Indeed -- sorry about that, everyone! I intended for that to go out
before I went on vacation (and didn't have email access), but it looks
like I didn't quite manage it.
I'm doing the uploads again now.
On Mon, Jan 21, 2019 at 6:05 AM Julien Cristau wrote:
>
> On Thu, Jan 17, 2019 at 01:48:24PM
On Thu, Jan 17, 2019 at 01:48:24PM -0800, Brad Warren wrote:
> I just wanted to make sure this was still on everyone’s radar. The
> change server side where tens of thousands of Debian users will begin
> being unable to renew their certificates is in less than a month.
>
It is, but the initial upl
I just wanted to make sure this was still on everyone’s radar. The change
server side where tens of thousands of Debian users will begin being unable to
renew their certificates is in less than a month.
> On Jan 8, 2019, at 4:24 PM, Harlan Lieberman-Berg wrote:
>
> Hello Julien, everyone,
>
>
Hello Julien, everyone,
I've uploaded the relevant packages for your examination. The
packages uploaded are:
- python-acme_0.28.0-1+deb9u1
- python-certbot_0.28.0-1+deb9u1
- python-certbot-nginx_0.28.0-1+deb9u1
- python-certbot-apache_0.28.0-1+deb9u1
- python-josepy_1.1.0-2+deb9u1
- parsedatetim
On Sun, Dec 2, 2018 at 10:48 AM Julien Cristau wrote:
> OK, let's do that then. Sorry for not getting back to this sooner.
Sounds good. I'm preparing the uploads now.
It looks like I will need to rebuild the version of
python-parsedatetime in stable to also build the python3 version. I
could
Processing control commands:
> tag -1 - moreinfo
Bug #887399 [release.debian.org] stretch-pu: package python-certbot/0.10.2-1
Removed tag(s) moreinfo.
> tag -1 + confirmed
Bug #887399 [release.debian.org] stretch-pu: package python-certbot/0.10.2-1
Added tag(s) confirmed.
--
887399: https://bugs
Control: tag -1 - moreinfo
Control: tag -1 + confirmed
On Tue, Nov 13, 2018 at 10:09:06PM -0500, Harlan Lieberman-Berg wrote:
> Hello Jeremy, release team,
>
> Yes, the minimal set of involved source packages is python-acme,
> python-certbot, python-certbot-nginx, and python-certbot-apache. This
Hello Jeremy, release team,
Yes, the minimal set of involved source packages is python-acme,
python-certbot, python-certbot-nginx, and python-certbot-apache. This
would also require the new package python-josepy, which is also
maintained by the LE team.
They should be able to be taken directly o
What can be done to get this issue resolved?
This issue has jumped in priority now that domain validation through the
TLS-SNI-01 challenge will be completely unsupported by Let’s Encrypt on
February 13th, 2019. See
https://community.letsencrypt.org/t/february-13-2019-end-of-life-for-all-tls-sni
I’m another upstream developer of Certbot.
Taking 0.21.1 into stable would be the most conservative update that would
resolve this issue. The oldest version you could take is 0.21.0, but 0.21.1 was
released 8 days later and as a result has been much more widely tested. Since
0.21.1 was released
Control: tag -1 moreinfo
On Mon, Jan 15, 2018 at 18:04:59 -0500, Harlan Lieberman-Berg wrote:
> Due to a security issue in the underlying Let's Encrypt protocol, one of the
> main methods of getting certificates from Let's Encrypt has been disabled
> (the TLS-SNI-01 protocol;
> https://communi
Processing control commands:
> tag -1 moreinfo
Bug #887399 [release.debian.org] stretch-pu: package python-certbot/0.10.2-1
Added tag(s) moreinfo.
--
887399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887399
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hello Release Team,
Due to a security issue in the underlying Let's Encrypt protocol, one of the
main methods of getting certificates from Let's Encrypt has been disabled (the
TL
13 matches
Mail list logo