Bug#989431: nftables runs to early at system boot
On 3.06.21 17:49, Arturo Borrero Gonzalez wrote: > On 6/3/21 5:26 PM, F.Stoyan wrote: > > > > nftables runs to early at system boot. At this time not all interfaces are > > available: > > > > # journalctl -b -3 --unit=systemd-networkd.service --unit=nftables.service > > --no-hostname > > -- Journal begins at Fri 2021-05-28 15:13:07 CEST, ends at Thu 2021-06-03 > > 17:08:05 CEST. -- > > Jun 03 15:18:23 nft[414]: /etc/nftables.conf:12:21-31: Error: Interface > > does not exist > > Jun 03 15:18:23 nft[414]: define SSID-MEDIA = enp1s0f0.66 > > Jun 03 15:18:23 nft[414]: ^^^ > > Jun 03 15:18:23 nft[414]: /etc/nftables.conf:11:21-31: Error: Interface > > does not exist > > Jun 03 15:18:23 nft[414]: define SSID-LABOR = enp1s0f0.65 > > Jun 03 15:18:23 nft[414]: ^^^ > > I guess you are using interface index in your ruleset, rather than interface Yes, indeed! > names. If you use interface name (i.e, iffname oifname etc) then the > interface don't need to exist when loading the ruleset. > > Loading the ruleset *before* the interfaces are up ensures that no network > traffic bypass the firewall policy. > > Is up to you to configure the systemd unit to load before/after the network. Thanks for the explanation. So everything is clear now. I think you can close the bugreport. Best regards F. Stoyan
Bug#875477: slrn only uses TLSv1.0
On 3.08.18 12:54, Moritz Muehlenhoff wrote: > On Mon, Sep 11, 2017 at 07:33:39PM +0200, Friedemann Stoyan wrote: > > Package: slrn > > Version: 1.0.3+dfsg-1 > > Severity: normal > > > > Dear Maintainer, > > > > I noticed that slrn only uses TLSv1.0 when connecting over SSL: > > > > 8 0.003899 2001:db8::119 2001:db8::119 48650 563 TLSv1 > > 188Client Hello > > > > Frame 8: 188 bytes on wire (1504 bits), 188 bytes captured (1504 bits) > > Ethernet II, Src: 00:00:00:00:00:00, Dst: 00:00:00:00:00:00 > > Internet Protocol Version 6, Src: 2001:db8::119, Dst: 2001:db8::119 > > Transmission Control Protocol, Src Port: 48650 (48650), Dst Port: nntps > > (563), Seq: 1, Ack: 1, Len: 102 > > Secure Sockets Layer > > TLSv1 Record Layer: Handshake Protocol: Client Hello > > Content Type: Handshake (22) > > Version: TLS 1.0 (0x0301) > > Length: 97 > > Handshake Protocol: Client Hello > > Handshake Type: Client Hello (1) > > Length: 93 > > Version: TLS 1.0 (0x0301) > > Random > > Session ID Length: 0 > > Cipher Suites Length: 30 > > Cipher Suites (15 suites) > > Compression Methods Length: 1 > > Compression Methods (1 method) > > Extensions Length: 22 > > Extension: Extended Master Secret > > Extension: status_request > > Extension: renegotiation_info > > Extension: SessionTicket TLS > > > > Newer OpenSSL Packages disables TLSv1.0 and TLSv1.1 [1], which breaks slrn's > > SSL Connections now. > > What kind of server are you connecting to, did you verify that it supports > TLS on the > server side? (e.g. by connecting with a different news client). > I can't reproduce the Bug anymore. With slrn from Buster, I get Handshakes with TLS1.2 properly. The Bug can be closed. Regards Friedemann
Bug#875477: slrn only uses TLSv1.0
Package: slrn Version: 1.0.3+dfsg-1 Severity: normal Dear Maintainer, I noticed that slrn only uses TLSv1.0 when connecting over SSL: 8 0.003899 2001:db8::119 2001:db8::119 48650 563 TLSv1188 Client Hello Frame 8: 188 bytes on wire (1504 bits), 188 bytes captured (1504 bits) Ethernet II, Src: 00:00:00:00:00:00, Dst: 00:00:00:00:00:00 Internet Protocol Version 6, Src: 2001:db8::119, Dst: 2001:db8::119 Transmission Control Protocol, Src Port: 48650 (48650), Dst Port: nntps (563), Seq: 1, Ack: 1, Len: 102 Secure Sockets Layer TLSv1 Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 97 Handshake Protocol: Client Hello Handshake Type: Client Hello (1) Length: 93 Version: TLS 1.0 (0x0301) Random Session ID Length: 0 Cipher Suites Length: 30 Cipher Suites (15 suites) Compression Methods Length: 1 Compression Methods (1 method) Extensions Length: 22 Extension: Extended Master Secret Extension: status_request Extension: renegotiation_info Extension: SessionTicket TLS Newer OpenSSL Packages disables TLSv1.0 and TLSv1.1 [1], which breaks slrn's SSL Connections now. [1]: https://lists.debian.org/debian-devel-announce/2017/08/msg4.html -- System Information: Debian Release: 9.1 APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages slrn depends on: ii debconf [debconf-2.0] 1.5.61 ii libc6 2.24-11+deb9u1 ii libcanlock22b-8 ii libgnutls-openssl273.5.8-5+deb9u3 ii libgnutls303.5.8-5+deb9u3 ii libslang2 2.3.1-5 ii libuu0 0.5.20-9 slrn recommends no packages. Versions of packages slrn suggests: pn slrnpull -- debconf information excluded
Bug#738948: vpnc: VPN connectivity gap during Phase2 Rekeying
Package: vpnc Version: 0.5.3r512-2 Severity: normal Dear Maintainer, I have become aware of a 30s VPN connectivity gap during Phase2 rekeying between vpnc and a Cisco ASA5515X with 9.1(4). Here is what happens in detail: Tunnel will be established: Feb 13 2014 17:34:40 : %ASA-6-713228: Group = INSTALL, Username = install, IP = 10.5.0.42, Assigned private IP address 10.65.250.1 to remote user Feb 13 2014 17:34:40 : %ASA-5-713119: Group = INSTALL, Username = install, IP = 10.5.0.42, PHASE 1 COMPLETED Feb 13 2014 17:34:40 : %ASA-5-713075: Group = INSTALL, Username = install, IP = 10.5.0.42, Overriding Initiator's IPSec rekeying duration from 2147483 to 120 seconds Feb 13 2014 17:34:40 : %ASA-5-713076: Group = INSTALL, Username = install, IP = 10.5.0.42, Overriding Initiator's IPSec rekeying duration from 0 to 1024 Kbs Feb 13 2014 17:34:40 : %ASA-6-602303: IPSEC: An outbound remote access SA (SPI= 0x126F81EA) between 10.65.224.3 and 10.5.0.42 (user= install) has been created. Feb 13 2014 17:34:40 : %ASA-5-713049: Group = INSTALL, Username = install, IP = 10.5.0.42, Security negotiation complete for User (install) Responder, Inbound SPI = 0xd2bc3605, Outbound SPI = 0x126f81ea Feb 13 2014 17:34:40 : %ASA-6-602303: IPSEC: An inbound remote access SA (SPI= 0xD2BC3605) between 10.65.224.3 and 10.5.0.42 (user= install) has been created. Feb 13 2014 17:34:40 : %ASA-5-713120: Group = INSTALL, Username = install, IP = 10.5.0.42, PHASE 2 COMPLETED (msgid=254e55e0) Everything is OK for vpnc too: S7.9 main loop (receive and transmit ipsec packets) [2014-02-13 17:34:20] remote - local spi: 0x126f81ea local - remote spi: 0xd2bc3605 VPN connection works like a charm. Then the first Phase2 rekeying comes. The ASA generate two new SPI but still uses the two old ones: Feb 13 2014 17:36:34 : %ASA-5-713041: Group = INSTALL, Username = install, IP = 10.5.0.42, IKE Initiator: Rekeying Phase 2, Intf tvpnout, IKE Peer 10.5.0.42 local Proxy Address 0.0.0.0, remote Proxy Address 10.65.250.1, Crypto map (SYSTEM_DEFAULT_CRYPTO_MAP) Feb 13 2014 17:36:34 : %ASA-6-602303: IPSEC: An outbound remote access SA (SPI= 0x607C17E7) between 10.65.224.3 and 10.5.0.42 (user= install) has been created. Feb 13 2014 17:36:34 : %ASA-5-713049: Group = INSTALL, Username = install, IP = 10.5.0.42, Security negotiation complete for User (install) Responder, Inbound SPI = 0x91103994, Outbound SPI = 0x607c17e7 Feb 13 2014 17:36:34 : %ASA-6-602303: IPSEC: An inbound remote access SA (SPI= 0x91103994) between 10.65.224.3 and 10.5.0.42 (user= install) has been created. Feb 13 2014 17:36:34 : %ASA-5-713120: Group = INSTALL, Username = install, IP = 10.5.0.42, PHASE 2 COMPLETED (msgid=63ad3117) The vpnc is not aware of this behavior and complains loudly for every incoming packet: unknown spi 0x126f81ea from peer At this time the VPN connection is broken. After 30s the ASA clears the two old SPI: Feb 13 2014 17:37:04 : %ASA-6-602304: IPSEC: An outbound remote access SA (SPI= 0x126F81EA) between 10.65.224.3 and 10.5.0.42 (user= install) has been deleted. Feb 13 2014 17:37:04 : %ASA-6-602304: IPSEC: An inbound remote access SA (SPI= 0xD2BC3605) between 10.5.0.42 and 10.65.224.3 (user= install) has been deleted. The vpnc noticed this. Due to it have already cleared the old SPI, it do nothing: got isakmp delete with bogus spi (expected -1808199535, received 210), ignoring... The ASA sends now ESP with new SPI and everything works well again until the next Phase2 Rekeying. -- System Information: Debian Release: jessie/sid APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.12-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages vpnc depends on: ii dpkg 1.17.6 ii libc62.17-97 ii libgcrypt11 1.5.3-3 ii libgnutls26 2.12.23-10+b1 ii perl 5.18.2-2 Versions of packages vpnc recommends: ii iproute 1:3.12.0-1 Versions of packages vpnc suggests: pn resolvconf none -- Configuration Files: /etc/vpnc/default.conf [Errno 13] Permission denied: u'/etc/vpnc/default.conf' /etc/vpnc/vpnc-script [Errno 13] Permission denied: u'/etc/vpnc/vpnc-script' -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#525785: sasl2-bin: saslauthd with kerberos5 doesn't work
On 8.02.14 18:41, Roberto C. Sánchez wrote: I am going through all the old bugs against cyrus-sasl2, and I wanted to see if you had any more information on this. I did a little investigating, and I found this in the saslauthd source code (auth_krb5.c): if (config) { keytabname = cfile_getstring(config, krb5_keytab, keytabname); verify_principal = cfile_getstring(config, krb5_verify_principal, verify_principal); } I know that Russ previously suggested that you might have KRB5_KTNAME set elsewhere in the environment, and you said you did not. Is there a chance that you have a saslauthd or other sasl configuration file that specifies the krb5_keytab option? Not that I am aware of. I think that might explain the behavior you are seeing. I have tried to replicate the behavior you see on your system with my own system, but on my system the library uses the default /etc/krb5.keytab location without me having to specify it anywhere. I don't know if this is importend or not, but I'm using Heimdal Kerberos and not the MIT Libraries: dpkg -l | grep sasl ii libsasl2-22.1.23.dfsg1-7 Cyrus SASL - authentication abstraction library ii libsasl2-modules 2.1.23.dfsg1-7 Cyrus SASL - pluggable authentication modules ii libsasl2-modules-gssapi-heimdal 2.1.23.dfsg1-7 Pluggable Authentication Modules for SASL (GSSAPI) ii sasl2-bin 2.1.23.dfsg1-7 Cyrus SASL - administration programs for SASL users database But never mind. In the meantime I don't use saslauthd anymore. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#691631: Postfix 2.9.3-2.1: memcache support not build in
Any news? Any chance to fix the bug in Wheezy? Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#676661: stunnel4: stunnel doesn't reread CRL
Package: stunnel4 Version: 3:4.29-1 Severity: normal Dear maintainers, After some time [1] of operation stunnel suddenly complains: 2012.06.08 08:42:50 LOG5[1656:3074509680]: tlstunnel accepted connection from xxx.xxx.xxx.xxx:32933 2012.06.08 08:42:50 LOG3[1656:3074509680]: SSL_accept: Peer suddenly disconnected 2012.06.08 08:42:50 LOG5[1656:3074509680]: Connection reset: 0 bytes sent to SSL, 0 bytes sent to socket 2012.06.08 08:42:50 LOG5[1656:3074509680]: tlstunnel accepted connection from xxx.xxx.xxx.xxx:22938 2012.06.08 08:42:51 LOG4[1656:3074509680]: Found CRL is expired - revoking all certificates until you get updated CRL stunnel is configured to work with CRLs: CRLpath = /etc/ssl/crls This directory contains the CRL and the appropriate hashes. The CRL itself is cron based generated. It seems that stunnel doesn't reread the CRL. After restarting stunnel everything works well again. [1]: a time greater than the CRL valid time -- System Information: Debian Release: 6.0.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages stunnel4 depends on: ii adduser3.112+nmu2add and remove users and groups ii libc6 2.11.3-3 Embedded GNU C Library: Shared lib ii libssl0.9.80.9.8o-4squeeze13 SSL shared libraries ii libwrap0 7.6.q-19 Wietse Venema's TCP wrappers libra ii netbase4.45 Basic TCP/IP networking system ii openssl0.9.8o-4squeeze13 Secure Socket Layer (SSL) binary a ii perl-modules 5.10.1-17squeeze3 Core Perl modules stunnel4 recommends no packages. Versions of packages stunnel4 suggests: pn logcheck-database none (no description available) -- Configuration Files: /etc/default/stunnel4 changed [not included] /etc/logrotate.d/stunnel4 changed [not included] /etc/stunnel/stunnel.conf changed [not included] -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#668041: stunnel4: Client side SNI doesn't work
Package: stunnel4 Version: 3:4.52-1 Severity: wishlist Dear Maintainer, I have a issue with stunnel in client mode and a SNI enabled TLS-Server. Some investigation shows, that stunnel doesn't send the extension 'server_name' into the ClientHello-Packet. Due to this the packet doesn't reach the virtuell server. It seems that this issue is fixed in stunnel version 4.53: http://www.mail-archive.com/openssl-users@openssl.org/msg66901.html * New features - Added client-mode sni option to directly control the value of TLS Server Name Indication (RFC 3546) extension. It would be great, if we get this version into wheezy. Regards Friedemann -- System Information: Debian Release: wheezy/sid APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages stunnel4 depends on: ii adduser 3.113+nmu1 ii libc6 2.13-27 ii libssl1.0.0 1.0.1-4 ii libwrap0 7.6.q-23 ii netbase 4.47 ii openssl 1.0.1-4 ii perl-modules 5.14.2-9 ii zlib1g1:1.2.6.dfsg-2 stunnel4 recommends no packages. Versions of packages stunnel4 suggests: pn logcheck-database none -- Configuration Files: /etc/default/stunnel4 changed [not included] -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#656824: cannot read the Linux header trying to boot linux 3.2.1-1
On 29.01.12 04:07, Jonathan Nieder wrote: James Robertson wrote: I upgraded to 3.2.1-2 and it booted fine. Weird. So it only happens sometimes, I guess. Friedemann, is the result of upgrading the kernel the same for you? (Please back up /boot first in case we have questions about it.) No, 3.2.1-2 doesn't boot, but it is no kernel related bug. I'm sure that the misbehavior is caused by a XFS bug in grub-pc. I filed this bugreport: http://bugs.debian.org/657776 The issue is fixed in upstream[1], but not in the debian package. Regards, Friedemann [1]: http://savannah.gnu.org/bugs/?34213 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#657776: grub-pc cant't load kernel at XFS Filesystem
Package: grub-pc Version: 1.99-14 Severity: important Dear Maintainer, I use grub2 with XFS on top of a logical volume. With kernel 3.2 grub refuse loading the kernel: Loading Linux 3.2.0-1-amd64 ... error: cannot read the Linux header. Loading intitial ramdisk ... error: you need to load the kernel first. press any key to continue... Some invertigation shows, that it seems to be an XFS related issue: $ sudo grub-fstest /dev/sda1 crc '(vg0-root)/boot/vmlinuz-3.1.0-1-amd64' $ sudo grub-fstest /dev/sda1 crc '(vg0-root)/boot/vmlinuz-3.2.0-1-amd64' grub-fstest: error: read error at offset 0: not a correct XFS BMAP node. $ xfs_info / meta-data=/dev/mapper/vg0-root isize=256agcount=4, agsize=32768 blks = sectsz=4096 attr=2 data = bsize=4096 blocks=131072, imaxpct=25 = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0 log =internal bsize=4096 blocks=1424, version=2 = sectsz=4096 sunit=1 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 $ xfs_bmap -l /boot/vmlinuz-3.1.0-1-amd64 /boot/vmlinuz-3.1.0-1-amd64: 0: [0..5327]: 344752..350079 5328 blocks $ xfs_bmap -l /boot/vmlinuz-3.2.0-1-amd64 /boot/vmlinuz-3.2.0-1-amd64: 0: [0..87]: 420864..420951 88 blocks 1: [88..175]: 421248..421335 88 blocks 2: [176..263]: 421760..421847 88 blocks 3: [264..351]: 422400..422487 88 blocks 4: [352..439]: 425472..425559 88 blocks 5: [440..527]: 426296..426383 88 blocks 6: [528..615]: 426552..426639 88 blocks 7: [616..703]: 430656..430743 88 blocks 8: [704..791]: 430784..430871 88 blocks 9: [792..879]: 431168..431255 88 blocks 10: [880..967]: 431296..431383 88 blocks 11: [968..1055]: 432192..432279 88 blocks 12: [1056..1143]: 432832..432919 88 blocks 13: [1144..1231]: 432960..433047 88 blocks 14: [1232..1319]: 433984..434071 88 blocks 15: [1320..1407]: 439336..439423 88 blocks 16: [1408..1495]: 445696..445783 88 blocks 17: [1496..1583]: 448648..448735 88 blocks 18: [1584..1671]: 448776..448863 88 blocks 19: [1672..1759]: 452952..453039 88 blocks 20: [1760..1847]: 453336..453423 88 blocks 21: [1848..1935]: 453976..454063 88 blocks 22: [1936..2023]: 455000..455087 88 blocks 23: [2024..2111]: 457048..457135 88 blocks 24: [2112..2199]: 457560..457647 88 blocks 25: [2200..2287]: 457688..457775 88 blocks 26: [2288..2375]: 457816..457903 88 blocks 27: [2376..2463]: 462272..462359 88 blocks 28: [2464..2551]: 462528..462615 88 blocks 29: [2552..2639]: 463872..463959 88 blocks 30: [2640..2727]: 464128..464215 88 blocks 31: [2728..2815]: 465152..465239 88 blocks 32: [2816..2903]: 465536..465623 88 blocks 33: [2904..2991]: 466048..466135 88 blocks 34: [2992..3079]: 466304..466391 88 blocks 35: [3080..3167]: 466560..466647 88 blocks 36: [3168..3255]: 468736..468823 88 blocks 37: [3256..3343]: 468992..469079 88 blocks 38: [3344..3431]: 469120..469207 88 blocks 39: [3432..3519]: 469632..469719 88 blocks 40: [3520..3607]: 469760..469847 88 blocks 41: [3608..3695]: 474272..474359 88 blocks 42: [3696..3783]: 474784..474871 88 blocks 43: [3784..3871]: 475808..475895 88 blocks 44: [3872..3959]: 476064..476151 88 blocks 45: [3960..4047]: 476704..476791 88 blocks 46: [4048..4135]: 477216..477303 88 blocks 47: [4136..4223]: 477696..477783 88 blocks 48: [4224..4311]: 479128..479215 88 blocks 49: [4312..4399]: 480280..480367 88 blocks 50: [4400..4487]: 484560..484647 88 blocks 51: [4488..4575]: 484944..485031 88 blocks 52: [4576..4663]: 489240..489327 88 blocks 53: [4664..4751]: 493168..493255 88 blocks 54: [4752..4839]: 494480..494567 88 blocks 55: [4840..4927]: 496312..496399 88 blocks 56: [4928..5015]: 497848..497935 88 blocks 57: [5016..5103]: 503584..503671 88 blocks 58: [5104..5191]: 505248..505335 88 blocks 59: [5192..5279]: 505504..505591 88 blocks 60: [5280..5367]: 505888..505975 88 blocks 61: [5368..5431]: 506400..506463 64 blocks -- Package-specific info: *** BEGIN /proc/mounts /dev/mapper/vg0-root / xfs rw,nodev,relatime,attr2,delaylog,noquota 0 0 /dev/mapper/vg0-home /home xfs rw,nodev,relatime,attr2,delaylog,logbufs=8,logbsize=256k,noquota 0 0 /dev/mapper/vg0-usr /usr xfs rw,nodev,relatime,attr2,delaylog,logbufs=8,logbsize=256k,noquota 0 0 /dev/mapper/vg0-ulocal /usr/local xfs rw,nodev,relatime,attr2,delaylog,logbufs=8,logbsize=256k,noquota 0 0 /dev/mapper/vg0-var /var xfs
Bug#656824: linux-image-3.2.0-1-amd64 Boot Failure
On 22.01.12 10:41, James Robertson wrote: Package: linux-2.6 Version: 3.2.1-1 Severity: normal Dear Maintainer, After installing this kernel I was not able to boot to it and received the following error on the console. Loading Linux 3.2.0-1-amd64 ... error: cannot read the Linux header. Loading intitial ramdisk ... error: you need to load the kernel first. press any key to continue... I use LVM with XFS on top of that, not sure if that has any relevance. I also received a time out when Querying Debian BTS for reports on linux-2.6 (source)... So apologies if this bug has already been reported. Same here. Thinkpad T500+LVM+XFS: $ mount | grep root /dev/mapper/vg0-root on / type xfs (rw,nodev,relatime,attr2,delaylog,noquota) $ ls -l /boot/ total 47772 -rw-r--r-- 1 root root 125263 Aug 27 19:54 config-3.0.0-1-amd64 -rw-r--r-- 1 root root 128350 Dec 23 18:12 config-3.1.0-1-amd64 -rw-r--r-- 1 root root 130657 Jan 19 11:48 config-3.2.0-1-amd64 drwxr-xr-x 3 root root 8192 Jan 21 08:53 grub -rw-r--r-- 1 root root 11230400 Nov 21 17:18 initrd.img-3.0.0-1-amd64 -rw-r--r-- 1 root root 11342985 Jan 21 08:07 initrd.img-3.1.0-1-amd64 -rw-r--r-- 1 root root 11585465 Jan 21 08:53 initrd.img-3.2.0-1-amd64 -rw-r--r-- 1 root root 2007368 Aug 27 19:54 System.map-3.0.0-1-amd64 -rw-r--r-- 1 root root 2034035 Dec 23 18:12 System.map-3.1.0-1-amd64 -rw-r--r-- 1 root root 2072539 Jan 19 11:48 System.map-3.2.0-1-amd64 -rw-r--r-- 1 root root 2705680 Aug 27 19:49 vmlinuz-3.0.0-1-amd64 -rw-r--r-- 1 root root 2727792 Dec 23 18:10 vmlinuz-3.1.0-1-amd64 -rw-r--r-- 1 root root 2779248 Jan 21 08:54 vmlinuz-3.2.0-1-amd64 The grubshell can display the kernel image but isn't be able to load it: grub ls (vg0-root)/boot/ kern/disk.c:245: Opening `vg0-root'... grub/ config-3.0.0-1-amd64 vmlinuz-3.0.0-1-amd64 System.map-3.0.0-1-amd64 initrd.img-3.0.0-1-amd64 vmlinuz-3.1.0-1-amd64 config-3.1.0-1-amd64 System.map-3.1.0-1-amd64 initrd.img-3.1.0-1-amd64 config-3.2.0-1-amd64 System.map-3.2.0-1-amd64 initrd.img-3.2.0-1-amd64 vmlinuz-3.2.0-1-amd64 kern/disk.c:330: Closing `vg0-root'. grub linux (vg0-root)/boot/vmlinuz-3.2.0-1-amd64 root=/dev/mapper/vg0-root ro kern/disk.c:245: Opening `vg0-root'... kern/disk.c:330: Closing `vg0-root'. error: cannot read the Linux header. Loading with 3.1.0-1 works: grub linux (vg0-root)/boot/vmlinuz-3.1.0-1-amd64 root=/dev/mapper/vg0-root ro kern/disk.c:245: Opening `vg0-root'... kern/disk.c:330: Closing `vg0-root'. I think it's a grub bug. Weird. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#649563: Acknowledgement (linux-image-3.1.0-1-amd64 can't load initial ramdisk anymore)
After upgrading to kernel linux-image-3.1.0-1-amd64 3.1.5-1 the kernel boots without errors. The Bug can be closed. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#649563: linux-image-3.1.0-1-amd64 can't load initial ramdisk anymore
Package: linux-2.6 Version: 3.1.1-1 Severity: normal Dear Maintainers, after upgrading wheezy to linux-image-3.1.0-1-amd64, grub complains: Loading initial ramdisk ... error: couldn't read file. Later the kernel panics. I have made 2 screenshots: http://users.swapon.de/~fstoyan/public/files/3.1.0-boot1_m.jpg http://users.swapon.de/~fstoyan/public/files/3.1.0-boot2_m.jpg In this case /boot is in the /-Filesystem which itself is into LVM: ### BEGIN /etc/grub.d/10_linux ### menuentry 'Debian GNU/Linux, with Linux 3.1.0-1-amd64' --class debian --class gnu-linux --class gnu --class os { load_video set gfxpayload=keep insmod gzio insmod lvm insmod part_msdos insmod xfs set root='(vg0-root)' search --no-floppy --fs-uuid --set=root af14a1aa-52e2-4a95-8d49-733722fe7949 echo'Loading Linux 3.1.0-1-amd64 ...' linux /boot/vmlinuz-3.1.0-1-amd64 root=/dev/mapper/vg0-root ro rootdelay=9 echo'Loading initial ramdisk ...' initrd /boot/initrd.img-3.1.0-1-amd64 } -- Package-specific info: ** Kernel log: boot messages should be attached ** Model information sys_vendor: LENOVO product_name: 20555WG product_version: ThinkPad T500 chassis_vendor: LENOVO chassis_version: Not Available bios_vendor: LENOVO bios_version: 6FET56WW (2.02 ) board_vendor: LENOVO board_name: 20555WG board_version: Not Available ** PCI devices: 00:00.0 Host bridge [0600]: Intel Corporation Mobile 4 Series Chipset Memory Controller Hub [8086:2a40] (rev 07) Subsystem: Lenovo Device [17aa:20e0] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast TAbort- TAbort- MAbort+ SERR- PERR- INTx- Latency: 0 Capabilities: access denied Kernel driver in use: agpgart-intel 00:02.0 VGA compatible controller [0300]: Intel Corporation Mobile 4 Series Chipset Integrated Graphics Controller [8086:2a42] (rev 07) (prog-if 00 [VGA controller]) Subsystem: Lenovo Device [17aa:2114] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx- Latency: 0 Interrupt: pin A routed to IRQ 48 Region 0: Memory at f440 (64-bit, non-prefetchable) [size=4M] Region 2: Memory at d000 (64-bit, prefetchable) [size=256M] Region 4: I/O ports at 1800 [size=8] Expansion ROM at unassigned [disabled] Capabilities: access denied Kernel driver in use: i915 00:02.1 Display controller [0380]: Intel Corporation Mobile 4 Series Chipset Integrated Graphics Controller [8086:2a43] (rev 07) Subsystem: Lenovo Device [17aa:2114] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx- Latency: 0 Region 0: Memory at f420 (64-bit, non-prefetchable) [size=1M] Capabilities: access denied 00:03.0 Communication controller [0780]: Intel Corporation Mobile 4 Series Chipset MEI Controller [8086:2a44] (rev 07) Subsystem: Lenovo Device [17aa:20e6] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx+ Latency: 0 Interrupt: pin A routed to IRQ 11 Region 0: Memory at fc326800 (64-bit, non-prefetchable) [size=16] Capabilities: access denied 00:19.0 Ethernet controller [0200]: Intel Corporation 82567LM Gigabit Network Connection [8086:10f5] (rev 03) Subsystem: Lenovo Device [17aa:20ee] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx- Latency: 0 Interrupt: pin A routed to IRQ 45 Region 0: Memory at fc10 (32-bit, non-prefetchable) [size=128K] Region 1: Memory at fc325000 (32-bit, non-prefetchable) [size=4K] Region 2: I/O ports at 1840 [size=32] Capabilities: access denied Kernel driver in use: e1000e 00:1a.0 USB Controller [0c03]: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #4 [8086:2937] (rev 03) (prog-if 00 [UHCI]) Subsystem: Lenovo Device [17aa:20f0] Control: I/O+ Mem- BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium TAbort- TAbort- MAbort- SERR- PERR- INTx- Latency: 0 Interrupt: pin A routed to IRQ 20 Region 4: I/O ports at 1860 [size=32]
Bug#641041: heimdal-kcm: heimdal-clients doesn't work with KCM Credential Store
Package: heimdal-kcm Version: 1.4.0-5~bpo60+1 Severity: normal Dear Maintainers, When using klist on a system with a KCM Credential Store, it complains: $ klist klist: krb5_cc_get_principal: No credentials cache file found Setting KRB5CCNAME dosen't help too: $ export KRB5CCNAME=KCM:`id -u` $ klist klist: krb5_cc_get_principal: No credentials cache file found The default_cc_name is configured in /etc/krb5.conf: $ verify_krb5_conf --dumpconfig 2/dev/null | grep -i KCM default_cc_name = KCM:%{uid} When I kill kcm (pkill -9 kcm), SysV-Initscript doesn't work, and delete default_cc_name, everything works fine: $ klist Credentials cache: FILE:/tmp/krb5cc_1000 Principal: f...@lab.swapon.de Issued Expires Principal Sep 9 19:16:53 Sep 10 05:16:53 krbtgt/lab.swapon...@lab.swapon.de -- System Information: Debian Release: 6.0.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages heimdal-kcm depends on: ii libasn1-8-hei 1.4.0~git20100726.dfsg.1-2 Heimdal Kerberos - ASN.1 library ii libc6 2.11.2-10 Embedded GNU C Library: Shared lib ii libhdb9-heimd 1.4.0~git20100726.dfsg.1-2 Heimdal Kerberos - kadmin server l ii libheimntlm0- 1.4.0~git20100726.dfsg.1-2 Heimdal Kerberos - NTLM support li ii libkrb5-26-he 1.4.0~git20100726.dfsg.1-2 Heimdal Kerberos - libraries ii libroken18-he 1.4.0~git20100726.dfsg.1-2 Heimdal Kerberos - roken support l ii libssl0.9.8 0.9.8o-4squeeze1 SSL shared libraries heimdal-kcm recommends no packages. heimdal-kcm suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#640219: insserv refuse starting of nfs-common
Package: insserv Version: 1.14.0-2 Severity: minor Tags: patch Dear Maintainers, When using nfs-common with rpcbind as portmapper, insserv refuses activating of nfs-common and complains: # insserv nfs-common rpcbind insserv: Service portmap has to be enabled to start service nfs-common insserv: exiting now! insserv doesn't recognize rpcbind as a portmap service. This can be easyly changed: --- /etc/insserv.conf.dist 2011-09-03 14:49:16.771818718 +0200 +++ /etc/insserv.conf 2011-09-03 14:49:40.707819967 +0200 @@ -28,7 +28,7 @@ # # SunRPC portmapper available # -$portmap portmap +$portmap +portmap +rpcbind # # The system time has been set correctly -- System Information: Debian Release: 6.0.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages insserv depends on: ii libc6 2.11.2-10 Embedded GNU C Library: Shared lib insserv recommends no packages. Versions of packages insserv suggests: pn bootchart none (no description available) -- Configuration Files: /etc/insserv.conf changed: $local_fs +mountall +mountoverflowtmp +umountfs $network+networking +ifupdown $named +named +dnsmasq +lwresd +bind9 $network $remote_fs $local_fs +mountnfs +mountnfs-bootclean +umountnfs +sendsigs $syslog +rsyslog +sysklogd +syslog-ng +dsyslog +inetutils-syslogd $portmap+portmap +rpcbind $time +hwclock interactive glibc udev console-screen keymap keyboard-setup console-setup cryptdisks cryptdisks-early checkfs-loop -- no debconf information --- /etc/insserv.conf.dist 2011-09-03 14:49:16.771818718 +0200 +++ /etc/insserv.conf 2011-09-03 14:49:40.707819967 +0200 @@ -28,7 +28,7 @@ # # SunRPC portmapper available # -$portmap portmap +$portmap +portmap +rpcbind # # The system time has been set correctly
Bug#627266: postfix: Initscript creates chroot with bad ca_path
Package: postfix Version: 2.8.2-1+b1 Severity: normal Tags: patch Dear Maintainers, I noticed that postfix initscript creates a chroot with this ca_path: /var/spool/postfix/etc/ssl/certs/etc/ssl/certs Furthermore due to the dereference of cpio the symbolic links of the certificates are converted into files. I have made a patch (a 2-liner) which correct this behavior. --- /etc/init.d/postfix.dist2011-05-19 05:57:26.766277421 +0200 +++ /etc/init.d/postfix 2011-05-19 06:02:36.221691418 +0200 @@ -89,7 +89,8 @@ else mkdir --parent ${dest_dir%/*} fi # handle files in subdirectories - find $ca_path -print0 | cpio -0pdL $dest_dir + (cd $ca_path; find . -name *.pem -print0 | cpio -0pdL $dest_dir 2/dev/null) +c_rehash $dest_dir /dev/null 21 if [ $new = 1 ]; then # and replace the old directory rm -r ${dest_dir%.NEW} Regards Friedemann -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.38-2-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages postfix depends on: ii adduser 3.112+nmu2 add and remove users and groups ii debconf [debconf-2.0] 1.5.39 Debian configuration management sy ii dpkg 1.16.0.3 Debian package management system ii libc6 2.13-4 Embedded GNU C Library: Shared lib ii libdb5.1 5.1.25-1 Berkeley v5.1 Database Libraries [ ii libsasl2-22.1.23.dfsg1-8 Cyrus SASL - authentication abstra ii libssl1.0.0 1.0.0d-2 SSL shared libraries ii lsb-base 3.2-27 Linux Standard Base 3.2 init scrip ii netbase 4.45 Basic TCP/IP networking system ii ssl-cert 1.0.28 simple debconf wrapper for OpenSSL Versions of packages postfix recommends: ii python2.6.6-14 interactive high-level object-orie Versions of packages postfix suggests: pn dovecot-commonnone (no description available) pn libsasl2-modules none (no description available) ii mutt [mail-reader]1.5.21-4 text-based mailreader supporting M pn postfix-cdb none (no description available) pn postfix-ldap none (no description available) pn postfix-mysql none (no description available) pn postfix-pcre none (no description available) pn postfix-pgsql none (no description available) pn procmail none (no description available) ii resolvconf1.48 name server information handler pn sasl2-bin none (no description available) pn ufw none (no description available) --- /etc/init.d/postfix.dist2011-05-19 05:57:26.766277421 +0200 +++ /etc/init.d/postfix 2011-05-19 06:02:36.221691418 +0200 @@ -89,7 +89,8 @@ else mkdir --parent ${dest_dir%/*} fi # handle files in subdirectories - find $ca_path -print0 | cpio -0pdL $dest_dir + (cd $ca_path; find . -name *.pem -print0 | cpio -0pdL $dest_dir 2/dev/null) +c_rehash $dest_dir /dev/null 21 if [ $new = 1 ]; then # and replace the old directory rm -r ${dest_dir%.NEW}
Bug#515754: nfs-common: Mounting with sec=krb fails with access denied by server, while mounting
Hello, nfs-common 1:1.2.3-2 from wheezy works flawlessly for me with sec=krb5p and allow_weak_crypto = true in /etc/krb5.conf. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#622084: dnsutils: nsupdate fails with assert after successfull zone-update
Package: dnsutils Version: 1:9.7.3.dfsg-1~squeeze1 Severity: minor Dear Maintainers, I use nsupdate with SIG(0) authentication in this way: nsupdate -k /etc/nsupdate/Khost.+005+61711.private server server zone zone update delete host A update add host 60 A IP send answer Answer: ;; -HEADER- opcode: UPDATE, status: NOERROR, id: 14054 ;; flags: qr; ZONE: 1, PREREQ: 0, UPDATE: 2, ADDITIONAL: 0 [...] quit mem.c:1099: INSIST(ctx-stats[i].gets == 0U) failed, back trace #0 0x7fb5662c3946 in ?? #1 0x7fb5662c3b1a in ?? #2 0x7fb5662d5794 in ?? #3 0x7fb5662d5a62 in ?? #4 0x7fb5676cf5e7 in ?? #5 0x7fb565801c4d in ?? #6 0x7fb5676c8c29 in ?? Aborted The Update itself succeeded, but when quitting nsupdate is complaining. -- System Information: Debian Release: 6.0.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages dnsutils depends on: ii bind9-host [host 1:9.7.3.dfsg-1~squeeze1 Version of 'host' bundled with BIN ii libbind9-60 1:9.7.3.dfsg-1~squeeze1 BIND9 Shared Library used by BIND ii libc62.11.2-10 Embedded GNU C Library: Shared lib ii libcap2 1:2.19-3support for getting/setting POSIX. ii libdns69 1:9.7.3.dfsg-1~squeeze1 DNS Shared Library used by BIND ii libgssapi-krb5-2 1.8.3+dfsg-4MIT Kerberos runtime libraries - k ii libisc62 1:9.7.3.dfsg-1~squeeze1 ISC Shared Library used by BIND ii libisccfg62 1:9.7.3.dfsg-1~squeeze1 Config File Handling Library used ii liblwres60 1:9.7.3.dfsg-1~squeeze1 Lightweight Resolver Library used ii libssl0.9.8 0.9.8o-4squeeze1SSL shared libraries ii libxml2 2.7.8.dfsg-2GNOME XML library dnsutils recommends no packages. Versions of packages dnsutils suggests: pn rblcheck none (no description available) -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#600957: linux-image-2.6.32-5-amd64: Please include vmw_pvscsi (VMware PVSCSI)
After installing 2.6.32-32: $ dpkg -l linux-image-2.6.32-5-amd64 Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ Name Version Description +++--== ii linux-image-2.6.32-5-amd64 2.6.32-32 Linux 2.6.32 for 64-bit PCs it seems, that vmw_pvscsi isn't enabled in this kernel: $ grep CONFIG_VMWARE_PVSCSI /boot/config-2.6.32-5-amd64 # CONFIG_VMWARE_PVSCSI is not set Please reopen the bug. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#616684: ntpd complains: syntax error, unexpected T_Mask, expecting T_EOC
Package: ntp Version: 1:4.2.6.p2+dfsg-1+b1 Severity: normal Dear Maintainers, when using restrict with IPv6 networks the ntpd complains: ntpd[18410]: line 41 column 32 syntax error, unexpected T_Mask, expecting T_EOC ntpd[18410]: syntax error in /etc/ntp.conf line 41, column 32 Line 41 is: restrict -6 2001:6f8:12ec:10:: mask :::f000:: nomodify This configuration works flawlessly with Lennys ntpd (1:4.2.4p4+dfsg) but no with squeeze anymore. -- System Information: Debian Release: 6.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages ntp depends on: ii adduser 3.112+nmu2 add and remove users and groups ii dpkg1.15.8.10Debian package management system ii libc6 2.11.2-10Embedded GNU C Library: Shared lib ii libcap2 1:2.19-3 support for getting/setting POSIX. ii libedit22.11-20080614-2 BSD editline and history libraries ii libopts25 1:5.10-1.1 automated option processing librar ii libssl0.9.8 0.9.8o-4squeeze1 SSL shared libraries ii lsb-base3.2-23.2squeeze1 Linux Standard Base 3.2 init scrip ii netbase 4.45 Basic TCP/IP networking system Versions of packages ntp recommends: ii perl 5.10.1-17 Larry Wall's Practical Extraction Versions of packages ntp suggests: pn ntp-doc none (no description available) -- Configuration Files: /etc/ntp.conf changed: driftfile /var/lib/ntp/ntp.drift statsdir /var/log/ntpstats/ statistics loopstats peerstats clockstats filegen loopstats file loopstats type day enable filegen peerstats file peerstats type day enable filegen clockstats file clockstats type day enable restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1 server ntp1.lab.swapon.de burst server reliant.lab.swapon.de burst restrict -6 ntp1.lab.swapon.de restrict -6 reliant.lab.swapon.de restrict -4 reliant.lab.swapon.de restrict -6 2001:6f8:12ec:10:: mask :::f000:: nomodify -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#616684: [pkg-ntp-maintainers] Bug#616684: ntpd complains: syntax error, unexpected T_Mask, expecting T_EOC
On 6.03.11 18:51, Kurt Roeckx wrote: On Sun, Mar 06, 2011 at 05:07:35PM +0100, Friedemann Stoyan wrote: restrict -6 2001:6f8:12ec:10:: mask :::f000:: nomodify It seems to work without the -6 Kurt Indeed, it does. Thanks for your help. Now I see in /usr/share/doc/ntp/NEWS.gz: * Unified IPv4 and IPv6 restrict lists The bug can be closed. Sorry for the noise. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#610675: udev: /dev-Filesystem is half-ram sized after every boot
Package: udev Version: 164-3 Severity: minor Dear Maintainers, regardless of setting the size (tmpfs_size=10M) in /etc/init.d/udev the /dev-Filesystem is half-ram sized after every boot. I suppose this is caused by mounting /dev with devtmpfs. -- System Information: Debian Release: 6.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages udev depends on: ii debconf [debconf-2.0] 1.5.36 Debian configuration management sy ii libc6 2.11.2-7 Embedded GNU C Library: Shared lib ii libselinux1 2.0.96-1 SELinux runtime shared libraries ii libudev0164-3libudev shared library ii libusb-0.1-42:0.1.12-16 userspace USB programming library ii lsb-base3.2-23.2squeeze1 Linux Standard Base 3.2 init scrip ii util-linux 2.17.2-5 Miscellaneous system utilities Versions of packages udev recommends: ii pciutils 1:3.1.7-6 Linux PCI Utilities ii usbutils 0.87-5 Linux USB utilities udev suggests no packages. -- debconf information: udev/new_kernel_needed: false udev/title/upgrade: udev/reboot_needed: udev/sysfs_deprecated_incompatibility: -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603780: Acknowledgement (network_biopair_interop: error reading 5 bytes from the network: Connection reset by peer)
A deeper look into paket 31 shows: Secure Socket Layer TLSv1 Record Layer: Encrypted Alert Content Type: Alert (21) Version: TLS 1.0 (0x0301) Length: 32 Alert Message: Encrypted Alert According to: http://en.wikipedia.org/wiki/Transport_Layer_Security#Alert_protocol this means Decryption failed. The Server closes the TCP connection with TCP-Reset immediately. It seems that some nasty happens at client side. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#578223: smokeping: Messages in apaches errorlog at every http hit
On 1.12.10 01:38, Guillaume Delacour wrote: I think you may use an Apache rewrite rule like : RewriteRule ^/$ /cgi-bin/smokeping.cgi [PT,L] No. I'm using the DirectoryIndex statement for selecting the CGI-Script directly: Directory /var/www/smokeping.swapon.de AddHandler cgi-script .cgi AllowOverride None Options -Indexes +ExecCGI DirectoryIndex smokeping.cgi Order allow,deny Allow from all /Directory This is *exactly* what i use too, and if i disable it, i don't have these warnings anymore. I don't like long urls, so this is not an option for me. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#604891: (rpc.gssd: Failed to create machine krb5 context with any credentials cache)
It seems the issue is solved. Due to a bad BIOS-Setup (dynamic clock ticks) the time slow down. NTP wasn't be able to correct this. After fixing this the observed misbehavior vanished. The Bug can be closes. Sorry for the noise. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#604891: rpc.gssd: Failed to create machine krb5 context with any credentials cache
Package: nfs-common Version: 1:1.2.2-4 Severity: normal I mount a NFS4-Share with krb5p and automounter. After some time the client refuses the mount. The rpc.gssd complains: rpc.gssd[12224]: in authgss_create() rpc.gssd[12224]: in authgss_refresh() rpc.gssd[12224]: in authgss_marshal() rpc.gssd[12224]: xdr_rpc_gss_cred: encode success (v 1, proc 1, seq 0, svc 1, ctx (nil):0) rpc.gssd[12224]: xdr_rpc_gss_init_args: encode success (token 0x1e667e0:542) rpc.gssd[12224]: in authgss_validate() rpc.gssd[12224]: xdr_rpc_gss_init_res decode success (ctx (nil):0, maj 851968, min -1765328347, win 128, token (nil):0) rpc.gssd[10927]: WARNING: Failed to create machine krb5 context with any credentials cache for server reliant.lab.swapon.de Which is not true: $ date Thu Nov 25 06:54:40 CET 2010 $ sudo klist -c /tmp/krb5cc_machine_LAB.SWAPON.DE Credentials cache: FILE:/tmp/krb5cc_machine_LAB.SWAPON.DE Principal: nfs/phoenix.lab.swapon...@lab.swapon.de Issued Expires Principal Nov 24 20:18:54 Nov 25 20:13:54 krbtgt/lab.swapon...@lab.swapon.de Nov 24 20:18:54 Nov 25 20:13:54 nfs/reliant.lab.swapon...@lab.swapon.de When I restart the rpc.gssd, everything works well again. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-common depends on: ii adduser 3.112 add and remove users and groups ii initscripts 2.88dsf-12 scripts for initializing and shutt ii libc62.11.2-7Embedded GNU C Library: Shared lib ii libcap2 1:2.19-3support for getting/setting POSIX. ii libcomerr2 1.41.12-2 common error description library ii libevent-1.4-2 1.4.13-stable-1 An asynchronous event notification ii libgssapi-krb5-2 1.8.3+dfsg-2MIT Kerberos runtime libraries - k ii libgssglue1 0.1-4 mechanism-switch gssapi library ii libk5crypto3 1.8.3+dfsg-2MIT Kerberos runtime libraries - C ii libkrb5-31.8.3+dfsg-2MIT Kerberos runtime libraries ii libnfsidmap2 0.23-2 An nfs idmapping library ii librpcsecgss30.19-2 allows secure rpc communication us ii libwrap0 7.6.q-19Wietse Venema's TCP wrappers libra ii lsb-base 3.2-23.1Linux Standard Base 3.2 init scrip ii netbase 4.43Basic TCP/IP networking system ii portmap 6.0.0-2 RPC port mapper ii ucf 3.0025+nmu1 Update Configuration File: preserv nfs-common recommends no packages. nfs-common suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#603780: network_biopair_interop: error reading 5 bytes from the network: Connection reset by peer
Package: postfix Version: 2.7.1-1 Severity: minor Dear maintainers, when sending mails with TLS-Encryption the smtp client complains: postfix/smtp[2141]: warning: network_biopair_interop: error reading 5 bytes from the network: Connection reset by peer The mail itself is properly transmitted: postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: DATA postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: 250 2.1.0 Ok postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: 250 2.1.5 Ok postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: 354 End data with CRLF.CRLF postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: . postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: QUIT postfix/smtp[2141]: mail.lab.swapon.de[2001:6f8:12ec:10::25]:25: 250 2.0.0 Ok: queued as 551A4131AA postfix/smtp[2141]: 572DA80534E: to=x...@lab.swapon.de, orig_to=root, relay=mail.lab.swapon.de[2001:6f8:12ec:10::25]:25, delay=0.57, delays=0.03/0.19/0.26/0.09, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 551A4131AA) postfix/smtp[2141]: name_mask: resource postfix/smtp[2141]: name_mask: software postfix/smtp[2141]: warning: network_biopair_interop: error reading 5 bytes from the network: Connection reset by peer postfix/qmgr[1756]: 572DA80534E: removed The tcpdump shows: 1 0.00 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [SYN] Seq=0 Win=5760 Len=0 MSS=1440 TSV=1454672 TSER=0 WS=7 2 0.002347 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [SYN, ACK] Seq=0 Ack=1 Win=5712 Len=0 MSS=1440 TSV=795381212 TSER=1454672 WS=6 3 0.002380 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [ACK] Seq=1 Ack=1 Win=5760 Len=0 TSV=1454673 TSER=795381212 4 0.065563 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 SMTP S: 220 mail.lab.swapon.de ESMTP Postfix 5 0.065583 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [ACK] Seq=1 Ack=39 Win=5760 Len=0 TSV=1454689 TSER=795381228 6 0.065666 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 SMTP C: EHLO phoenix.lab.swapon.de 7 0.066093 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=39 Ack=29 Win=5760 Len=0 TSV=795381228 TSER=1454689 8 0.066109 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 SMTP S: 250-mail.lab.swapon.de | 250-PIPELINING | 250-SIZE 1024 | 250-ETRN | 250-STARTTLS | 250-ENHANCEDSTATUSCODES | 250-8BITMIME | 250 DSN 9 0.066186 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 SMTP C: STARTTLS 10 0.066602 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 SMTP S: 220 2.0.0 Ready to start TLS 11 0.067936 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 SSL Client Hello 12 0.106074 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=200 Ack=1302 Win=8576 Len=0 TSV=795381239 TSER=1454689 13 0.144959 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TLSv1 Server Hello, 14 0.145000 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TLSv1 Certificate, Server Key Exchange, Certificate Request, Server Hello Done 15 0.145021 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [ACK] Seq=1302 Ack=2932 Win=12544 Len=0 TSV=1454708 TSER=795381248 16 0.154838 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP [TCP segment of a reassembled PDU] 17 0.154877 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TLSv1 Certificate, Client Key Exchange, Certificate Verify, Change Cipher Spec, Encrypted Handshake Message 18 0.155376 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=2932 Ack=2730 Win=11456 Len=0 TSV=795381251 TSER=1454711 19 0.155411 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=2932 Ack=3638 Win=14336 Len=0 TSV=795381251 TSER=1454711 20 0.184549 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TLSv1 Encrypted Handshake Message, Change Cipher Spec, Encrypted Handshake Message 21 0.224971 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [ACK] Seq=3638 Ack=4158 Win=15488 Len=0 TSV=1454728 TSER=795381258 22 0.326873 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TLSv1 Application Data 23 0.327928 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TLSv1 Application Data 24 0.327965 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TCP 39580 smtp [ACK] Seq=3707 Ack=4291 Win=18304 Len=0 TSV=1454754 TSER=795381294 25 0.328175 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TLSv1 Application Data 26 0.366085 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=4291 Ack=3808 Win=14336 Len=0 TSV=795381304 TSER=1454754 27 0.372678 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TLSv1 Application Data 28 0.372891 2001:6f8:12ec:11::1024:0 - 2001:6f8:12ec:10::25 TLSv1 Application Data 29 0.373310 2001:6f8:12ec:10::25 - 2001:6f8:12ec:11::1024:0 TCP smtp 39580 [ACK] Seq=4376 Ack=4165 Win=17152 Len=0 TSV=795381305
Bug#602090: automount: syntax error in nsswitch config near [ syntax error ]
Package: autofs5 Version: 5.0.4-3.1 Severity: minor Tags: patch I encountered the Ununtu Bug 488696: syntax error in nsswitch config near [ syntax error ] https://bugs.launchpad.net/ubuntu/+source/autofs5/+bug/488696 in Debian Squeeze too. Adding the line: automount: files to /etc/nsswitch.conf solves the problem. Regards Friedemann -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages autofs5 depends on: ii libc6 2.11.2-6+squeeze1 Embedded GNU C Library: Shared lib ii ucf3.0025+nmu1 Update Configuration File: preserv Versions of packages autofs5 recommends: ii module-init-tools 3.12-1 tools for managing Linux kernel mo ii nfs-common1:1.2.2-4 NFS support files common to client autofs5 suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#599454: whois fails when replys contain non US-ASCII
Package: whois Version: 4.7.30 Severity: normal Dear maintainers, It seems that whois fails when the reply contains non US-ASCII output: $ whois web.de --verbose Using server whois.denic.de. Query string: -T dn,ace -C US-ASCII web.de % Error: 5500013 Invalid charset for response Quoting from https://trac.macports.org/ticket/26634 DENIC recently upgraded its WHOIS servers. Due to strict, explicit US-ASCII calls that whois does, when not configureed with IDN/ICONV support, currently ALL QUERIES FAIL when the response data contains any UTF-8 (e.g. Umlauts in the contact information which is very common). -- System Information: Debian Release: 5.0.6 APT prefers proposed-updates APT policy: (700, 'proposed-updates'), (700, 'stable'), (500, 'testing'), (400, 'unstable'), (200, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages whois depends on: ii libc6 2.7-18lenny4 GNU C Library: Shared libraries ii libidn11 1.8+20080606-1 GNU libidn library, implementation whois recommends no packages. whois suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#592394: linux-image-2.6.35-trunk-686: System freeze after switching from X to Console and back again
Package: linux-2.6 Version: 2.6.35-1~experimental.1 Severity: normal Dear maintainers, when I switch from X11 to console and back again, my Lenovo Thinkpad T500 freeze with a kernel dump: [ 187.011557] ACPI: Video Device [VID1] (multi-head: yes rom: no post: no) [ 187.011574] [drm] Initialized i915 1.6.0 20080730 for :00:02.0 on minor 0 [ 245.840201] BUG: unable to handle kernel NULL pointer dereference at (null) [ 245.840212] IP: [(null)] (null) [ 245.840219] *pde = [ 245.840225] Oops: [#1] SMP [ 245.840232] last sysfs file: /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq [ 245.840239] Modules linked in: i915 drm_kms_helper drm i2c_algo_bit ip6table_filter ip6_tables xt_tcpudp xt_owner iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables x_tables autofs4 rpcsec_gss_krb5 nfsd nfs lockd fscache nfs_acl auth_rpcgss sunrpc xfs exportfs aes_i586 aes_generic xts gf128mul dm_crypt acpi_cpufreq mperf loop pciehp pci_hotplug joydev arc4 ecb serio_raw psmouse evdev pcmcia snd_pcsp zaurus cdc_ether usbnet i2c_i801 mii r852 sm_common nand nand_ids nand_ecc mtd yenta_socket pcmcia_rsrc pcmcia_core wmi snd_hda_codec_conexant thinkpad_acpi battery ac nvram tpm_tis tpm tpm_bios video output iwlagn cdc_wdm iwlcore cdc_acm snd_hda_intel uvcvideo mac80211 snd_hda_codec btusb snd_hwdep videodev v4l1_compat snd_pcm cfg80211 snd_timer snd i2c_core bluetooth soundcore snd_page_alloc rfkill button processor ext3 jbd mbcache dm_mirror dm_region_hash dm_log dm_snapshot dm_mod sg sd_mod sr_mod crc_t10dif cdrom ahci libahci sdhci_pci sdhci libata mmc_core firewire_ohci led_class firewire_core crc_itu_t scsi_mod ehci_hcd uhci_hcd usbcore e1000e nls_base thermal fan thermal_sys [last unloaded: scsi_wait_scan] [ 245.840437] [ 245.840444] Pid: 3585, comm: Xorg Not tainted 2.6.35-trunk-686 #1 20555WG/20555WG [ 245.840451] EIP: 0060:[] EFLAGS: 00213206 CPU: 0 [ 245.840469] EIP is at 0x0 [ 245.840474] EAX: f5bb4800 EBX: f4a68000 ECX: f73e8800 EDX: f4a68014 [ 245.840480] ESI: f5bb4800 EDI: f5bafe84 EBP: f5bafe84 ESP: f5bafe5c [ 245.840486] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 245.840494] Process Xorg (pid: 3585, ti=f5bae000 task=f56b6f60 task.ti=f5bae000) [ 245.840498] Stack: [ 245.840501] f89483f2 f73e8800 f5bb4800 0040 f5bafe84 f83858da 40446440 f89752b4 [ 245.840514] 0 f8948223 bfdcfbd8 0003 [ 245.840526] 0 [ 245.840540] Call Trace: [ 245.840567] [f89483f2] ? i915_dma_init+0x1cf/0x200 [i915] [ 245.840595] [f83858da] ? drm_ioctl+0x208/0x2aa [drm] [ 245.840617] [f8948223] ? i915_dma_init+0x0/0x200 [i915] [ 245.840633] [c10b4270] ? do_sync_write+0x9e/0xd3 [ 245.840657] [f83856d2] ? drm_ioctl+0x0/0x2aa [drm] [ 245.840666] [c10be662] ? vfs_ioctl+0x1c/0x7d [ 245.840674] [c10bebda] ? do_vfs_ioctl+0x472/0x4ac [ 245.840683] [c10b40be] ? fsnotify_modify+0x4c/0x53 [ 245.840690] [c10b41d2] ? do_sync_write+0x0/0xd3 [ 245.840697] [c10b47db] ? vfs_write+0x9d/0xda [ 245.840704] [c10bec58] ? sys_ioctl+0x44/0x64 [ 245.840714] [c1002f1f] ? sysenter_do_call+0x12/0x28 [ 245.840719] Code: Bad EIP value. [ 245.840727] EIP: [] 0x0 SS:ESP 0068:f5bafe5c [ 245.840753] CR2: [ 245.840764] ---[ end trace bb284edc78bdb8f5 ]--- [ 245.920314] [drm:drm_release] *ERROR* Device busy: 1 Mouse, Keyboard etc. doesn't work anymore, but network connections are not affected. $ dpkg -l xserver-xorg-video-intel Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Cfg-files/Unpacked/Failed-cfg/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad) ||/ Name Version Description +++-=-=-== ii xserver-xorg-video-intel 2:2.3.2-2+lenny7 X.Org X server -- Intel i8xx, i9xx display driver -- Package-specific info: ** Kernel log: boot messages should be attached ** Model information not available ** PCI devices: 00:00.0 Host bridge [0600]: Intel Corporation Mobile 4 Series Chipset Memory Controller Hub [8086:2a40] (rev 07) Subsystem: Lenovo Device [17aa:20e0] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast TAbort- TAbort- MAbort+ SERR- PERR- INTx- Latency: 0 Capabilities: access denied Kernel driver in use: agpgart-intel 00:01.0 PCI bridge [0604]: Intel Corporation Mobile 4 Series Chipset PCI Express Graphics Port [8086:2a41] (rev 07) (prog-if 00 [Normal decode]) Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B-
Bug#587894: iodine: Please add support for CNAME/TXT/A/MX/SRV queries
Package: iodine Version: 0.5.1-2~bpo50+1 Severity: wishlist Dear Maintainers, it would be nice to have support for CNAME/TXT/A/MX/SRV queries in iodine. This feature was added in 0.6.0 release candidate. It would be great upgrading to this version. Regards Friedemann -- System Information: Debian Release: 5.0.5 APT prefers proposed-updates APT policy: (700, 'proposed-updates'), (700, 'stable'), (500, 'testing'), (400, 'unstable'), (200, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.34-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages iodine depends on: ii adduser3.110 add and remove users and groups ii debconf [debconf-2.0] 1.5.24Debian configuration management sy ii libc6 2.7-18lenny4 GNU C Library: Shared libraries ii makedev2.3.1-88 creates device files in /dev ii udev 0.125-7+lenny3/dev/ and hotplug management daemo ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime iodine recommends no packages. Versions of packages iodine suggests: ii dnsutils 1:9.6.ESV.R1+dfsg-0+lenny2 Clients provided with BIND pn fping none (no description available) pn gawk none (no description available) pn ipcalcnone (no description available) ii iproute 20080725-2 networking and traffic control too -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#583643: linux-image-2.6.34-1-686: iwlagn disassociate under high load
I'm not be able reproducing this bug anymore. No disassociation after many hours with a saturated wireless link. No clue what kind of cosmic EM-burst caused this odd problem. You can close the bug. Sorry for the noise. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#583643: linux-image-2.6.34-1-686: iwlagn disassociate under high load
Package: linux-2.6 Version: 2.6.34-1~experimental.1 Severity: normal Dear Maintainers, after upgrading to kernel 2.6.34-1~experimental.1 my iwlagn based wirless lan gets unstable under higher/heavy load: [226918.161883] wlan0: deauthenticated from 00:13:5f:ff:04:80 (Reason: 10) [226918.176600] mac80211-phy0: failed to remove key (0, 00:13:5f:ff:04:80) from hardware (-22) [226918.192593] cfg80211: Calling CRDA to update world regulatory domain [226918.192637] cfg80211: Calling CRDA for country: EU [226918.765130] ADDRCONF(NETDEV_UP): wlan0: link is not ready [226922.877709] wlan0: authenticate with 00:13:5f:ff:04:80 (try 1) [226922.878811] wlan0: authenticated [226922.878851] wlan0: associate with 00:13:5f:ff:04:80 (try 1) [226922.880158] wlan0: RX AssocResp from 00:13:5f:ff:04:80 (capab=0x111 status=0 aid=1) [226922.880165] wlan0: associated [226922.884919] ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [228503.826349] wlan0: deauthenticated from 00:13:5f:ff:04:80 (Reason: 2) [228503.844068] mac80211-phy0: failed to remove key (0, 00:13:5f:ff:04:80) from hardware (-22) [228503.868282] cfg80211: Calling CRDA to update world regulatory domain [228503.868336] cfg80211: Calling CRDA for country: EU [228504.465770] ADDRCONF(NETDEV_UP): wlan0: link is not ready [228508.580218] wlan0: authenticate with 00:13:5f:ff:04:80 (try 1) [228508.581246] wlan0: authenticated [228508.581285] wlan0: associate with 00:13:5f:ff:04:80 (try 1) [228508.582488] wlan0: RX AssocResp from 00:13:5f:ff:04:80 (capab=0x111 status=0 aid=1) [228508.582494] wlan0: associated In my accesspoint (cisco 1131ag) logfile I can see: May 28 2010 22:00:13.519 CEST: %DOT11-6-ASSOC: Interface Dot11Radio1, Station 0016.eaef.2cea Associated KEY_MGMT[WPAv2 PSK] May 28 2010 22:13:51.212 CEST: %DOT11-4-MAXRETRIES: Packet to client 0016.eaef.2cea reached max retries, removing the client May 28 2010 22:13:51.213 CEST: %DOT11-6-DISASSOC: Interface Dot11Radio1, Deauthenticating Station 0016.eaef.2cea Reason: Previous authentication no longer valid May 28 2010 22:13:51.215 CEST: %DOT11-4-MAXRETRIES: Packet to client 0016.eaef.2cea reached max retries, removing the client May 28 2010 22:13:57.856 CEST: %DOT11-6-ASSOC: Interface Dot11Radio1, Station 0016.eaef.2cea Associated KEY_MGMT[WPAv2 PSK] May 28 2010 22:40:18.691 CEST: %DOT11-4-MAXRETRIES: Packet to client 0016.eaef.2cea reached max retries, removing the client May 28 2010 22:40:18.695 CEST: %DOT11-6-DISASSOC: Interface Dot11Radio1, Deauthenticating Station 0016.eaef.2cea Reason: Previous authentication no longer valid May 28 2010 22:40:23.558 CEST: %DOT11-6-ASSOC: Interface Dot11Radio1, Station 0016.eaef.2cea Associated KEY_MGMT[WPAv2 PSK] With kernel linux-image-2.6.32-5-686 the wlan works prefectly. -- Package-specific info: ** Version: Linux version 2.6.34-1-686 (Debian 2.6.34-1~experimental.1) (m...@debian.org) (gcc version 4.3.4 (Debian 4.3.4-10) ) #1 SMP Thu May 20 12:14:21 UTC 2010 [5.036056] iwlagn: Intel(R) Wireless WiFi Link AGN driver for Linux, in-tree: [5.036059] iwlagn: Copyright(c) 2003-2010 Intel Corporation [5.036111] iwlagn :03:00.0: PCI INT A - GSI 17 (level, low) - IRQ 17 [5.036119] iwlagn :03:00.0: setting latency timer to 64 [5.036155] iwlagn :03:00.0: Detected Intel Wireless WiFi Link 5300AGN REV=0x24 [5.272223] iwlagn :03:00.0: Tunable channels: 13 802.11bg, 24 802.11a channels [5.272337] iwlagn :03:00.0: irq 33 for MSI/MSI-X [5.328754] iwlagn :03:00.0: firmware: requesting iwlwifi-5000-2.ucode [6.440762] iwlagn :03:00.0: loaded firmware version 8.24.2.12 ** Loaded modules: Module Size Used by des_generic15043 0 cbc 1987 0 i915 219529 2 drm_kms_helper 18209 1 i915 drm 113797 4 i915,drm_kms_helper i2c_algo_bit3541 1 i915 ip6table_filter 924 0 ip6_tables 8736 1 ip6table_filter xt_tcpudp 1675 1 xt_owner 739 1 iptable_nat 2883 1 nf_nat 10920 1 iptable_nat nf_conntrack_ipv4 7585 3 iptable_nat,nf_nat nf_conntrack 39080 3 iptable_nat,nf_nat,nf_conntrack_ipv4 nf_defrag_ipv4 839 1 nf_conntrack_ipv4 iptable_filter 964 0 ip_tables 7877 2 iptable_nat,iptable_filter x_tables8703 7 ip6table_filter,ip6_tables,xt_tcpudp,xt_owner,iptable_nat,iptable_filter,ip_tables autofs416622 1 rpcsec_gss_krb5 7476 0 nfsd 193778 2 nfs 207484 0 lockd 49983 2 nfsd,nfs fscache24766 1 nfs nfs_acl 1699 2 nfsd,nfs auth_rpcgss25227 3 rpcsec_gss_krb5,nfsd,nfs sunrpc135008 9 rpcsec_gss_krb5,nfsd,nfs,lockd,nfs_acl,auth_rpcgss xfs 646746 4 exportfs2626 2 nfsd,xfs
Bug#582639: udev disagrees with kernel names
Package: udev Version: 154-1 Severity: minor Dear maintainers, I have noticed that udev complains: Sat May 22 12:51:32 2010: udevd-work[255]: kernel-provided name 'dm-0' and NAME= 'mapper/vg00-usr' disagree, please use SYMLINK+= or change the kernel to provide the proper name Sat May 22 12:51:32 2010: udevd-work[255]: kernel-provided name 'dm-3' and NAME= 'mapper/vg00-home' disagree, please use SYMLINK+= or change the kernel to provide the proper name Kernel is: Linux version 2.6.32-3-686 (Debian 2.6.32-9) (m...@debian.org) (gcc version 4.3.4 (Debian 4.3.4-8) ) #1 SMP Thu Feb 25 06:14:20 UTC 2010 Regards Friedemann -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-3-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages udev depends on: ii debconf [debconf-2.0]1.5.32 Debian configuration management sy ii libc62.10.2-6Embedded GNU C Library: Shared lib ii libselinux1 2.0.94-1SELinux runtime shared libraries ii libusb-0.1-4 2:0.1.12-14 userspace USB programming library ii lsb-base 3.2-23.1Linux Standard Base 3.2 init scrip ii util-linux 2.16.2-0Miscellaneous system utilities Versions of packages udev recommends: ii pciutils 1:3.1.7-3 Linux PCI Utilities ii usbutils 0.87-1 Linux USB utilities udev suggests no packages. -- debconf information: udev/new_kernel_needed: false udev/title/upgrade: udev/reboot_needed: -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#578223: smokeping: Messages in apaches errorlog at every http hit
Package: smokeping Version: 2.3.6-3 Severity: minor Dear Maintainers, I have install smokeping and it's working. But there is a minor issue, at every http access the apache webserver complains: smokeping.cgi: Use of uninitialized value $url in substitution (s///) at (eval 35) line 45. -- System Information: Debian Release: 5.0.4 APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages smokeping depends on: ii adduser 3.110add and remove users and groups ii debianutils 2.30 Miscellaneous utilities specific t ii fping 2.4b2-to-ipv6-15 sends ICMP ECHO_REQUEST packets to ii libdigest-hmac-perl 1.01-7 create standard message integrity ii librrds-perl1.3.1-4 Time-series data storage and displ ii libsnmp-session-perl1.12-1 Perl support for accessing SNMP-aw ii liburi-perl 1.35.dfsg.1-1Manipulates and accesses URI strin ii libwww-perl 5.813-1 WWW client/server library for Perl ii lsb-base3.2-20 Linux Standard Base 3.2 init scrip ii perl5.10.0-19lenny2 Larry Wall's Practical Extraction ii perl-modules [libnet-pe 5.10.0-19lenny2 Core Perl modules ii postfix [mail-transport 2.5.5-1.1High-performance mail transport ag ii speedy-cgi-perl 2.22-10 speed up perl scripts by making th ii ucf 3.0016 Update Configuration File: preserv Versions of packages smokeping recommends: ii apache2-mpm-wor 2.2.9-10+lenny7 Apache HTTP Server - high speed th ii dnsutils1:9.5.1.dfsg.P3-1+lenny1 Clients provided with BIND pn echopingnone (no description available) pn libsocket6-perl none (no description available) Versions of packages smokeping suggests: ii curl 7.18.2-8lenny4 Get a file from an HTTP, HTTPS or pn libauthen-radius-perl none (no description available) pn libio-socket-ssl-perl none (no description available) ii libnet-dns-perl 0.63-2 Perform DNS queries from a Perl sc pn libnet-ldap-perl none (no description available) pn libnet-telnet-perlnone (no description available) ii openssh-client1:5.1p1-5 secure shell client, an rlogin/rsh -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#573001: bash-completion: no completion for OGG-Theora video files
