Debian Bug report logs -
#812708
Alternative chain verification failure after 1024b root CAs removal
Reported by: Leszek Dubiel <leszek.dubiel@dubielvitrum.pl>
Date: Mon, 25 Jan 2016 23:57:02 UTC
Severity: grave
Merged with 812488
Fixed in versions openssl/1.0.2d-1, openssl/1.0.1t-1+deb8u1
Done: Jonathan Wiltshire <jmw@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Mon, 25 Jan 2016 23:57:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Leszek Dubiel <leszek.dubiel@dubielvitrum.pl>:
New Bug report received and forwarded. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Mon, 25 Jan 2016 23:57:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Subject: ca-certificates: on fresh debian install typical ssl session fails on Thawte certificates
Package: ca-certificates
Version: 20141019+deb8u1
Severity: normal
Dear Maintainer,
After updating from Debian Jessie 8.2 to 8.3 some certificates got broken. When I run command:
echo GET | openssl s_client -connectwww.ecod.pl:443 2>&1 | head -n3
the result is:
depth=2 C = US, O = "thawte, Inc.", OU = Certification Services Division, OU = "(c) 2006 thawte, Inc. - For authorized use only", CN = thawte Primary Root CA
verify error:num=20:unable to get local issuer certificate
verify return:0
I have done fresh Debian Jessie installation. Certificate verification also fails.
To solve the problem I have had to copy /etc/ssl/certs and /usr/share/ca-certificates directories from Ubuntu.
-- System Information:
Debian Release: 8.3
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux 3.16.0-4-586
Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages ca-certificates depends on:
ii debconf [debconf-2.0] 1.5.56
ii openssl 1.0.1k-3+deb8u2
ca-certificates recommends no packages.
ca-certificates suggests no packages.
-- debconf information:
ca-certificates/new_crts:
ca-certificates/trust_new_crts: yes
ca-certificates/title:
ca-certificates/enable_crts: mozilla/ACCVRAIZ1.crt, mozilla/ACEDICOM_Root.crt, mozilla/AC_Raíz_Certicámara_S.A..crt, mozilla/Actalis_Authentication_Root_CA.crt, mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Low-Value_Services_Root.crt, mozilla/AddTrust_Public_Services_Root.crt, mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/AffirmTrust_Commercial.crt, mozilla/AffirmTrust_Networking.crt, mozilla/AffirmTrust_Premium.crt, mozilla/AffirmTrust_Premium_ECC.crt, mozilla/ApplicationCA_-_Japanese_Government.crt, mozilla/Atos_TrustedRoot_2011.crt,
mozilla/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.crt,
mozilla/Baltimore_CyberTrust_Root.crt, mozilla/Buypass_Class_2_CA_1.crt,
mozilla/Buypass_Class_2_Root_CA.crt,
mozilla/Buypass_Class_3_Root_CA.crt, mozilla/CA_Disig.crt,
mozilla/CA_Disig_Root_R1.crt, mozilla/CA_Disig_Root_R2.crt,
mozilla/Camerfirma_Chambers_of_Commerce_Root.crt,
mozilla/Camerfirma_Global_Chambersign_Root.crt,
mozilla/CA_WoSign_ECC_Root.crt,
mozilla/Certification_Authority_of_WoSign_G2.crt, mozilla/Certigna.crt,
mozilla/Certinomis_-_Autorité_Racine.crt, mozilla/Certinomis_-_Root_CA.crt,
mozilla/Certplus_Class_2_Primary_CA.crt, mozilla/certSIGN_ROOT_CA.crt,
mozilla/Certum_Root_CA.crt, mozilla/Certum_Trusted_Network_CA.crt,
mozilla/CFCA_EV_ROOT.crt, mozilla/Chambers_of_Commerce_Root_-_2008.crt,
mozilla/China_Internet_Network_Information_Center_EV_Certificates_Root.crt,
mozilla/CNNIC_ROOT.crt, mozilla/Comodo_AAA_Services_root.crt,
mozilla/COMODO_Certification_Authority.crt,
mozilla/COMODO_ECC_Certification_Authority.crt,
mozilla/COMODO_RSA_Certification_Authority.crt,
mozilla/Comodo_Secure_Services_root.crt,
mozilla/Comodo_Trusted_Services_root.crt, mozilla/ComSign_CA.crt,
mozilla/Cybertrust_Global_Root.crt,
mozilla/Deutsche_Telekom_Root_CA_2.crt,
mozilla/DigiCert_Assured_ID_Root_CA.crt,
mozilla/DigiCert_Assured_ID_Root_G2.crt,
