] [ssl:error] [pid 31979:tid 
> > > 140564909500160] [client 80.227.5.106:40019] AH02039: Certificate 
> > > Verification: Error (66): EE certificate key too weak
> > > [Wed Aug 05 11:59:09.029731 2020] [ssl:error] [pid 31979:tid 
> > > 140565890987776] [client 80.227.5.106:9418] AH02039: Certificate 
> > > Verification: Error (66): EE certificate key too weak
> > 
> > This is not my IP address.
> 
> Looking at your mail headers, I found 152.81.9.54 and I got similar logs:
> hertzog@ticharich:~$ grep 152.81.9.54 
> /var/log/apache2/tracker.debian.org-error.log
> [Thu Aug 06 07:57:16.520838 2020] [ssl:error] [pid 29597:tid 140564724860672] 
> [client 152.81.9.54:55460] AH02039: Certificate Verification: Error (66): EE 
> certificate key too weak
> [Thu Aug 06 07:57:48.093622 2020] [ssl:error] [pid 29597:tid 140564909500160] 
> [client 152.81.9.54:55462] AH02039: Certificate Verification: Error (10): 
> certificate has expired
> 
> > When I first encountered the error, I realised my certificate was
> > expired. Then, I generated a new certificate. I still get the
> > undesirable behaviour with the new certificate.
> 
> I'm not sure what else I can do to help you here. I'm putting DSA in copy
> in case they know what's going on here. I never had such an issue.
> 
> Did you drop you old certificate and restart your browser?
> 
Maybe also provide the output of "openssl x509 -noout -text" on the cert.

Cheers,
Julien



Bug#967086: Empty pages when authenticated

2020-08-06 Thread Raphael Hertzog
On Thu, 06 Aug 2020, Stéphane Glondu wrote:
> Le 05/08/2020 à 14:36, Raphael Hertzog a écrit :
> >> tracker.debian.org does not seem to respond or responds always empty
> >> pages (no error) when I use a client certificate.
> > 
> > I don't have the issue with my own certificate.
> > 
> > I see this in the error log:
> > [Wed Aug 05 11:17:05.798925 2020] [ssl:error] [pid 31979:tid 
> > 140564909500160] [client 80.227.5.106:40019] AH02039: Certificate 
> > Verification: Error (66): EE certificate key too weak
> > [Wed Aug 05 11:59:09.029731 2020] [ssl:error] [pid 31979:tid 
> > 140565890987776] [client 80.227.5.106:9418] AH02039: Certificate 
> > Verification: Error (66): EE certificate key too weak
> 
> This is not my IP address.

Looking at your mail headers, I found 152.81.9.54 and I got similar logs:
hertzog@ticharich:~$ grep 152.81.9.54 
/var/log/apache2/tracker.debian.org-error.log
[Thu Aug 06 07:57:16.520838 2020] [ssl:error] [pid 29597:tid 140564724860672] 
[client 152.81.9.54:55460] AH02039: Certificate Verification: Error (66): EE 
certificate key too weak
[Thu Aug 06 07:57:48.093622 2020] [ssl:error] [pid 29597:tid 140564909500160] 
[client 152.81.9.54:55462] AH02039: Certificate Verification: Error (10): 
certificate has expired

> When I first encountered the error, I realised my certificate was
> expired. Then, I generated a new certificate. I still get the
> undesirable behaviour with the new certificate.

I'm not sure what else I can do to help you here. I'm putting DSA in copy
in case they know what's going on here. I never had such an issue.

Did you drop you old certificate and restart your browser?

Cheers,
-- 
  ⢀⣴⠾⠻⢶⣦⠀   Raphaël Hertzog 
  ⣾⠁⢠⠒⠀⣿⡁
  ⢿⡄⠘⠷⠚⠋The Debian Handbook: https://debian-handbook.info/get/
  ⠈⠳⣄   Debian Long Term Support: https://deb.li/LTS



Bug#967086: Empty pages when authenticated

2020-08-06 Thread Stéphane Glondu
Le 05/08/2020 à 14:36, Raphael Hertzog a écrit :
>> tracker.debian.org does not seem to respond or responds always empty
>> pages (no error) when I use a client certificate.
> 
> I don't have the issue with my own certificate.
> 
> I see this in the error log:
> [Wed Aug 05 11:17:05.798925 2020] [ssl:error] [pid 31979:tid 140564909500160] 
> [client 80.227.5.106:40019] AH02039: Certificate Verification: Error (66): EE 
> certificate key too weak
> [Wed Aug 05 11:59:09.029731 2020] [ssl:error] [pid 31979:tid 140565890987776] 
> [client 80.227.5.106:9418] AH02039: Certificate Verification: Error (66): EE 
> certificate key too weak

This is not my IP address.

