Report forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>: Bug#397730; Package openssl.
(full text, mbox, link).
Acknowledgement sent to Chris Adams <cadams@salk.edu>:
New Bug report received and forwarded. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>.
(full text, mbox, link).
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: openssl: Password input fails when using sudo
Date: Wed, 08 Nov 2006 17:56:38 -0800
Package: openssl
Version: 0.9.8c-3
Severity: normal
sudo openssl genrsa -aes192 -out /etc/ssl/private/host.example.edu.key 1024
admin@sifel sudo password:
Generating RSA private key, 1024 bit long modulus
.++++++
....................++++++
e is 65537 (0x10001)
Enter pass phrase for /etc/ssl/private/host.example.edu.key:
User interface error
27157:error:0906906F:PEM routines:PEM_ASN1_write_bio:read key:pem_lib.c:331:
If I use sudo -s and run the exact command inside the resulting session all is fine.
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-amd64
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages openssl depends on:
ii libc6 2.3.6.ds1-7 GNU C Library: Shared libraries
ii libssl0.9.8 0.9.8c-3 SSL shared libraries
ii zlib1g 1:1.2.3-13 compression library - runtime
openssl recommends no packages.
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>: Bug#397730; Package openssl.
(Sun, 08 May 2011 02:54:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Scott Schaefer <saschaefer@neurodiverse.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>.
(Sun, 08 May 2011 02:54:03 GMT) (full text, mbox, link).
From: Scott Schaefer <saschaefer@neurodiverse.org>
To: 397730@bugs.debian.org
Subject: Confirmed Fixed
Date: Sat, 07 May 2011 22:51:05 -0400
I am unable to determine w/o significant effort when/how this was fixed
[or even if it was perhaps a problem in sudo].
However, I have verified that the following works in both stable
(0.9.8o-4squeeze1), and testing (1.0.0d-2)
$ sudo openssl genrsa -aes192 -out /tmp/host.example.edu.key 1024
[sudo] password for saschaefer:
Generating RSA private key, 1024 bit long modulus
....++++++
..........................++++++
e is 65537 (0x10001)
Enter pass phrase for /tmp/host.example.edu.key:
Verifying - Enter pass phrase for /tmp/host.example.edu.key:
Reply sent
to Scott Schaefer <saschaefer@neurodiverse.org>:
You have taken responsibility.
(Sun, 08 May 2011 02:54:05 GMT) (full text, mbox, link).
Notification sent
to Chris Adams <cadams@salk.edu>:
Bug acknowledged by developer.
(Sun, 08 May 2011 02:54:06 GMT) (full text, mbox, link).
From: Scott Schaefer <saschaefer@neurodiverse.org>
To: 397730-done@bugs.debian.org
Subject: Close: Fixed upstream
Date: Sat, 07 May 2011 22:51:24 -0400
Package: openssl
Version: 0.9.8o-4squeeze1
This bug is confirmed fixed by upstream in version 0.9.8o-4squeeze1
(available in stable)
Marked as fixed in versions openssl/1.0.0d-2.
Request was from Andreas Beckmann <anbe@debian.org>
to control@bugs.debian.org.
(Sat, 02 Nov 2013 15:57:08 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 01 Dec 2013 07:32:16 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the GNU General
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.