mozilla/DigiCert_Assured_ID_Root_G3.crt,
mozilla/DigiCert_Global_Root_CA.crt,
mozilla/DigiCert_Global_Root_G2.crt,
mozilla/DigiCert_Global_Root_G3.crt,
mozilla/DigiCert_High_Assurance_EV_Root_CA.crt,
mozilla/DigiCert_Trusted_Root_G4.crt, mozilla/DST_ACES_CA_X6.crt,
mozilla/DST_Root_CA_X3.crt, mozilla/D-TRUST_Root_Class_3_CA_2_2009.crt,
mozilla/D-TRUST_Root_Class_3_CA_2_EV_2009.crt,
mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt,
mozilla/EC-ACC.crt, mozilla/EE_Certification_Centre_Root_CA.crt,
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt,
mozilla/Entrust_Root_Certification_Authority.crt,
mozilla/Entrust_Root_Certification_Authority_-_EC1.crt, mozilla/Entrust_Root_Certification_Authority_-_G2.crt, mozilla/ePKI_Root_Certification_Authority.crt,
mozilla/Equifax_Secure_CA.crt,
mozilla/Equifax_Secure_eBusiness_CA_1.crt,
mozilla/Equifax_Secure_Global_eBusiness_CA.crt,
mozilla/E-Tugra_Certification_Authority.crt,
mozilla/GeoTrust_Global_CA_2.crt, mozilla/GeoTrust_Global_CA.crt,
mozilla/GeoTrust_Primary_Certification_Authority.crt,
mozilla/GeoTrust_Primary_Certification_Authority_-_G2.crt, mozilla/GeoTrust_Primary_Certification_Authority_-_G3.crt, mozilla/GeoTrust_Universal_CA_2.crt,
mozilla/GeoTrust_Universal_CA.crt, mozilla/Global_Chambersign_Root_-_2008.crt, mozilla/GlobalSign_ECC_Root_CA_-_R4.crt, mozilla/GlobalSign_ECC_Root_CA_-_R5.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/GlobalSign_Root_CA_-_R2.crt, mozilla/GlobalSign_Root_CA_-_R3.crt, mozilla/Go_Daddy_Class_2_CA.crt,
mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt,
mozilla/Hellenic_Academic_and_Research_Institutions_RootCA_2011.crt,
mozilla/Hongkong_Post_Root_CA_1.crt,
mozilla/IdenTrust_Commercial_Root_CA_1.crt,
mozilla/IdenTrust_Public_Sector_Root_CA_1.crt, mozilla/IGC_A.crt,
mozilla/Izenpe.com.crt, mozilla/Juur-SK.crt,
mozilla/Microsec_e-Szigno_Root_CA_2009.crt,
mozilla/Microsec_e-Szigno_Root_CA.crt, mozilla/NetLock_Arany_=Class_Gold=_Főtanúsítvány.crt, mozilla/NetLock_Business_=Class_B=_Root.crt, mozilla/NetLock_Express_=Class_C=_Root.crt, mozilla/NetLock_Notary_=Class_A=_Root.crt, mozilla/NetLock_Qualified_=Class_QA=_Root.crt, mozilla/Network_Solutions_Certificate_Authority.crt,
mozilla/OISTE_WISeKey_Global_Root_GA_CA.crt,
mozilla/OISTE_WISeKey_Global_Root_GB_CA.crt, mozilla/PSCProcert.crt,
mozilla/QuoVadis_Root_CA_1_G3.crt, mozilla/QuoVadis_Root_CA_2.crt,
mozilla/QuoVadis_Root_CA_2_G3.crt, mozilla/QuoVadis_Root_CA_3.crt,
mozilla/QuoVadis_Root_CA_3_G3.crt, mozilla/QuoVadis_Root_CA.crt,
mozilla/Root_CA_Generalitat_Valenciana.crt,
mozilla/RSA_Security_2048_v3.crt, mozilla/Secure_Global_CA.crt,
mozilla/SecureSign_RootCA11.crt, mozilla/SecureTrust_CA.crt,
mozilla/Security_Communication_EV_RootCA1.crt,
mozilla/Security_Communication_RootCA2.crt,
mozilla/Security_Communication_Root_CA.crt,
mozilla/Sonera_Class_1_Root_CA.crt, mozilla/Sonera_Class_2_Root_CA.crt,
mozilla/Staat_der_Nederlanden_EV_Root_CA.crt,
mozilla/Staat_der_Nederlanden_Root_CA.crt,
mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt, mozilla/Staat_der_Nederlanden_Root_CA_-_G3.crt, mozilla/Starfield_Class_2_CA.crt,
mozilla/Starfield_Root_Certificate_Authority_-_G2.crt, mozilla/Starfield_Services_Root_Certificate_Authority_-_G2.crt, mozilla/StartCom_Certification_Authority_2.crt,
mozilla/StartCom_Certification_Authority.crt,
mozilla/StartCom_Certification_Authority_G2.crt,
mozilla/S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN.crt,
mozilla/S-TRUST_Universal_Root_CA.crt, mozilla/Swisscom_Root_CA_1.crt,
mozilla/Swisscom_Root_CA_2.crt, mozilla/Swisscom_Root_EV_CA_2.crt,
mozilla/SwissSign_Gold_CA_-_G2.crt, mozilla/SwissSign_Platinum_CA_-_G2.crt, mozilla/SwissSign_Silver_CA_-_G2.crt, mozilla/Taiwan_GRCA.crt,
mozilla/TC_TrustCenter_Class_3_CA_II.crt,
mozilla/TeliaSonera_Root_CA_v1.crt, mozilla/thawte_Primary_Root_CA.crt,
