Your message dated Wed, 23 Jan 2008 04:17:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#450676: fixed in netcat 1.10-34
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: netcat
Version: 1.10-33
Severity: wishlist


I suggest some examples be added, such as the following.

        - Jim Van Zandt

--- debian/nc.1.old     2007-11-08 21:46:08.000000000 -0500
+++ debian/nc.1 2007-11-08 22:28:39.000000000 -0500
@@ -111,6 +111,53 @@
 .TP 13
 .I \-z
 zero-I/O mode [used for scanning]
+.SH EXAMPLES
+.SS Simple File Transfer
+Netcat can be used as a simple data transfer agent, and it doesn't really
+matter which end is the listener and which end is the client -- input at one
+side arrives at the other side as output.  It is helpful to start the listener
+at the receiving side with no timeout specified, and then give the sending side
+a small timeout.  That way the listener stays listening until you contact it,
+and after data stops flowing the client will time out, shut down, and take the
+listener with it.  Unless the intervening network is fraught with problems,
+this should be completely reliable, and you can always increase the timeout.  A
+typical example of something "rsh" is often used for: on one side,
+
+        nc -l -p 1234 | uncompress -c | tar xvfp -
+
+and then on the other side
+
+        tar cfp - /some/dir | compress -c | nc -w 3 othermachine 1234
+
+will transfer the contents of a directory from one machine to another, without
+having to worry about .rhosts files, user accounts, or inetd configurations
+at either end.  Again, it matters not which is the listener or receiver; the
+"tarring" machine could just as easily be running the listener instead.  One
+could conceivably use a scheme like this for backups, by having cron-jobs fire
+up listeners and backup handlers [which can be restricted to specific addresses
+and ports between each other] and pipe "dump" or "tar" on one machine to "dd
+of=/dev/tapedrive" on another as usual.  Since netcat returns a nonzero exit
+status for a denied listener connection, scripts to handle such tasks could
+easily log and reject connect attempts from third parties, and then retry.
+.SS Encrypted File Transfer
+.\" example courtesy of Tom Buskey <[EMAIL PROTECTED]>
+Suppose you have an ssh tunnel, and you want to copy a file to the
+remote machine.  You could just scp it directly, but that opens up
+another connection.  The goal is to re-use the existing connection.
+You can use netcat to do this:
+
+When you SSH in, add -L 31000:127.0.0.1:31000
+
+On the remote:
+
+    nc -lvnp 31000 127.0.0.1 > file
+
+On the local:
+
+    nc -v -w 2 127.0.0.1 31000 < file
+
+No extra overhead.  TCP takes care of error correction.  SSH has already
+encrypted the pipe.
 .SH COPYRIGHT
 Netcat is entirely my own creation, although plenty of other code was
 used as examples.  It is freely given away to the Internet community


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'oldstable'), (500, 'testing'), (500, 
'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.17 (SMP w/1 CPU core; PREEMPT)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages netcat depends on:
ii  libc6                         2.6.1-5    GNU C Library: Shared libraries

netcat recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: netcat
Source-Version: 1.10-34

We believe that the bug you reported is fixed in the latest version of
netcat, which is due to be installed in the Debian FTP archive:

netcat_1.10-34.diff.gz
  to pool/main/n/netcat/netcat_1.10-34.diff.gz
netcat_1.10-34.dsc
  to pool/main/n/netcat/netcat_1.10-34.dsc
netcat_1.10-34_amd64.deb
  to pool/main/n/netcat/netcat_1.10-34_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Decklin Foster <[EMAIL PROTECTED]> (supplier of updated netcat package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 20 Jan 2008 21:43:44 -0500
Source: netcat
Binary: netcat
Architecture: source amd64
Version: 1.10-34
Distribution: unstable
Urgency: low
Maintainer: Decklin Foster <[EMAIL PROTECTED]>
Changed-By: Decklin Foster <[EMAIL PROTECTED]>
Description: 
 netcat     - TCP/IP swiss army knife
Closes: 308687 450676 457171 457172 457173
Changes: 
 netcat (1.10-34) unstable; urgency=low
 .
   * Rename TOS option from -x to -T. This is painful, but it was never a
     standard option, and will be needed for command-line compatibility with
     other implementations of netcat. Forcing them to rename -x is not
     viable.
   * Don't return EXIT_FAILURE from -h, and include debian revision number
     in its output. (Closes: #457171)
   * Include portability fix for Darwin. (Closes: #457172)
   * Don't give select more nfds than necessary. (Closes: #457173)
   * Reformat all the patch headers.
   * Include note about the use of http_proxy in examples/webproxy. (Closes:
     #308687)
   * Edit EXAMPLES pointer in man page, and add an examples section to
     README.Debian. (Closes: #450676)
Files: 
 1be19ecbd1719b5564ab0ebcc4d570b0 567 net important netcat_1.10-34.dsc
 bb32fcd457b1b55883c3d009b874321c 19750 net important netcat_1.10-34.diff.gz
 d798040cdcf63fbbd39b4e42faafef59 68950 net important netcat_1.10-34_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHlr1GuIJGh/GWjRsRApk5AJwMlg0fgxxavkJJcSURb5xDIHvXpQCcC98S
NsH2mnjShVejFT+NotOZGok=
=OzVq
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to