[Bug 1864689] Re: openssl in 20.04 can't connect to site that was fine in 19.10 and is fine in Chrome and Firefox

2020-05-18 Thread Dr. Uwe Meyer-Gruhl
This bug affects me too, with a client certificate that now "magically"
does not match the requirements.

Ironically, the error message says only:

OpenSSL error error:140AB18E:SSL routines:SSL_CTX_use_certificate:ca md
too weak, (no key found, wrong pass phrase, or wrong file format?)

although there was no MD5 signature involved at all. So, even when you
know that with OpenSSL 1.1, an "SSL security level" has been introduced,
and that Ubuntu has set that level to 2, it is hard to find that it
deprecates SHA1 now (see
https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set_security_level.html).

Thus, even for more knowledgable people than me this is a major hassle
to find and/or fix. I wonder why Ubuntu has chosen to raise the level
that high considering that the documentation page contains a clear
warning indication:

"WARNING at this time setting the security level higher than 1 for
general internet use is likely to cause considerable interoperability
issues and is not recommended. This is because the SHA1 algorithm is
very widely used in certificates and will be rejected at levels higher
than 1 because it only offers 80 bits of security."

I think that this is an extremely unwise choice for an OS to make.

That being said, here is the fix (also hard to find):

In /etc/ssl/openssl.cnf, add this line before the start of the file:

 openssl_conf = default_conf

At the end of the file, add these lines:

 [default_conf]
 ssl_conf = ssl_sect

 [ssl_sect]
 system_default = system_default_sect

 [system_default_sect]
 CipherString = DEFAULT:@SECLEVEL=1

This will bring down the SSL security level to the former level of 1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864689

Title:
  openssl in 20.04 can't connect to site that was fine in 19.10 and is
  fine in Chrome and Firefox

To manage notifications about this bug go to:
https://bugs.launchpad.net/openssl/+bug/1864689/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872443] Re: /etc/securetty missing: dovecot not working

2020-04-16 Thread Dr. Uwe Meyer-Gruhl
I cannot tell if this is a problem in whatever version of Debian, since
I do not use it.

Even with Ubuntu being derived from Debian at some point between 18.04
where /etc/securetty was delivered with package login and 20.04 where
the whole package is unavailable.

I think that is an interdependence between multiple packages, but I am
not quite in the position to point at where (or even if) the problem
could be fixed in Debian.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872443

Title:
  /etc/securetty missing: dovecot not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1872443/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872550] Re: dovecot snarfing does not work on 20.04

2020-04-14 Thread Dr. Uwe Meyer-Gruhl
Not a bug in Ubuntu

** Changed in: dovecot (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872550

Title:
  dovecot snarfing does not work on 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1872550/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872550] Re: dovecot snarfing does not work on 20.04

2020-04-14 Thread Dr. Uwe Meyer-Gruhl
My bad: It does not work with the current dovecot 2.3.10 from the official 
repos, either.
Thus, it is an upstream bug.

I have found how to solve the problem:

mail_location = mbox:/home/%u/mail/:INBOX=/home/%u/mail/mbox:INDEX=MEMORY
mail_plugins = snarf notify zlib

namespace Snarf {
   prefix = ~~Snarfbox/
   separator = /
   location = mbox:/run/dovecot/empty:INBOX=/var/mail/%u:INDEX=MEMORY
   list = no
   hidden = yes
}

plugin {
   mbox_snarf = /home/%u/mail/mbox
   snarf = ~~Snarfbox/INBOX
}

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872550

Title:
  dovecot snarfing does not work on 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1872550/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872550] [NEW] dovecot snarfing does not work on 20.04

2020-04-13 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

Description:Ubuntu Focal Fossa (development branch)
Release:20.04
Package:dovecot (2.3.7.2-1ubuntu3)

Problem:

When using "snarf", the dovecot version delivered with 20.04 (Focal
Fossa) does not work correctly. Snarfing is used to get new mail from
/var/mail/%u to ~/mail/mbox (INBOX).

Mail content from the incoming mail directory does not get snarfed into
the INBOX. Thus, no new incoming mail is ever detected.

