On Ubuntu 8.04.1 I downloaded and installed the package for Intrepid
Ibex and now it works.
http://fr.archive.ubuntu.com/ubuntu/pool/universe/f/fail2ban/fail2ban_0.8.3-2_all.deb
--
[SRU] fail2ban fails to start after reboot
https://bugs.launchpad.net/bugs/222804
You received this bug
Should be working since 0.82.0-0ubuntu2
** Changed in: akonadi (Ubuntu)
Status: New = Fix Released
--
akonadi does not work with the apparmor rules introduced for /usr/sbin/mysqld
on hardy.
https://bugs.launchpad.net/bugs/197476
You received this bug notification because you are a
Anderson, I tested the 2.4.9-0ubuntu0.8.04 and the bug is gone.
--
(ITS#5527) slapd segfaults when using dynlist
https://bugs.launchpad.net/bugs/218734
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap2.3 in ubuntu.
--
This bug is still there with 1:9.5.0.dfsg.P2-1ubuntu1. Rebuilding the
source package on an IPv6 enabled box did not fix it.
In the buildlog at http://launchpadlibrarian.net/17069359
/buildlog_ubuntu-
intrepid-i386.bind9_1%3A9.5.0.dfsg.P2-1ubuntu1_FULLYBUILT.txt.gz you can
see
checking for
*** This bug is a duplicate of bug 249824 ***
https://bugs.launchpad.net/bugs/249824
** This bug has been marked a duplicate of bug 249824
[intrepid] IPv6 unusable
--
DNS: not able to use IPv6 Resolvers
https://bugs.launchpad.net/bugs/259740
You received this bug notification because you
*** This bug is a duplicate of bug 249824 ***
https://bugs.launchpad.net/bugs/249824
** This bug has been marked a duplicate of bug 249824
[intrepid] IPv6 unusable
--
bind9 doesn't bind to IPv6 interfaces
https://bugs.launchpad.net/bugs/257909
You received this bug notification because
** Changed in: mysql-dfsg-5.0 (Ubuntu)
Assignee: (unassigned) = Didier Roche (didrocks)
Status: New = Confirmed
--
expire-log-days typo error
https://bugs.launchpad.net/bugs/242309
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
hello Chuck,
I tested your php5, and it seems to have made the problem worse. Now, instead
of just getting rid of the matching tail, it also takes another character with
it.
Sorry!
--
HEREDOC fails when terminating string matches tail of HEREDOC string
Comment from mathiaz:
[18:39] mathiaz nxvl: as of intrepid, apache2 comes with ssl ootb
[18:40] mathiaz nxvl: apache2 depends on ssl-cert and uses the snake-oil-cert
IIRC
So, make Apache Full profile as default.
* add ufw integration (see
Public bug reported:
Binary package hint: samba
Ubuntu FireWall have now some features to integrate profiles from
different application. Instead of knowing the ports on which xxx service
is running, the administrator have different profiles and can create
some rules on the profile instead of
** Attachment added: samba_3.2.1-1ubuntu5.debdiff
http://launchpadlibrarian.net/17094684/samba_3.2.1-1ubuntu5.debdiff
--
Please add UFW profile integration with Samba
https://bugs.launchpad.net/bugs/261544
You received this bug notification because you are a member of Ubuntu
Server Team,
** Changed in: samba (Ubuntu)
Sourcepackagename: None = samba
--
pam_smbpass.so segfaults
https://bugs.launchpad.net/bugs/260687
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in ubuntu.
--
Ubuntu-server-bugs mailing list
** Bug watch added: Debian Bug tracker #477646
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477646
** Also affects: suphp (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477646
Importance: Unknown
Status: Unknown
--
php5-cgi not working with suphp in Hardy
** Changed in: suphp (Debian)
Status: Unknown = New
--
php5-cgi not working with suphp in Hardy
https://bugs.launchpad.net/bugs/253268
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in ubuntu.
--
Ubuntu-server-bugs mailing
This was the fix for my problem, why this happened I have no idea. It
took quite a bit of searching to locate this...
Run /usr/share/debconf/fix_db.pl as root user
I hope this will help someone else!
Steve
--
libapache2-mod-php5 can't be configured
https://bugs.launchpad.net/bugs/205608
You
Updating debdiff, i forgot to add a line on changelog.
