[Bug 1925229] [NEW] ypbind refuses to start with YPBINDARGS=-no-dbus

2021-04-20 Thread Gerald Drouillard
Public bug reported: Have done a few upgrades from 18.x to 20.x and they all have the problem of starting ypbind if /etc/defaults/nis has the default value. YPBINDARGS=-no-dbus ** Affects: nis (Ubuntu) Importance: Undecided Status: New -- You received this bug notification

[Bug 1860182] Re: zpool scrub malfunction after kernel upgrade

2020-02-07 Thread Gerald Drouillard
I believe there was something on the zfs user list that had a similar problem. Let the scrub run as long on the HWE kernel as the other and it looks like it will complete. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1808649] Re: TLS_CIPHER_LIST and TLS_PROTOCOL Ignored

2018-12-18 Thread Gerald Drouillard
Now that courier is compiled with gnutils instead of openssl the only setting in pop3d-ssl or imapd-ssl that will limit the ciphers or protocols is the setting TLS_PRIORITY. Example: TLS_PRIORITY="SECURE128:+SECURE192:-VERS-ALL:+VERS-TLS1.2" You can test pop with: nmap --script ssl-enum-ciphers

[Bug 1808649] [NEW] TLS_CIPHER_LIST and TLS_PROTOCOL Ignored

2018-12-15 Thread Gerald Drouillard
Public bug reported: No matter what you put in TLS_CIPHER_LIST and/or TLS_PROTOCOL the settings are ignored. There is no way to limit the TLS Protocol or Cipher list in courier imap or pop. This is critical for PCI compliance. Older versions would allow you to manipulate the tls_cipher_list to

[Bug 1426743] [NEW] There is no way to Enable only TLS1.1 and over - PCI Compliance

2015-02-28 Thread Gerald Drouillard
Public bug reported: According to the developer, in the current version there is TLS_PROTOCOL=TLSv1.1+ setting. Currently if setting the TLS_PROTOCOL=TLS1 will disable all protocols except TLS1 disabling any higher version of TLS. ** Affects: courier (Ubuntu) Importance: Undecided

[Bug 1425141] Re: mod_headers CVE-2013-5704

2015-02-27 Thread Gerald Drouillard
If you must use the mod, it looks like a good work around until this is fixed, is to install Ondřej Surý PPA for Apache2.x. The PPA has apache 2.4.12 for ubuntu trusty and other versions. https://launchpad.net/~ondrej/+archive/ubuntu/apache2 I have been running 2.4.12 for a few days now on

[Bug 1425141] Re: mod_headers CVE-2013-5704

2015-02-27 Thread Gerald Drouillard
If you must use the mod, it looks like a good work around until this is fixed, is to install Ondřej Surý PPA for Apache2.x. The PPA has apache 2.4.12 for ubuntu trusty and other versions. https://launchpad.net/~ondrej/+archive/ubuntu/apache2 I have been running 2.4.12 for a few days now on

[Bug 1257186] Re: memory leakage messages (no talloc stackframe)

2014-12-01 Thread Gerald Drouillard
Disabling the module with pam-auth-update makes the problem go away for me. If I re-enable the problem comes back. This should be a HIGH priority bug. The problem will occur after a successful su command. Running with all the available patches available today. -- You received this bug

[Bug 1257186] Re: memory leakage messages (no talloc stackframe)

2014-12-01 Thread Gerald Drouillard
Disabling the module with pam-auth-update makes the problem go away for me. If I re-enable the problem comes back. This should be a HIGH priority bug. The problem will occur after a successful su command. Running with all the available patches available today. -- You received this bug

[Bug 1257186] Re: memory leakage messages

2014-07-27 Thread Gerald Drouillard
Hopefully, if they are cherry picking fixes they pick these too: https://bugzilla.samba.org/show_bug.cgi?id=10684 https://bugzilla.samba.org/show_bug.cgi?id=10673 ** Bug watch added: Samba Bugzilla #10684 https://bugzilla.samba.org/show_bug.cgi?id=10684 ** Bug watch added: Samba Bugzilla

[Bug 1257186] Re: memory leakage messages

2014-07-27 Thread Gerald Drouillard
Hopefully, if they are cherry picking fixes they pick these too: https://bugzilla.samba.org/show_bug.cgi?id=10684 https://bugzilla.samba.org/show_bug.cgi?id=10673 ** Bug watch added: Samba Bugzilla #10684 https://bugzilla.samba.org/show_bug.cgi?id=10684 ** Bug watch added: Samba Bugzilla

[Bug 1311353] Re: no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory

2014-07-05 Thread Gerald Drouillard
*** This bug is a duplicate of bug 1257186 *** https://bugs.launchpad.net/bugs/1257186 Looks like the folks at Samba have address the bug and have it staged for the next release: https://bugzilla.samba.org/show_bug.cgi?id=8449 ** Bug watch added: Samba Bugzilla #8449

[Bug 1257186] Re: memory leakage messages

2014-07-05 Thread Gerald Drouillard
Looks like the folks at Samba have address the bug and have it staged for the next release: https://bugzilla.samba.org/show_bug.cgi?id=8449 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu.

[Bug 1311353] Re: no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory

2014-07-05 Thread Gerald Drouillard
*** This bug is a duplicate of bug 1257186 *** https://bugs.launchpad.net/bugs/1257186 Looks like the folks at Samba have address the bug and have it staged for the next release: https://bugzilla.samba.org/show_bug.cgi?id=8449 ** Bug watch added: Samba Bugzilla #8449

[Bug 1274680] Re: sudo no talloc stackframe at ../source3/param/loadparam.c:4831, leaking memory

2014-07-05 Thread Gerald Drouillard
*** This bug is a duplicate of bug 1257186 *** https://bugs.launchpad.net/bugs/1257186 Looks like the folks at Samba have address the bug and have it staged for the next release: https://bugzilla.samba.org/show_bug.cgi?id=8449 ** Bug watch added: Samba Bugzilla #8449

[Bug 1257186] Re: memory leakage messages

2014-07-05 Thread Gerald Drouillard
Looks like the folks at Samba have address the bug and have it staged for the next release: https://bugzilla.samba.org/show_bug.cgi?id=8449 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1257186

[Bug 989164] Re: precise headless server upgrade failed

2012-04-27 Thread Gerald Drouillard
Same thing for med. To remove: apt-get remove libjpeg62-dev It may update/remove a few other packages. do-release-upgrade apt-get install libjpeg-dev (if you still need it) Everything else seems fine. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 126125] Re: dansguardian start takes more than half a minute

2007-09-06 Thread Gerald Drouillard
I have the same problem. At the same time I believe there is a bug in 7.04 because it would be better to set virusengine = 'clamdscan' instead of 'clamav'... especially on a server acting as a content filter. -- dansguardian start takes more than half a minute

[Bug 126125] Re: dansguardian start takes more than half a minute

2007-09-06 Thread Gerald Drouillard
Opps... I also wanted to make it clear that 'clamdscan' does not work in 7.04... it may have something to do with permissions, which could get tricky as clamd could be working with amavisd-new scanning email. -- dansguardian start takes more than half a minute

[Bug 130472] Re: [ltsp] printer prints only once

2007-09-05 Thread Gerald Drouillard
I tried the new jetpipe in a freshly installed 7.04 with all updates and it didn't work. The start_printer change fixed it for me. Note that it appears the client terminal needs to reboot for the change to take effect. -- [ltsp] printer prints only once https://bugs.launchpad.net/bugs/130472