This works fine with 18.04 which employs dovecot 2.2.32.2, but there
seems to be no indication that something changed upstream, so I am at a
loss at what causes this. When I enable debug output, I can even see
that the snarf plugin is active.

When I install older dovecot-core, dovecot-popd3d and dovecot-imapd from
18.04 into 20.04, everything works as usual.

The relevant portion of my configuration is:


mail_location = mbox:~/mail/:INBOX=~/mail/mbox:INDEX=MEMORY
mail_plugins = snarf notify zlib

namespace snarf {
   prefix = ~~snarf/
   separator = /
   location = mbox:/run/dovecot/empty:INBOX=/var/mail/%u:INDEX=MEMORY
   list = no
   hidden = yes
}

plugin {
   snarf = ~~snarf/INBOX
}

** Affects: dovecot (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: dovecot snarf

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872550

Title:
  dovecot snarfing does not work on 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1872550/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872443] Re: /etc/securetty missing: dovecot not working

2020-04-13 Thread Dr. Uwe Meyer-Gruhl
At least, in 18.04, the file /etc/securetty was in package login...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872443

Title:
  /etc/securetty missing: dovecot not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1872443/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872443] [NEW] /etc/securetty missing: dovecot not working

2020-04-13 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

With Ubuntu 20.04 Focal Fossa, /etc/securetty is missing from the
"login" package (4.8.1-1ubuntu4).

This leads to errors such as in /var/log/mail.log when a dovecot auth is
tried:

Apr 13 13:08:17 venus dovecot[10588]: imap-login: Login: user=, 
method=PLAIN,
rip=192.168.123.1, lip=192.168.123.188, mpid=12200, TLS, TLSv1.2 with cipher 
ECDHE-E
CDSA-AES256-GCM-SHA384 (256/256 bits)
Apr 13 13:08:18 venus auth[12195]: pam_unix(dovecot:auth): Couldn't open 
/etc/secure
tty: No such file or directory
Apr 13 13:08:18 venus auth[12195]: pam_unix(dovecot:auth): Couldn't open 
/etc/secure
tty: No such file or directory
Apr 13 13:08:18 venus dovecot[10588]: imap-login: Login: user=, 
method=PLAIN,
rip=192.168.123.1, lip=192.168.123.188, mpid=12202, TLS, TLSv1.2 with cipher 
ECDHE-E
CDSA-AES256-GCM-SHA384 (256/256 bits)

It seems that pam_unix still needs /etc/securetty, but login no longer
provides it.

There was a similar bug in debian that seems to be related:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931899

To my understanding, this is a problem between pam and login packages in
20.04.

** Affects: shadow (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: dovecot login pam securetty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872443

Title:
  /etc/securetty missing: dovecot not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1872443/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872288] Re: Focal Fossa: postfix configure-instance script typos

2020-04-12 Thread Dr. Uwe Meyer-Gruhl
I hope that the upstream patch will be in time for Focal Fossa
finalisation.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872288

Title:
  Focal Fossa: postfix configure-instance script typos

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/1872288/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872288] [NEW] Focal Fossa: postfix configure-instance script typos

2020-04-12 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

Description:Ubuntu Focal Fossa (development branch)
Release:20.04

Postfix 3.4.10-1


There are some typos that have crept into 
/usr/lib/postfix/configure-instance.sh which keep the postfix chroot 
environment from working.

In the script, there are two sections that copy the SSL certificate
paths (often /etc/ssl/certs) into the chroot environment
(/var/spool/postscript). This is needed for any chrooted postfix daemon
to find the CA certificates.

If "smtp_tls_CApath" is not copied to /var/spool/postfix, you will
experience errors like:

Apr 12 12:27:44 venus postfix/smtp[23477]: certificate verification failed for 
mx.xyz.de[8.8.8.8]:587: untrusted issuer /O=Digital Signature Trust Co./CN=DST 
Root CA X3
Apr 12 12:27:44 venus postfix/smtp[23477]: 529761C123E: to=, 
relay=mx.xyz.de[8.8.8.8]:587, delay=4024, delays=4024/0.02/0.11/0, dsn=4.7.5, 
status=deferred (Server certificate not trusted)

This is rendering TLS essentially unusable.

