Your message dated Sun, 03 Apr 2005 13:02:38 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#302795: fixed in sslwrap 2.0.6-17
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 3 Apr 2005 00:02:36 +0000
>From [EMAIL PROTECTED] Sat Apr 02 16:02:36 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (minbar.dodds.net) 
[66.93.39.86] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DHsZX-0000MN-00; Sat, 02 Apr 2005 16:02:35 -0800
Received: by minbar.dodds.net (Postfix, from userid 1000)
        id BE71B1A103; Sat,  2 Apr 2005 16:02:34 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Steve Langasek <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: sslwrap: please do not call update-inetd from an init script!
X-Mailer: reportbug 3.9
Date: Sat, 02 Apr 2005 16:02:34 -0800
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: sslwrap
Version: 2.0.6-16
Severity: grave
Tags: sid

Hi Jonathan,

A combination of factors now gives me this on console every time
/etc/init.d/sslwrap stop is called:

# /etc/init.d/sslwrap stop
Stopping sslwrap:
Trying to add the following entry:

 #<off># https   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 80

There is already an entry for #<off># https in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># https   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 80

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># ssmtp   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 25

There is already an entry for #<off># ssmtp in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># ssmtp   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 25

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># nntps   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 119

There is already an entry for #<off># nntps in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># nntps   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 119

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># telnets   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 23

There is already an entry for #<off># telnets in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># telnets   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 23

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># ircs   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 194

There is already an entry for #<off># ircs in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># ircs   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 194

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># ftps-data   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 20

There is already an entry for #<off># ftps-data in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># ftps-data   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 20

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># ftps   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 21

There is already an entry for #<off># ftps in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># ftps   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 21

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n

Trying to add the following entry:

 #<off># ldaps   stream  tcp nowait  sslwrap:sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 389

There is already an entry for #<off># ldaps in /etc/inetd.conf,
but I don't recognise it.  Here is what it looks like:

 #<off># ldaps   stream  tcp nowait  sslwrap.sslwrap /usr/sbin/tcpd  
/usr/sbin/sslwrap  -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 389

Do you want to ignore this potential problem and continue, or would
you rather not do so now ?  Continue?  (n/y) n
 imaps pop3s sswat.
#

This is especially pleasant because ssh is stopped before sslwrap on
shutdown, and on startup, ssh will reject connections because
/etc/nologin is still present at the time the init script is prompting
for these answers.

Even better, I don't actually use *any* of these default services (sswat
is the only one I'm interested in), and even if I did, I don't see any
reason for sslwrap to be twiddling the contents of /etc/inetd.conf in an
init script -- it's the *inetd* init script's job to start and stop
inetd-controlled services.

The trigger for all of these extra entries in /etc/inetd.conf seems to
be bug #277294; let us say that the upgrade did not go smoothly.
Nevertheless, I believe the real RC bug here is the gratuitous
invocation of update-inetd.

Contents of /etc/inetd.conf available upon request if you need more info
to reproduce this problem.

Cheers,
-- 
Steve Langasek
postmodern programmer

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages sslwrap depends on:
ii  debconf                     1.4.47       Debian configuration management sy
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries
ii  openssl                     0.9.7e-3     Secure Socket Layer (SSL) binary a

-- debconf information excluded

---------------------------------------
Received: (at 302795-close) by bugs.debian.org; 3 Apr 2005 17:11:13 +0000
>From [EMAIL PROTECTED] Sun Apr 03 10:11:13 2005
Return-path: <[EMAIL PROTECTED]>
Received: from gluck.debian.org [192.25.206.10] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DI8cz-0007Ib-00; Sun, 03 Apr 2005 10:11:13 -0700
Received: from newraff.debian.org [208.185.25.31] (mail)
        by gluck.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DI8cy-0000hW-00; Sun, 03 Apr 2005 11:11:13 -0600
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DI8Ug-0008Af-00; Sun, 03 Apr 2005 13:02:38 -0400
From: Jonathan McDowell <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#302795: fixed in sslwrap 2.0.6-17
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 03 Apr 2005 13:02:38 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 3

Source: sslwrap
Source-Version: 2.0.6-17

We believe that the bug you reported is fixed in the latest version of
sslwrap, which is due to be installed in the Debian FTP archive:

sslwrap_2.0.6-17.diff.gz
  to pool/main/s/sslwrap/sslwrap_2.0.6-17.diff.gz
sslwrap_2.0.6-17.dsc
  to pool/main/s/sslwrap/sslwrap_2.0.6-17.dsc
sslwrap_2.0.6-17_i386.deb
  to pool/main/s/sslwrap/sslwrap_2.0.6-17_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonathan McDowell <[EMAIL PROTECTED]> (supplier of updated sslwrap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 03 Apr 2005 17:47:24 +0100
Source: sslwrap
Binary: sslwrap
Architecture: source i386
Version: 2.0.6-17
Distribution: unstable
Urgency: low
Maintainer: Jonathan McDowell <[EMAIL PROTECTED]>
Changed-By: Jonathan McDowell <[EMAIL PROTECTED]>
Description: 
 sslwrap    - Simple TCP service encryption using TLS/SSL
Closes: 301513 301675 302795
Changes: 
 sslwrap (2.0.6-17) unstable; urgency=low
 .
   * The "Shoot me, I deserve it" release.
   * Don't touch inetd.conf or inetd in our init script, only pre/postinst.
     (closes: #302795)
   * Use AM_MAINTAINER_MODE in configure to avoid time-stamp skew issues
     on build. (closes: #301513)
   * Just use "user" syntax for update-inetd; our only group is sslwrap anyway
     and it appears the update-inetds don't agree about syntax. Also delete
     the old format lines before trying to create the new format ones.
     (closes: #301675)
Files: 
 927cb6245123786aeaf9af606a2da3f1 579 net optional sslwrap_2.0.6-17.dsc
 7172f0bb056fbd2dea0a9c6f3441e69f 78999 net optional sslwrap_2.0.6-17.diff.gz
 1f595bc7fc7ac3ef4e6a09726210f1bb 39812 net optional sslwrap_2.0.6-17_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCUB/q8b1L5FtDA2cRAunQAKCuoFEZSykMMIy9MmcMEkhXpB1NKgCfUCLv
enjO+8R8/BLfqD5/9CKq9Wg=
=Cw9M
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to