> So maybe get a new certificate?

When I first encountered the error, I realised my certificate was
expired. Then, I generated a new certificate. I still get the
undesirable behaviour with the new certificate.


Cheers,

-- 
Stéphane



Bug#966939: marked as done (fdb: FTBFS: dh_sphinxdoc: error: debian/python-fdb-doc/usr/share/doc/python-fdb-doc/html/search.html does not load searchindex.js)

2020-08-06 Thread Debian Bug Tracking System
Your message dated Thu, 6 Aug 2020 09:37:49 +0200
with message-id <20200806073749.GA321521@pisco.westfalen.local>
and subject line Re: fdb: FTBFS: dh_sphinxdoc: error: 
debian/python-fdb-doc/usr/share/doc/python-fdb-doc/html/search.html does not 
load searchindex.js
has caused the Debian Bug report #966939,
regarding fdb: FTBFS: dh_sphinxdoc: error: 
debian/python-fdb-doc/usr/share/doc/python-fdb-doc/html/search.html does not 
load searchindex.js
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
966939: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966939
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: fdb
Version: 2.0.1-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200802 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<>'
> dh_installdocs README.rst
>   install -d debian/python-fdb/usr/share/doc/python-fdb
>   install -d debian/.debhelper/generated/python-fdb
>   cp --reflink=auto -a README.rst 
> debian/python-fdb/usr/share/doc/python-fdb
>   chown -R 0:0 debian/python-fdb/usr/share/doc
>   chmod -R u\+rw,go=rX debian/python-fdb/usr/share/doc
>   install -p -m0644 debian/copyright 
> debian/python-fdb/usr/share/doc/python-fdb/copyright
>   install -d debian/python3-fdb/usr/share/doc/python3-fdb
>   install -d debian/.debhelper/generated/python3-fdb
>   install -p -m0644 debian/copyright 
> debian/python3-fdb/usr/share/doc/python3-fdb/copyright
>   install -d debian/python-fdb-doc/usr/share/doc/python-fdb-doc
>   install -d debian/.debhelper/generated/python-fdb-doc
>   install -p -m0644 debian/copyright 
> debian/python-fdb-doc/usr/share/doc/python-fdb-doc/copyright
>   install -d debian/python-fdb-doc/usr/share/doc-base/
>   install -p -m0644 debian/python-fdb-doc.doc-base 
> debian/python-fdb-doc/usr/share/doc-base/python-fdb-doc
> dh_installdocs --package=python-fdb-doc --doc-main-package=python-fdb-doc html
>   cd 'html/..' && find 'html' \( -type f -or -type l \) -and ! -empty 
> -print0 | LC_ALL=C sort -z | xargs -0 -I {} cp --reflink=auto --parents -dp 
> {} /<>/debian/python-fdb-doc/usr/share/doc/python-fdb-doc
>   chown -R 0:0 debian/python-fdb-doc/usr/share/doc
>   chmod -R u\+rw,go=rX debian/python-fdb-doc/usr/share/doc
>   install -p -m0644 debian/copyright 
> debian/python-fdb-doc/usr/share/doc/python-fdb-doc/copyright
>   install -p -m0644 debian/python-fdb-doc.doc-base 
> debian/python-fdb-doc/usr/share/doc-base/python-fdb-doc
> dh_sphinxdoc --package=python-fdb-doc usr/share/doc/python-fdb-doc/html
> dh_sphinxdoc: error: 
> debian/python-fdb-doc/usr/share/doc/python-fdb-doc/html/search.html does not 
> load searchindex.js
> make[1]: *** [debian/rules:29: override_dh_installdocs] Error 25

The full build log is available from:
   http://qa-logs.debian.net/2020/08/02/fdb_2.0.1-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Version: 2.0.1-2

On Mon, Aug 03, 2020 at 10:50:48AM +0200, Lucas Nussbaum wrote:
> Source: fdb
> Version: 2.0.1-1
> Severity: serious
> Justification: FTBFS on amd64
> Tags: bullseye sid ftbfs
> Usertags: ftbfs-20200802 ftbfs-bullseye
> 
> Hi,
> 
> During a rebuild of all packages in sid, your package failed to build
> on amd64.

This was fixed in my upload yesterday.

Cheers,
Moritz--- End Message ---