At the start of each section, a variable named "ca_path" ist defined and
should be used thereafter. Alas, the variable is misspelled "sca_path"
throughout the first section (starting at line 47) and "dca_path"
throughout the second section (starting at line 79). This results in the
certificates not being copied.

** Affects: postfix (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: chroot postfix tls

** Patch added: "Patch for /usr/lib/postfix/configure-instance.sh (Focal Fossa 
20.04)"
   
https://bugs.launchpad.net/bugs/1872288/+attachment/5352447/+files/configure-instance.sh.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872288

Title:
  Focal Fossa: postfix configure-instance script typos

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/1872288/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867784] Re: "systemctl status ..." in Focal does not show any process output

2020-03-17 Thread Dr. Uwe Meyer-Gruhl
Never mind. My fault. The journal was gone, so nothing could be shown.

** Changed in: systemd (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867784

Title:
  "systemctl status ..." in Focal does not show any process output

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1867784/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1867784] [NEW] "systemctl status ..." in Focal does not show any process output

2020-03-17 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

Software versions:

# lsb_release -rd
Description:Ubuntu Focal Fossa (development branch)
Release:20.04
# apt-cache policy systemd
systemd:
  Installed: 244.3-1ubuntu1
  Candidate: 244.3-1ubuntu1
  Version table:
 *** 244.3-1ubuntu1 500
500 http://de.archive.ubuntu.com/ubuntu focal/main amd64 Packages
100 /var/lib/dpkg/status


When I issue "systemctl status apache2" (or for any other service for that 
matter) in Focal, the last few lines of output are not shown any more:

# systemctl status apache2
● apache2.service - The Apache HTTP Server
 Loaded: loaded (/lib/systemd/system/apache2.service; enabled; vendor prese>
Drop-In: /etc/systemd/system/apache2.service.d
 └─override.conf
 Active: active (running) since Tue 2020-03-17 13:34:42 CET; 1h 43min ago
   Docs: https://httpd.apache.org/docs/2.4/
   Main PID: 283994 (apache2)
  Tasks: 55 (limit: 9451)
 Memory: 27.3M
 CGroup: /system.slice/apache2.service
 ├─283994 /usr/sbin/apache2 -k start
 ├─283997 /usr/sbin/apache2 -k start
 └─283998 /usr/sbin/apache2 -k start
#


With Bionic (18.04), the last few log lines were shown as described in the 
systemctl man page:

#systemctl status apache2
● apache2.service - The Apache HTTP Server
   Loaded: loaded (/lib/systemd/system/apache2.service; enabled; vendor preset: 
enab
  Drop-In: /lib/systemd/system/apache2.service.d
   └─apache2-systemd.conf
/etc/systemd/system/apache2.service.d
   └─override.conf
   Active: active (running) since Tue 2020-03-03 23:01:13 CET; 1 weeks 6 days 
ago
  Process: 1255 ExecReload=/usr/sbin/apachectl graceful (code=exited, 
status=0/SUCCE
 Main PID: 11522 (/usr/sbin/apach)
Tasks: 15 (limit: 4915)
   CGroup: /system.slice/apache2.service
   ├─ 1280 /usr/sbin/apache2 -k start
   ├─ 6459 /usr/sbin/apache2 -k start
   └─11522 /usr/sbin/apache2 -k start

Mar 13 06:25:27 fatty.xy.de systemd[1]: Reloading The Apache HTTP Server.
Mar 13 06:25:27 fatty.xy.de systemd[1]: Reloaded The Apache HTTP Server.
Mar 14 06:25:27 fatty.xy.de systemd[1]: Reloading The Apache HTTP Server.
Mar 14 06:25:27 fatty.xy.de systemd[1]: Reloaded The Apache HTTP Server.
Mar 15 06:25:27 fatty.xy.de systemd[1]: Reloading The Apache HTTP Server.
Mar 15 06:25:27 fatty.xy.de systemd[1]: Reloaded The Apache HTTP Server.
Mar 16 06:25:28 fatty.xy.de systemd[1]: Reloading The Apache HTTP Server.
Mar 16 06:25:28 fatty.xy.de systemd[1]: Reloaded The Apache HTTP Server.
Mar 17 06:25:27 fatty.xy.de systemd[1]: Reloading The Apache HTTP Server.
Mar 17 06:25:27 fatty.xy.de systemd[1]: Reloaded The Apache HTTP Server.
#


I do not know if this was an upstream systemd change, however it seems wrong.