Package: bash-completion Version: 20080705 Severity: wishlist it seems there is no recognition for OGG-Theora video files in the mplayer completion. Please enable the completion for OGG-Video (OGV|ogv). Regards Friedemann -- System Information: Debian Release: 5.0.4 APT prefers proposed-updates APT policy: (700, 'proposed-updates'), (700, 'stable'), (500, 'testing'), (400, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.32-3-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages bash-completion depends on: ii bash 3.2-4 The GNU Bourne Again SHell bash-completion recommends no packages. bash-completion suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#568771: No credentials found
Package: nfs-common Severity: normal Indeed, everything works now. My fault, I should have a closer look at the readme. The bug can be closed. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#568771: rpc.gssd: No credentials found
Package: nfs-common Version: 1:1.2.1-3 Severity: normal It seems that rpc.gssd doesn't find the appropriate credential although it is present: # /usr/sbin/rpc.gssd -v -v -v -v -v -f beginning poll handling krb5 upcall Full hostname for 'reliant.lab.swapon.de' is 'reliant.lab.swapon.de' Full hostname for 'orion.lab.swapon.de' is 'orion.lab.swapon.de' Key table entry not found while getting keytab entry for 'root/orion.lab.swapon...@lab.swapon.de' Success getting keytab entry for 'nfs/orion.lab.swapon...@lab.swapon.de' WARNING: No supported encryption types (config file error?) while getting initial ticket for principal 'nfs/orion.lab.swapon...@lab.swapon.de' using keytab 'WRFILE:/etc/krb5.keytab' ERROR: No credentials found for connection to server reliant.lab.swapon.de doing error downcall Failed to write error downcall! # ktutil -k /etc/krb5.keytab list --keys /etc/krb5.keytab: Vno Type Principal Key Aliases 5 des-cbc-crc nfs/orion.lab.swapon...@lab.swapon.de 5157548a73cd5d4a $ kadmin list -l nfs/orion.lab.swapon.de fsn/ad...@lab.swapon.de's Password: Principal: nfs/orion.lab.swapon...@lab.swapon.de Principal expires: never Password expires: never Last password change: 2010-02-07 16:39:21 UTC Max ticket life: 1 day Max renewable life: unlimited Kvno: 5 Mkvno: 0 Last successful login: never Last failed login: never Failed login count: 0 Last modified: 2010-02-07 16:39:21 UTC Modifier: fsn/ad...@lab.swapon.de Attributes: Keytypes: des-cbc-crc(pw-salt) PK-INIT ACL: Aliases: -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.32-trunk-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-common depends on: ii adduser3.112 add and remove users and groups ii initscripts2.87dsf-8 scripts for initializing and shutt ii libc6 2.10.2-2 GNU C Library: Shared libraries ii libcomerr2 1.41.9-1 common error description library ii libevent-1.4-2 1.4.13-stable-1 An asynchronous event notification ii libgssapi-krb5-2 1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - k ii libgssglue10.1-4 mechanism-switch gssapi library ii libk5crypto3 1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - C ii libkrb5-3 1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries ii libnfsidmap2 0.23-2An nfs idmapping library ii librpcsecgss3 0.19-2allows secure rpc communication us ii libwrap0 7.6.q-18 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-23Linux Standard Base 3.2 init scrip ii netbase4.40 Basic TCP/IP networking system ii portmap6.0.0-1 RPC port mapper ii ucf3.0025Update Configuration File: preserv nfs-common recommends no packages. nfs-common suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#539244: nmap doesn't work with IPv6 Nameservers
Package: nmap Version: 4.62-1 Severity: normal I'm using IPv6 nameservers: $ cat /etc/resolv.conf nameserver ::1 but nmap complains: $ nmap -R -sP 192.168.19.0/24 Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 07:20 CEST mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns_servers Explicit nameserver setup doesn't work too: $ nmap --dns-servers ::1 -sP 192.168.19.0/24 Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 07:25 CEST mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns_servers -- System Information: Debian Release: 5.0.2 APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages nmap depends on: ii libc6 2.7-18 GNU C Library: Shared libraries ii libgcc1 1:4.3.2-1.1 GCC support library ii libpcap0.8 0.9.8-5 system interface for user-level pa ii libpcre37.6-2.1 Perl 5 Compatible Regular Expressi ii libssl0.9.8 0.9.8g-15+lenny1 SSL shared libraries ii libstdc++6 4.3.2-1.1The GNU Standard C++ Library v3 nmap recommends no packages. nmap suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#537159: dhcp3-client: supersede domain-name-servers doesn't accept IPv6 addresses
Package: dhcp3-client Version: 3.1.1-6 Severity: normal When I instruct dhclient to use IPv6 nameservers: supersede domain-name-servers ::1; it complains: # dhclient usb0 Internet Systems Consortium DHCP Client V3.1.1 Copyright 2004-2008 Internet Systems Consortium. All rights reserved. For info, please visit http://www.isc.org/sw/dhcp/ /etc/dhcp3/dhclient.conf line 20: : (58): expecting IP address or hostname supersede domain-name-servers : ^ /etc/dhcp3/dhclient.conf line 20: expecting a statement. supersede domain-name-servers ::1; ^ /etc/dhcp3/dhclient.conf line 20: semicolon expected. Is there no IPv6 support? Regards Friedemann -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages dhcp3-client depends on: ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii debianutils 2.30 Miscellaneous utilities specific t ii dhcp3-common 3.1.1-6common files used by all the dhcp3 ii libc6 2.7-18 GNU C Library: Shared libraries dhcp3-client recommends no packages. Versions of packages dhcp3-client suggests: pn avahi-autoipd none (no description available) pn resolvconfnone (no description available) -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#536508: atftpd doesn't work with IPv6
Package: atftpd Version: 0.7.dfsg-6 Severity: normal atftpd doesn't work with IPv6, syslog shows: Jul 10 15:20:29 wlftp in.tftpd[22024]: connect from 2001:db8:0:8:224:97ff:fe4a:79db (2001:db8:0:8:224:97ff:fe4a:79db) Jul 10 15:20:29 wlftp atftpd[22024]: Advanced Trivial FTP server started (0.7) Jul 10 15:20:29 wlftp atftpd[22024]: Connection refused from 0.0.0.0 -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages atftpd depends on: ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy ii libc6 2.7-18 GNU C Library: Shared libraries ii libpcre37.6-2.1 Perl 5 Compatible Regular Expressi ii libwrap07.6.q-16 Wietse Venema's TCP wrappers libra ii openbsd-inetd [inet-superse 0.20080125-2 The OpenBSD Internet Superserver atftpd recommends no packages. Versions of packages atftpd suggests: ii logrotate 3.7.1-5Log rotation utility -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#536509: tftpd doesn't work with IPv6
Package: tftpd Version: 0.17-16 Severity: normal tftpd doesn't work with IPv6, syslog shows: Jul 10 15:26:30 wlftp in.tftpd[22216]: connect from 2001:db8:0:8:224:97ff:fe4a:79db (2001:db8:0:8:224:97ff:fe4a:79db) Jul 10 15:26:30 wlftp tftpd[22217]: tftpd: trying to get file: images/asa821-k8.bin Jul 10 15:26:30 wlftp tftpd[22217]: tftpd: serving file from /var/lib/tftpboot Jul 10 15:26:30 wlftp tftpd[22217]: tftpd: read: Connection refused -- System Information: Debian Release: 5.0.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages tftpd depends on: ii libc6 2.7-18 GNU C Library: Shared libraries ii openbsd-inetd [inet-superse 0.20080125-2 The OpenBSD Internet Superserver tftpd recommends no packages. tftpd suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#299706: Please add IPv6 support to squid
ping6 Any status updates about IPv6 integration? Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#526361: libsasl2-modules-gssapi-heimdal: GSSAPI with heimdal kerberos5 doesn't work
Package: libsasl2-modules-gssapi-heimdal Version: 2.1.22.dfsg1-23 Severity: important Dear Maintainers, I have noticed that GSSAPI with heimdal kerberos5 doesn't work. This happens with OpenLDAP (slapd) but can be reproduced with sasl-sample-server/sasl-sample-client too. This behavior is caused by missformed kerberos ticket-granting principals. Heimdal Kerberos with this configurtion: f...@reliant:~$ verify_krb5_conf --dumpconfig [logging] kdc = FILE:/var/log/heimdal-kdc.log [libdefaults] default_realm = LAB.SWAPON.DE default_cc_name = KCM:%{uid} fcc-mit-ticketflags = true [realms] LAB.SWAPON.DE = { kdc = kerberos.lab.swapon.de admin_server = kerberos.lab.swapon.de } [domain_realm] .lab.swapon.de = LAB.SWAPON.DE Some sasl testing with sasl-sample-server/sasl-sample-client: (Client/Server responses are stripped down) SASL-Server: f...@reliant:~$ KRB5_KTNAME=/etc/krb5.keytab sasl-sample-server -m GSSAPI -s host Forcing use of mechanism GSSAPI Sending list of 1 mechanism(s) S: R1NTQVBJ Waiting for client mechanism... C: R1NTOMIJgcO7AQjce5X2dQ3LbDPjzH0X6 got 'GSSAPI' Sending response... S: Y1t/wIJcL+vyjBcNTZdcmmeJznmv7XmxDdpzBsdtOblGbcnSOrn8w== Waiting for client reply... SASL-Client: f...@reliant:~$ KRB5_KTNAME=/etc/krb5.keytab sasl-sample-client -s host -m GSSAPI -n reliant.lab.swapon.de service=host Waiting for mechanism list from server... S: R1NTQVBJrecieved 6 byte message Forcing use of mechanism GSSAPI Choosing best mechanism from: GSSAPI Using mechanism GSSAPI Preparing initial. Sending initial response... C: R1NTOMIJgcO7AQjce5X2dQ3LbDPjzH0X6 Waiting for server reply... From special interest is the KDC Logfile: -- Authentication Server Request: OK 2009-04-30T09:44:25 AS-REQ host/reliant.lab.swapon...@lab.swapon.de from IPv6:2001:6f8:12ec:11::88:fefe for krbtgt/lab.swapon...@lab.swapon.de 2009-04-30T09:44:25 Client sent patypes: encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp, encrypted-timestamp 2009-04-30T09:44:25 Looking for PKINIT pa-data -- host/reliant.lab.swapon...@lab.swapon.de 2009-04-30T09:44:25 Looking for ENC-TS pa-data -- host/reliant.lab.swapon...@lab.swapon.de 2009-04-30T09:44:25 ENC-TS Pre-authentication succeeded -- host/reliant.lab.swapon...@lab.swapon.de using aes256-cts-hmac-sha1-96 2009-04-30T09:44:25 Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, des3-cbc-md5, arcfour-hmac-md5, des-cbc-md5, des-cbc-md4, des-cbc-crc 2009-04-30T09:44:25 Using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96 2009-04-30T09:44:25 AS-REQ authtime: 2009-04-30T09:44:25 starttime: unset endtime: 2009-04-30T19:44:25 renew till: unset 2009-04-30T09:44:25 sending 670 bytes to IPv6:2001:6f8:12ec:11::88:fefe -- Ticket Granting Server Request: Fails 2009-04-30T09:44:25 TGS-REQ host/reliant.lab.swapon...@lab.swapon.de from IPv6:2001:6f8:12ec:11::88:fefe for digest/reli...@lab.swapon.de [canonicalize] 2009-04-30T09:44:25 Searching referral for RELIANT 2009-04-30T09:44:25 Server not found in database: digest/reli...@lab.swapon.de: No such entry in the database 2009-04-30T09:44:25 Failed building TGS-REP to IPv6:2001:6f8:12ec:11::88:fefe 2009-04-30T09:44:25 sending 107 bytes to IPv6:2001:6f8:12ec:11::88:fefe 2009-04-30T09:44:25 TGS-REQ host/reliant.lab.swapon...@lab.swapon.de from IPv6:2001:6f8:12ec:11::88:fefe for krbtgt/reli...@lab.swapon.de 2009-04-30T09:44:25 Server not found in database: krbtgt/reli...@lab.swapon.de: No such entry in the database 2009-04-30T09:44:25 Failed building TGS-REP to IPv6:2001:6f8:12ec:11::88:fefe 2009-04-30T09:44:25 sending 107 bytes to IPv6:2001:6f8:12ec:11::88:fefe The kerberos ticket-granting request realm krbtgt/reli...@lab.swapon.de is completly false. Correct is: krbtgt/lab.swapon...@lab.swapon.de. KRB5_KTNAME=/etc/krb5.keytab sasl-sample-server -m GSSAPI -s host -d LAB.SWAPON.DE produces: 2009-04-30T09:54:03 TGS-REQ host/reliant.lab.swapon...@lab.swapon.de from IPv6:2001:6f8:12ec:11::88:fefe for krbtgt/swa...@lab.swapon.de 2009-04-30T09:54:03 Server not found in database: krbtgt/swa...@lab.swapon.de: No such entry in the database 2009-04-30T09:54:03 Failed building TGS-REP to IPv6:2001:6f8:12ec:11::88:fefe 2009-04-30T09:54:03 sending 107 bytes to IPv6:2001:6f8:12ec:11::88:fefe which is not correct too. At present I have no clue how to fix this. Good ideas would be appreciated. Regards Friedemann -- System Information: Debian Release: 5.0.1 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages libsasl2-modules-gssapi-heimdal depends on: ii libasn1-8-heimdal
Bug#525785: sasl2-bin: saslauthd with kerberos5 doesn't work
Package: sasl2-bin Version: 2.1.22.dfsg1-23 Severity: minor Dear Maintainers, when using saslauthd with kerberos5 authentication mechanism it simply fails with: saslauthd[10678]: do_auth: auth failure: [user=xxx] [service=ldap] [realm=x] [mech=kerberos5] [reason=saslauthd internal error] Fix: Explicitly set the environment in /etc/default/saslauthd and point to the keytab: KRB5_KTNAME=/etc/krb5.keytab Please include this environment in default configuration. Regards Friedemann -- System Information: Debian Release: 5.0.1 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages sasl2-bin depends on: ii db4.6-util 4.6.21-11Berkeley v4.6 Database Utilities ii debconf [debcon 1.5.24 Debian configuration management sy ii libc6 2.7-18 GNU C Library: Shared libraries ii libcomerr2 1.41.3-1 common error description library ii libdb4.64.6.21-11Berkeley v4.6 Database Libraries [ ii libkrb531.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries ii libldap-2.4-2 2.4.11-1 OpenLDAP libraries ii libpam0g1.0.1-5+lenny1 Pluggable Authentication Modules l ii libsasl2-2 2.1.22.dfsg1-23 Cyrus SASL - authentication abstra ii libssl0.9.8 0.9.8g-15+lenny1 SSL shared libraries ii lsb-base3.2-20 Linux Standard Base 3.2 init scrip sasl2-bin recommends no packages. sasl2-bin suggests no packages. -- debconf information excluded -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#525785: sasl2-bin: saslauthd with kerberos5 doesn't work
On 27.04.09 00:16, Russ Allbery wrote: Friedemann Stoyan fsto...@swapon.de writes: when using saslauthd with kerberos5 authentication mechanism it simply fails with: saslauthd[10678]: do_auth: auth failure: [user=xxx] [service=ldap] [realm=x] [mech=kerberos5] [reason=saslauthd internal error] Fix: Explicitly set the environment in /etc/default/saslauthd and point to the keytab: KRB5_KTNAME=/etc/krb5.keytab Please include this environment in default configuration. That's an odd problem and fix since that's the default keytab location. If KRB5_KTNAME isn't set in the environment, that's the path that should be used by the library by default. This was my assumption too. It seems that saslauthd ignores the library defaults. Do you have KRB5_KTNAME set in the environment before running the init script for some reason? No, I haven't. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#525785: sasl2-bin: saslauthd with kerberos5 doesn't work
Roberto C. Sánchez wrote: Is it being set in the init script prior to the defaults file being read? No. In general there is no need to set KRB5_KTNAME. If it is unset the default (/etc/krb5.keytab) is used. But not from saslauthd. Regards Friedemann -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#512960: Realtek r8169: icmp6 neighbor discovery doesn't work
Package: linux-image-2.6.26-1-amd64 Version: 2.6.26-13 Severity: normal Dear Maintainers, the RealTek RTL-8169 Gigabit Ethernet driver (r8169.ko) doesn't work properly with icmp6. I can't see any incoming icmp6 neighbor solicitation with tcpdump. But, when I switch the interface in allmulticast mode: ip set link allmulticast on dev eth0 everythink works. I can see icmp6 neighbor solicitations and appropriate neighbor advertisements. Is there some hardware limitation or is this a driver bug? (Mainboard is an Asus M3A78 PRO) Regards Friedemann -- Package-specific info: ** Version: Linux version 2.6.26-1-amd64 (Debian 2.6.26-13) (wa...@debian.org) (gcc version 4.1.3 20080704 (prerelease) (Debian 4.1.2-24)) #1 SMP Sat Jan 10 17:57:00 UTC 2009 ** Command line: root=/dev/md0 ro ** Not tainted ** Kernel log: [6.494554] r8169 Gigabit Ethernet driver 2.2LK-NAPI loaded [6.494611] ACPI: PCI Interrupt :02:00.0[A] - GSI 18 (level, low) - IRQ 18 [6.494694] PCI: Setting latency timer of device :02:00.0 to 64 [6.494976] eth0: RTL8168c/8111c at 0xc2c38000, 00:22:15:fd:b1:0d, XID 3c4000c0 IRQ 1277 [ 36.801716] r8169: eth0: link up [ 36.805223] r8169: eth0: link up ** Loaded modules: Module Size Used by sg 36448 0 kvm_amd29580 0 kvm 127464 1 kvm_amd ip6t_REJECT 8320 2 xt_NFLOG6400 2 ip6table_filter 7296 1 ip6_tables 23056 1 ip6table_filter xt_tcpudp 7680 1 ipt_REJECT 7552 2 ipt_ULOG 13736 3 iptable_filter 7424 1 ip_tables 21520 1 iptable_filter x_tables 25224 7 ip6t_REJECT,xt_NFLOG,ip6_tables,xt_tcpudp,ipt_REJECT,ipt_ULOG,ip_tables nfsd 248360 17 auth_rpcgss47520 1 nfsd exportfs8704 1 nfsd nfs 251696 0 lockd 68560 2 nfsd,nfs nfs_acl 7552 2 nfsd,nfs sunrpc197480 14 nfsd,auth_rpcgss,nfs,lockd,nfs_acl bridge 53544 0 xfs 475432 7 aes_x86_64 12416 4 aes_generic32552 1 aes_x86_64 xts 7680 2 gf128mul 12800 1 xts dm_crypt 17032 1 crypto_blkcipher 21636 4 xts,dm_crypt ipv6 288328 67 ip6t_REJECT loop 19468 0 snd_hda_intel 434904 0 serio_raw 9860 0 pcspkr 7040 0 psmouse42268 0 k8temp 9216 0 snd_pcm81672 1 snd_hda_intel snd_timer 25744 1 snd_pcm snd63688 3 snd_hda_intel,snd_pcm,snd_timer soundcore 12064 1 snd snd_page_alloc 13072 2 snd_hda_intel,snd_pcm i2c_piix4 13072 0 i2c_core 27936 1 i2c_piix4 wmi11712 0 button 11680 0 shpchp 34080 0 pci_hotplug32056 1 shpchp evdev 14208 0 ext3 125072 5 jbd51240 1 ext3 mbcache12804 1 ext3 dm_mirror 20608 0 dm_log 13956 1 dm_mirror dm_snapshot19400 0 dm_mod 58864 31 dm_crypt,dm_mirror,dm_log,dm_snapshot raid456 125984 1 async_xor 8448 1 raid456 async_memcpy6912 1 raid456 async_tx 11764 3 raid456,async_xor,async_memcpy xor 9744 2 raid456,async_xor raid1 24192 3 md_mod 80164 6 raid456,raid1 usb_storage94528 0 ata_generic10116 0 ide_pci_generic 9220 0 [permanent] atiixp 8324 0 [permanent] ide_core 128284 2 ide_pci_generic,atiixp ehci_hcd 36108 0 ohci_hcd 25092 0 r8169 31492 0 sd_mod 29376 12 thermal22688 0 processor 42304 1 thermal fan 9352 0 thermal_sys17728 3 thermal,processor,fan ahci 33036 16 libata165472 2 ata_generic,ahci scsi_mod 160760 4 sg,usb_storage,sd_mod,libata dock 14112 1 libata ** PCI devices: 00:00.0 Host bridge [0600]: Advanced Micro Devices [AMD] RS780 Host Bridge [1022:9600] Subsystem: ATI Technologies Inc Device [1002:7910] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap- 66MHz+ UDF- FastB2B- ParErr- DEVSEL=medium TAbort- TAbort- MAbort+ SERR- PERR- INTx- Latency: 0 00:01.0 PCI bridge [0604]: Advanced Micro Devices [AMD] RS780 PCI to PCI bridge (int gfx) [1022:9602] (prog-if 00 [Normal decode]) Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV-
Bug#495232: Please unblock 0.99.11-1
Dear Maintainers, I run into the same trouble, quagga 0.99.10-1 is completely unusable for me. I compiled quagga source 0.99.11-1 from unstable for lenny. This version fixes the bug. Please unblock quagga 0.99.11-1. Regards Friedemann -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#494444: linux-image-2.6.26-1-686: kacpid is in uninteruptible sleep and produces loads 1
Package: linux-image-2.6.26-1-686 Version: 2.6.26-1 Severity: normal Dear Maintainers, after upgrading to Kernel 2.6.26 I have loads 1 but no CPU usage. I discoverd that kacpid kernelthread is in uninteruptible sleep: $ ps axu | grep kacpid | grep -v grep root41 0.0 0.0 0 0 ?D 14:58 0:01 [kacpid] 'acpi -V' hang in uninteruptible sleep too and isn't killable any more: $ acpi -V Battery 1: Full, 97% AC Adapter 0: on-line Kernel linux-image-2.6.25-2-686 works well. -- Package-specific info: ** Version: Linux version 2.6.26-1-686 (Debian 2.6.26-1) ([EMAIL PROTECTED]) (gcc version 4.1.3 20080623 (prerelease) (Debian 4.1.2-23)) #1 SMP Wed Jul 30 20:02:15 UTC 2008 ** Command line: root=UUID=cfa47139-db7a-41b0-a5dd-2d8d5b19b771 ro ** Not tainted ** Kernel log: [0.00] Initializing cgroup subsys cpuset [0.00] Initializing cgroup subsys cpu [0.00] Linux version 2.6.26-1-686 (Debian 2.6.26-1) ([EMAIL PROTECTED]) (gcc version 4.1.3 20080623 (prerelease) (Debian 4.1.2-23)) #1 SMP Wed Jul 30 20:02:15 UTC 2008 [0.00] BIOS-provided physical RAM map: [0.00] BIOS-e820: - 0009f800 (usable) [0.00] BIOS-e820: 0009f800 - 000a (reserved) [0.00] BIOS-e820: 000dc000 - 0010 (reserved) [0.00] BIOS-e820: 0010 - 3fee (usable) [0.00] BIOS-e820: 3fee - 3feec000 (ACPI data) [0.00] BIOS-e820: 3feec000 - 3ff0 (ACPI NVS) [0.00] BIOS-e820: 3ff0 - 4000 (reserved) [0.00] BIOS-e820: fec1 - fec2 (reserved) [0.00] BIOS-e820: ff80 - ffc0 (reserved) [0.00] BIOS-e820: fc00 - 0001 (reserved) [0.00] 126MB HIGHMEM available. [0.00] 896MB LOWMEM available. [0.00] Entering add_active_range(0, 0, 261856) 0 entries of 256 used [0.00] Zone PFN ranges: [0.00] DMA 0 - 4096 [0.00] Normal 4096 - 229376 [0.00] HighMem229376 - 261856 [0.00] Movable zone start PFN for each node [0.00] early_node_map[1] active PFN ranges [0.00] 0:0 - 261856 [0.00] On node 0 totalpages: 261856 [0.00] DMA zone: 32 pages used for memmap [0.00] DMA zone: 0 pages reserved [0.00] DMA zone: 4064 pages, LIFO batch:0 [0.00] Normal zone: 1760 pages used for memmap [0.00] Normal zone: 223520 pages, LIFO batch:31 [0.00] HighMem zone: 254 pages used for memmap [0.00] HighMem zone: 32226 pages, LIFO batch:7 [0.00] Movable zone: 0 pages used for memmap [0.00] DMI present. [0.00] ACPI: RSDP 000F62C0, 0014 (r0 ACER ) [0.00] ACPI: RSDT 3FEE6205, 0030 (r1 ACER Kestrel 20021012 LTP 0) [0.00] ACPI: FACP 3FEEBF2C, 0074 (r1 ACER Kestrel 20021012 PTL 50) [0.00] ACPI: DSDT 3FEE6235, 5CF7 (r1 ACER Kestrel 20021012 MSFT 10E) [0.00] ACPI: FACS 3FEFCFC0, 0040 [0.00] ACPI: HPET 3FEEBFA0, 0038 (r1 ACER Kestrel 20021012 PTL 0) [0.00] ACPI: BOOT 3FEEBFD8, 0028 (r1 ACER Kestrel 20021012 LTP 1) [0.00] ACPI: DMI detected: Acer [0.00] ACPI: PM-Timer IO Port: 0x1008 [0.00] ACPI: HPET id: 0x8086a201 base: 0x0 is invalid [0.00] Allocating PCI resources starting at 5000 (gap: 4000:bec1) [0.00] PM: Registered nosave memory: 0009f000 - 000a [0.00] PM: Registered nosave memory: 000a - 000dc000 [0.00] PM: Registered nosave memory: 000dc000 - 0010 [0.00] SMP: Allowing 0 CPUs, 0 hotplug CPUs [0.00] PERCPU: Allocating 37960 bytes of per cpu data [0.00] NR_CPUS: 8, nr_cpu_ids: 1 [0.00] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 259810 [0.00] Kernel command line: root=UUID=cfa47139-db7a-41b0-a5dd-2d8d5b19b771 ro [0.00] Local APIC disabled by BIOS -- you can enable it with lapic [0.00] mapped APIC to b000 (0180f000) [0.00] Enabling fast FPU save and restore... done. [0.00] Enabling unmasked SIMD FPU exception support... done. [0.00] Initializing CPU#0 [0.00] PID hash table entries: 4096 (order: 12, 16384 bytes) [0.00] Detected 1598.697 MHz processor. [0.004000] Console: colour VGA+ 80x25 [0.004000] console [tty0] enabled [0.004000] Dentry cache hash table entries: 131072 (order: 7, 524288 bytes) [0.004000] Inode-cache hash table entries: 65536 (order: 6, 262144 bytes) [0.004000] Memory: 1027920k/1047424k available (1758k kernel code, 18744k reserved, 743k data, 244k init, 129920k highmem) [0.004000] virtual kernel memory layout:
Bug#492251: madwifi-source: 0.9.4+r3698.20080604.hal20080528-1 crashes with 2.6.25-7
