Your message dated Tue, 11 Nov 2014 11:33:49 +0000 with message-id <e1xo9hl-0006yo...@franck.debian.org> and subject line Bug#768411: fixed in openvpn 2.3.4-4 has caused the Debian Bug report #768411, regarding openvpn doesn't start automatically on boot anymore to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 768411: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768411 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: openvpn Version: 2.3.4-3 Severity: important Justification: Lose user settings / don't autostart Dear maintainer Using jessie, after upgrading to openvpn 2.3.4-3 from 2.3.2-9, openvpn does not start anymore. This is the relevant part of the log file from /var/log/unattended-upgrades/unattended-upgrades.log 2014-11-05 07:49:18,942 INFO Initial blacklisted packages: 2014-11-05 07:49:18,950 INFO Initial whitelisted packages: 2014-11-05 07:49:18,950 INFO Starting unattended upgrades script 2014-11-05 07:49:18,951 INFO Allowed origins are: ['origin=Debian'] 2014-11-05 07:51:49,194 WARNING Package 'openvpn' has conffile prompt and needs to be upgraded manually 2014-11-05 07:52:29,050 INFO package 'openvpn' not upgraded 2014-11-05 07:52:48,335 INFO Packages that will be upgraded: cron extlinux geoclue-2.0 gir1.2-gst-plugins-base-1.0 gir1.2-gstreamer-1.0 gnome-orca gstreamer1.0-plugins-base gstreamer1.0-plugins-base:i386 gstreamer1.0-x iceweasel kbd libbrlapi0.6 libfribidi0 libgstreamer-plugins-base1.0-0 libgstreamer-plugins-base1.0-0:i386 libgstreamer1.0-0 libgstreamer1.0-0:i386 libharfbuzz-dev libharfbuzz-gobject0 libharfbuzz-icu0 libharfbuzz0b libhttpcore-java libpipeline1 libsvn1 libvlc5 libvlccore8 lintian python-simplejson python-sqlparse python3-brlapi python3-sqlparse subversion syslinux syslinux-common vlc vlc-data vlc-nox vlc-plugin-notify vlc-plugin-pulse xbrlapi 2014-11-05 07:52:48,336 INFO Writing dpkg log to '/var/log/unattended-upgrades/unattended-upgrades-dpkg.log' 2014-11-05 07:55:33,936 INFO All upgrades installed After upgrading manually openvpn with aptitude, and rebooting, openvpn did not start. # service openvpn status ● openvpn.service - OpenVPN service Loaded: loaded (/lib/systemd/system/openvpn.service; disabled) Active: inactive (dead) Starting openvpn manually does work, though I can't specify which tunnel I want to start anymore, like the arguments of init script are being ignored. Default "AUTOSTART" tunnels can be started that way. I can start non default tunnels using the command line with --daemon --cd --config options, and stop them using kill, but this is quite anoying. I can see from that bug report that it says I modified /etc/init.d/openvpn, but I don't think so. I also tried "aptitude reinstall openvpn", but reportbug still says I have a non-default init script, and I can't see any ".dpkg-dist" nor ".dpkg-new" I could fix it from. -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (990, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages openvpn depends on: ii debconf [debconf-2.0] 1.5.53 ii initscripts 2.88dsf-57 ii iproute2 3.16.0-2 ii libc6 2.19-12 ii liblzo2-2 2.08-1 ii libpam0g 1.1.8-3.1 ii libpkcs11-helper1 1.11-2 ii libssl1.0.0 1.0.1j-1 Versions of packages openvpn recommends: ii easy-rsa 2.2.2-1 Versions of packages openvpn suggests: ii openssl 1.0.1j-1 ii resolvconf 1.76 -- Configuration Files: /etc/default/openvpn changed: AUTOSTART="IPredator-CLI-Password" OPTARGS="" OMIT_SENDSIGS=0 /etc/init.d/openvpn changed: . /lib/lsb/init-functions test $DEBIAN_SCRIPT_DEBUG && set -v -x DAEMON=/usr/sbin/openvpn DESC="virtual private network daemon" CONFIG_DIR=/etc/openvpn test -x $DAEMON || exit 0 test -d $CONFIG_DIR || exit 0 AUTOSTART="all" STATUSREFRESH=10 OMIT_SENDSIGS=0 if test -e /etc/default/openvpn ; then . /etc/default/openvpn fi start_vpn () { if grep -q '^[ ]*daemon' $CONFIG_DIR/$NAME.conf ; then # daemon already given in config file DAEMONARG= else # need to daemonize DAEMONARG="--daemon ovpn-$NAME" fi if grep -q '^[ ]*status ' $CONFIG_DIR/$NAME.conf ; then # status file already given in config file