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: focal status systemd

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867784

Title:
  "systemctl status ..." in Focal does not show any process output

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1867784/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1865204] Re: Multiple packages broke with openssl 1.1.1 upgrade

2020-02-29 Thread Dr. Uwe Meyer-Gruhl
** Description changed:

  While I welcome the adding of security features by upgrading vital packages 
like openssl,
  there are at least two packages that I know of which ran fine with libssl 
1.1.0 and do not with libssl 1.1.1. This bug has been introduced with the 
migration from openssl 1.1.0 to 1.1.1 in one of the last point releases.
- 
  
  1. stunnel4 3:5.44-1ubuntu3
  
  stunnel4 breaks with openssl 1.1.1 (which supports TLS 1.3).
  
  I get errors when a Windows stunnel client connects to the stunnel4
  daemon:
  
  Feb 20 14:10:03 peterpan.neverland stunnel[24427]: LOG3[0]: s_connect: 
connect ::1:3128
  : Connection refused (111)
  
  This can be fixed when I manually add "MaxProtocol = TLSv1.2" to
  /etc/ssl/openssl.conf, showing that TLS 1.3 introduced by openssl 1.1.1
  is the culprit.
  
  stunnel4 needs an update. At least for stunnel4, another fix would be to
  specify "sslVersion = TLSv1.2" in its config file.
  
- 
  2. pure-ftpd 1.0.46-1build1
  
  Same thing here. You cannot connect once you use "tls=2" or higher if
  openssl 1.1.1 with TLS 1.3 is active. Only fix here I found is to limit
- the max protocol. pure-ftpd itself has no means of solving that problem,
- at least not in the bionic version.
+ the max protocol in openssl for all applications. pure-ftpd itself has
+ no means of controlling the TLS version, at least not in the bionic
+ version of it.
+ 
+ I use Ubuntu Server 18.04.04 LTS, BTW and openssl was
+ 1.1.1-1ubuntu2.1~18.04.5.
  
  
- I use Ubuntu Server 18.04.04 LTS, BTW and openssl was 
1.1.1-1ubuntu2.1~18.04.5.
+ Both problems could be fixed by backporting stunnel4 and pure-ftpd packages 
from Focal Fossa.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865204

Title:
  Multiple packages broke with openssl 1.1.1 upgrade

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1865204/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1865204] [NEW] Multiple packages broke with openssl 1.1.1 upgrade

2020-02-28 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

While I welcome the adding of security features by upgrading vital packages 
like openssl,
there are at least two packages that I know of which ran fine with libssl 1.1.0 
and do not with libssl 1.1.1. This bug has been introduced with the migration 
from openssl 1.1.0 to 1.1.1 in one of the last point releases.


1. stunnel4 3:5.44-1ubuntu3

stunnel4 breaks with openssl 1.1.1 (which supports TLS 1.3).

I get errors when a Windows stunnel client connects to the stunnel4
daemon:

Feb 20 14:10:03 peterpan.neverland stunnel[24427]: LOG3[0]: s_connect: connect 
::1:3128
: Connection refused (111)

This can be fixed when I manually add "MaxProtocol = TLSv1.2" to
/etc/ssl/openssl.conf, showing that TLS 1.3 introduced by openssl 1.1.1
is the culprit.

stunnel4 needs an update. At least for stunnel4, another fix would be to
specify "sslVersion = TLSv1.2" in its config file.


2. pure-ftpd 1.0.46-1build1

Same thing here. You cannot connect once you use "tls=2" or higher if
openssl 1.1.1 with TLS 1.3 is active. Only fix here I found is to limit
the max protocol. pure-ftpd itself has no means of solving that problem,
at least not in the bionic version.


I use Ubuntu Server 18.04.04 LTS, BTW and openssl was 1.1.1-1ubuntu2.1~18.04.5.

** Affects: openssl (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865204

Title:
  Multiple packages broke with openssl 1.1.1 upgrade

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1865204/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1864035] [NEW] stunnel4 breaks with openssl 1.1.1

2020-02-20 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

stunnel4 breaks with openssl 1.1.1 which supports TLS 1.3. This bug has
been introduced with the migration from openssl 1.1.0 in one of the last
point releases.