** Attachment added: samba_3.2.1-1ubuntu5.debdiff
http://launchpadlibrarian.net/17099535/samba_3.2.1-1ubuntu5.debdiff
--
Please add UFW profile integration with Samba
https://bugs.launchpad.net/bugs/261544
You received this bug
I think this should work (however in my case, I compiled from source):
Download '*0.6.2-1ubuntu1_i386.deb' files (as listed below in the deb
-i) from launchpad
(might need current version on the purge statements)
% sudo apt-get purge libapache2-mod-suphp
% sudo apt-get purge suphp-common
% deb
Ok, thank you for your answer i will test it at night.
On Tue, Aug 26, 2008 at 3:27 AM, Paul [EMAIL PROTECTED] wrote:
Hi Nicolas,
There is a presentation here that explains it:
www.cluesheet.com/lectures/phptek-embedding.pdf.
There is a more detailed guide to programming with it here:
I can confirm the cacertdir not implemented for gnutls warning
message. The same setup that worked for me on Gutsy no longer works on
Hardy.
I had only added the following option to my /etc/ldap/ldap.conf file:
TLS_CACERTDIR /usr/share/ca-certificates/mozilla
However, while this ticket might
I am seeing this same issue. Let me know if there is any information I
can provide that would be helpful, but my output is basically the same
as what Karl has already posted.
And for those interested, you can work around the issue with the
following option in ldap.conf:
TLS_REQCERT allow
Hi Charles,
Well, most sysadmins that I know, including the sysadmin that is me :),
prefer security in depth and don't want an either-or choice between
application-level and system-level ACLs.
Note also that newer versions of NUT are dropping ACLs in favor of
binding to interfaces (with a
Public bug reported:
Ubuntu FireWall have now some features to integrate profiles from
different application. Instead of knowing the ports on which xxx service
is running, the administrator have different profiles and can create
some rules on the profile instead of updating the targeted port.
** Attachment added: dovecot_1.1.2-1ubuntu6.debdiff
http://launchpadlibrarian.net/17105349/dovecot_1.1.2-1ubuntu6.debdiff
** Changed in: dovecot (Ubuntu)
Status: New = Confirmed
--
Please add UFW profile integration with dovecot
https://bugs.launchpad.net/bugs/261689
You received
** Changed in: samba (Ubuntu)
Status: New = Confirmed
--
Please add UFW profile integration with Samba
https://bugs.launchpad.net/bugs/261544
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in ubuntu.
--
Ubuntu-server-bugs
On Aug 26, 2008, at 8:11 PM, Steve Langasek wrote:
Hi Charles,
Well, most sysadmins that I know, including the sysadmin that is
me :),
prefer security in depth and don't want an either-or choice between
application-level and system-level ACLs.
Understood, but at the very least,
Public bug reported:
Binary package hint: bind9
Ubuntu FireWall have now some features to integrate profiles from
different application. Instead of knowing the ports on which xxx service
is running, the administrator have different profiles and can create
some rules on the profile instead of
Public bug reported:
Binary package hint: postfix
Ubuntu FireWall have now some features to integrate profiles from
different application. Instead of knowing the ports on which xxx service
is running, the administrator have different profiles and can create
some rules on the profile instead of
** Attachment added: postfix_2.5.4-1ubuntu2.debdiff
http://launchpadlibrarian.net/17105701/postfix_2.5.4-1ubuntu2.debdiff
** Changed in: postfix (Ubuntu)
Status: New = Confirmed
--
Please add UFW profile integration with postfix
https://bugs.launchpad.net/bugs/261698
You received
** Changed in: dnsmasq (Ubuntu Dapper)
Status: New = Confirmed
** Changed in: dnsmasq (Ubuntu Feisty)
Status: New = Confirmed
** Changed in: dnsmasq (Ubuntu Gutsy)
Status: New = Confirmed
--
dnsmasq might be vulnerable to recent DNS spoofing issue
Port 587 is far more important than 465, but a bigger question is that
port opening is really a function of Postfix config. If smtps is not
configured, then there's no reason to open 465 (that's actually
officially assigned to another protocol).
** Changed in: postfix (Ubuntu)
Status:
** Changed in: fail2ban (Ubuntu)
Status: Fix Released = Confirmed
--
[SRU] fail2ban fails to start after reboot
https://bugs.launchpad.net/bugs/222804
You received this bug notification because you are a member of Ubuntu
Server Team, which is a direct subscriber.
--
Ubuntu-server-bugs
That's why that profile is not loaded by default, just added for enabling it by
hand when user want's to, the default profile is Postfix, which allows port 25,
because that's the default opened port in an out-of-the-box instalation.
Port number for TLS was taken from
32 matches
Mail list logo