mozilla/thawte_Primary_Root_CA_-_G2.crt, mozilla/thawte_Primary_Root_CA_-_G3.crt, mozilla/Trustis_FPS_Root_CA.crt,
mozilla/T-TeleSec_GlobalRoot_Class_2.crt,
mozilla/T-TeleSec_GlobalRoot_Class_3.crt,
mozilla/TÜBİTAK_UEKAE_Kök_Sertifika_Hizmet_Sağlayıcısı_-_Sürüm_3.crt,
mozilla/TURKTRUST_Certificate_Services_Provider_Root_2007.crt,
mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H5.crt,
mozilla/TÜRKTRUST_Elektronik_Sertifika_Hizmet_Sağlayıcısı_H6.crt,
mozilla/TWCA_Global_Root_CA.crt,
mozilla/TWCA_Root_Certification_Authority.crt,
mozilla/USERTrust_ECC_Certification_Authority.crt,
mozilla/USERTrust_RSA_Certification_Authority.crt,
mozilla/UTN_USERFirst_Email_Root_CA.crt,
mozilla/UTN_USERFirst_Hardware_Root_CA.crt,
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt,
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_2.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt,
mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt, mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt, mozilla/VeriSign_Universal_Root_Certification_Authority.crt, mozilla/Visa_eCommerce_Root.crt, mozilla/WellsSecure_Public_Root_Certificate_Authority.crt, mozilla/WoSign_China.crt, mozilla/WoSign.crt, mozilla/XRamp_Global_CA_Root.crt, spi-inc.org/spi-cacert-2008.crt
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Tue, 26 Jan 2016 21:48:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Yvan - Dugwood <yvan@dugwood.com>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Tue, 26 Jan 2016 21:48:07 GMT) (full text, mbox, link).
Message #10 received at 812708@bugs.debian.org (full text, mbox, reply):
Before upgrading the package, if you run:
strace curl -O /dev/null -Iv https://www.ecod.pl
(I kept your url as a test)
=> stat("/etc/ssl/certs/98ec67f0.0", {st_mode=S_IFREG|0644,
st_size=1155, ...}) = 0
ls -al /etc/ssl/certs/98ec67f0.0
lrwxrwxrwx 1 root root 28 avril 27 2015 /etc/ssl/certs/98ec67f0.0 ->
Thawte_Premium_Server_CA.pem
ls -al /etc/ssl/certs/Thawte_Premium_Server_CA.pem
lrwxrwxrwx 1 root root 63 avril 29 2014
/etc/ssl/certs/Thawte_Premium_Server_CA.pem ->
/usr/share/ca-certificates/mozilla/Thawte_Premium_Server_CA.crt
But, after the upgrade:
stat("/etc/ssl/certs/98ec67f0.0", 0x7fff3c5501d0) = -1 ENOENT (No such
file or directory)
Same file, but can't be found anymore.
I've already tried «sudo update-ca-certificates --fresh», with no luck,
as there's no Thawte Premium CA anymore. The only way is to copy the
file from an older release (see http://curl.haxx.se/docs/caextract.html,
under «RSA-1024 removed»).
So far I don't know if the issue is the missing file or the fact that
the certificate should be in another file, which is badly linked.
Best regards,
Yvan.
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Wed, 27 Jan 2016 12:57:11 GMT) (full text, mbox, link).
Acknowledgement sent
to Christian Beer <christian.beer@aei.mpg.de>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Wed, 27 Jan 2016 12:57:11 GMT) (full text, mbox, link).
Message #15 received at 812708@bugs.debian.org (full text, mbox, reply):
Hi,
I can maybe shed some more light on this. The problem is that the
"Thawte Premium Server CA" was removed from the certificate store with
20141019+deb8u1. On Stretch this is not a problem because openssl is on
1.0.2 there. On Jessie we have 1.0.1 which can not verify cross signed
certificates as it seems.
I tested with a current Jessie and Stretch installation and it turns out
that openssl 1.0.2 verifies the "Thawte Primary Root CA" correctly
because it is in the certificate store. With openssl 1.0.1 this
verification fails because it looks for the (removed) "Thawte Premium
Server CA". I first thought it only affects servers that send both
chains but as Leszek writes this also affects him.
