Your message dated Mon, 24 Feb 2020 11:50:29 +0000
with message-id <[email protected]>
and subject line Bug#952328: fixed in jss 4.6.3-1
has caused the Debian Bug report #952328,
regarding jss: FTBFS: test failed: 58 - SSLClientAuth_FIPSMODE (Failed)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
952328: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=952328
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: jss
Version: 4.6.2-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20200222 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> cd build && ctest --output-on-failure
> Test project /<<PKGBUILDDIR>>/build
>       Start  1: Clean_Data_Dir
>  1/66 Test  #1: Clean_Data_Dir ....................................   Passed  
>   0.01 sec
>       Start  2: Create_Data_Dir
>  2/66 Test  #2: Create_Data_Dir ...................................   Passed  
>   0.01 sec
>       Start  3: TestBufferPRFD
>  3/66 Test  #3: TestBufferPRFD ....................................   Passed  
>   0.00 sec
>       Start  4: Clean_Setup_DBs
>  4/66 Test  #4: Clean_Setup_DBs ...................................   Passed  
>   0.01 sec
>       Start  5: Create_Setup_DBs
>  5/66 Test  #5: Create_Setup_DBs ..................................   Passed  
>   0.01 sec
>       Start  6: Setup_DBs
>  6/66 Test  #6: Setup_DBs .........................................   Passed  
>   0.24 sec
>       Start  7: Clean_FIPS_Setup_DBs
>  7/66 Test  #7: Clean_FIPS_Setup_DBs ..............................   Passed  
>   0.01 sec
>       Start  8: Create_FIPS_Setup_DBs
>  8/66 Test  #8: Create_FIPS_Setup_DBs .............................   Passed  
>   0.01 sec
>       Start  9: Setup_FIPS_DBs
>  9/66 Test  #9: Setup_FIPS_DBs ....................................   Passed  
>   0.28 sec
>       Start 10: Test_UTF-8_Converter
> 10/66 Test #10: Test_UTF-8_Converter ..............................   Passed  
>   0.07 sec
>       Start 11: JSS_DER_Encoding_of_Enumeration_regression_test
> 11/66 Test #11: JSS_DER_Encoding_of_Enumeration_regression_test ...   Passed  
>   0.67 sec
>       Start 12: JSS_Test_DER_Encoding_Functionality
> 12/66 Test #12: JSS_Test_DER_Encoding_Functionality ...............   Passed  
>   0.05 sec
>       Start 13: JSS_Test_Empty_DER_Value
> 13/66 Test #13: JSS_Test_Empty_DER_Value ..........................   Passed  
>   0.05 sec
>       Start 14: BigObjectIdentifier
> 14/66 Test #14: BigObjectIdentifier ...............................   Passed  
>   0.06 sec
>       Start 15: JSS_Test_PR_FileDesc
> 15/66 Test #15: JSS_Test_PR_FileDesc ..............................   Passed  
>   0.16 sec
>       Start 16: JSS_Test_Raw_SSL
> 16/66 Test #16: JSS_Test_Raw_SSL ..................................   Passed  
>   0.14 sec
>       Start 17: JSS_Test_Buffer
> 17/66 Test #17: JSS_Test_Buffer ...................................   Passed  
>   0.15 sec
>       Start 18: JUnit_BMPStringTest
> 18/66 Test #18: JUnit_BMPStringTest ...............................   Passed  
>   0.37 sec
>       Start 19: JUnit_IA5StringTest
> 19/66 Test #19: JUnit_IA5StringTest ...............................   Passed  
>   0.34 sec
>       Start 20: JUnit_PrintableStringTest
> 20/66 Test #20: JUnit_PrintableStringTest .........................   Passed  
