Your message dated Tue, 12 Jul 2005 19:02:25 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#302684: fixed in zeroconf 0.6-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 2 Apr 2005 10:51:40 +0000 >From [EMAIL PROTECTED] Sat Apr 02 02:51:40 2005 Return-path: <[EMAIL PROTECTED]> Received: from gluck.debian.org [192.25.206.10] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DHgE8-0000WB-00; Sat, 02 Apr 2005 02:51:40 -0800 Received: from post-24.mail.nl.demon.net [194.159.73.194] by gluck.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DHgE8-00038U-00; Sat, 02 Apr 2005 03:51:40 -0700 Received: from aglu.demon.nl ([83.160.174.170]:3160 helo=localhost) by post-24.mail.nl.demon.net with esmtp (Exim 4.43) id 1DHgE2-000OkY-GH for [EMAIL PROTECTED]; Sat, 02 Apr 2005 10:51:34 +0000 Received: by localhost (Postfix, from userid 1001) id BF33211F3FA; Sat, 2 Apr 2005 13:04:51 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Thomas Hood <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: Limit families/methods for which zeroconf is called? X-Mailer: reportbug 3.8 Date: Sat, 02 Apr 2005 13:04:51 +0200 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: zeroconf Version: 0.3-1 Severity: normal The zeroconf if-up.d script runs zeroconf when _any_ interface is upped. This includes the loopback interface. Is this really necessary? If not then lines like the following can be added to the top of the script: [ "$ADDRFAM" = "inet" ] || [ "$ADDRFAM" = "inet6" ] || exit 0 [ "$METHOD" = "loopback" ] && exit 0 [ "$METHOD" = "ppp" ] && exit 0 [ "$METHOD" = "wvdial" ] && exit 0 I don't know enough about zeroconf to tell for exactly which address families and methods zeroconf should be called. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing'), (50, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages zeroconf depends on: ii ifupdown 0.6.4-4.12 high level tools to configure netw ii iproute 20041019-3 Professional tools to control the ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an -- no debconf information --------------------------------------- Received: (at 302684-close) by bugs.debian.org; 12 Jul 2005 23:09:10 +0000 >From [EMAIL PROTECTED] Tue Jul 12 16:09:10 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DsTsE-00082U-00; Tue, 12 Jul 2005 16:09:10 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DsTlh-0002xS-00; Tue, 12 Jul 2005 19:02:25 -0400 From: Anand Kumria <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#302684: fixed in zeroconf 0.6-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 12 Jul 2005 19:02:25 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 4 Source: zeroconf Source-Version: 0.6-1 We believe that the bug you reported is fixed in the latest version of zeroconf, which is due to be installed in the Debian FTP archive: zeroconf_0.6-1.diff.gz to pool/main/z/zeroconf/zeroconf_0.6-1.diff.gz zeroconf_0.6-1.dsc to pool/main/z/zeroconf/zeroconf_0.6-1.dsc zeroconf_0.6-1_i386.deb to pool/main/z/zeroconf/zeroconf_0.6-1_i386.deb zeroconf_0.6.orig.tar.gz to pool/main/z/zeroconf/zeroconf_0.6.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anand Kumria <[EMAIL PROTECTED]> (supplier of updated zeroconf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 11 Jul 2005 00:13:02 +1000 Source: zeroconf Binary: zeroconf Architecture: source i386 Version: 0.6-1 Distribution: unstable Urgency: high Maintainer: Anand Kumria <[EMAIL PROTECTED]> Changed-By: Anand Kumria <[EMAIL PROTECTED]> Description: zeroconf - IPv4 link-local address allocator Closes: 302585 302680 302683 302684 303364 317655 Changes: zeroconf (0.6-1) unstable; urgency=high . * New upstream release * Don't crucify Mark's network with lots of ARP packets (Closes: #317655) -- thus the ugency. * Change the name of the if-up.d script to zeroconf (Closes: #302585) * Copyright information is now available (Closes: #302680) * Ship all documentation (Closes: #302683) * Make the address add/remove scripts more robust so we don't cause (harmless) errors to appear (Closes: #303364, #302684) Files: 30ea0c4465c2b1a4706c405bd5bd73b0 678 net optional zeroconf_0.6-1.dsc 59606a0925564e15160a4ec9a018cdc2 42179 net optional zeroconf_0.6.orig.tar.gz aa84082fb89fab22021ce43e7d8c6b6d 3223 net optional zeroconf_0.6-1.diff.gz 514839dacc389797ed413fae02ebd0bd 37144 net optional zeroconf_0.6-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iQCVAwUBQtRKgGRmcAD8BdppAQIA/AQAokbkBVWpmJ765ejPvnpZO+6KGYKttfzA iqs4KBuRyw+v9MNdxB3o/vzrUVnb6IzWJAzJjRG0Mi2TkeNKZxObRO3lKg12Vx/x QD8lRL7LF+ZL76moBRqG90F/jlyqo7NaZi7l6onoUwSZ6hateXhoyb1O3ELsC1l8 j4MleiDU/Ok= =4i2M -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]