Your message dated Sun, 03 Apr 2005 13:02:38 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#302795: fixed in sslwrap 2.0.6-17 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 3 Apr 2005 00:02:36 +0000 >From [EMAIL PROTECTED] Sat Apr 02 16:02:36 2005 Return-path: <[EMAIL PROTECTED]> Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (minbar.dodds.net) [66.93.39.86] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DHsZX-0000MN-00; Sat, 02 Apr 2005 16:02:35 -0800 Received: by minbar.dodds.net (Postfix, from userid 1000) id BE71B1A103; Sat, 2 Apr 2005 16:02:34 -0800 (PST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Steve Langasek <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: sslwrap: please do not call update-inetd from an init script! X-Mailer: reportbug 3.9 Date: Sat, 02 Apr 2005 16:02:34 -0800 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: sslwrap Version: 2.0.6-16 Severity: grave Tags: sid Hi Jonathan, A combination of factors now gives me this on console every time /etc/init.d/sslwrap stop is called: # /etc/init.d/sslwrap stop Stopping sslwrap: Trying to add the following entry: #<off># https stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 80 There is already an entry for #<off># https in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># https stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 80 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># ssmtp stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 25 There is already an entry for #<off># ssmtp in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># ssmtp stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 25 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># nntps stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 119 There is already an entry for #<off># nntps in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># nntps stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 119 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># telnets stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 23 There is already an entry for #<off># telnets in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># telnets stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 23 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># ircs stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 194 There is already an entry for #<off># ircs in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># ircs stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 194 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># ftps-data stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 20 There is already an entry for #<off># ftps-data in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># ftps-data stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 20 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># ftps stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 21 There is already an entry for #<off># ftps in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># ftps stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 21 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n Trying to add the following entry: #<off># ldaps stream tcp nowait sslwrap:sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 389 There is already an entry for #<off># ldaps in /etc/inetd.conf, but I don't recognise it. Here is what it looks like: #<off># ldaps stream tcp nowait sslwrap.sslwrap /usr/sbin/tcpd /usr/sbin/sslwrap -cert /etc/sslwrap/server.pem -addr 127.0.0.1 -port 389 Do you want to ignore this potential problem and continue, or would you rather not do so now ? Continue? (n/y) n imaps pop3s sswat. # This is especially pleasant because ssh is stopped before sslwrap on shutdown, and on startup, ssh will reject connections because /etc/nologin is still present at the time the init script is prompting for these answers. Even better, I don't actually use *any* of these default services (sswat is the only one I'm interested in), and even if I did, I don't see any reason for sslwrap to be twiddling the contents of /etc/inetd.conf in an init script -- it's the *inetd* init script's job to start and stop inetd-controlled services. The trigger for all of these extra entries in /etc/inetd.conf seems to be bug #277294; let us say that the upgrade did not go smoothly. Nevertheless, I believe the real RC bug here is the gratuitous invocation of update-inetd. Contents of /etc/inetd.conf available upon request if you need more info to reproduce this problem. Cheers, -- Steve Langasek postmodern programmer -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages sslwrap depends on: ii debconf 1.4.47 Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7e-3 SSL shared libraries ii openssl 0.9.7e-3 Secure Socket Layer (SSL) binary a -- debconf information excluded --------------------------------------- Received: (at 302795-close) by bugs.debian.org; 3 Apr 2005 17:11:13 +0000 >From [EMAIL PROTECTED] Sun Apr 03 10:11:13 2005 Return-path: <[EMAIL PROTECTED]> Received: from gluck.debian.org [192.25.206.10] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DI8cz-0007Ib-00; Sun, 03 Apr 2005 10:11:13 -0700 Received: from newraff.debian.org [208.185.25.31] (mail) by gluck.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DI8cy-0000hW-00; Sun, 03 Apr 2005 11:11:13 -0600 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DI8Ug-0008Af-00; Sun, 03 Apr 2005 13:02:38 -0400 From: Jonathan McDowell <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#302795: fixed in sslwrap 2.0.6-17 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sun, 03 Apr 2005 13:02:38 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 3 Source: sslwrap Source-Version: 2.0.6-17 We believe that the bug you reported is fixed in the latest version of sslwrap, which is due to be installed in the Debian FTP archive: sslwrap_2.0.6-17.diff.gz to pool/main/s/sslwrap/sslwrap_2.0.6-17.diff.gz sslwrap_2.0.6-17.dsc to pool/main/s/sslwrap/sslwrap_2.0.6-17.dsc sslwrap_2.0.6-17_i386.deb to pool/main/s/sslwrap/sslwrap_2.0.6-17_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jonathan McDowell <[EMAIL PROTECTED]> (supplier of updated sslwrap package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 03 Apr 2005 17:47:24 +0100 Source: sslwrap Binary: sslwrap Architecture: source i386 Version: 2.0.6-17 Distribution: unstable Urgency: low Maintainer: Jonathan McDowell <[EMAIL PROTECTED]> Changed-By: Jonathan McDowell <[EMAIL PROTECTED]> Description: sslwrap - Simple TCP service encryption using TLS/SSL Closes: 301513 301675 302795 Changes: sslwrap (2.0.6-17) unstable; urgency=low . * The "Shoot me, I deserve it" release. * Don't touch inetd.conf or inetd in our init script, only pre/postinst. (closes: #302795) * Use AM_MAINTAINER_MODE in configure to avoid time-stamp skew issues on build. (closes: #301513) * Just use "user" syntax for update-inetd; our only group is sslwrap anyway and it appears the update-inetds don't agree about syntax. Also delete the old format lines before trying to create the new format ones. (closes: #301675) Files: 927cb6245123786aeaf9af606a2da3f1 579 net optional sslwrap_2.0.6-17.dsc 7172f0bb056fbd2dea0a9c6f3441e69f 78999 net optional sslwrap_2.0.6-17.diff.gz 1f595bc7fc7ac3ef4e6a09726210f1bb 39812 net optional sslwrap_2.0.6-17_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCUB/q8b1L5FtDA2cRAunQAKCuoFEZSykMMIy9MmcMEkhXpB1NKgCfUCLv enjO+8R8/BLfqD5/9CKq9Wg= =Cw9M -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]