>   0.27 sec
>       Start 21: JUnit_TeletexStringTest
> 21/66 Test #21: JUnit_TeletexStringTest ...........................   Passed  
>   0.28 sec
>       Start 22: JUnit_UniversalStringTest
> 22/66 Test #22: JUnit_UniversalStringTest .........................   Passed  
>   0.41 sec
>       Start 23: JUnit_UTF8StringTest
> 23/66 Test #23: JUnit_UTF8StringTest ..............................   Passed  
>   0.31 sec
>       Start 24: buffer_size_1
> 24/66 Test #24: buffer_size_1 .....................................   Passed  
>   0.00 sec
>       Start 25: buffer_size_4
> 25/66 Test #25: buffer_size_4 .....................................   Passed  
>   0.00 sec
>       Start 26: JUnit_ChainSortingTest
> 26/66 Test #26: JUnit_ChainSortingTest ............................   Passed  
>   0.29 sec
>       Start 27: Generate_known_RSA_cert_pair
> 27/66 Test #27: Generate_known_RSA_cert_pair ......................   Passed  
>   5.39 sec
>       Start 28: Generate_known_ECDSA_cert_pair
> 28/66 Test #28: Generate_known_ECDSA_cert_pair ....................   Passed  
>   0.72 sec
>       Start 29: Generate_known_DSS_cert_pair
> 29/66 Test #29: Generate_known_DSS_cert_pair ......................   Passed  
>   0.82 sec
>       Start 30: Create_PKCS11_cert_to_PKCS12_rsa.pfx
> 30/66 Test #30: Create_PKCS11_cert_to_PKCS12_rsa.pfx ..............   Passed  
>   1.42 sec
>       Start 31: Create_PKCS11_cert_to_PKCS12_ecdsa.pfx
> 31/66 Test #31: Create_PKCS11_cert_to_PKCS12_ecdsa.pfx ............   Passed  
>   1.20 sec
>       Start 32: Create_PKCS11_cert_to_PKCS12_dss.pfx
> 32/66 Test #32: Create_PKCS11_cert_to_PKCS12_dss.pfx ..............   Passed  
>   1.20 sec
>       Start 33: List_CA_certs
> 33/66 Test #33: List_CA_certs .....................................   Passed  
>   0.17 sec
>       Start 34: SSLClientAuth
> 34/66 Test #34: SSLClientAuth .....................................   Passed  
>   5.67 sec
>       Start 35: Key_Generation
> 35/66 Test #35: Key_Generation ....................................   Passed  
>   1.81 sec
>       Start 36: Digest
> 36/66 Test #36: Digest ............................................   Passed  
>   0.22 sec
>       Start 37: HMAC
> 37/66 Test #37: HMAC ..............................................   Passed  
>   0.25 sec
>       Start 38: KeyWrapping
> 38/66 Test #38: KeyWrapping .......................................   Passed  
>   1.80 sec
>       Start 39: Mozilla_JSS_JCA_Signature
> 39/66 Test #39: Mozilla_JSS_JCA_Signature .........................   Passed  
>   1.91 sec
>       Start 40: Mozilla_JSS_NSS_Signature
> 40/66 Test #40: Mozilla_JSS_NSS_Signature .........................   Passed  
>   0.99 sec
>       Start 41: JSS_Signature_test
> 41/66 Test #41: JSS_Signature_test ................................   Passed  
>   0.99 sec
>       Start 42: Secret_Decoder_Ring
> 42/66 Test #42: Secret_Decoder_Ring ...............................   Passed  
>   0.31 sec
>       Start 43: List_cert_by_certnick
> 43/66 Test #43: List_cert_by_certnick .............................   Passed  
>   0.25 sec
>       Start 44: Verify_cert_by_certnick
> 44/66 Test #44: Verify_cert_by_certnick ...........................   Passed  
>   0.18 sec
