[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#701978: unblock: kmess/2.0.6.1-3



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Hello, 

could you please unblock the kmess package? the latest -3 upload 
contains a fix for the bug #697918 "deconnection each minute":
http://bugs.debian.org/697918


Thank you.
diff -Nru kmess-2.0.6.1/debian/changelog kmess-2.0.6.1/debian/changelog
--- kmess-2.0.6.1/debian/changelog	2011-11-09 15:32:03.000000000 +0100
+++ kmess-2.0.6.1/debian/changelog	2013-01-17 22:35:08.000000000 +0100
@@ -1,3 +1,9 @@
+kmess (2.0.6.1-3) unstable; urgency=low
+
+  * Add use_ssl_v3.diff, avoids disconnections each minute. (Closes: #697918)
+
+ -- José Manuel Santamaría Lema <panfaust@gmail.com>  Thu, 17 Jan 2013 22:34:48 +0100
+
 kmess (2.0.6.1-2) unstable; urgency=high
 
   * Add follow-location-redirects.diff, this makes KMess usable with the latest
diff -Nru kmess-2.0.6.1/debian/patches/series kmess-2.0.6.1/debian/patches/series
--- kmess-2.0.6.1/debian/patches/series	2011-11-09 14:44:13.000000000 +0100
+++ kmess-2.0.6.1/debian/patches/series	2013-01-16 22:06:38.000000000 +0100
@@ -1 +1,2 @@
 follow-location-redirects.diff
+use_ssl_v3.diff
diff -Nru kmess-2.0.6.1/debian/patches/use_ssl_v3.diff kmess-2.0.6.1/debian/patches/use_ssl_v3.diff
--- kmess-2.0.6.1/debian/patches/use_ssl_v3.diff	1970-01-01 01:00:00.000000000 +0100
+++ kmess-2.0.6.1/debian/patches/use_ssl_v3.diff	2013-01-17 22:30:33.000000000 +0100
@@ -0,0 +1,34 @@
+Author: José Manuel Santamaría Lema <panfaust@gmail.com>
+Description: This patch forces KMess to use SSLv3.
+ This patch is needed because with recent versions of openssl kmess disconnects
+ and connects again each minute: http://bugs.debian.org/697918
+ Downgrading openssl to an older version solves the problem, however, this isn't
+ probably a bug in openssl but in the MSN servers, see:
+ http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=666012#31
+ .
+ For the record, emesene had the same problem and their upstream developers
+ solved the problem doing the same, just using SSLv3.
+Forwarded: yes, but upstream isn't maintaining the program anymore
+Bug-Debian: http://bugs.debian.org/697918
+Last-Update: 2013-01-17
+--- a/src/network/soap/httpsoapconnection.cpp
++++ b/src/network/soap/httpsoapconnection.cpp
+@@ -31,6 +31,7 @@
+ #include <QNetworkRequest>
+ #include <QNetworkReply>
+ #include <QSslError>
++#include <QSslConfiguration>
+ 
+ #include <KLocale>
+ 
+@@ -353,6 +354,10 @@ void HttpSoapConnection::sendNextRequest
+     request.setRawHeader( "SOAPAction", quotedAction.toLatin1() );
+   }
+ 
++  QSslConfiguration ssl_config = request.sslConfiguration();
++  ssl_config.setProtocol(QSsl::SslV3);
++  request.setSslConfiguration(ssl_config);
++
+   http_->post( request, contents );
+ 
+   // Start the response timer

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: