[From nobody Sat Mar 21 13:45:05 2026
Received: (at 698219-done) by bugs.debian.org; 21 Mar 2026 13:43:06 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-5.0 required=4.0 tests=BAYES_00,DKIM_SIGNED,
 DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HAS_BUG_NUMBER,
 RCVD_IN_DNSWL_MED,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,
 RCVD_IN_VALIDITY_RPBL_BLOCKED,RCVD_IN_VALIDITY_SAFE_BLOCKED,
 SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 62; hammy, 138; neutral, 44; spammy,
 3. spammytokens:0.987-1--sk:wwwphy, 0.987-1--sk:www.phy,
 0.942-+--H*r:bugs.debian.org hammytokens:0.000-+--UD:debian.tar.xz,
 0.000-+--UD:tar.xz, 0.000-+--dget, 0.000-+--UD:1.orig.tar.gz,
 0.000-+--UD:0-2.dsc
Return-path: &lt;sebastian@breakpoint.cc&gt;
Received: from chamillionaire.breakpoint.cc ([91.216.245.30]:36848)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;sebastian@breakpoint.cc&gt;)
 id 1w3wbZ-007Wui-1u for 698219-done@bugs.debian.org;
 Sat, 21 Mar 2026 13:43:06 +0000
Date: Sat, 21 Mar 2026 14:43:00 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=breakpoint.cc;
 s=2025; t=1774100581;
 h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
 to:to:cc:mime-version:mime-version:content-type:content-type:
 in-reply-to:in-reply-to:references:references;
 bh=oDgWYrzRFsqYcYsEarefW0Do3dz31TECqu+AGEcReSA=;
 b=LWf69bIoqL4OFnDi8FQnYbH+iqERTfRgz5TDt0pHPdgXSxegcveMzY/y7UKaIXlQVEyR/V
 Bgr/ko/IJPaw/2yUwJW+CohXfdQqNYTURsnowliPTkFJIHuVtF8MhKXqBGscrrsHV5JWg+
 HttGn+vOM507m8279nP5xoiluosrdOjOyf6BXv3Lji4BS5XSNclh/zCpA6rdzeVdpWaDUC
 RXiTJKHvL1IDYfdzRNJDC18mArsid66KCWIsvM89TIOLkuBd9iX/xYHJmWc1NkRlVlc2Lq
 n8tyirAVVzaYvKwZkEeGQ+36NoddyDdo1fjYauuEiof90ZlyspgELuLYKv+Pbw==
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=breakpoint.cc;
 s=2025e; t=1774100581;
 h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
 to:to:cc:mime-version:mime-version:content-type:content-type:
 in-reply-to:in-reply-to:references:references;
 bh=oDgWYrzRFsqYcYsEarefW0Do3dz31TECqu+AGEcReSA=;
 b=eEpOoo6KyZa4Em7fpMMgvICgTBY8NZflCYJuQR3yJER/Srr2GR2hN+Ue6PJIBWdVV8y7mG
 r4SY2Y+Hw11V97Bg==
From: Sebastian Andrzej Siewior &lt;sebastian@breakpoint.cc&gt;
To: Mathieu Malaterre &lt;malat@debian.org&gt;, 698219-done@bugs.debian.org
Subject: Re: Bug#698219: dget: error:14077458:SSL
 routines:SSL23_GET_SERVER_HELLO:reason(1112)
Message-ID: &lt;20260321134300.VA2mLt1e@breakpoint.cc&gt;
References: &lt;20130115124434.1970.63702.reportbug@lirispat.univ-lyon1.fr&gt;
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: &lt;20130115124434.1970.63702.reportbug@lirispat.univ-lyon1.fr&gt;

On 2013-01-15 13:44:34 [+0100], Mathieu Malaterre wrote:
&gt; It would be nice it dget would allow passing something like --no-check-certificate (wget). Otherwise it fails on some https:
&gt; 
&gt; $ dget --insecure -u &quot;http://www.physik.tu-cottbus.de/~george/debian/unstable/source/libemf_1.0-2.dsc&quot;
&gt; dget: retrieving http://www.physik.tu-cottbus.de/~george/debian/unstable/source/libemf_1.0-2.dsc
&gt;   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
&gt;                                  Dload  Upload   Total   Spent    Left  Speed
&gt; 100   454  100   454    0     0   7186      0 --:--:-- --:--:-- --:--:-- 14645
&gt; curl: (35) error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112)
&gt; dget: curl libemf_1.0-2.dsc http://www.physik.tu-cottbus.de/~george/debian/unstable/source/libemf_1.0-2.dsc failed

I would assume this has been dealt with in the meantime. I am not sure
where how libssl gets here since the link is not having a https in there:
| $ dget http://ftp.de.debian.org/debian/pool/main/o/openssl/openssl_3.6.1-3.dsc
| dget: retrieving http://ftp.de.debian.org/debian/pool/main/o/openssl/openssl_3.6.1-3.dsc
|   % Total    % Received % Xferd  Average Speed  Time    Time    Time   Current
|                                  Dload  Upload  Total   Spent   Left   Speed
| 100   2675 100   2675   0      0  52257      0                              0
| dget: retrieving http://ftp.de.debian.org/debian/pool/main/o/openssl/openssl_3.6.1.orig.tar.gz
|   % Total    % Received % Xferd  Average Speed  Time    Time    Time   Current
|                                  Dload  Upload  Total   Spent   Left   Speed
| 100 52.34M 100 52.34M   0      0 12.07M      0   00:04   00:04         12.04M
| dget: retrieving http://ftp.de.debian.org/debian/pool/main/o/openssl/openssl_3.6.1.orig.tar.gz.asc
|   % Total    % Received % Xferd  Average Speed  Time    Time    Time   Current
|                                  Dload  Upload  Total   Spent   Left   Speed
| 100    833 100    833   0      0  15724      0                              0
| dget: retrieving http://ftp.de.debian.org/debian/pool/main/o/openssl/openssl_3.6.1-3.debian.tar.xz
|   % Total    % Received % Xferd  Average Speed  Time    Time    Time   Current
|                                  Dload  Upload  Total   Spent   Left   Speed
| 100  48768 100  48768   0      0 520.2k      0                              0
| openssl_3.6.1-3.dsc:
|       Good signature found
|    validating openssl_3.6.1.orig.tar.gz
|    validating openssl_3.6.1.orig.tar.gz.asc
|    validating openssl_3.6.1-3.debian.tar.xz
| All files validated successfully.

but then there is a reply that this is something in OpenSSL 0.9.8 and
the original link no longer works.

Therefore I am closing this and if there is an issue, please come back.

Sebastian]