We publish the chain like this: servercert, thawte SSL CA - G2, Thawte
Primary Root CA, Thawte Premium Server CA
Looking at the Thawte website you can clearly see that the "Thawte
Premium Server CA" is still operational and should not be excluded from
certificate stores (https://www.thawte.com/roots/index.html). The
certificate is obviously still need for openssl 1.0.1
For reference here are the openssl bug reports that fix the alternate
chain problem in 1.0.2:
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3637
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3621
So I would like to see the "Thawte Premium Server CA" in the Debian
Jessie certificate store again very soon. This currently will disconnect
all Volunteers running BOINC from at least two big projects
(Einstein@home, WorldCommunityGrid) as soon as they update to
20141019+deb8u1. Another solution would be to update openssl to 1.0.2 on
Jessie but I doubt that this is easier than re-adding the certificate.
I have done more troubleshooting and can provide more evidence if needed.
Kind regards
Christian
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#812708; Package ca-certificates.
(Wed, 27 Jan 2016 16:33:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Shuler <michael@pbandjelly.org>:
Extra info received and forwarded to list.
(Wed, 27 Jan 2016 16:33:05 GMT) (full text, mbox, link).
Message #20 received at 812708@bugs.debian.org (full text, mbox, reply):
On 01/27/2016 06:47 AM, Christian Beer wrote:
> I tested with a current Jessie and Stretch installation and it turns out
> that openssl 1.0.2 verifies the "Thawte Primary Root CA" correctly
> because it is in the certificate store. With openssl 1.0.1 this
> verification fails because it looks for the (removed) "Thawte Premium
> Server CA". I first thought it only affects servers that send both
> chains but as Leszek writes this also affects him.
Thank you for the details!
> So I would like to see the "Thawte Premium Server CA" in the Debian
> Jessie certificate store again very soon.
Yep, sorry for the regression, but I appreciate the extra info - it
helps solve some of my own troubleshooting.
--
Kind regards,
Michael
Severity set to 'important' from 'normal'
Request was from Michael Shuler <michael@pbandjelly.org>
to control@bugs.debian.org.
(Thu, 28 Jan 2016 05:09:04 GMT) (full text, mbox, link).
Merged 812488 812708
Request was from Michael Shuler <michael@pbandjelly.org>
to control@bugs.debian.org.
(Thu, 28 Jan 2016 05:09:06 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Thu, 28 Jan 2016 15:48:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Peter Dahlberg <catdog2@tuxzone.org>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Thu, 28 Jan 2016 15:48:05 GMT) (full text, mbox, link).
Message #29 received at 812708@bugs.debian.org (full text, mbox, reply):
Hi,
There seems to be a similar looking issue because of the removed "GTE
CyberTrust Global Root".
jessie:
$ openssl s_client -connect pictureis24-a.akamaihd.net:443
CONNECTED(00000003)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/C=US/ST=MA/L=Cambridge/O=Akamai Technologies Inc./CN=a248.e.akamai.net
i:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
Akamai SureServer CA G14-SHA2
1 s:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
Akamai SureServer CA G14-SHA2
i:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
2 s:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE
CyberTrust Global Root
---
testing:
% openssl s_client -connect pictureis24-a.akamaihd.net:443
CONNECTED(00000003)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
verify return:1
depth=1 C = NL, L = Amsterdam, O = Verizon Enterprise Solutions, OU =
Cybertrust, CN = Verizon Akamai SureServer CA G14-SHA2
verify return:1
depth=0 C = US, ST = MA, L = Cambridge, O = Akamai Technologies Inc., CN =
a248.e.akamai.net
verify return:1
---
Certificate chain
0 s:/C=US/ST=MA/L=Cambridge/O=Akamai Technologies Inc./CN=a248.e.akamai.net
i:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
Akamai SureServer CA G14-SHA2
1 s:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
Akamai SureServer CA G14-SHA2
i:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
2 s:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE
CyberTrust Global Root
---
Kind regards,
Peter
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Fri, 05 Feb 2016 12:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Rich <forums@artfulrobot.uk>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Fri, 05 Feb 2016 12:27:04 GMT) (full text, mbox, link).
Message #34 received at 812708@bugs.debian.org (full text, mbox, reply):
subject says it all.
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#812708; Package ca-certificates.
(Fri, 05 Feb 2016 15:42:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Shuler <michael@pbandjelly.org>:
Extra info received and forwarded to list.
(Fri, 05 Feb 2016 15:42:13 GMT) (full text, mbox, link).
Message #39 received at 812708@bugs.debian.org (full text, mbox, reply):
On 02/05/2016 05:49 AM, Rich wrote:
> subject says it all.
Please provide a specific URL to test. The "Baltimore CyberTrust Root"
CA may be a different issue, looking at several mozilla bugzilla
tickets, but I can't tell without any detail.
Thanks, Michael
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Sun, 07 Feb 2016 18:24:21 GMT) (full text, mbox, link).
