Your message dated Fri, 24 Nov 2017 17:06:58 +0000 with message-id <[email protected]> and subject line Bug#853293: fixed in wpa 2:2.6-7 has caused the Debian Bug report #853293, regarding wpasupplicant: Honor /etc/network/interfaces.d/ (or whatever directories are sourced in /etc/network/interfaces) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 853293: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853293 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: wpasupplicant Version: 2.3-2 Hi! I configured wpasupplicant with a roaming interface: root@odroid-c1-1:~# cat /etc/network/interfaces.d/wlan0 auto wlan0 iface wlan0 inet manual wpa-driver wext wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf wpa-verbosity 1 I configured one Wifi network in it's wpa_supplicant.conf and it is joined. However, `dhclient' isn't started, because /etc/wpa_supplicant/functions.sh:ifup() (sourced from /sbin/wpa_action) does only look in /etc/network/interfaces, but doesn't honor in directories configured there with the "source-directory" directive. Modern systems may have something like "source-directory /etc/network/interfaces.d", which allows to define each interface in its own file. But since the simple parser doesn't honor the fragment directory, is just replaces the correct network name with `default': /etc/wpa_supplicant/functions.sh: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 886 ##################################################################### 887 ## apply mapping logic and ifup logical interface 888 # Apply mapping logic via id_str or external mapping script, check 889 # state of IFACE with respect to ifupdown and ifup logical interaface 890 # 891 ifup () { [...] 944 if [ -n "$WPA_LOGICAL_IFACE" ]; then 945 if egrep -q "^iface[[:space:]]+${WPA_LOGICAL_IFACE}[[:space:]]+inet" "$INTERFACES_FILE"; then 946 : # logical network is defined 947 else 948 wpa_msg log "network settings not defined for $WPA_LOGICAL_IFACE in $INTERFACES_FILE" 949 WPA_LOGICAL_IFACE="default" 950 fi Just omitting the check for whether or net the logical network is defined will let it work. Unfortunately, the `functions.sh' predates the current Debian packaging SVN, so I cannot figure out (easily) what the intention was to set the logical iface name to "default". But after all, it would be nice to either broaden the check (to also walk through additional files within directories mentioned with the "source-directory" stanza, or so allow for some config item (along with the base interfacee for which roaming is configured) to force the original "id_str" name. Thanks a lot, Jan-Benedict -- Jan-Benedict Glaw [email protected] +49-172-7608481 Signature of: If it doesn't work, force it. the second : If it breaks, it needed replacing anyway.
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---Source: wpa Source-Version: 2:2.6-7 We believe that the bug you reported is fixed in the latest version of wpa, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andrew Shadura <[email protected]> (supplier of updated wpa package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 24 Nov 2017 16:29:25 +0000 Source: wpa Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb Architecture: source Version: 2:2.6-7 Distribution: unstable Urgency: medium Maintainer: Debian wpasupplicant Maintainers <[email protected]> Changed-By: Andrew Shadura <[email protected]> Description: hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator wpagui - graphical user interface for wpa_supplicant wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i) wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb) Closes: 853293 871488 875233 879208 Launchpad-Bugs-Fixed: 1730399 Changes: wpa (2:2.6-7) unstable; urgency=medium . * Upload to unstable. * Optional AP side workaround for key reinstallation attacks (LP: #1730399). . wpa (2:2.6-6) experimental; urgency=medium . [ Reiner Herrmann ] * Port wpa_gui to Qt5 (Closes: #875233). . [ Andrew Shadura ] * Add a service file for hostapd. * Build wpa_supplicant with interface matching support (Closes: #879208). . [ Benedikt Wildenhain (BO) ] * Install [email protected] (Closes: #871488). . [ Jan-Benedict Glaw ] * Consider all ifupdown configuration, not only /etc/network/interfaces (Closes: #853293). . wpa (2:2.6-5) experimental; urgency=medium . [ Yves-Alexis Perez ] * Fix multiple issues in WPA protocol (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088): - hostapd: Avoid key reinstallation in FT handshake - Prevent reinstallation of an already in-use group key - Extend protection of GTK/IGTK reinstallation of - Fix TK configuration to the driver in EAPOL-Key 3/4 - Prevent installation of an all-zero TK - Fix PTK rekeying to generate a new ANonce - TDLS: Reject TPK-TK reconfiguration - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode - WNM: Ignore WNM-Sleep Mode Response without pending - FT: Do not allow multiple Reassociation Response frames - TDLS: Ignore incoming TDLS Setup Response retries . wpa (2:2.6-4) experimental; urgency=medium . * Upload to experimental. * Bump the epoch to 2:, as the upload to unstable had to bump epoch. Checksums-Sha1: a6abfdfbe661f1cbd1f8105e4312033010412ba0 2220 wpa_2.6-7.dsc ac3cbc937fb71c07f8a0d96a5a8eeee83ff281d8 93040 wpa_2.6-7.debian.tar.xz Checksums-Sha256: 63c21768e08b8d74b761c759db75f1e9e3b7f6e6d3fb602da0d37c481113c8ec 2220 wpa_2.6-7.dsc a14f3d63a8ad3456e4b638351731a4ede36322c37e53979316e160d8c31e8849 93040 wpa_2.6-7.debian.tar.xz Files: ae765dc21e2dc7733ee497ab2119a4b6 2220 net optional wpa_2.6-7.dsc cc22fa751e722f3dfa9e8f650affed0e 93040 net optional wpa_2.6-7.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJaGE0AAAoJEJ1bI/kYT6UUyaAH/RNZJegtmuZVgyQHbbzVSamR QQbfIo8yMt2DiVpgXQY0FUS9WimCL3mOPQ2KnXx+6xLkbHD51ZpHFwXixFDd83zX dy3308OHkovJlZrDLhb9vCUyheRMcqsUtWzvbUIVBNN9c1+82ZUaWkDKmFMRVMgw wRHcZwiua+4iVtx2WSLtPWjPGs0Zpffnkj+M/uhpRNDBwd0rCb/HD0yKj43sFHfp 6xAm0eEK1mSaZbxpU282+iOv1QLM0KIwcs+DZo/jeE62BrQzDgBs5AEP/1oJPrzH st09C7W0WfpfGGENmAoY+JOakRmfGEQnaG3qi3If8lhF//fX4XLBgNa/6AEupo8= =nX3E -----END PGP SIGNATURE-----
--- End Message ---

