Bug#797926: transition: openssl: remove SSLv3 methods

2016-02-01 Thread Emilio Pozuelo Monfort
On 01/02/16 18:14, Mattia Rizzolo wrote: > If I'm looking right at this transition the only remaining package is > pbbam, where the maintainer-built binary was built against the old > libssl. > > Please binNMU it. > > Does it being ma:same implies you should binNMU all archs to preserve > coinsta

Bug#797926: transition: openssl: remove SSLv3 methods

2016-02-01 Thread Mattia Rizzolo
If I'm looking right at this transition the only remaining package is pbbam, where the maintainer-built binary was built against the old libssl. Please binNMU it. Does it being ma:same implies you should binNMU all archs to preserve coinstallability? -- regards, Mattia R

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-10 Thread Andreas Beckmann
On 2015-11-09 18:04, Emilio Pozuelo Monfort wrote: > On 09/11/15 11:30, Andreas Beckmann wrote: >> What about experimental? > Thanks, scheduling those. Thanks. Just checked the packages still appearing in the list and filed two unrelated FTBFS bugs and one SSLv3 bug (thrift). Andreas

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-09 Thread Emilio Pozuelo Monfort
On 09/11/15 11:30, Andreas Beckmann wrote: > On Sat, 7 Nov 2015 12:30:11 +0100 Emilio Pozuelo Monfort > wrote: >> All the rdeps have been binNMUed at this stage. > > What about experimental? Is there a "apt-cache rdepends libssl1.0.0" > equivalent command that only reports packages from experim

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-09 Thread Andreas Beckmann
On Sat, 7 Nov 2015 12:30:11 +0100 Emilio Pozuelo Monfort wrote: > All the rdeps have been binNMUed at this stage. What about experimental? Is there a "apt-cache rdepends libssl1.0.0" equivalent command that only reports packages from experimental? Anyway, here we have a list: atheme-services

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-07 Thread Kurt Roeckx
On Sat, Nov 07, 2015 at 12:30:11PM +0100, Emilio Pozuelo Monfort wrote: > All the rdeps have been binNMUed at this stage. Now bugs need to be reported > so > the buggy packages are either fixed or leave testing. I'll work on it when I have time. Kurt

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-07 Thread Emilio Pozuelo Monfort
All the rdeps have been binNMUed at this stage. Now bugs need to be reported so the buggy packages are either fixed or leave testing. Cheers, Emilio

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-02 Thread Gianfranco Costamagna
Hi, the first binNMU round has shown some problems, e.g. on casablanca cd /«PKGBUILDDIR»/obj-x86_64-linux-gnu/src && /usr/bin/c++ -Dcpprest_EXPORTS -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -std=c++11 -fno-strict-aliasing -Wall -Wextra -Wunused-par

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-01 Thread Kurt Roeckx
On Sun, Nov 01, 2015 at 06:52:08PM +0100, Emilio Pozuelo Monfort wrote: > >> Do the rdeps build against the new version? IOW, are there any users of the > >> removed methods? > > > > There are users of the removed method. But all known ones should > > have been changed to either not use it anymor

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-01 Thread Emilio Pozuelo Monfort
Control: tags -1 confirmed On 01/11/15 16:22, Kurt Roeckx wrote: > On Sun, Nov 01, 2015 at 03:22:29PM +0100, Emilio Pozuelo Monfort wrote: >> On 26/10/15 23:28, Emilio Pozuelo Monfort wrote: >>> On 24/10/15 11:22, Kurt Roeckx wrote: On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire

Processed: Re: Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-01 Thread Debian Bug Tracking System
Processing control commands: > tags -1 confirmed Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods Added tag(s) confirmed. -- 797926: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797926 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-01 Thread Kurt Roeckx
On Sun, Nov 01, 2015 at 03:22:29PM +0100, Emilio Pozuelo Monfort wrote: > On 26/10/15 23:28, Emilio Pozuelo Monfort wrote: > > On 24/10/15 11:22, Kurt Roeckx wrote: > >> On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote: > >>> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx w

Bug#797926: transition: openssl: remove SSLv3 methods

2015-11-01 Thread Emilio Pozuelo Monfort
On 26/10/15 23:28, Emilio Pozuelo Monfort wrote: > On 24/10/15 11:22, Kurt Roeckx wrote: >> On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote: >>> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote: On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote: >

Bug#797926: transition: openssl: remove SSLv3 methods

2015-10-26 Thread Emilio Pozuelo Monfort
On 24/10/15 11:22, Kurt Roeckx wrote: > On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote: >> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote: >>> On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote: > So do I start with an soname change and upload th

Bug#797926: transition: openssl: remove SSLv3 methods

2015-10-24 Thread Kurt Roeckx
On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote: > On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote: > > On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote: > > > > So do I start with an soname change and upload that to > > > > experimental? > > > > >

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-16 Thread Jonathan Wiltshire
On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote: > On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote: > > > So do I start with an soname change and upload that to > > > experimental? > > > > Yes please. > > So that has passed the new queue now. Please let me know whe

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-09 Thread Kurt Roeckx
On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote: > > So do I start with an soname change and upload that to > > experimental? > > Yes please. So that has passed the new queue now. Please let me know when I can start this in unstable. Kurt

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-03 Thread Jonathan Wiltshire
On Thu, Sep 03, 2015 at 11:04:27PM +0200, Kurt Roeckx wrote: > On Thu, Sep 03, 2015 at 10:06:17PM +0200, Julien Cristau wrote: > > On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote: > > > > > - Just drop the symbols, adding Breaks on at least some > > > packages like curl and python that

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-03 Thread Kurt Roeckx
On Thu, Sep 03, 2015 at 10:06:17PM +0200, Julien Cristau wrote: > On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote: > > > - Just drop the symbols, adding Breaks on at least some > > packages like curl and python that are known to need a rebuild > > against the changed headers. > > >

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-03 Thread Julien Cristau
On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote: > - Just drop the symbols, adding Breaks on at least some > packages like curl and python that are known to need a rebuild > against the changed headers. > Definitely not. Cheers, Julien signature.asc Description: Digital signature

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-03 Thread Jonathan Wiltshire
user release.debian@packages.debian.org usertag 797926 transition On Thu, Sep 03, 2015 at 08:51:05PM +0200, Kurt Roeckx wrote: > My question is how you want to proceed with this. I see a few > options: > - Change the soname, rebuild everything against that new soname. > - Just drop the symbol

Bug#797926: transition: openssl: remove SSLv3 methods

2015-09-03 Thread Kurt Roeckx
Package: release.debian.org Hi, I would like to remove the last support for SSLv3 in openssl. This means that I'll be dropping 3 symbols from the shared library: SSLv3_method(); SSLv3_server_method(); SSLv3_client_method(); Those can still be used to set up SSLv3 connections, while using the SSL