I get errors when a Windows stunnel client connects to the stunnel4
daemon:

Feb 20 14:10:03 peterpan.neverland stunnel[24427]: LOG3[0]: s_connect: connect 
::1:3128
: Connection refused (111)

This can be fixed when I manually add "MaxProtocol = TLSv1.2" to
/etc/ssl/openssl.conf, showing that TLS 1.3 introduced by openssl 1.1.1
is the culprit.

Probably stunnel4 needs an update.

** Affects: stunnel4 (Ubuntu)
 Importance: Undecided
 Status: New

** Project changed: launchpad => stunnel4 (Ubuntu)

** Summary changed:

- stunnel breaks with openssl 1.1.1
+ stunnel4 breaks with openssl 1.1.1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864035

Title:
  stunnel4 breaks with openssl 1.1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/stunnel4/+bug/1864035/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] PciMultimedia.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "PciMultimedia.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303083/+files/PciMultimedia.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] UdevDb.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1851382/+attachment/5303088/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] CurrentDmesg.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303081/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] WifiSyslog.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303089/+files/WifiSyslog.txt

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] ProcInterrupts.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303086/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] Lspci.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1851382/+attachment/5303082/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] ProcEnviron.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303085/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] ProcCpuinfoMinimal.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303084/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] Re: Missing modules for cryptography and NFSv4

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Tags added: apport-collected bionic

** Description changed:

  There are two essential kernel modules that are missing from some linux
  kernel packages under Ubuntu Server 18.04 LTS:
  
  nfsv4.ko and aes-x86_64.ko (matter-of-fact any crypto module)
  
  I found them both missing in linux-kvm and nfsv4.ko missing in linux-
  generic - both are present in linux-generic-hwe-18.04.
  
  
  The use cases for these are not far-fetched:
  
  In an Ubuntu KVM guest, I often need virtual disks that I can encrypt
  via LUKS in order to protect them (somewhat). Obviously, this is not
  possible without the crypto modules, which are not present in the KVM-
  specialised kernel package 'linux-kvm'.
  
  On the other hand, when I want to mount NFS storage, I cannot use NFSv4,
  which is the preferred way of doing it when you need firewalling. Why
  this fails is not at all obvious, since the use-level "mount.nfs4" is
  present, but only gives cryptic messages, not showing that a kernel
  module is missing.
  
  And even with the default kernel (linux-generic), which has some more
  modules, NFSv4 client support is missing.
  
- Do I really have to use linux-generic-hwe-18.04 for that? It seems a bit
- much.
+ Do I really have to use linux-generic-hwe-18.04 for that? It seems a bit much.
+ --- 
+ ProblemType: Bug
+ AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 
2: ls: cannot access '/dev/snd/': No such file or directory
+ AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
+ ApportVersion: 2.20.9-0ubuntu7.9
+ Architecture: amd64
+ ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
+ CRDA: N/A
+ DistroRelease: Ubuntu 18.04
+ HibernationDevice: RESUME=/dev/mapper/unifi--vg-swap_1
+ InstallationDate: Installed on 2017-02-11 (996 days ago)
+ InstallationMedia: Ubuntu-Server 16.04.1 LTS "Xenial Xerus" - Release amd64 
(20160719)
+ IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
+ Lsusb: Error: command ['lsusb'] failed with exit code 1:
+ MachineType: QEMU Standard PC (i440FX + PIIX, 1996)
+ Package: linux (not installed)
+ ProcFB: Error: [Errno 2] No such file or directory: '/proc/fb'
+ ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-1048-kvm 
root=/dev/mapper/hostname--vg-root ro net.ifnames=0 biosdevname=0
+ ProcVersionSignature: Ubuntu 4.15.0-1048.48-kvm 4.15.18
+ RelatedPackageVersions:
+  linux-restricted-modules-4.15.0-1048-kvm N/A
+  linux-backports-modules-4.15.0-1048-kvm  N/A
+  linux-firmware   1.173.9
+ RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
+ Tags:  bionic
+ Uname: Linux 4.15.0-1048-kvm x86_64
+ UnreportableReason: This report is about a package that is not installed.
+ UpgradeStatus: Upgraded to bionic on 2019-06-22 (136 days ago)
+ UserGroups:
+  
+ _MarkForUpload: False
+ dmi.bios.date: 04/01/2014
+ dmi.bios.vendor: SeaBIOS
+ dmi.bios.version: 1.10.2-1ubuntu1
+ dmi.chassis.type: 1
+ dmi.chassis.vendor: QEMU
+ dmi.chassis.version: pc-i440fx-xenial
+ dmi.modalias: 
dmi:bvnSeaBIOS:bvr1.10.2-1ubuntu1:bd04/01/2014:svnQEMU:pnStandardPC(i440FX+PIIX,1996):pvrpc-i440fx-xenial:cvnQEMU:ct1:cvrpc-i440fx-xenial:
+ dmi.product.name: Standard PC (i440FX + PIIX, 1996)
+ dmi.product.version: pc-i440fx-xenial
+ dmi.sys.vendor: QEMU

