Your message dated Tue, 12 Jul 2005 19:02:25 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#302684: fixed in zeroconf 0.6-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Apr 2005 10:51:40 +0000
>From [EMAIL PROTECTED] Sat Apr 02 02:51:40 2005
Return-path: <[EMAIL PROTECTED]>
Received: from gluck.debian.org [192.25.206.10] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DHgE8-0000WB-00; Sat, 02 Apr 2005 02:51:40 -0800
Received: from post-24.mail.nl.demon.net [194.159.73.194] 
        by gluck.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DHgE8-00038U-00; Sat, 02 Apr 2005 03:51:40 -0700
Received: from aglu.demon.nl ([83.160.174.170]:3160 helo=localhost)
        by post-24.mail.nl.demon.net with esmtp (Exim 4.43)
        id 1DHgE2-000OkY-GH
        for [EMAIL PROTECTED]; Sat, 02 Apr 2005 10:51:34 +0000
Received: by localhost (Postfix, from userid 1001)
        id BF33211F3FA; Sat,  2 Apr 2005 13:04:51 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Thomas Hood <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: Limit families/methods for which zeroconf is called?
X-Mailer: reportbug 3.8
Date: Sat, 02 Apr 2005 13:04:51 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: zeroconf
Version: 0.3-1
Severity: normal

The zeroconf if-up.d script runs zeroconf when _any_ interface is upped.
This includes the loopback interface.  Is this really necessary?  If not
then lines like the following can be added to the top of the script:

[ "$ADDRFAM" = "inet" ] || [ "$ADDRFAM" = "inet6" ] || exit 0
[ "$METHOD" = "loopback" ] && exit 0
[ "$METHOD" = "ppp" ] && exit 0
[ "$METHOD" = "wvdial" ] && exit 0

I don't know enough about zeroconf to tell for exactly which address
families and methods zeroconf should be called.


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (50, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.11
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages zeroconf depends on:
ii  ifupdown                    0.6.4-4.12   high level tools to configure netw
ii  iproute                     20041019-3   Professional tools to control the 
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an

-- no debconf information

---------------------------------------
Received: (at 302684-close) by bugs.debian.org; 12 Jul 2005 23:09:10 +0000
>From [EMAIL PROTECTED] Tue Jul 12 16:09:10 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DsTsE-00082U-00; Tue, 12 Jul 2005 16:09:10 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DsTlh-0002xS-00; Tue, 12 Jul 2005 19:02:25 -0400
From: Anand Kumria <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#302684: fixed in zeroconf 0.6-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 12 Jul 2005 19:02:25 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 4

Source: zeroconf
Source-Version: 0.6-1

We believe that the bug you reported is fixed in the latest version of
zeroconf, which is due to be installed in the Debian FTP archive:

zeroconf_0.6-1.diff.gz
  to pool/main/z/zeroconf/zeroconf_0.6-1.diff.gz
zeroconf_0.6-1.dsc
  to pool/main/z/zeroconf/zeroconf_0.6-1.dsc
zeroconf_0.6-1_i386.deb
  to pool/main/z/zeroconf/zeroconf_0.6-1_i386.deb
zeroconf_0.6.orig.tar.gz
  to pool/main/z/zeroconf/zeroconf_0.6.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anand Kumria <[EMAIL PROTECTED]> (supplier of updated zeroconf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 11 Jul 2005 00:13:02 +1000
Source: zeroconf
Binary: zeroconf
Architecture: source i386
Version: 0.6-1
Distribution: unstable
Urgency: high
Maintainer: Anand Kumria <[EMAIL PROTECTED]>
Changed-By: Anand Kumria <[EMAIL PROTECTED]>
Description: 
 zeroconf   - IPv4 link-local address allocator
Closes: 302585 302680 302683 302684 303364 317655
Changes: 
 zeroconf (0.6-1) unstable; urgency=high
 .
   * New upstream release
   * Don't crucify Mark's network with lots of ARP packets (Closes: #317655)
     -- thus the ugency.
   * Change the name of the if-up.d script to zeroconf (Closes: #302585)
   * Copyright information is now available (Closes: #302680)
   * Ship all documentation (Closes: #302683)
   * Make the address add/remove scripts more robust so we don't cause
     (harmless) errors to appear (Closes: #303364, #302684)
Files: 
 30ea0c4465c2b1a4706c405bd5bd73b0 678 net optional zeroconf_0.6-1.dsc
 59606a0925564e15160a4ec9a018cdc2 42179 net optional zeroconf_0.6.orig.tar.gz
 aa84082fb89fab22021ce43e7d8c6b6d 3223 net optional zeroconf_0.6-1.diff.gz
 514839dacc389797ed413fae02ebd0bd 37144 net optional zeroconf_0.6-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQCVAwUBQtRKgGRmcAD8BdppAQIA/AQAokbkBVWpmJ765ejPvnpZO+6KGYKttfzA
iqs4KBuRyw+v9MNdxB3o/vzrUVnb6IzWJAzJjRG0Mi2TkeNKZxObRO3lKg12Vx/x
QD8lRL7LF+ZL76moBRqG90F/jlyqo7NaZi7l6onoUwSZ6hateXhoyb1O3ELsC1l8
j4MleiDU/Ok=
=4i2M
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to