Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-10-12 Thread Josue Ortega
On 2019-10-12 03:52, Julien Cristau wrote: > Control: tag -1 - moreinfo > Control: tag -1 + confirmed > > On Thu, Oct 03, 2019 at 04:58:23PM -0700, Josue Ortega wrote: >> Hi, >> >> I've included the recommended changes for the fix: >> >> rpcbind (1.2.5-0.3+deb10u1) buster; urgency=medium >> >>

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-10-12 Thread Julien Cristau
Control: tag -1 - moreinfo Control: tag -1 + confirmed On Thu, Oct 03, 2019 at 04:58:23PM -0700, Josue Ortega wrote: > Hi, > > I've included the recommended changes for the fix: > > rpcbind (1.2.5-0.3+deb10u1) buster; urgency=medium > > * Add 00-rmt-calls.patch (Closes: #939877): > + Add

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-10-03 Thread Josue Ortega
Hi, I've included the recommended changes for the fix: rpcbind (1.2.5-0.3+deb10u1) buster; urgency=medium * Add 00-rmt-calls.patch (Closes: #939877): + Add command line option to enable remote calls at runtime + Refresh debian/patches * debian/control: Update maintainer information

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Josue Ortega
On 2019-09-09 20:06, Sam Hartman wrote: > It seems concerning to decrease the security of rpcbind to the NIS > level with no option for the user to request the higher level of > security. You have a very good point here. Helped me to fully understand the situation > I do agree that fixing nis

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Sam Hartman
> "Sam" == Sam Hartman writes: > "Josue" == Josue Ortega writes: Josue> On Mon, Sep 09, 2019 at 08:27:31PM -0400, Sam Hartman wrote: >>> What are the security implications of enabling this configure >>> flag? Josue> Enabling this flag lets rpcbind to open random

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Sam Hartman
> "Josue" == Josue Ortega writes: Josue> On Mon, Sep 09, 2019 at 08:27:31PM -0400, Sam Hartman wrote: >> What are the security implications of enabling this configure >> flag? Josue> Enabling this flag lets rpcbind to open random listening Josue> ports. This would make

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Josue Ortega
On Mon, Sep 09, 2019 at 08:27:31PM -0400, Sam Hartman wrote: > What are the security implications of enabling this configure flag? Enabling this flag lets rpcbind to open random listening ports. This would make firewalling very hard. (Default behavior prior version 1.2.5) > Why is it off by

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Sam Hartman
What are the security implications of enabling this configure flag? Why is it off by default?

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Josue Ortega
On 2019-09-09 13:45, Adam D. Barratt wrote: > Control: tags -1 + moreinfo > > On Mon, 2019-09-09 at 13:28 -0600, Josue Ortega wrote: >> I'd like to update rpcbind in Buster to fix the response to broadcast >> requests. >> Currently the broadcast requests are broken in Buster causing >> problems

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Adam D. Barratt
Control: tags -1 + moreinfo On Mon, 2019-09-09 at 13:28 -0600, Josue Ortega wrote: > I'd like to update rpcbind in Buster to fix the response to broadcast > requests. > Currently the broadcast requests are broken in Buster causing > problems to users > using NIS services. See #939877 and

Bug#939890: buster-pu: package rpcbind/1.2.5-0.3+deb10u1

2019-09-09 Thread Josue Ortega
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Hi, I'd like to update rpcbind in Buster to fix the response to broadcast requests. Currently the broadcast requests are broken in Buster causing problems to users using NIS