Package: madwifi-source Version: 1:0.9.4+r3698.20080604.hal20080528-1 Severity: important Dear Maintainers, After upgrading to madwifi-source 0.9.4+r3698.20080604.hal20080528-1 kernel 2.6.25-7 crashes repeating: Jul 23 07:50:37 defiant kernel: [ 43.782901] Pid: 0, comm: swapper Tainted: P 2.6.25-2-686 #1 Jul 23 07:50:37 defiant kernel: [ 43.782933] [f8bc5fc3] ieee80211_input+0x156d/0x1585 [wlan] Jul 23 07:50:37 defiant kernel: [ 43.783005] [f8bdae1c] ieee80211_input_monitor+0x6a8/0x6e4 [wlan] Jul 23 07:50:37 defiant kernel: [ 43.783096] [c024eb66] copy_skb_header+0x18/0x69 Jul 23 07:50:37 defiant kernel: [ 43.783120] [f8bc6056] ieee80211_input_all+0x7b/0x9d [wlan] Jul 23 07:50:37 defiant kernel: [ 43.783193] [f8c07497] ath_rx_tasklet+0x61c/0x8a2 [ath_pci] Jul 23 07:50:37 defiant kernel: [ 43.783231] [c011ab3c] activate_task+0x1b/0x26 Jul 23 07:50:37 defiant kernel: [ 43.783246] [c011de94] try_to_wake_up+0xc7/0xd0 Jul 23 07:50:37 defiant kernel: [ 43.783281] [c012872f] tasklet_action+0x58/0xb8 Jul 23 07:50:37 defiant kernel: [ 43.783295] [c0128305] __do_softirq+0x66/0xd3 Jul 23 07:50:37 defiant kernel: [ 43.783312] [c01283b7] do_softirq+0x45/0x53 Jul 23 07:50:37 defiant kernel: [ 43.783324] [c012865a] irq_exit+0x35/0x67 Jul 23 07:50:37 defiant kernel: [ 43.78] [c0109f1b] do_IRQ+0x52/0x63 Jul 23 07:50:37 defiant kernel: [ 43.783352] [c0108257] common_interrupt+0x23/0x28 Jul 23 07:50:37 defiant kernel: [ 43.783378] [c01500d8] audit_filter_rules+0x2b4/0x6b4 Jul 23 07:50:37 defiant kernel: [ 43.783397] [f8828266] acpi_idle_enter_simple+0x196/0x204 [processor] Jul 23 07:50:37 defiant kernel: [ 43.783440] [f8827e7c] acpi_idle_enter_bm+0xc3/0x317 [processor] Jul 23 07:50:37 defiant kernel: [ 43.783476] [c0246ea6] cpuidle_idle_call+0x5b/0x89 Jul 23 07:50:37 defiant kernel: [ 43.783490] [c0246e4b] cpuidle_idle_call+0x0/0x89 Jul 23 07:50:37 defiant kernel: [ 43.783504] [c01065c9] cpu_idle+0xa1/0xc1 Jul 23 07:50:37 defiant kernel: [ 43.783534] === Jul 23 07:50:37 defiant kernel: [ 44.027403] Pid: 0, comm: swapper Tainted: P 2.6.25-2-686 #1 Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8bc5fc3] ieee80211_input+0x156d/0x1585 [wlan] Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8bdae1c] ieee80211_input_monitor+0x6a8/0x6e4 [wlan] Jul 23 07:50:37 defiant kernel: [ 44.027403] [c024eb66] copy_skb_header+0x18/0x69 Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8bc6056] ieee80211_input_all+0x7b/0x9d [wlan] Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8c07497] ath_rx_tasklet+0x61c/0x8a2 [ath_pci] Jul 23 07:50:37 defiant kernel: [ 44.027403] [c012872f] tasklet_action+0x58/0xb8 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c0128305] __do_softirq+0x66/0xd3 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c01283b7] do_softirq+0x45/0x53 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c012865a] irq_exit+0x35/0x67 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c0109f1b] do_IRQ+0x52/0x63 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c0108257] common_interrupt+0x23/0x28 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c01500d8] audit_filter_rules+0x2b4/0x6b4 Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8828266] acpi_idle_enter_simple+0x196/0x204 [processor] Jul 23 07:50:37 defiant kernel: [ 44.027403] [f8827e7c] acpi_idle_enter_bm+0xc3/0x317 [processor] Jul 23 07:50:37 defiant kernel: [ 44.027403] [c0246ea6] cpuidle_idle_call+0x5b/0x89 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c0246e4b] cpuidle_idle_call+0x0/0x89 Jul 23 07:50:37 defiant kernel: [ 44.027403] [c01065c9] cpu_idle+0xa1/0xc1 Jul 23 07:50:37 defiant kernel: [ 44.027403] === Hardware: $ lspci -vv | grep Atheros 03:00.0 Ethernet controller: Atheros Communications Inc. AR5212/AR5213 Multiprotocol MAC/baseband processor (rev 01) Kernel Messages: Jul 23 07:50:25 defiant kernel: [ 11.357038] ath_hal: module license 'Proprietary' taints kernel. Jul 23 07:50:25 defiant kernel: [ 11.358313] ath_hal: 0.10.5.6 (AR5210, AR5211, AR5212, AR5416, RF5111, RF5112, RF2413 , RF5413, RF2133, RF2425, RF2417) Jul 23 07:50:25 defiant kernel: [ 11.381442] wlan: svn r3698 Jul 23 07:50:25 defiant kernel: [ 11.408329] ath_pci: svn r3698 Jul 23 07:50:25 defiant kernel: [ 11.424416] MC'97 0 converters and GPIO not ready (0x1) Jul 23 07:50:25 defiant kernel: [ 11.425175] PCI: Enabling device :03:00.0 ( - 0002) Jul 23 07:50:25 defiant kernel: [ 11.425230] ACPI: PCI Interrupt :03:00.0[A] - Link [LNKE] - GSI 10 (level, low) - IRQ 10 Jul 23 07:50:25 defiant kernel: [ 11.872749] MadWifi: ath_attach: HAL managed transmit power control (TPC) disabled. Jul 23 07:50:25 defiant kernel: [ 11.872825] MadWifi: ath_attach: Interference mitigation is supported. Currently disabled. Jul 23 07:50:25 defiant kernel: [ 11.873607] MadWifi: ath_attach: Switching rfkill
Bug#473135: xfsprogs: mkfs.xfs creates bad features2 superblock field
[EMAIL PROTECTED] wrote: Package: xfsprogs Version: 2.9.7-1 Severity: normal Dear Maintainers, quoting from http://oss.sgi.com/archives/xfs/2008-02/msg00225.html ... Please apply this patch. The fix isn't merged in upstream CVS yet - we'll upload a new xfsprogs when the final version of the fix is decided on. Hello, the 'bad features2 superblock field' Userspace Patches are in CVS now: Date: Mon Apr 14 11:50:24 AEST 2008 Workarea: chook.melbourne.sgi.com:/home/bnaujok/isms/xfs-cmds Inspected by: [EMAIL PROTECTED] The following file(s) were checked into: longdrop.melbourne.sgi.com:/isms/xfs-cmds/master-melb Modid: master-melb:xfs-cmds:30855a xfsprogs/db/sb.c - 1.23 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/db/sb.c.diff?r1=texttr1=1.23r2=texttr2=1.22f=h - Update xfs_db for extra superblock field xfsprogs/db/check.c - 1.34 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/db/check.c.diff?r1=texttr1=1.34r2=texttr2=1.33f=h - Detect features2 in wrong location in superblock xfsprogs/mkfs/xfs_mkfs.c - 1.88 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/mkfs/xfs_mkfs.c.diff?r1=texttr1=1.88r2=texttr2=1.87f=h - Make sure features2 is the same in bad and good locations when creating a filesystem xfsprogs/include/xfs_sb.h - 1.20 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/include/xfs_sb.h.diff?r1=texttr1=1.20r2=texttr2=1.19f=h - Add sb_bad_features2 to superblock structure xfsprogs/repair/phase1.c - 1.12 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/repair/phase1.c.diff?r1=texttr1=1.12r2=texttr2=1.11f=h - Detect and fix features2 in wrong location xfsprogs/libxfs/xfs_mount.c - 1.26 - changed http://oss.sgi.com/cgi-bin/cvsweb.cgi/xfs-cmds/xfsprogs/libxfs/xfs_mount.c.diff?r1=texttr1=1.26r2=texttr2=1.25f=h - Add sb_bad_features2 to superblock structure Regards Friedemann -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#473135: xfsprogs: mkfs.xfs creates bad features2 superblock field
Package: xfsprogs Version: 2.9.7-1 Severity: normal Dear Maintainers, quoting from http://oss.sgi.com/archives/xfs/2008-02/msg00225.html There is a bug in mkfs.xfs that can result in writing the features2 field in the superblock to the wrong location. This only occurs on some architectures, typically those with 32 bit userspace and 64 bit kernels. This patch detects the defect at mount time, logs a warning such as: XFS: correcting sb_features alignment problem in dmesg and corrects the problem so that everything is OK. it also blacklists the bad field in the superblock so it does not get used for something else later on. Please apply this patch. Regards Friedemann -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.24-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages xfsprogs depends on: ii libc6 2.7-6 GNU C Library: Shared libraries ii libreadline5 5.2-3 GNU readline and history libraries ii libuuid1 1.40.8-2 universally unique id library xfsprogs recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#464111: bind9: Please update hint-file
Package: bind9 Version: 1:9.4.2-3 Severity: wishlist There is an IANA announcement that 6 rootnameservers are IPv6 enabled: http://www.iana.org/reports/root--announcement.html Please update the hint-file accordingly. Regards Friedemann -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-3-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages bind9 depends on: ii adduser 3.105 add and remove users and groups ii libbind9-30 1:9.4.2-3 BIND9 Shared Library used by BIND ii libc6 2.7-6 GNU C Library: Shared libraries ii libdns32 1:9.4.2-3 DNS Shared Library used by BIND ii libisc32 1:9.4.2-3 ISC Shared Library used by BIND ii libisccc301:9.4.2-3 Command Channel Library used by BI ii libisccfg30 1:9.4.2-3 Config File Handling Library used ii liblwres301:9.4.2-3 Lightweight Resolver Library used ii libssl0.9.8 0.9.8g-4 SSL shared libraries ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip ii netbase 4.30 Basic TCP/IP networking system bind9 recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#450793: lvm2: initscript doesn't set ownership/permissions for particular LVs
Package: lvm2 Version: 2.02.26-1+b1 Severity: normal Hi, I have noticed that initscripts provides no support for setting ownership/permission for Logical Volumes. In Etch this can be done with: '/etc/default/lvm-common', but not in Lenny anymore. Regards Friedemann -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages lvm2 depends on: ii libc6 2.6.1-1+b1 GNU C Library: Shared libraries ii libdevmapper1.02.12:1.02.20-2The Linux Kernel Device Mapper use ii libncurses5 5.6+20071013-1 Shared libraries for terminal hand ii libreadline5 5.2-3 GNU readline and history libraries ii libselinux1 2.0.15-2+b1SELinux shared libraries ii libsepol1 2.0.3-1+b1 Security Enhanced Linux policy lib lvm2 recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#449247: linux-2.6: Please enable CONFIG_IPV6_ROUTER_PREF
Package: linux-2.6 Version: linux-image-2.6-686 Severity: wishlist Hello, I have a dual homed IPv6 Host. Unfortunatly the kernel doesn't honor radvds 'AdvDefaultPreference' Option. CONFIG_IPV6_ROUTER_PREF turns this on. Regards F. Stoyan -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#428434: libc6: Resolver prefers IPv4 to IPv6 in some cases
Package: libc6 Version: 2.3.6.ds1-13 Severity: normal Hi, In some cases the resolver prefers IPv4 to IPv6. This happens when: - the A-RR is a RFC 1918 Address - there is a more specific route for this address Example: $ ip route list table all 192.168.17.1 local 192.168.17.1 dev lo table 255 proto kernel scope host src 192.168.17.1 $ host -t any test1.libc6test.swapon.de test1.libc6test.swapon.de has IPv6 address 2001:6f8:12ec::1 test1.libc6test.swapon.de has address 10.10.10.10 $ host -t any test2.libc6test.swapon.de test2.libc6test.swapon.de has IPv6 address 2001:6f8:12ec::1 test2.libc6test.swapon.de has address 192.168.17.1 $ host -t any test3.libc6test.swapon.de test3.libc6test.swapon.de has IPv6 address 2001:6f8:12ec::1 test3.libc6test.swapon.de has address 81.169.139.143 $ telnet test1.libc6test.swapon.de Trying 2001:6f8:12ec::1... Trying 10.10.10.10... $ telnet test2.libc6test.swapon.de Trying 192.168.17.1... Trying 2001:6f8:12ec::1... $ telnet test3.libc6test.swapon.de Trying 2001:6f8:12ec::1... Trying 81.169.139.143... The releases 2.3.2.ds1-22sarge6 (Sarge) and 2.5-9+b1 (Lenny) are not affected. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages libc6 depends on: ii tzdata2007b-1Time Zone and Daylight Saving Time libc6 recommends no packages. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#427928: tshark (adns) doesn't recognize IPv6 Nameserver Addresses
Package: tshark Version: 0.99.4-5 Severity: normal Hi, when using IPv6 adns doesn't recognize valid IPv6 Nameserver Address: adns: /etc/resolv.conf:3: invalid nameserver address `2001:::::1' (IP Address is anonymized) -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-4-686 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages tshark depends on: ii libadns11.4-0.1 Asynchronous-capable DNS client li ii libc6 2.3.6.ds1-13 GNU C Library: Shared libraries ii libcap1 1:1.10-14support for getting/setting POSIX. ii libgcrypt11 1.2.3-2 LGPL Crypto library - runtime libr ii libglib2.0-02.12.4-2 The GLib library of C routines ii libgnutls13 1.4.4-3 the GNU TLS library - runtime libr ii libgpg-error0 1.4-1library for common error values an ii libpcap0.8 0.9.5-1 System interface for user-level pa ii libpcre36.7-1Perl 5 Compatible Regular Expressi ii wireshark-common0.99.4-5 network traffic analyser (common f ii zlib1g 1:1.2.3-13 compression library - runtime tshark recommends no packages. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]