Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#69311 - [testssl.sh] upstream error while scanning for vulnerabilities
Attached to Project:
Community Packages
Opened by Alexandre ZANNI (noraj) - Wednesday, 13 January 2021, 15:14 GMT
Last edited by Jelle van der Waa (jelly) - Wednesday, 13 January 2021, 15:22 GMT
Opened by Alexandre ZANNI (noraj) - Wednesday, 13 January 2021, 15:14 GMT
Last edited by Jelle van der Waa (jelly) - Wednesday, 13 January 2021, 15:22 GMT
|
DetailsDescription:
Additional info: * package version: 3.0.2 * link to upstream bug report: https://github.com/drwetter/testssl.sh/issues/1823 * solution: upstream issue fixed in 3.0.4 |
This task depends upon
I'm actually running the 3.0.4 check(), I have no error so far but it's very long to run so I'll keep you up to date if I encounter one. Have you any error report to share?
STARTTLS XMPP unit tests via OpenSSL --> jabber.org:5222 ...
not ok 8 -
# Failed test ''
# at t/25_baseline_starttls.t line 99.
# '
# Start 2021-01-13 19:54:02 -->> 208.68.163.218:5222 (jabber.org) <<--
#
# A record via: supplied IP "208.68.163.218"
# rDNS (208.68.163.218): xmpp.org.
# ./testssl.sh: line 18364: 252289 Segmentation fault (core dumped) $OPENSSL s_client $(s_client_options "$STARTTLS_OPTIMAL_PROTO $BUGS -connect "$NODEIP:$PORT" $PROXY -msg $STARTTLS $SNI") < /dev/null > $TMPFILE 2>> $ERRFILE
# ./testssl.sh: line 18364: 252300 Segmentation fault (core dumped) $OPENSSL s_client $(s_client_options "$STARTTLS_OPTIMAL_PROTO $BUGS -connect "$NODEIP:$PORT" $PROXY -msg $STARTTLS $SNI") < /dev/null > $TMPFILE 2>> $ERRFILE
# ./testssl.sh: line 18364: 252312 Segmentation fault (core dumped) $OPENSSL s_client $(s_client_options "$STARTTLS_OPTIMAL_PROTO $BUGS -connect "$NODEIP:$PORT" $PROXY -msg $STARTTLS $SNI") < /dev/null > $TMPFILE 2>> $ERRFILE
# ./testssl.sh: line 18364: 252323 Segmentation fault (core dumped) $OPENSSL s_client $(s_client_options "$STARTTLS_OPTIMAL_PROTO $BUGS -connect "$NODEIP:$PORT" $PROXY -msg $STARTTLS $SNI") < /dev/null > $TMPFILE 2>> $ERRFILE
# ./testssl.sh: line 18364: 252332 Segmentation fault (core dumped) $OPENSSL s_client $(s_client_options "$STARTTLS_OPTIMAL_PROTO $BUGS -connect "$NODEIP:$PORT" $PROXY -msg $STARTTLS $SNI") < /dev/null > $TMPFILE 2>> $ERRFILE
#
# jabber.org:5222 doesn't seem to be a TLS/SSL enabled server
# The results might look ok but they could be nonsense. Really proceed ? ("yes" to continue) -->
# '
# matches '(?^:(e|E)rror|(f|F)atal|\.\/testssl\.sh: line |Oops|s_client connect problem)'
I just `updpkgsums` the PKGBUILD to 3.0.4, installed it with `makepkg -fsri --nocheck` since there is only one test failing in check(), and re-ran the same command on the same target as in https://github.com/drwetter/testssl.sh/issues/1808#issuecomment-750905034 and now it works perfectly.