** Attachment added: "AudioDevicesInUse.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303080/+files/AudioDevicesInUse.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] ProcModules.txt

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1851382/+attachment/5303087/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1851382] [NEW] Missing modules for cryptography and NFSv4

2019-11-05 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

There are two essential kernel modules that are missing from some linux
kernel packages under Ubuntu Server 18.04 LTS:

nfsv4.ko and aes-x86_64.ko (matter-of-fact any crypto module)

I found them both missing in linux-kvm and nfsv4.ko missing in linux-
generic - both are present in linux-generic-hwe-18.04.


The use cases for these are not far-fetched:

In an Ubuntu KVM guest, I often need virtual disks that I can encrypt
via LUKS in order to protect them (somewhat). Obviously, this is not
possible without the crypto modules, which are not present in the KVM-
specialised kernel package 'linux-kvm'.

On the other hand, when I want to mount NFS storage, I cannot use NFSv4,
which is the preferred way of doing it when you need firewalling. Why
this fails is not at all obvious, since the use-level "mount.nfs4" is
present, but only gives cryptic messages, not showing that a kernel
module is missing.

And even with the default kernel (linux-generic), which has some more
modules, NFSv4 client support is missing.

Do I really have to use linux-generic-hwe-18.04 for that? It seems a bit
much.

** Affects: linux-meta (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: crypto nfsv4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851382

Title:
  Missing modules for cryptography and NFSv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta/+bug/1851382/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1797386] Re: [SRU] OpenSSL 1.1.1 to 18.04 LTS

2019-03-10 Thread Dr. Uwe Meyer-Gruhl
Hi,

good idea in theory, but I want to add my 2cents: Please coordinate this
update with ALL affected packages, like apache2 and nginx.

My reason is:

I just tried the PPA and found that nginx works with TLS 1.3 after that
right out of the box.

HOWEVER, there is a problem: openssl 1.1.1 has changed the way the
cipher suites are configured - the ones for TLS 1.3 are configured
separately, see here:

https://github.com/openssl/openssl/commit/f865b08143b453962ad4afccd69e698d13c60f77

Nginx on the other hand has chosen to not support that new configuration
at all, see:

https://trac.nginx.org/nginx/ticket/1529

That means that the predefined order of TLS 1.3 is:

TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256

and cannot be changed - it took me hours to find that out since the
Nginx 1.15 documentation does not tell you that the TLS 1.3 ciphers
cannot be changed by ssl_ciphers, but are silently ignored.


The default set and order of ciphersuites may suit your needs or not -
matter-of-fact it makes my SSLLabs score worse because of the AES128
cipher used. I have tried to apply othe defaults in
/etc/ssl/openssl.conf but they do not seem to work for nginx. Neither
could I just disable TLS 1.3 in order to restore the old behaviour other
than to restore OpenSSL 1.1.0 by using "ppa-purge ppa:ci-train-ppa-
service/3473".


King regards,


Uwe


** Bug watch added: trac.nginx.org/nginx/ #1529
   http://trac.nginx.org/nginx/ticket/1529

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1797386

Title:
  [SRU] OpenSSL 1.1.1 to 18.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1797386/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1774141] [NEW] (In)compatibility library libcurl3

2018-05-30 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

With Bionic (18.04), libcurl4 is the standard, libcurl3 seems to be a
compatibility library.