Acknowledgement sent
to nandhp <nandhp@gmail.com>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Sun, 07 Feb 2016 18:24:21 GMT) (full text, mbox, link).
Message #44 received at 812708@bugs.debian.org (full text, mbox, reply):
I am having the same problem with apis.live.net:443. I am running Debian
stable with ca-certificates 20141019+deb8u1.
Thanks.
-nandhp
$ openssl s_client -connect apis.live.net:443
CONNECTED(00000003)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore
CyberTrust Root
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/C=US/ST=WA/L=Redmond/O=Microsoft Corporation/OU=Microsoft
Corporation/CN=storage.live.com
i:/C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/OU=Microsoft
IT/CN=Microsoft IT SSL SHA2
1 s:/C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/OU=Microsoft
IT/CN=Microsoft IT SSL SHA2
i:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
2 s:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE
CyberTrust Global Root
---
Server certificate
[...]
subject=/C=US/ST=WA/L=Redmond/O=Microsoft Corporation/OU=Microsoft
Corporation/CN=storage.live.com
issuer=/C=US/ST=Washington/L=Redmond/O=Microsoft
Corporation/OU=Microsoft IT/CN=Microsoft IT SSL SHA2
---
No client certificate CA names sent
---
SSL handshake has read 6828 bytes and written 509 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-SHA384
Session-ID: [...]
Session-ID-ctx:
Master-Key: [...]
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1454865834
Timeout : 300 (sec)
Verify return code: 20 (unable to get local issuer certificate)
---
^C
On Thu, 28 Jan 2016 16:44:09 +0100 Peter Dahlberg <catdog2@tuxzone.org>
wrote:
> Hi,
>
> There seems to be a similar looking issue because of the removed "GTE
> CyberTrust Global Root".
>
> jessie:
>
> $ openssl s_client -connect pictureis24-a.akamaihd.net:443
> CONNECTED(00000003)
> depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
> verify error:num=20:unable to get local issuer certificate
> verify return:0
> ---
> Certificate chain
> 0 s:/C=US/ST=MA/L=Cambridge/O=Akamai Technologies Inc./CN=a248.e.akamai.net
> i:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
> Akamai SureServer CA G14-SHA2
> 1 s:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
> Akamai SureServer CA G14-SHA2
> i:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
> 2 s:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
> i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE
> CyberTrust Global Root
> ---
>
> testing:
>
> % openssl s_client -connect pictureis24-a.akamaihd.net:443
> CONNECTED(00000003)
> depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
> verify return:1
> depth=1 C = NL, L = Amsterdam, O = Verizon Enterprise Solutions, OU =
> Cybertrust, CN = Verizon Akamai SureServer CA G14-SHA2
> verify return:1
> depth=0 C = US, ST = MA, L = Cambridge, O = Akamai Technologies Inc., CN =
> a248.e.akamai.net
> verify return:1
> ---
> Certificate chain
> 0 s:/C=US/ST=MA/L=Cambridge/O=Akamai Technologies Inc./CN=a248.e.akamai.net
> i:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
> Akamai SureServer CA G14-SHA2
> 1 s:/C=NL/L=Amsterdam/O=Verizon Enterprise Solutions/OU=Cybertrust/CN=Verizon
> Akamai SureServer CA G14-SHA2
> i:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
> 2 s:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root
> i:/C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE
> CyberTrust Global Root
> ---
>
> Kind regards,
> Peter
>
>
>
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Mon, 08 Feb 2016 10:21:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Rich Lott - Artful Robot <forums@artfulrobot.uk>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Mon, 08 Feb 2016 10:21:03 GMT) (full text, mbox, link).
Message #49 received at 812708@bugs.debian.org (full text, mbox, reply):
Hi Michael,
Thanks for getting back. Good you did as I was wrong!
Here's what's failing under Debian Jessie:
echo GET | openssl s_client -CApath /etc/ssl/certs/ -connect
us9.api.mailchimp.com:443 2>&1 | head -n5
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore
CyberTrust Root
verify error:num=20:unable to get local issuer certificate
verify return:0
I tracked this down to the following change in ca-certificates.conf:
Was:
mozilla/GTE_CyberTrust_Global_Root.crt
Is:
#!mozilla/GTE_CyberTrust_Global_Root.crt
By adding that certificate back in (from a local Ubuntu), adding it back
to /etc/ca-certificates.conf and running update-ca-certificates,
Mailchimp's API works again.
Hope this is useful, I have to admit I'm at the limit of my
understanding on this!
Thanks,
Rich
On 05/02/16 15:40, Michael Shuler wrote:
> On 02/05/2016 05:49 AM, Rich wrote:
>> subject says it all.
>
> Please provide a specific URL to test. The "Baltimore CyberTrust Root"
> CA may be a different issue, looking at several mozilla bugzilla
> tickets, but I can't tell without any detail.
