Your message dated Fri, 24 Nov 2017 17:06:58 +0000
with message-id <[email protected]>
and subject line Bug#853293: fixed in wpa 2:2.6-7
has caused the Debian Bug report #853293,
regarding wpasupplicant: Honor /etc/network/interfaces.d/ (or whatever 
directories are sourced in /etc/network/interfaces)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
853293: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853293
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: wpasupplicant
Version: 2.3-2

Hi!

I configured wpasupplicant with a roaming interface:

root@odroid-c1-1:~# cat /etc/network/interfaces.d/wlan0 
auto wlan0
iface wlan0 inet manual
        wpa-driver      wext
        wpa-roam        /etc/wpa_supplicant/wpa_supplicant.conf
        wpa-verbosity   1


I configured one Wifi network in it's wpa_supplicant.conf and it is
joined. However, `dhclient' isn't started, because
/etc/wpa_supplicant/functions.sh:ifup() (sourced from
/sbin/wpa_action) does only look in /etc/network/interfaces, but
doesn't honor in directories configured there with the
"source-directory" directive.

  Modern systems may have something like
"source-directory /etc/network/interfaces.d", which allows to define
each interface in its own file. But since the simple parser doesn't
honor the fragment directory, is just replaces the correct network
name with `default':


/etc/wpa_supplicant/functions.sh:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 886 #####################################################################
 887 ## apply mapping logic and ifup logical interface
 888 # Apply mapping logic via id_str or external mapping script, check
 889 # state of IFACE with respect to ifupdown and ifup logical interaface
 890 #
 891 ifup () {
[...]
 944         if [ -n "$WPA_LOGICAL_IFACE" ]; then
 945                 if egrep -q 
"^iface[[:space:]]+${WPA_LOGICAL_IFACE}[[:space:]]+inet" "$INTERFACES_FILE"; 
then
 946                         : # logical network is defined
 947                 else
 948                         wpa_msg log "network settings not defined for 
$WPA_LOGICAL_IFACE in $INTERFACES_FILE"
 949                         WPA_LOGICAL_IFACE="default"
 950                 fi


Just omitting the check for whether or net the logical network is
defined will let it work. Unfortunately, the `functions.sh' predates
the current Debian packaging SVN, so I cannot figure out (easily) what
the intention was to set the logical iface name to "default".

  But after all, it would be nice to either broaden the check (to also
walk through additional files within directories mentioned with the
"source-directory" stanza, or so allow for some config item (along
with the base interfacee for which roaming is configured) to force the
original "id_str" name.

Thanks a lot,
  Jan-Benedict

-- 
      Jan-Benedict Glaw      [email protected]              +49-172-7608481
 Signature of:                            If it doesn't work, force it.
 the second  :                   If it breaks, it needed replacing anyway.

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2:2.6-7

We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Shadura <[email protected]> (supplier of updated wpa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 24 Nov 2017 16:29:25 +0000
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2:2.6-7
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers 
<[email protected]>
Changed-By: Andrew Shadura <[email protected]>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 853293 871488 875233 879208
Launchpad-Bugs-Fixed: 1730399
Changes:
 wpa (2:2.6-7) unstable; urgency=medium
 .
   * Upload to unstable.
   * Optional AP side workaround for key reinstallation attacks (LP: #1730399).
 .
 wpa (2:2.6-6) experimental; urgency=medium
 .
   [ Reiner Herrmann ]
   * Port wpa_gui to Qt5 (Closes: #875233).
 .
   [ Andrew Shadura ]
   * Add a service file for hostapd.
   * Build wpa_supplicant with interface matching support (Closes: #879208).
 .
   [ Benedikt Wildenhain (BO) ]
   * Install [email protected] (Closes: #871488).
 .
   [ Jan-Benedict Glaw ]
   * Consider all ifupdown configuration, not only /etc/network/interfaces
     (Closes: #853293).
 .
 wpa (2:2.6-5) experimental; urgency=medium
 .
   [ Yves-Alexis Perez ]
   * Fix multiple issues in WPA protocol (CVE-2017-13077, CVE-2017-13078,
     CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
     CVE-2017-13086, CVE-2017-13087, CVE-2017-13088):
     - hostapd: Avoid key reinstallation in FT handshake
     - Prevent reinstallation of an already in-use group key
     - Extend protection of GTK/IGTK reinstallation of
     - Fix TK configuration to the driver in EAPOL-Key 3/4
     - Prevent installation of an all-zero TK
     - Fix PTK rekeying to generate a new ANonce
     - TDLS: Reject TPK-TK reconfiguration
     - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode
     - WNM: Ignore WNM-Sleep Mode Response without pending
     - FT: Do not allow multiple Reassociation Response frames
     - TDLS: Ignore incoming TDLS Setup Response retries
 .
 wpa (2:2.6-4) experimental; urgency=medium
 .
   * Upload to experimental.
   * Bump the epoch to 2:, as the upload to unstable had to bump epoch.
Checksums-Sha1:
 a6abfdfbe661f1cbd1f8105e4312033010412ba0 2220 wpa_2.6-7.dsc
 ac3cbc937fb71c07f8a0d96a5a8eeee83ff281d8 93040 wpa_2.6-7.debian.tar.xz
Checksums-Sha256:
 63c21768e08b8d74b761c759db75f1e9e3b7f6e6d3fb602da0d37c481113c8ec 2220 
wpa_2.6-7.dsc
 a14f3d63a8ad3456e4b638351731a4ede36322c37e53979316e160d8c31e8849 93040 
wpa_2.6-7.debian.tar.xz
Files:
 ae765dc21e2dc7733ee497ab2119a4b6 2220 net optional wpa_2.6-7.dsc
 cc22fa751e722f3dfa9e8f650affed0e 93040 net optional wpa_2.6-7.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJaGE0AAAoJEJ1bI/kYT6UUyaAH/RNZJegtmuZVgyQHbbzVSamR
QQbfIo8yMt2DiVpgXQY0FUS9WimCL3mOPQ2KnXx+6xLkbHD51ZpHFwXixFDd83zX
dy3308OHkovJlZrDLhb9vCUyheRMcqsUtWzvbUIVBNN9c1+82ZUaWkDKmFMRVMgw
wRHcZwiua+4iVtx2WSLtPWjPGs0Zpffnkj+M/uhpRNDBwd0rCb/HD0yKj43sFHfp
6xAm0eEK1mSaZbxpU282+iOv1QLM0KIwcs+DZo/jeE62BrQzDgBs5AEP/1oJPrzH
st09C7W0WfpfGGENmAoY+JOakRmfGEQnaG3qi3If8lhF//fX4XLBgNa/6AEupo8=
=nX3E
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to