>       Start 45: Secret_Key_Generation
> 45/66 Test #45: Secret_Key_Generation .............................   Passed  
>   0.21 sec
>       Start 46: JSSProvider
> 46/66 Test #46: JSSProvider .......................................   Passed  
>   0.24 sec
>       Start 47: X509CertTest
> 47/66 Test #47: X509CertTest ......................................   Passed  
>   3.66 sec
>       Start 48: KeyStoreTest
> 48/66 Test #48: KeyStoreTest ......................................   Passed  
>   0.56 sec
>       Start 49: Key_Factory
> 49/66 Test #49: Key_Factory .......................................   Passed  
>   0.32 sec
>       Start 50: HMAC_Unwrap
> 50/66 Test #50: HMAC_Unwrap .......................................   Passed  
>   0.24 sec
>       Start 51: CMAC_Test
> 51/66 Test #51: CMAC_Test .........................................   Passed  
>   0.22 sec
>       Start 52: Mozilla_JSS_Secret_Key_Generation
> 52/66 Test #52: Mozilla_JSS_Secret_Key_Generation .................   Passed  
>   0.26 sec
>       Start 53: TestBufferPRFDSSL_RSA
> 53/66 Test #53: TestBufferPRFDSSL_RSA .............................   Passed  
>   0.16 sec
>       Start 54: TestBufferPRFDSSL_ECDSA
> 54/66 Test #54: TestBufferPRFDSSL_ECDSA ...........................   Passed  
>   0.04 sec
>       Start 55: JSS_Test_BufferPRFD
> 55/66 Test #55: JSS_Test_BufferPRFD ...............................   Passed  
>   1.30 sec
>       Start 56: Enable_FipsMODE
> 56/66 Test #56: Enable_FipsMODE ...................................   Passed  
>   0.20 sec
>       Start 57: check_FipsMODE
> 57/66 Test #57: check_FipsMODE ....................................   Passed  
>   0.22 sec
>       Start 58: SSLClientAuth_FIPSMODE
> 58/66 Test #58: SSLClientAuth_FIPSMODE ............................***Failed  
>   4.18 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be 
> preloaded (cannot open shared object file): ignored.
> Feb 23, 2020 2:44:32 AM org.mozilla.jss.CryptoManager <clinit>
> INFO: CryptoManager: loading JSS library
> Feb 23, 2020 2:44:32 AM org.mozilla.jss.CryptoManager <clinit>
> INFO: CryptoManager: loaded JSS library from java.library.path
> Feb 23, 2020 2:44:32 AM org.mozilla.jss.CryptoManager initialize
> INFO: CryptoManager: initializing NSS database at 
> /<<PKGBUILDDIR>>/build/results/fips
> ***FilePasswordCallback returns m1oZilla
> using port:2877
> The NSS database is configured in FIPSmode.
> Enable ony FIPS ciphersuites.
> Server about to create socket
> Server created socket
> Server specified cert directly
> Server about to accept
> client about to connect
> Client specified cert directly
> client connected
> Server accepted
> Server about to read
> Exception in thread "main" java.io.IOException: SocketException cannot read 
> on socket
>       at org.mozilla.jss.ssl.SSLSocket.read(SSLSocket.java:1493)
>       at org.mozilla.jss.ssl.SSLInputStream.read(SSLInputStream.java:38)
>       at org.mozilla.jss.ssl.SSLInputStream.read(SSLInputStream.java:25)
>       at org.mozilla.jss.tests.SSLClientAuth.run(SSLClientAuth.java:435)
>       at java.base/java.lang.Thread.run(Thread.java:834)
> Server exiting
> org.mozilla.jss.ssl.SSLSocketException: SSL_ForceHandshake failed: (-12188) 
> Peer reports it experienced an internal error.