>
> Thanks, Michael
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Wed, 10 Feb 2016 20:54:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Miguel Jacq <mig@mig5.net>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Wed, 10 Feb 2016 20:54:08 GMT) (full text, mbox, link).
Message #54 received at 812708@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Confirming that I too had to re-add the Thawte_Premium_Server_CA.crt and GTE_CyberTrust_Global_Root.crt before I could make requests to Twilio and Mailchimp APIs (respectively) again on Debian 8.3.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Mon, 15 Feb 2016 17:30:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Tom Freudenberg <th.freudenberg@googlemail.com>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Mon, 15 Feb 2016 17:30:03 GMT) (full text, mbox, link).
Message #59 received at 812708@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
As we got an issue while doing downloads of
curl -L -O https://dl.bintray.com/4commerce-technologies-ag/meteor-universal/arm_dev_bundles/dev_bundle_Linux_armv7l_0.5.16.tar.gz
that was happened too to the latest debian stable update
A fix was to install a previous package of ca-certificates by downloading from pool and manual replacement with dpkg.
Tom
P.S. Read more about that issue on :: https://github.com/4commerce-technologies-AG/meteor/issues/37
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Tue, 16 Feb 2016 17:24:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Tony den Haan <tony@tuxick.net>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Tue, 16 Feb 2016 17:24:08 GMT) (full text, mbox, link).
Message #64 received at 812708@bugs.debian.org (full text, mbox, reply):
openssl s_client -connect gmail-smtp-in.l.google.com:25 -starttls smtp
on jessie: (and ubuntu lts :)
Verify return code: 20 (unable to get local issuer certificate)
on testing:
Verify return code: 0 (ok)
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#812708; Package ca-certificates.
(Thu, 25 Feb 2016 14:57:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Shuler <michael@pbandjelly.org>:
Extra info received and forwarded to list.
(Thu, 25 Feb 2016 14:57:07 GMT) (full text, mbox, link).
Message #69 received at 812708@bugs.debian.org (full text, mbox, reply):
On 02/16/2016 11:22 AM, Tony den Haan wrote:
> openssl s_client -connect gmail-smtp-in.l.google.com:25 -starttls smtp
>
> on jessie: (and ubuntu lts :)
> Verify return code: 20 (unable to get local issuer certificate)
>
> on testing:
> Verify return code: 0 (ok)
>
This appears to be unrelated to this bug report and your command works
correctly on Jessie if given a CApath. I assume this is a behavioral
difference in openssl.
openssl s_client -CApath /etc/ssl/certs -connect
gmail-smtp-in.l.google.com:25 -starttls smtp
CONNECTED(00000003)
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = Google Inc, CN = Google Internet Authority G2
verify return:1
depth=0 C = US, ST = California, L = Mountain View, O = Google Inc, CN =
mx.google.com
verify return:1
---
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=mx.google.com
i:/C=US/O=Google Inc/CN=Google Internet Authority G2
1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
---
<...>
Verify return code: 0 (ok)
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#812708; Package ca-certificates.
(Thu, 25 Feb 2016 15:09:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Shuler <michael@pbandjelly.org>:
Extra info received and forwarded to list.
(Thu, 25 Feb 2016 15:09:03 GMT) (full text, mbox, link).
Message #74 received at 812708@bugs.debian.org (full text, mbox, reply):
On 02/25/2016 08:58 AM, Tony den Haan wrote:
> That is the problem, it requires -CApath, while /etc/ssl/certs should be
> default. On testing it works ok without it.
Which is unrelated to the ca-certificates package - that's my point :)
Feel free to open a new bug report for the openssl package describing
your problem, although I would suggest that this behavior change between
openssl versions in stable and testing means that feature was fixed or
added between those versions. Regardless, this is not related to
ca-certificates in any way.
--
Kind regards,
Michael
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Thu, 25 Feb 2016 17:57:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Rémi Rampin <remirampin@gmail.com>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Thu, 25 Feb 2016 17:57:04 GMT) (full text, mbox, link).
Message #79 received at 812708@bugs.debian.org (full text, mbox, reply):
I think you get the problem at this point, but I'm going to mention
that this prevents people from using the installer for the Anaconda
Python distribution. Neither curl nor openssl connects to
repo.continuum.io. Same CA: thawte_Primary_Root_CA.crt
https://github.com/ContinuumIO/anaconda-issues/issues/670.
This breaks automatic CI systems everywhere too.
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Fri, 26 Feb 2016 08:21:17 GMT) (full text, mbox, link).
Acknowledgement sent
to Luca BRUNO <lucab@debian.org>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Fri, 26 Feb 2016 08:21:17 GMT) (full text, mbox, link).
Message #84 received at 812708@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
retitle 812488 Alternative chain verification failure after 1024b root CAs removal
severity 812488 grave
thanks
On Thu, 25 Feb 2016 09:14:19 -0600 Michael Shuler <michael@pbandjelly.org> wrote:
> On 02/22/2016 04:12 AM, Christian Beer wrote:
> > It seems that the openssl update is not happening soon. Can you please
> > include the 1024bit certificates again to solve this regression?
>
> Yeah, I have a work in progress branch that re-includes the 1024-bit
> CAs. Ran back into #743339 on upgrade, so needs some additional testing..
After a jessie upgrade today, I got the same regression and spent some time
debugging it (before finding this report) and got to the same conclusion as
other here: side effect of removing 1024b root CAs is that OpenSSL 1.0.1
fails to verify alternative chains (where a server-sent intermediate CA is
a locally trusted root one).
I'm re-titling an raising the severity here, hoping it will help other people
noticing the regression in the meanwhile.
Cheers, Luca
--
.''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso)
: :' : The Universal O.S. | lucab (AT) debian.org
`. `'` | GPG: 0xBB1A3A854F3BBEBF
`- http://www.debian.org | Debian GNU/Linux Developer
[signature.asc (application/pgp-signature, inline)]
Changed Bug title to 'Alternative chain verification failure after 1024b root CAs removal' from 'ca-certificates: on fresh debian install typical ssl session fails on Thawte certificates'
Request was from Luca BRUNO <lucab@debian.org>
to control@bugs.debian.org.
(Fri, 26 Feb 2016 08:21:22 GMT) (full text, mbox, link).
Severity set to 'grave' from 'important'
Request was from Luca BRUNO <lucab@debian.org>
to control@bugs.debian.org.
(Fri, 26 Feb 2016 08:21:25 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Tue, 01 Mar 2016 09:03:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Christian Beer <christian.beer@aei.mpg.de>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Tue, 01 Mar 2016 09:03:06 GMT) (full text, mbox, link).
Message #93 received at 812708@bugs.debian.org (full text, mbox, reply):
The removal of the 1024bit certificates just hit Ubuntu 14.04 and
because they use openssl 1.0.1f they are also affected. I filed a bug
report there:
https://bugs.launchpad.net/debian/+source/ca-certificates/+bug/1551615
Regards
Christian
Added blocking bug(s) of 812708: 774882
Request was from Christian Seiler <christian@iwakd.de>
to 774882-submit@bugs.debian.org.
(Mon, 28 Mar 2016 17:03:05 GMT) (full text, mbox, link).
Removed blocking bug(s) of 812708: 774882
Request was from kurt@roeckx.be (Kurt Roeckx)
to control@bugs.debian.org.
(Fri, 06 May 2016 13:09:06 GMT) (full text, mbox, link).
Removed blocking bug(s) of 812708: 774882
Request was from kurt@roeckx.be (Kurt Roeckx)
to control@bugs.debian.org.
(Fri, 06 May 2016 13:09:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Thu, 19 May 2016 11:36:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Andreas Sewe <andreas.sewe@codetrails.com>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Thu, 19 May 2016 11:36:03 GMT) (full text, mbox, link).
Message #104 received at 812708@bugs.debian.org (full text, mbox, reply):
FYI, removal of the "Thawte Premium Server CA" causes problems not only
with openssl, but also when Java verifies certificates (e.g., when
installing signed plugins in the Eclipse IDE).
Here's the output of jarsigner:
> jarsigner -verify -certs -verbose ./eclipse/plugins/com.codetrails.aether_1.14.0.v20160518-2203-b207.jar
...
> [entry was signed on 5/19/16 12:08 AM]
> X.509, CN=Codetrails GmbH, OU=IT Department, O=Codetrails GmbH, L=Darmstadt, ST=Hessen, C=DE
> [certificate is valid from 3/1/16 1:00 AM to 5/1/17 1:59 AM]
> X.509, CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US
> [certificate is valid from 12/10/13 1:00 AM to 12/10/23 12:59 AM]
> X.509, CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
> [certificate is valid from 11/17/06 1:00 AM to 12/31/20 12:59 AM]
> X.509, EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
> [certificate is valid from 8/1/96 2:00 AM to 1/2/21 12:59 AM]
> [CertPath not validated: Path does not chain with any of the trust anchors]
With the keystore Oracle ships with Java 1.8.0_91 this verifies fine:
> jarsigner -keystore cacerts.original -verify -certs -verbose ./eclipse/plugins/com.codetrails.aether_1.14.0.v20160518-2203-b207.jar
...
> [entry was signed on 5/19/16 12:08 AM]
> X.509, CN=Codetrails GmbH, OU=IT Department, O=Codetrails GmbH, L=Darmstadt, ST=Hessen, C=DE
> [certificate is valid from 3/1/16 1:00 AM to 5/1/17 1:59 AM]
> X.509, CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US
> [certificate is valid from 12/10/13 1:00 AM to 12/10/23 12:59 AM]
> X.509, CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
> [certificate is valid from 11/17/06 1:00 AM to 12/31/20 12:59 AM]
> X.509, EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA (thawtepremiumserverca)
> [certificate is valid from 8/1/96 2:00 AM to 1/2/21 12:59 AM]
Note, however, that it doesn't find the "thawte Primary Root CA"
*intermediate* certificate in its keystore, as no alias (like for
"(thawtepremiumserverca)") is shown.
However, the keystore shipped with Debian 8.4 *does* contain that
intermediate certificate:
> keytool -list -alias debian:thawte_primary_root_ca.pem -v -keystore /usr/lib/jvm/java-7-openjdk-amd64/jre/lib/security/cacerts
...
> Alias name: debian:thawte_primary_root_ca.pem
> Creation date: Apr 6, 2016
> Entry type: trustedCertEntry
>
> Owner: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
> Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
> Serial number: 344ed55720d5edec49f42fce37db2b6d
If this were found by jarsigner, then everything would be fine; that the
root certificate is not trusted is immaterial, as an intermediate
certificate already is. But unfortunately that's not the case. :-(
Hope that helps.
Andreas
--
Codetrails GmbH
The knowledge transfer company
Robert-Bosch-Str. 7, 64293 Darmstadt
Phone: +49-6151-276-7092
Mobile: +49-170-811-3791
http://www.codetrails.com/
Managing Director: Dr. Marcel Bruch
Handelsregister: Darmstadt HRB 91940
Information forwarded
to debian-bugs-dist@lists.debian.org, Michael Shuler <michael@pbandjelly.org>:
Bug#812708; Package ca-certificates.
(Thu, 19 May 2016 13:45:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Christian Beer <christian.beer@aei.mpg.de>:
Extra info received and forwarded to list. Copy sent to Michael Shuler <michael@pbandjelly.org>.
(Thu, 19 May 2016 13:45:06 GMT) (full text, mbox, link).
Message #109 received at 812708@bugs.debian.org (full text, mbox, reply):
On 19.05.2016 14:05, Andreas Sewe wrote:
> FYI, removal of the "Thawte Premium Server CA" causes problems not only
> with openssl, but also when Java verifies certificates (e.g., when
> installing signed plugins in the Eclipse IDE).
I think this is a separate issue with jarsigner not the ca-certificates
package.
> Note, however, that it doesn't find the "thawte Primary Root CA"
> *intermediate* certificate in its keystore, as no alias (like for
> "(thawtepremiumserverca)") is shown.
>
> However, the keystore shipped with Debian 8.4 *does* contain that
> intermediate certificate:
I think the tool can't find the "thawte Premium Server CA" certificate
(which was removed from ca-certificates) which is the old Root
certificate. But of course the "Thawte Primary Root CA" is still part of
ca-certificates because it is the "new" certificate. Both root certs are
eligible to certify your code signing intermediate certificate. You only
need one of the two certificates to be in the certificate store to
verify the intermediate, yet jarsigner wants to have both. This sounds
more like a problem with jarsigner which can not recognize alternative
certification chains. Much like the problem openssl has in the current
version in stable.
Regards
Christian
Message #110 received at 812488-done@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Control: reassign -1 openssl
Control: fixed -1 1.0.1t-1+deb8u1
Hi,
On Sun, Jan 24, 2016 at 12:32:39PM +0100, Rosario Maddox wrote:
> Package: libsms-send-perl
> Version: 1.06-2
> Severity: important
This is really an issue in openssl, and has been resolved since May.
Reassigning, closing, and setting versions.
--
Jonathan Wiltshire jmw@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
[signature.asc (application/pgp-signature, inline)]
Bug reassigned from package 'ca-certificates' to 'openssl'.
Request was from Jonathan Wiltshire <jmw@debian.org>
to control@bugs.debian.org.
(Mon, 27 Jun 2016 15:09:08 GMT) (full text, mbox, link).
No longer marked as found in versions ca-certificates/20141019+deb8u1.
Request was from Jonathan Wiltshire <jmw@debian.org>
to control@bugs.debian.org.
(Mon, 27 Jun 2016 15:09:10 GMT) (full text, mbox, link).
Marked as fixed in versions openssl/1.0.1t-1+deb8u1.
Request was from Jonathan Wiltshire <jmw@debian.org>
to control@bugs.debian.org.
(Mon, 27 Jun 2016 15:09:11 GMT) (full text, mbox, link).
Marked as fixed in versions openssl/1.0.2d-1.
Request was from kurt@roeckx.be (Kurt Roeckx)
to control@bugs.debian.org.
(Thu, 07 Jul 2016 15:09:08 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 05 Aug 2016 07:26:43 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Thu Apr 30 17:26:42 2020;
Machine Name:
beach
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.