Your message dated Fri, 09 Mar 2007 18:32:04 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#407936: fixed in wpasupplicant 0.6.0~cvs20070224-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: wpasupplicant Version: 0.5.5-4 Severity: normal Tags: patch When wpasupplicant is launched from /etc/wpa_supplicant/functions.sh it tries to use flag -W, which is supposed to make it wait until the wpa_cli attaches to the socket. The thing is, that the -W is not documented in wpasupplicant, and thus, it does not work (at least in my system). This causes wpa_cli to miss the CONNECTED event when the wireless network is available from the very first moment. As the event is missed, wpa_action is not called and the interface is not configured. I suggest changing the file /etc/wpa_supplicant/functions.sh, in function init_wpa_cli, so that after wpa_cli is launched, we force a disconnect with wpa_cli to make wpasupplicant reconnect again and send the CONNECTED event. The proposed code would be: init_wpa_cli () { if [ -n "$WPA_ACTION_SCRIPT" ]; then local WPA_CLI_OPTIONS WPA_CLI_OPTIONS="-B -P $WPA_CLI_PIDFILE -i $WPA_IFACE" wpa_msg verbose "$WPA_CLI_BIN $WPA_CLI_OPTIONS -p $WPA_CTRL_DIR -a $WPA_ACTION_SCRIPT" start-stop-daemon --start --oknodo $DAEMON_VERBOSITY \ --name $WPA_CLI_PNAME --startas $WPA_CLI_BIN --pidfile $WPA_CLI_PIDFILE \ -- $WPA_CLI_OPTIONS -p $WPA_CTRL_DIR -a $WPA_ACTION_SCRIPT if [ "$?" != "0" ]; then wpa_msg stderr "$WPA_CLI_BIN daemon failed to start" return 1 else wpa_msg verbose "force disconnect to assure that wpa_cli receives CONNECTED event" $WPA_CLI_BIN -P $WPA_CLI_PIDFILE -i $WPA_IFACE disconnect fi fi } -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18.8-686-nopiix Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8) Versions of packages wpasupplicant depends on: ii libc6 2.3.6.ds1-10 GNU C Library: Shared libraries ii libdbus-1-3 1.0.2-1 simple interprocess messaging syst ii libncurses5 5.5-5 Shared libraries for terminal hand ii libreadline5 5.2-2 GNU readline and history libraries ii libssl0.9.8 0.9.8c-4 SSL shared libraries ii lsb-base 3.1-22 Linux Standard Base 3.1 init scrip Versions of packages wpasupplicant recommends: pn dhcp3-client <none> (no description available) -- no debconf information
--- End Message ---
--- Begin Message ---Source: wpasupplicant Source-Version: 0.6.0~cvs20070224-1 We believe that the bug you reported is fixed in the latest version of wpasupplicant, which is due to be installed in the Debian FTP archive: wpagui_0.6.0~cvs20070224-1_i386.deb to pool/main/w/wpasupplicant/wpagui_0.6.0~cvs20070224-1_i386.deb wpasupplicant_0.6.0~cvs20070224-1.diff.gz to pool/main/w/wpasupplicant/wpasupplicant_0.6.0~cvs20070224-1.diff.gz wpasupplicant_0.6.0~cvs20070224-1.dsc to pool/main/w/wpasupplicant/wpasupplicant_0.6.0~cvs20070224-1.dsc wpasupplicant_0.6.0~cvs20070224-1_i386.deb to pool/main/w/wpasupplicant/wpasupplicant_0.6.0~cvs20070224-1_i386.deb wpasupplicant_0.6.0~cvs20070224.orig.tar.gz to pool/main/w/wpasupplicant/wpasupplicant_0.6.0~cvs20070224.