Lucid is still supported on servers. Please don't untarget it for
server packages.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Title:
DomainKeys Identified Mail (DKIM) Verifiers may inapp
(Untargetting EOLd releases)
** No longer affects: opendkim (Ubuntu Lucid)
** No longer affects: opendkim (Ubuntu Natty)
** No longer affects: opendkim (Ubuntu Oneiric)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
This bug was fixed in the package opendkim - 2.6.8-0ubuntu1.0.1
---
opendkim (2.6.8-0ubuntu1.0.1) precise-proposed; urgency=low
* New upstream security release to add capability to exclude use of
insecure keys (Closes: #691394, LP: #1071139)
- Fix bug #SF3539449: Clarify leg
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Title:
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately con
Hello Scott, or anyone else affected,
Accepted opendkim into precise-proposed. The package will build now and
be available at
http://launchpad.net/ubuntu/+source/opendkim/2.6.8-0ubuntu1.0.1 in a few
hours, and then in the -proposed repository.
Please help us by testing this new package. See
http
This bug was fixed in the package opendkim - 2.6.8-0ubuntu1
---
opendkim (2.6.8-0ubuntu1) quantal-proposed; urgency=low
* New upstream security release to add capability to exclude use of
insecure keys (Closes: #691394, LP: #1071139)
-- Scott KittermanThu, 25 Oct 2012 01:04
Tested that opendkim is working with the quantal-proposed package. I've
got additional verification that the fix is good since I've got the same
package backported to precise running in production.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug no
Uploading to ubuntu (via ftp to upload.ubuntu.com):
Uploading opendkim_2.6.8-0ubuntu1~ubuntu10.04.1.dsc: done.
Uploading opendkim_2.6.8.orig.tar.gz: done.
Uploading opendkim_2.6.8-0ubuntu1~ubuntu10.04.1.diff.gz: done.
Uploading opendkim_2.6.8-0ubuntu1~ubuntu10.04.1_source.changes: d
Uploading to ubuntu (via ftp to upload.ubuntu.com):
Uploading opendkim_2.6.8-0ubuntu1~ubuntu12.04.1.dsc: done.
Uploading opendkim_2.6.8.orig.tar.gz: done.
Uploading opendkim_2.6.8-0ubuntu1~ubuntu12.04.1.diff.gz: done.
Uploading opendkim_2.6.8-0ubuntu1~ubuntu12.04.1_source.changes: d
B/I/R on lucid and precise.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Title:
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey
message trust
To manage notificatio
On Wednesday, November 07, 2012 10:26:23 PM you wrote:
> Since this is a fairly thorny issue, and a large patch to solve it,
> verification needs to include extensive documentation of what testing
> was done.
Almost all the patch was tool noise, so it's pretty low risk. There isn't a
good way to
Since this is a fairly thorny issue, and a large patch to solve it,
verification needs to include extensive documentation of what testing
was done.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Hello Scott, or anyone else affected,
Accepted opendkim into quantal-proposed. The package will build now and
be available at
http://launchpad.net/ubuntu/+source/opendkim/2.6.8-0ubuntu1 in a few
hours, and then in the -proposed repository.
Please help us by testing this new package. See
https://
This bug was fixed in the package opendkim - 2.6.8-1
---
opendkim (2.6.8-1) experimental; urgency=low
* New upstream security release to add capability to exclude use of
insecure keys (Closes: #691394, LP: #1071139)
-- Scott Kitterman Thu, 25 Oct 2012 01:04:27
-0400
** Cha
** Changed in: precise-backports
Importance: Undecided => High
** Changed in: precise-backports
Status: New => In Progress
** Changed in: precise-backports
Assignee: (unassigned) => Scott Kitterman (kitterman)
** Changed in: lucid-backports
Importance: Undecided => High
** Cha
** Description changed:
See http://www.kb.cert.org/vuls/id/268267, VU#268267
opendkim in squeeze, wheezy, sid offers no method to prevent use of keys
less than 1024 bits. This is added in the new upstream release, 2.6.8, that
was released just for this issue.
+
+ [IMPACT]
+
+ * DKIM
** Changed in: opendkim (Debian)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Title:
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately
Actually, this is more an enhancement, and requires a config file
change.
I think this would be better handled by an SRU than a security update.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Since opendkim is in universe, it is community maintained. If you are
able, please post a debdiff for this issue.
When a debdiff is available, members of the security team will review it
and publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/Upda
** Changed in: opendkim (Debian)
Status: Unknown => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1071139
Title:
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately conv
Uploaded 2.6.8 for raring.
** Bug watch added: Debian Bug tracker #691394
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691394
** Also affects: opendkim (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691394
Importance: Unknown
Status: Unknown
** Changed in: open
21 matches
Mail list logo