However, libcurl3 and libcurl4 can not be installed together, presumably
because of some obscure dependencies in the packages. These dependencies
are, however, unneccessary, because the shared libraries have different
names.

Alas, since the package curl itself relies on libcurl4, installing
libcurl3 removes curl. For example, installing Domoticz and other
external tools need libcurl3 and thus remove curl support.

If the dependencies between libcurl3 and 4 were corrected in Bionic,
this could easily be fixed.

** Affects: curl3 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: 18.04 bionic dependency

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1774141

Title:
  (In)compatibility library libcurl3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curl3/+bug/1774141/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1566542] Re: [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable for VNC / option "hideshell" buggy

2016-08-23 Thread Dr. Uwe Meyer-Gruhl
There is an even better fix, however, something like this should be
included in the Ubuntu documentation for x11vnc as it is far from
obvious...

One can put something like this into /usr/share/sddm/scripts/Xsetup:

/usr/bin/x11vnc -rfbauth /etc/vncpasswd -rfbport 5943 -reopen -forever &

Explanation: $XAUTHORITY and $DISPLAY are set with Xsetup script.

The reason being given for the unpredictable xauth name is that sddm
should be able to handle multi-seat. I sets $XAUTHORITY and $DISPLAY for
all dependend children, such as /usr/share/sddm/scripts/Xsetup.

In order to start x11vnc, one should include it in Xsetup instead of
establishing an independend service in systemd (since x11vnc depends on
the real X server, anyway, which in turn is started/controlled by sddm).


** Bug watch added: github.com/sddm/sddm/issues #622
   https://github.com/sddm/sddm/issues/622

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1566542

Title:
  [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable
  for VNC / option "hideshell" buggy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sddm/+bug/1566542/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1566542] Re: [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable for VNC / option "hideshell" buggy

2016-08-23 Thread Dr. Uwe Meyer-Gruhl
Oh, and BTW: There will be no upstream fix for this, see:
https://github.com/sddm/sddm/issues/622

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1566542

Title:
  [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable
  for VNC / option "hideshell" buggy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sddm/+bug/1566542/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1566542] Re: [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable for VNC / option "hideshell" buggy

2016-04-09 Thread Dr. Uwe Meyer-Gruhl
The versions are correct.


I doubt that the update of x11vnc would change anything with regard to the 
interoperability issue.

As a workaround for that, I resorted to use:

ExecStart=/bin/sh -c '/usr/bin/x11vnc -auth /var/run/sddm/* -display :0
-rfbauth /etc/vncpasswd -rfbport 5943 -reopen -forever'

in /etc/systemd/system/x11vnc. It would not work if more than one X
display is in use.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1566542

Title:
  [upstream] Two sddm bugs with 16.04 – MIT-Magic cookie unpredictable
  for VNC / option "hideshell" buggy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sddm/+bug/1566542/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1566542] [NEW] Two sddm bugs with 16.04

2016-04-05 Thread Dr. Uwe Meyer-Gruhl
Public bug reported:

SDDM with 16.04 LTS introduces two new problems that did not exist with
15.10 or 14.04:

1. The option HideShells in /etc/sddm.conf does not work correctly. When
more than one shell is specified, the filter does not work and the
matching users are listed in the greeting screen notwithstanding.

2. The xauthority (or MIT-MAGIC-COOKIE) file is no longer at
/var/run/sddm/:0 but at an unpredictable location like
/var/run/sddm/{ca7d6d45-9b4d-4a92-997e-c9c11081dea1} which is build by
including a random UUID in the path. When trying to start x11vnc, for
example, that file cannot be found. With 15.10, one could start x11vnc
with '/usr/bin/x11vnc -auth /var/run/sddm/:0 -display :0 -rfbauth
/etc/vncpasswd -rfbport 5943 -reopen -forever', this is no longer
possible.

Especially the second bug is uncool with Ubuntu server for remote root
servers.

** Affects: sddm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: sddm x11vnc xauth

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1566542

Title:
  Two sddm bugs with 16.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sddm/+bug/1566542/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs