Processing of potamus_0.12-1_amd64.changes
potamus_0.12-1_amd64.changes uploaded successfully to localhost along with the files: potamus_0.12-1.dsc potamus_0.12.orig.tar.gz potamus_0.12-1.debian.tar.gz potamus_0.12-1_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pniao-ll...@franck.debian.org
potamus_0.12-1_amd64.changes ACCEPTED into unstable
Accepted: potamus_0.12-1.debian.tar.gz to main/p/potamus/potamus_0.12-1.debian.tar.gz potamus_0.12-1.dsc to main/p/potamus/potamus_0.12-1.dsc potamus_0.12-1_amd64.deb to main/p/potamus/potamus_0.12-1_amd64.deb potamus_0.12.orig.tar.gz to main/p/potamus/potamus_0.12.orig.tar.gz Override entries for your package: potamus_0.12-1.dsc - source gnome potamus_0.12-1_amd64.deb - optional gnome Announcing to debian-devel-chan...@lists.debian.org Closing bugs: 569540 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnimr-0003ad...@franck.debian.org
Processed: forcibly merging 502605 500099
Processing commands for cont...@bugs.debian.org: > forcemerge 502605 500099 Bug#502605: numlockx: Error compiling keymap Bug#500099: numlockx causes an error message in Xorg.0.log Forcibly Merged 500099 502605. > thanks Stopping processing here. Please contact me if you need assistance. -- 502605: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502605 500099: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500099 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.12912188195191.transcr...@bugs.debian.org
Bug#502605: Still existing in 1.2?
Hi I've tried to reproduce this issue with 1.2 and it does not seem to happen anymore. Are you able to reproduce it? -- Michal Čihař | http://cihar.com | http://blog.cihar.com signature.asc Description: PGP signature
Bug#482592: Still existing in 1.2?
Hi I've tried to reproduce this issue with 1.2 and it does not seem to happen anymore. Are you able to reproduce it? -- Michal Čihař | http://cihar.com | http://blog.cihar.com signature.asc Description: PGP signature
Processing of tla_1.3.5+dfsg-16_amd64.changes
tla_1.3.5+dfsg-16_amd64.changes uploaded successfully to localhost along with the files: tla_1.3.5+dfsg-16.dsc tla_1.3.5+dfsg-16.diff.gz tla-doc_1.3.5+dfsg-16_all.deb tla_1.3.5+dfsg-16_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnprl-0004oh...@franck.debian.org
Bug#605048: marked as done (tla: Using deprecated --preserve option to tar)
Your message dated Wed, 01 Dec 2010 16:52:19 + with message-id and subject line Bug#605048: fixed in tla 1.3.5+dfsg-16 has caused the Debian Bug report #605048, regarding tla: Using deprecated --preserve option to tar to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 605048: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605048 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tla Version: 1.3.5+dfsg-15 Severity: minor tla is using the deprecated --preserve option for tar to preserve both permissions and order. This generates a deprecation warning from tar in Debian Squeeze (GNU tar 1.23). Severity is minor because in spite of the warning, tar still works, but severity could be greater if --preserve is eventually removed. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages tla depends on: ii gawk 1:3.1.7.dfsg-5 GNU awk, a pattern scanning and pr ii libc6 2.11.2-7 Embedded GNU C Library: Shared lib ii libexpat1 2.0.1-7XML parsing C library - runtime li ii patch 2.6-2 Apply a diff file to an original Versions of packages tla recommends: ii tla-doc1.3.5+dfsg-15 GNU Arch revision control system ( Versions of packages tla suggests: ii gnupg 1.4.10-4 GNU privacy guard - a free PGP rep pn ssh(no description available) -- no debconf information --- End Message --- --- Begin Message --- Source: tla Source-Version: 1.3.5+dfsg-16 We believe that the bug you reported is fixed in the latest version of tla, which is due to be installed in the Debian FTP archive: tla-doc_1.3.5+dfsg-16_all.deb to main/t/tla/tla-doc_1.3.5+dfsg-16_all.deb tla_1.3.5+dfsg-16.diff.gz to main/t/tla/tla_1.3.5+dfsg-16.diff.gz tla_1.3.5+dfsg-16.dsc to main/t/tla/tla_1.3.5+dfsg-16.dsc tla_1.3.5+dfsg-16_amd64.deb to main/t/tla/tla_1.3.5+dfsg-16_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 605...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Tim Gokcen (supplier of updated tla package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 26 Nov 2010 16:20:03 -0500 Source: tla Binary: tla tla-doc Architecture: all amd64 source Version: 1.3.5+dfsg-16 Distribution: unstable Urgency: low Maintainer: Debian QA Group Changed-By: Tim Gokcen Closes: 605048 Description: tla- GNU Arch revision control system tla-doc- GNU Arch revision control system (documentation) Changes: tla (1.3.5+dfsg-16) unstable; urgency=low . * QA upload. * tar --preserve is deprecated; use --preserve-permissions and --preserve-order instead (closes: #605048). * Changed section to vcs, since that's what it is * Fix lintian warnings/errors, including: - Added debian/README.source (from dpatch default) - Moved #include patches into dpatch system - Added dversionmangle to debian/watch - Added ${misc:Depends} to debian/control - Updated debhelper version to 5 (no changes needed) - Removed 3x .SP macros from tla manpage - Fixed spelling errors in code C-strings - Fixed tla-gpg-check hyphenization errors - tla-doc is in doc-base section Programming - Made package version 1.0 explicit. Hopefully someone (maybe me) will convert to pkg version 3.0 later - Removed -rpath from libneon build Checksums-Sha1: 90a1b26b426f2aaf56d577e5741e473a91d386d5 1655 tla_1.3.5+dfsg-16.dsc 06fecca22d9d3b19f93e60427bf6c44ff1bcadc0 36723 tla_1.3.5+dfsg-16.diff.gz 88b1e6ce148bfead2e3b4ec1686c8dddbe71798b 50626 tla-doc_1.3.5+dfsg-16_all.deb 75ab0f97c5fb77aceaafcd5f7b4cf4c97e8c3a0e 383200 tla_1.3.5+dfsg-16_amd64.deb Checksums-Sha256: d79bc0509a723c620e59dbc874ed93127a18df3e980ba254bf6e0b04c9b74680 1655 tla_1.3.5+dfsg-16.dsc cbb844dd3e491d9edf9d150a3f12cd641b3257bbc414048bdffd8bced4c0498e 36723 tla
Bug#602869: marked as done (gadmin-openvpn-server: puts logfile in /etc instead of /var/log)
Your message dated Wed, 01 Dec 2010 17:02:37 + with message-id and subject line Bug#602869: fixed in gadmin-openvpn-server 0.1.5-3.1 has caused the Debian Bug report #602869, regarding gadmin-openvpn-server: puts logfile in /etc instead of /var/log to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 602869: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602869 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: gadmin-openvpn-server Version: 0.1.5-1 Severity: serious Justification: Policy 9.1.1 The configuration created by gadmin-openvpn-server contains these two lines: log/etc/gadmin-openvpn/server/openvpn-server.log status /etc/gadmin-openvpn/server/openvpn-server-status.log I don't see any way to change this from a client perspective. Logfiles should be placed in /var/log by the FHS. stew -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (600, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages gadmin-openvpn-server depends on: ii libatk1.0-0 1.30.0-1The ATK accessibility toolkit ii libc62.11.2-6Embedded GNU C Library: Shared lib ii libcairo21.8.10-6The Cairo 2D vector graphics libra ii libfontconfig1 2.8.0-2.1 generic font configuration library ii libfreetype6 2.4.2-2 FreeType 2 font engine, shared lib ii libglib2.0-0 2.24.2-1The GLib library of C routines ii libgtk2.0-0 2.20.1-1+b1 The GTK+ graphical user interface ii libpango1.0-01.28.1-1Layout and rendering of internatio ii menu 2.1.44 generates programs menu for all me ii openvpn 2.1.3-1 virtual private network daemon gadmin-openvpn-server recommends no packages. gadmin-openvpn-server suggests no packages. -- no debconf information --- End Message --- --- Begin Message --- Source: gadmin-openvpn-server Source-Version: 0.1.5-3.1 We believe that the bug you reported is fixed in the latest version of gadmin-openvpn-server, which is due to be installed in the Debian FTP archive: gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb to main/g/gadmin-openvpn-server/gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb gadmin-openvpn-server_0.1.5-3.1.diff.gz to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1.diff.gz gadmin-openvpn-server_0.1.5-3.1.dsc to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1.dsc gadmin-openvpn-server_0.1.5-3.1_amd64.deb to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 602...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mehdi Dogguy (supplier of updated gadmin-openvpn-server package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 01 Dec 2010 17:06:16 +0100 Source: gadmin-openvpn-server Binary: gadmin-openvpn-server gadmin-openvpn-server-dbg Architecture: source amd64 Version: 0.1.5-3.1 Distribution: unstable Urgency: low Maintainer: Debian QA Group Changed-By: Mehdi Dogguy Description: gadmin-openvpn-server - GTK+ configuration tool for openvpn (server) gadmin-openvpn-server-dbg - GTK+ configuration tool for openvpn (debug for server) Closes: 602869 Changes: gadmin-openvpn-server (0.1.5-3.1) unstable; urgency=low . * QA upload. * Revert all changes made in the previous upload... except the orphaning. * Fix "03-logfiles.patch" which was introduced to move logfiles from /etc to /var/log (Closes: #602869). Checksums-Sha1: 0da28edfc2675f8bf37614a7f85ba623fc147dc6 2001 gadmin-openvpn-server_0.1.5-3.1.dsc 5e848ec1d8b631c365aee765e3563c409395443f 7017 gadmin-openvpn-server_0.1.5-3.1.diff.gz 57ec6af5d7c955a3f57de35d746f1ccef0de52a5 76364 gadmin-openvpn-server_0.1.5-3.1_amd64.deb a1ce8387f8301c2cbf3e23c56dbd8166a1cb7dbb 151006 gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb Checksums-S
Processing of gadmin-openvpn-server_0.1.5-3.1_amd64.changes
gadmin-openvpn-server_0.1.5-3.1_amd64.changes uploaded successfully to localhost along with the files: gadmin-openvpn-server_0.1.5-3.1.dsc gadmin-openvpn-server_0.1.5-3.1.diff.gz gadmin-openvpn-server_0.1.5-3.1_amd64.deb gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnpuz-00089i...@franck.debian.org
tla_1.3.5+dfsg-16_amd64.changes ACCEPTED into unstable
Accepted: tla-doc_1.3.5+dfsg-16_all.deb to main/t/tla/tla-doc_1.3.5+dfsg-16_all.deb tla_1.3.5+dfsg-16.diff.gz to main/t/tla/tla_1.3.5+dfsg-16.diff.gz tla_1.3.5+dfsg-16.dsc to main/t/tla/tla_1.3.5+dfsg-16.dsc tla_1.3.5+dfsg-16_amd64.deb to main/t/tla/tla_1.3.5+dfsg-16_amd64.deb Override entries for your package: tla-doc_1.3.5+dfsg-16_all.deb - optional doc tla_1.3.5+dfsg-16.dsc - source vcs tla_1.3.5+dfsg-16_amd64.deb - optional vcs Announcing to debian-devel-chan...@lists.debian.org Closing bugs: 605048 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnpul-0008cd...@franck.debian.org
gadmin-openvpn-server_0.1.5-3.1_amd64.changes ACCEPTED into unstable
Accepted: gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb to main/g/gadmin-openvpn-server/gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb gadmin-openvpn-server_0.1.5-3.1.diff.gz to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1.diff.gz gadmin-openvpn-server_0.1.5-3.1.dsc to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1.dsc gadmin-openvpn-server_0.1.5-3.1_amd64.deb to main/g/gadmin-openvpn-server/gadmin-openvpn-server_0.1.5-3.1_amd64.deb Override entries for your package: gadmin-openvpn-server-dbg_0.1.5-3.1_amd64.deb - extra debug gadmin-openvpn-server_0.1.5-3.1.dsc - source admin gadmin-openvpn-server_0.1.5-3.1_amd64.deb - optional admin Announcing to debian-devel-chan...@lists.debian.org Closing bugs: 602869 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnq4j-0001c7...@franck.debian.org
Processing of gadmin-openvpn-client_0.1.2-4_amd64.changes
gadmin-openvpn-client_0.1.2-4_amd64.changes uploaded successfully to localhost along with the files: gadmin-openvpn-client_0.1.2-4.dsc gadmin-openvpn-client_0.1.2-4.diff.gz gadmin-openvpn-client_0.1.2-4_amd64.deb gadmin-openvpn-client-dbg_0.1.2-4_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnq96-0001kn...@franck.debian.org
gadmin-openvpn-client_0.1.2-4_amd64.changes ACCEPTED into unstable
Accepted: gadmin-openvpn-client-dbg_0.1.2-4_amd64.deb to main/g/gadmin-openvpn-client/gadmin-openvpn-client-dbg_0.1.2-4_amd64.deb gadmin-openvpn-client_0.1.2-4.diff.gz to main/g/gadmin-openvpn-client/gadmin-openvpn-client_0.1.2-4.diff.gz gadmin-openvpn-client_0.1.2-4.dsc to main/g/gadmin-openvpn-client/gadmin-openvpn-client_0.1.2-4.dsc gadmin-openvpn-client_0.1.2-4_amd64.deb to main/g/gadmin-openvpn-client/gadmin-openvpn-client_0.1.2-4_amd64.deb Override entries for your package: gadmin-openvpn-client-dbg_0.1.2-4_amd64.deb - extra debug gadmin-openvpn-client_0.1.2-4.dsc - source admin gadmin-openvpn-client_0.1.2-4_amd64.deb - optional admin Announcing to debian-devel-chan...@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1pnqil-0002ib...@franck.debian.org
Bug#500099: Bug#502605: Still existing in 1.2?
Hello On Wed, 1 Dec 2010 16:56:34 +0100 Michal Čihař wrote: > I've tried to reproduce this issue with 1.2 and it does not seem to > happen anymore. Are you able to reproduce it? No, it seems to work now. -- Mvh Anders Lagerås pgputA5kXat2F.pgp Description: PGP signature
Bug#502605: marked as done (numlockx: Error compiling keymap)
Your message dated Wed, 1 Dec 2010 22:25:33 +0100 with message-id <20101201222533.457d4...@nutt.cihar.com> and subject line Re: Bug#502605: Still existing in 1.2? has caused the Debian Bug report #502605, regarding numlockx: Error compiling keymap to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 502605: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502605 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: numlockx Version: 1.1-9 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 When having xnumlock installed do I get these error messages in Xorg.log: (EE) Error compiling keymap (server-0) (EE) XKB: Couldn't compile keymap - -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (995, 'unstable'), (700, 'testing'), (600, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=sv_SE (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages numlockx depends on: ii libc6 2.7-15 GNU C Library: Shared libraries ii libx11-6 2:1.1.5-2 X11 client-side library ii libxtst6 2:1.0.3-1 X11 Testing -- Resource extension numlockx recommends no packages. Versions of packages numlockx suggests: pn x-display-manager (no description available) -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkj5rD8ACgkQw5UvgfnzqGpeGgCeLOtSzRFszuMsY/7R8VRF4+j7 gG8AnRqtK6huVSgx/foqEwLMajLuj4kC =48Dy -END PGP SIGNATURE- --- End Message --- --- Begin Message --- Version: 1.2-1 Dne Wed, 1 Dec 2010 19:57:56 +0100 Anders Lagerås napsal(a): > Hello > On Wed, 1 Dec 2010 16:56:34 +0100 > Michal Čihař wrote: > > I've tried to reproduce this issue with 1.2 and it does not seem to > > happen anymore. Are you able to reproduce it? > No, it seems to work now. Thanks for confirming, closing. -- Michal Čihař | http://cihar.com | http://blog.cihar.com signature.asc Description: PGP signature --- End Message ---
Bug#500099: marked as done (numlockx causes an error message in Xorg.0.log)
Your message dated Wed, 1 Dec 2010 22:25:33 +0100 with message-id <20101201222533.457d4...@nutt.cihar.com> and subject line Re: Bug#502605: Still existing in 1.2? has caused the Debian Bug report #502605, regarding numlockx causes an error message in Xorg.0.log to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 502605: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502605 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: numlockx Version: 1.1-9 Severity: minor problem : numlockx causes an error message in Xorg.0.log While hunting down another problem with a log viewer I found this minor annoyance. I marked as minor because I can't 'see' any functionality problem. Could be marked as wishlist cause I wish my logs to be error free ;-) /me creates enough of his own. I would like it to work without posting an error, seems the problem may be Xorg changes and not numlockx, it may cause other problems we users aren't aware of now or later... --paste (EE) Error compiling keymap (server-0) (EE) XKB: Couldn't compile keymap --end paste I can uninstall numlockx and Xorg.0.log is error free. Thanks for all you do for Debian. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages numlockx depends on: ii libc6 2.7-13 GNU C Library: Shared libraries ii libx11-6 2:1.1.4-2 X11 client-side library ii libxtst6 2:1.0.3-1 X11 Testing -- Resource extension numlockx recommends no packages. Versions of packages numlockx suggests: ii gdm [x-display-manager] 2.20.7-3 GNOME Display Manager --- End Message --- --- Begin Message --- Version: 1.2-1 Dne Wed, 1 Dec 2010 19:57:56 +0100 Anders Lagerås napsal(a): > Hello > On Wed, 1 Dec 2010 16:56:34 +0100 > Michal Čihař wrote: > > I've tried to reproduce this issue with 1.2 and it does not seem to > > happen anymore. Are you able to reproduce it? > No, it seems to work now. Thanks for confirming, closing. -- Michal Čihař | http://cihar.com | http://blog.cihar.com signature.asc Description: PGP signature --- End Message ---
Bug#603450: Fwd: Due offlineimap absence of certificate validation issue -- Debian BTS#603450
-- Forwarded message -- From: dave b Date: 1 December 2010 13:59 Subject: Re: Due offlineimap absence of certificate validation issue -- Debian BTS#603450 To: John Goerzen Cc: Jan Lieskovsky , Christoph Höger Here have a patch! This obviously will break connecting to hosts which use a self-signed certificate. Perhaps some one else can fix this when they want it fixed ;) ? I tested using the following config: # Sample minimal config file. Copy this to ~/.offlineimaprc and edit to # suit to get started fast. [general] accounts = Test [Account Test] localrepository = Local remoterepository = Remote [Repository Local] type = Maildir localfolders = ~/Test [Repository Remote] type = IMAP ssl = yes remotehost = imap.gmail.com # this should work #remotehost = 74.125.39.109 # this should fail #remotehost = $putselfsignedserveraddresshere #this should fail remoteuser = jgoerzen For these hosts (listed here) the expected outcome matched the actual outcome when I tried offlineimap. diff --git a/offlineimap/imaplibutil.py b/offlineimap/imaplibutil.py index a60242b..3df92c2 100644 --- a/offlineimap/imaplibutil.py +++ b/offlineimap/imaplibutil.py @@ -27,6 +27,7 @@ try: import ssl ssl_wrap = ssl.wrap_socket except ImportError: +print e ssl_wrap = socket.ssl class IMAP4_Tunnel(IMAP4): @@ -62,7 +63,7 @@ class IMAP4_Tunnel(IMAP4): self.infd.close() self.outfd.close() self.process.wait() - + class sslwrapper: def __init__(self, sslsock): self.sslsock = sslsock @@ -144,6 +145,27 @@ def new_open(self, host = '', port = IMAP4_PORT): raise socket.error(last_error) self.file = self.sock.makefile('rb') + +def _verifycert(cert, hostname): +'''Verify that cert (in socket.getpeercert() format) matches hostname. +CRLs and subjectAltName are not handled. + +Returns error message if any problems are found and None on success. +''' +if not cert: +return ('no certificate received') +dnsname = hostname.lower() +for s in cert.get('subject', []): +key, value = s[0] +if key == 'commonName': +certname = value.lower() +if (certname == dnsname or +'.' in dnsname and certname == '*.' + dnsname.split('.', 1)[1]): +return None +return ('certificate is for %s') % certname +return ('no commonName found in certificate') + + def new_open_ssl(self, host = '', port = IMAP4_SSL_PORT): """Setup connection to remote server on "host:port". (default: localhost:standard IMAP4 SSL port). @@ -171,7 +193,10 @@ def new_open_ssl(self, host = '', port = IMAP4_SSL_PORT): if last_error != 0: # FIXME raise socket.error(last_error) -self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile) +self.sslobj = ssl_wrap(self.sock, self.keyfile, self.certfile, cert_reqs=ssl.CERT_REQUIRED, ca_certs="/etc/ssl/certs/ca-certificates.crt") +msg = _verifycert(self.sslobj.getpeercert(), host) +if msg: +raise socket.error(('%s certificate error: %s') % (host, msg) ) self.sslobj = sslwrapper(self.sslobj) mustquote = re.compile(r"[^\w!#$%&'+,.:;<=>?^`|~-]") diff --git a/offlineimap/imapserver.py b/offlineimap/imapserver.py index 74f1a27..a4925b1 100644 --- a/offlineimap/imapserver.py +++ b/offlineimap/imapserver.py @@ -85,7 +85,7 @@ class UsefulIMAP4_SSL(UsefulIMAPMixIn, imaplibutil.WrappedIMAP4_SSL): imaplibutil.new_open_ssl(self, host, port) # This is the same hack as above, to be used in the case of an SSL -# connexion. +# connection. def read(self, size): if (system() == 'Darwin') and (size>0) : @@ -191,7 +191,7 @@ class IMAPServer: try: if self.gss_step == self.GSS_STATE_STEP: if not self.gss_vc: -rc, self.gss_vc = kerberos.authGSSClientInit('imap@' + +rc, self.gss_vc = kerberos.authGSSClientInit('imap@' + self.hostname) response = kerberos.authGSSClientResponse(self.gss_vc) rc = kerberos.authGSSClientStep(self.gss_vc, data) @@ -243,7 +243,7 @@ class IMAPServer: self.lastowner[imapobj] = thread.get_ident() self.connectionlock.release() return imapobj - + self.connectionlock.release() # Release until need to modify data """ Must be careful here that if we fail we should bail out gracefully @@ -328,7 +328,7 @@ class IMAPServer: if(self.connectionlock.locked()): self.connectionlock.release() raise - + def connectionwait(self): """Waits until there is a connection available. Note that between the time that a connection becomes available and the time it is @@ -378,7 +378