Your message dated Wed, 23 Jan 2008 04:17:02 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#450676: fixed in netcat 1.10-34 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: netcat Version: 1.10-33 Severity: wishlist I suggest some examples be added, such as the following. - Jim Van Zandt --- debian/nc.1.old 2007-11-08 21:46:08.000000000 -0500 +++ debian/nc.1 2007-11-08 22:28:39.000000000 -0500 @@ -111,6 +111,53 @@ .TP 13 .I \-z zero-I/O mode [used for scanning] +.SH EXAMPLES +.SS Simple File Transfer +Netcat can be used as a simple data transfer agent, and it doesn't really +matter which end is the listener and which end is the client -- input at one +side arrives at the other side as output. It is helpful to start the listener +at the receiving side with no timeout specified, and then give the sending side +a small timeout. That way the listener stays listening until you contact it, +and after data stops flowing the client will time out, shut down, and take the +listener with it. Unless the intervening network is fraught with problems, +this should be completely reliable, and you can always increase the timeout. A +typical example of something "rsh" is often used for: on one side, + + nc -l -p 1234 | uncompress -c | tar xvfp - + +and then on the other side + + tar cfp - /some/dir | compress -c | nc -w 3 othermachine 1234 + +will transfer the contents of a directory from one machine to another, without +having to worry about .rhosts files, user accounts, or inetd configurations +at either end. Again, it matters not which is the listener or receiver; the +"tarring" machine could just as easily be running the listener instead. One +could conceivably use a scheme like this for backups, by having cron-jobs fire +up listeners and backup handlers [which can be restricted to specific addresses +and ports between each other] and pipe "dump" or "tar" on one machine to "dd +of=/dev/tapedrive" on another as usual. Since netcat returns a nonzero exit +status for a denied listener connection, scripts to handle such tasks could +easily log and reject connect attempts from third parties, and then retry. +.SS Encrypted File Transfer +.\" example courtesy of Tom Buskey <[EMAIL PROTECTED]> +Suppose you have an ssh tunnel, and you want to copy a file to the +remote machine. You could just scp it directly, but that opens up +another connection. The goal is to re-use the existing connection. +You can use netcat to do this: + +When you SSH in, add -L 31000:127.0.0.1:31000 + +On the remote: + + nc -lvnp 31000 127.0.0.1 > file + +On the local: + + nc -v -w 2 127.0.0.1 31000 < file + +No extra overhead. TCP takes care of error correction. SSH has already +encrypted the pipe. .SH COPYRIGHT Netcat is entirely my own creation, although plenty of other code was used as examples. It is freely given away to the Internet community -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'oldstable'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.17 (SMP w/1 CPU core; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages netcat depends on: ii libc6 2.6.1-5 GNU C Library: Shared libraries netcat recommends no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: netcat Source-Version: 1.10-34 We believe that the bug you reported is fixed in the latest version of netcat, which is due to be installed in the Debian FTP archive: netcat_1.10-34.diff.gz to pool/main/n/netcat/netcat_1.10-34.diff.gz netcat_1.10-34.dsc to pool/main/n/netcat/netcat_1.10-34.dsc netcat_1.10-34_amd64.deb to pool/main/n/netcat/netcat_1.10-34_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Decklin Foster <[EMAIL PROTECTED]> (supplier of updated netcat package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 20 Jan 2008 21:43:44 -0500 Source: netcat Binary: netcat Architecture: source amd64 Version: 1.10-34 Distribution: unstable Urgency: low Maintainer: Decklin Foster <[EMAIL PROTECTED]> Changed-By: Decklin Foster <[EMAIL PROTECTED]> Description: netcat - TCP/IP swiss army knife Closes: 308687 450676 457171 457172 457173 Changes: netcat (1.10-34) unstable; urgency=low . * Rename TOS option from -x to -T. This is painful, but it was never a standard option, and will be needed for command-line compatibility with other implementations of netcat. Forcing them to rename -x is not viable. * Don't return EXIT_FAILURE from -h, and include debian revision number in its output. (Closes: #457171) * Include portability fix for Darwin. (Closes: #457172) * Don't give select more nfds than necessary. (Closes: #457173) * Reformat all the patch headers. * Include note about the use of http_proxy in examples/webproxy. (Closes: #308687) * Edit EXAMPLES pointer in man page, and add an examples section to README.Debian. (Closes: #450676) Files: 1be19ecbd1719b5564ab0ebcc4d570b0 567 net important netcat_1.10-34.dsc bb32fcd457b1b55883c3d009b874321c 19750 net important netcat_1.10-34.diff.gz d798040cdcf63fbbd39b4e42faafef59 68950 net important netcat_1.10-34_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHlr1GuIJGh/GWjRsRApk5AJwMlg0fgxxavkJJcSURb5xDIHvXpQCcC98S NsH2mnjShVejFT+NotOZGok= =OzVq -----END PGP SIGNATURE-----
--- End Message ---