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Kel Modderman <[EMAIL PROTECTED]> (supplier of updated wpasupplicant package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 8 Mar 2007 03:23:51 +1000 Source: wpasupplicant Binary: wpagui wpasupplicant Architecture: source i386 Version: 0.6.0~cvs20070224-1 Distribution: experimental Urgency: low Maintainer: Debian/Ubuntu wpasupplicant Maintainers <[EMAIL PROTECTED]> Changed-By: Kel Modderman <[EMAIL PROTECTED]> Description: wpagui - GUI for wpa_supplicant wpasupplicant - Client support for WPA and WPA2 (IEEE 802.11i) Closes: 401809 402619 403301 403313 403316 407936 412179 413689 Changes: wpasupplicant (0.6.0~cvs20070224-1) experimental; urgency=low . * New upstream development release. (Closes: #401809) * wpa_supplicant no longer segfaults on failure to initialize a network interface. (Closes: #403301, #403313) * Fixes EAP-PEAP/TTLS/FAST to use the correct EAP identifier in tunnelled identity request. (Closes: #402619) * Drop deprecated init script example. debian/wpa_supplicant.init-daemon. * Drop debian/patches/10_orinoco_wep_key_fix.dpatch as the appropriate driver fix has been included in mainline linux since 2.6.19-rc. * Drop debian/patches/21_madwifiold_20060207_includes.dpatch, madwifi-old is deprecated upstream. * Remove false instructions from NEWS file regarding madwifi-old support that has since been discarded from the source package. * Drop debian/patches/11_erroneous_manpage_ref.dpatch, applied upstream. * Remove wpa-stakey code from conf_wpasupplicant() in functions.sh since it is removed from upstream. * Allow 'wpa-essid' to do the same thing as 'wpa-ssid'. (Closes: #403316) * Update Uploader: email address. * Update private madwifi includes to r2156 of madwifi.org SVN trunk. * Make a large note in README.modes wpa-roam documentation that a ctrl_interface MUST be defined for the roaming setup to function. (Closes: #407936). * Activate wpa_supplicant's dbus interface by installing dbus-wpa_supplicant.conf to the appropriate location. (Closes: #412179) * Add debian/patches/30_dbus_policy.dpatch to allow access control to wpa_supplicant's dbus interface via the netdev group. (Michael Biebl). * Install a service file to /usr/share/dbus-1/services/ for dbus aware applications that may take advantage of that in the future (Michael Biebl). * Add support to ifupdown.sh for `wpa-mode' and `wpa-frequency' options used in IBSS mode. Note that ifupdown.sh does not do any sanity checking for the other many requirements for using wpa_supplicant in IBSS mode. * Update XS-Vcs-* fields in control file, add Vcs-Browser token. * Move debian spcific ifupdown sh glue into debian/ifupdown/. * Have prerm gracefully bring down interfaces under the influence of wpa_supplicant via wpa-ifupdown init script. * Remove unrequired `unset' usage in wpa-ifupdown.init, discard stderr of find invocations. * Don't stop dbus wpasupplicant daemon via wpa-ifupdown. * Suggest wireless-tools. (Closes: #413689) Files: d89c94179f0173d0ed655e5f3e1867bc 1014 net optional wpasupplicant_0.6.0~cvs20070224-1.dsc 68ad9377765a381c5282198daaa8b34c 742043 net optional wpasupplicant_0.6.0~cvs20070224.orig.tar.gz 5b7276ebcb5812c5572c6343dae15813 61207 net optional wpasupplicant_0.6.0~cvs20070224-1.diff.gz e50fb221590bfb77b55d9ed12a50cc27 261302 net optional wpasupplicant_0.6.0~cvs20070224-1_i386.deb 85b6e3181833f6e89d5cdff19b045d5a 104026 net optional wpagui_0.6.0~cvs20070224-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Debian Powered! iD8DBQFF8aaImAg1RJRTSKQRAmKjAJ9/tZIZuKA7XtqIwwVbH48SjdJdfwCcDbNz EbpTkB3TRm4UJIL417EZoGY= =W7w5 -----END PGP SIGNATURE-----
--- End Message ---

