Your message dated Thu, 22 Feb 2018 10:06:22 +0000
with message-id <e1eonle-000agk...@fasolo.debian.org>
and subject line Bug#828557: fixed in sslsniff 0.8-7
has caused the Debian Bug report #828557,
regarding sslsniff: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
828557: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828557
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: sslsniff
Version: 0.8-4.2
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/sslsniff_0.8-4.2_amd64-20160529-1540

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: sslsniff
Source-Version: 0.8-7

We believe that the bug you reported is fixed in the latest version of
sslsniff, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 828...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphaël Hertzog <hert...@debian.org> (supplier of updated sslsniff package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 22 Feb 2018 10:40:16 +0100
Source: sslsniff
Binary: sslsniff
Architecture: source
Version: 0.8-7
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools Packaging Team 
<pkg-security-t...@lists.alioth.debian.org>
Changed-By: Raphaël Hertzog <hert...@debian.org>
Description:
 sslsniff   - SSL/TLS man-in-the-middle attack tool
Closes: 828557
Changes:
 sslsniff (0.8-7) unstable; urgency=medium
 .
   * Add patch to build against openssl 1.1. Closes: #828557
     Thanks to Hilko Bengen <ben...@debian.org> for the patch.
   * Update Build-Depends to build against openssl 1.1.
   * Switch to debhelper compat level 11.
   * Change priority to optional.
   * Bump Standards-Version to 4.1.3.
   * Update Vcs-* fields for move to salsa.debian.org.
Checksums-Sha1:
 daa864d5ef4a09c574de57eb27fe604811c48083 1759 sslsniff_0.8-7.dsc
 88338144f159519941ce54c8ce21a44ef1781aea 7032 sslsniff_0.8-7.debian.tar.xz
 f8bfa295a630206241cc04f574b0b96c499082a7 5445 sslsniff_0.8-7_source.buildinfo
Checksums-Sha256:
 92a4fd1952ba36053d987514a334bc2d0f5c29cacc94e77dd6b9022ed419003f 1759 
sslsniff_0.8-7.dsc
 378884a1e42f4b3d610b10d30eacce87bed38a824e34f2ee47e475dda18b485b 7032 
sslsniff_0.8-7.debian.tar.xz
 1a522746ee470e4f48d0d580fb08f7798c3edaac69928375425aeb64115bbcd4 5445 
sslsniff_0.8-7_source.buildinfo
Files:
 122fdc465b48d1c624b8f98794d797dc 1759 admin optional sslsniff_0.8-7.dsc
 a16f9a4faee30e8f0bc2d910d3a2a0cf 7032 admin optional 
sslsniff_0.8-7.debian.tar.xz
 16d435fa754450d58aa1d1051dd15c96 5445 admin optional 
sslsniff_0.8-7_source.buildinfo

-----BEGIN PGP SIGNATURE-----
Comment: Signed by Raphael Hertzog

iQEzBAEBCgAdFiEE1823g1EQnhJ1LsbSA4gdq+vCmrkFAlqOkwEACgkQA4gdq+vC
mrlyDggAsFFuJl39tdT0LJbM0bejZEnXjGk2Tnrjiu1QRgk/Nm+53PxQSmlHFVRh
BYAYwUHNJsjEaJoPh8OI/01LaAf/XJJYjzzMjtREWx8JjYaArUjopsWiuFZNAsx1
ZLDiCWOHXrbzs9mhXCmmPFCHW5aLLs2x9YppUlm3NvJQ4B01n0sWbR6/XfMh/Jz6
PO7mC8F9q8lUGl+YeMEwMkZ9BWKKErgRWZrosbQ9616fOCLab05CvdzE5CiLoUXX
Rz/pqNA61jYNDY4Fd1Lb/aK04mfvdzwf4hGWO5EenOXTY0MmUHVLsg2Hm5g5XKvK
G3p6uCAEuUbL4VHH69QIs3lZXy/Riw==
=QtG+
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to