>       at org.mozilla.jss.ssl.SSLSocket.forceHandshake(Native Method)
>       at 
> org.mozilla.jss.tests.SSLClientAuth.testConnection(SSLClientAuth.java:345)
>       at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:157)
>       at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:90)
> 
>       Start 59: HMAC_FIPSMODE
> 59/66 Test #59: HMAC_FIPSMODE .....................................   Passed  
>   0.26 sec
>       Start 60: KeyWrapping_FIPSMODE
> 60/66 Test #60: KeyWrapping_FIPSMODE ..............................   Passed  
>   1.63 sec
>       Start 61: Mozilla_JSS_JCA_Signature_FIPSMODE
> 61/66 Test #61: Mozilla_JSS_JCA_Signature_FIPSMODE ................   Passed  
>   1.93 sec
>       Start 62: JSS_Signature_test_FipsMODE
> 62/66 Test #62: JSS_Signature_test_FipsMODE .......................   Passed  
>   1.01 sec
>       Start 63: Disable_FipsMODE
> 63/66 Test #63: Disable_FipsMODE ..................................   Passed  
>   0.23 sec
>       Start 64: JUnit_GenericValueConverterTest
> 64/66 Test #64: JUnit_GenericValueConverterTest ...................   Passed  
>   0.15 sec
>       Start 65: JUnit_IA5StringConverterTest
> 65/66 Test #65: JUnit_IA5StringConverterTest ......................   Passed  
>   0.17 sec
>       Start 66: JUnit_PrintableConverterTest
> 66/66 Test #66: JUnit_PrintableConverterTest ......................   Passed  
>   0.16 sec
> 
> 98% tests passed, 1 tests failed out of 66
> 
> Total Test time (real) =  46.84 sec
> 
> The following tests FAILED:
>        58 - SSLClientAuth_FIPSMODE (Failed)
> Errors while running CTest
> make[1]: *** [debian/rules:38: override_dh_auto_test] Error 8

The full build log is available from:
   http://qa-logs.debian.net/2020/02/22/jss_4.6.2-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

--- End Message ---
--- Begin Message ---
Source: jss
Source-Version: 4.6.3-1
Done: Timo Aaltonen <[email protected]>

We believe that the bug you reported is fixed in the latest version of
jss, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Timo Aaltonen <[email protected]> (supplier of updated jss package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 24 Feb 2020 13:30:49 +0200
Source: jss
Architecture: source
Version: 4.6.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian FreeIPA Team <[email protected]>
Changed-By: Timo Aaltonen <[email protected]>
Closes: 952328
Changes:
 jss (4.6.3-1) unstable; urgency=medium
 .
   * New upstream release. (Closes: #952328)
   * disable-kbkdf.diff: Disable KBKDF support until we have NSS 3.51.
   * control: Use debhelper-compat.
Checksums-Sha1:
 61f22ec5e339a205dea932a8030c905dcb37961a 2038 jss_4.6.3-1.dsc
 98e86c9f88163d846d0ebd7248fc10dea8682564 895624 jss_4.6.3.orig.tar.gz
 13e86d768d625f465bf7a24000f42e887c5eb071 12976 jss_4.6.3-1.debian.tar.xz
 8405a4eae581f8bab81018491645f236e624cdb9 6484 jss_4.6.3-1_source.buildinfo
Checksums-Sha256:
 96222e9e42e21399384125c6d06cba8c6a885b77c0af47320bb4d31b682b3ddb 2038 
jss_4.6.3-1.dsc
 bf85e51c3c2915a008190b12d4b011dfae85c4747bc73ea817def00b680dd06f 895624 
jss_4.6.3.orig.tar.gz
 6bdfe69ef4933fde3c603fa4883890ee09fb0358029d00e44cbfb16c611eda29 12976 
jss_4.6.3-1.debian.tar.xz
 b594fe4a17d02fbe04edc56ea3473f39f199be51dfd465a20ff9d71f8401db42 6484 
jss_4.6.3-1_source.buildinfo
Files:
 390f46d1ba9fa25798b229ee7205e9fc 2038 java optional jss_4.6.3-1.dsc
 d0d6bb71543b5a22d1cbae797f609ed8 895624 java optional jss_4.6.3.orig.tar.gz
 7eb7020b1a5c88825c2b4e8bda7d1fe5 12976 java optional jss_4.6.3-1.debian.tar.xz
 3829bb561ca18f8ea5708ac82dfa5acb 6484 java optional 
jss_4.6.3-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=7AC4
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to