STATUSARG="" elif test $STATUSREFRESH -eq 0 ; then # default status file disabled in /etc/default/openvpn STATUSARG="" else # prepare default status file STATUSARG="--status /run/openvpn/$NAME.status $STATUSREFRESH" fi # tun using the "subnet" topology confuses the routing code that wrongly # emits ICMP redirects for client to client communications SAVED_DEFAULT_SEND_REDIRECTS=0 if grep -q '^[[:space:]]*dev[[:space:]]*tun' $CONFIG_DIR/$NAME.conf && \ grep -q '^[[:space:]]*topology[[:space:]]*subnet' $CONFIG_DIR/$NAME.conf ; then # When using "client-to-client", OpenVPN routes the traffic itself without # involving the TUN/TAP interface so no ICMP redirects are sent if ! grep -q '^[[:space:]]*client-to-client' $CONFIG_DIR/$NAME.conf ; then sysctl -w net.ipv4.conf.all.send_redirects=0 > /dev/null # Save the default value for send_redirects before disabling it # to make sure the tun device is created with send_redirects disabled SAVED_DEFAULT_SEND_REDIRECTS=$(sysctl -n net.ipv4.conf.default.send_redirects) if [ "$SAVED_DEFAULT_SEND_REDIRECTS" -ne 0 ]; then sysctl -w net.ipv4.conf.default.send_redirects=0 > /dev/null fi fi fi log_progress_msg "$NAME" STATUS=0 start-stop-daemon --start --quiet --oknodo \ --pidfile /run/openvpn/$NAME.pid \ --exec $DAEMON -- $OPTARGS --writepid /run/openvpn/$NAME.pid \ $DAEMONARG $STATUSARG --cd $CONFIG_DIR \ --config $CONFIG_DIR/$NAME.conf || STATUS=1 [ "$OMIT_SENDSIGS" -ne 1 ] || ln -s /run/openvpn/$NAME.pid /run/sendsigs.omit.d/openvpn.$NAME.pid # Set the back the original default value of send_redirects if it was changed if [ "$SAVED_DEFAULT_SEND_REDIRECTS" -ne 0 ]; then sysctl -w net.ipv4.conf.default.send_redirects=$SAVED_DEFAULT_SEND_REDIRECTS > /dev/null fi } stop_vpn () { start-stop-daemon --stop --quiet --oknodo \ --pidfile $PIDFILE --exec $DAEMON --retry 5 if [ "$?" -eq 0 ]; then rm -f $PIDFILE [ "$OMIT_SENDSIGS" -ne 1 ] || rm -f /run/sendsigs.omit.d/openvpn.$NAME.pid rm -f /run/openvpn/$NAME.status 2> /dev/null fi } case "$1" in start) log_daemon_msg "Starting $DESC" # first create /run directory so it's present even # when no VPN are autostarted by this script, but later # by systemd openvpn@.service mkdir -p /run/openvpn # autostart VPNs if test -z "$2" ; then # check if automatic startup is disabled by AUTOSTART=none if test "x$AUTOSTART" = "xnone" -o -z "$AUTOSTART" ; then log_warning_msg " Autostart disabled." exit 0 fi if test -z "$AUTOSTART" -o "x$AUTOSTART" = "xall" ; then # all VPNs shall be started automatically for CONFIG in `cd $CONFIG_DIR; ls *.conf 2> /dev/null`; do NAME=${CONFIG%%.conf} start_vpn done else # start only specified VPNs for NAME in $AUTOSTART ; do if test -e $CONFIG_DIR/$NAME.conf ; then start_vpn else log_failure_msg "No such VPN: $NAME" STATUS=1 fi done fi #start VPNs from command line else while shift ; do [ -z "$1" ] && break if test -e $CONFIG_DIR/$1.conf ; then NAME=$1 start_vpn else log_failure_msg " No such VPN: $1" STATUS=1 fi done fi log_end_msg ${STATUS:-0} ;; stop) log_daemon_msg "Stopping $DESC" if test -z "$2" ; then for PIDFILE in `ls /run/openvpn/*.pid 2> /dev/null`; do NAME=`echo $PIDFILE | cut -c14-` NAME=${NAME%%.pid} stop_vpn log_progress_msg "$NAME" done else while shift ; do [ -z "$1" ] && break if test -e /run/openvpn/$1.pid ; then PIDFILE=`ls /run/openvpn/$1.pid 2> /dev/null` NAME=`echo $PIDFILE | cut -c14-` NAME=${NAME%%.pid} stop_vpn log_progress_msg "$NAME" else log_failure_msg " (failure: No such VPN is running: $1)" fi done fi log_end_msg 0 ;; reload|force-reload) log_daemon_msg "Reloading $DESC" for PIDFILE in `ls /run/openvpn/*.pid 2> /dev/null`; do NAME=`echo $PIDFILE | cut -c14-` NAME=${NAME%%.pid} if egrep '^[[:blank:]]*user[[:blank:]]' $CONFIG_DIR/$NAME.conf > /dev/null 2>&1 ; then stop_vpn start_vpn log_progress_msg "(restarted)" else kill -HUP `cat $PIDFILE` || true log_progress_msg "$NAME" fi done log_end_msg 0 ;; soft-restart) log_daemon_msg "$DESC sending SIGUSR1" for PIDFILE in `ls /run/openvpn/*.pid 2> /dev/null`; do NAME=`echo $PIDFILE | cut -c14-` NAME=${NAME%%.pid} kill -USR1 `cat $PIDFILE` || true log_progress_msg "$NAME" done log_end_msg 0 ;; restart) shift $0 stop ${@} $0 start ${@} ;; cond-restart) log_daemon_msg "Restarting $DESC." for PIDFILE in `ls /run/openvpn/*.pid 2> /dev/null`; do NAME=`echo $PIDFILE | cut -c14-` NAME=${NAME%%.pid} stop_vpn start_vpn done log_end_msg 0 ;; status) GLOBAL_STATUS=0 if test -z "$2" ; then # We want status for all defined VPNs. # Returns success if all autostarted VPNs are defined and running if test "x$AUTOSTART" = "xnone" ; then # Consider it a failure if AUTOSTART=none log_warning_msg "No VPN autostarted" GLOBAL_STATUS=1 else if ! test -z "$AUTOSTART" -o "x$AUTOSTART" = "xall" ; then # Consider it a failure if one of the autostarted VPN is not defined for VPN in $AUTOSTART ; do if ! test -f $CONFIG_DIR/$VPN.conf ; then log_warning_msg "VPN '$VPN' is in AUTOSTART but is not defined" GLOBAL_STATUS=1 fi done fi fi for CONFIG in `cd $CONFIG_DIR; ls *.conf 2> /dev/null`; do NAME=${CONFIG%%.conf} # Is it an autostarted VPN ? if test -z "$AUTOSTART" -o "x$AUTOSTART" = "xall" ; then AUTOVPN=1 else if test "x$AUTOSTART" = "xnone" ; then AUTOVPN=0 else AUTOVPN=0 for VPN in $AUTOSTART; do if test "x$VPN" = "x$NAME" ; then AUTOVPN=1 fi done fi fi if test "x$AUTOVPN" = "x1" ; then # If it is autostarted, then it contributes to global status status_of_proc -p /run/openvpn/${NAME}.pid openvpn "VPN '${NAME}'" || GLOBAL_STATUS=1 else status_of_proc -p /run/openvpn/${NAME}.pid openvpn "VPN '${NAME}' (non autostarted)" || true fi done else # We just want status for specified VPNs. # Returns success if all specified VPNs are defined and running while shift ; do [ -z "$1" ] && break NAME=$1 if test -e $CONFIG_DIR/$NAME.conf ; then # Config exists status_of_proc -p /run/openvpn/${NAME}.pid openvpn "VPN '${NAME}'" || GLOBAL_STATUS=1 else # Config does not exist log_warning_msg "VPN '$NAME': missing $CONFIG_DIR/$NAME.conf file !" GLOBAL_STATUS=1 fi done fi exit $GLOBAL_STATUS ;; *) echo "Usage: $0 {start|stop|reload|restart|force-reload|cond-restart|soft-restart|status}" >&2 exit 1 ;; esac exit 0 -- debconf information: openvpn/create_tun: false
signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: openvpn Source-Version: 2.3.4-4 We believe that the bug you reported is fixed in the latest version of openvpn, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 768...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alberto Gonzalez Iniesta <a...@inittab.org> (supplier of updated openvpn package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 07 Nov 2014 13:59:54 +0100 Source: openvpn Binary: openvpn Architecture: source amd64 Version: 2.3.4-4 Distribution: unstable Urgency: medium Maintainer: Alberto Gonzalez Iniesta <a...@inittab.org> Changed-By: Alberto Gonzalez Iniesta <a...@inittab.org> Description: openvpn - virtual private network daemon Closes: 768384 768411 Changes: openvpn (2.3.4-4) unstable; urgency=medium . * Use dh-systemd in order to enable the service unit. (Closes: #768411) * Add comment on /etc/default/openvpn file about options not supported on systemd. (Closes: #768384) Checksums-Sha1: 72f957dde44efd37234a0fe04d392557d4f46260 2005 openvpn_2.3.4-4.dsc 039bf4e8425312df569d0e31f9572139a4c987d5 106856 openvpn_2.3.4-4.debian.tar.xz 71b1611074051d2f4af29e65348bb2fbdee2a407 467678 openvpn_2.3.4-4_amd64.deb Checksums-Sha256: d6be2df64196c2ecebaa26307d184aa0e40c308d2e139fe6d2bf8bda7022053b 2005 openvpn_2.3.4-4.dsc 41962bc5d8cb0f0b9878eeba225963e4f80f17ae0182f3a8eddd8c622463468d 106856 openvpn_2.3.4-4.debian.tar.xz 47e6dc54c5e62d31b52d05717113f14eddb8d094eaad71a8232ab6e12832cbf2 467678 openvpn_2.3.4-4_amd64.deb Files: aa696d761de03193b3904238b5cf2b49 2005 net optional openvpn_2.3.4-4.dsc bb1d3cdabb25c26aba21f8aefd5748fb 106856 net optional openvpn_2.3.4-4.debian.tar.xz 59a92b283b4da160a793d7844d095346 467678 net optional openvpn_2.3.4-4_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJUYe6iAAoJEACbM3VrmqpVn8MP/i24PmJauWixbxcV/I6/4zCQ QVNZIw0S/Dt0a25NxofhwvCRFLdttcy0M+7tDQ2qZoc993LvtGcQ5snGP6RWHzzd O18GrwK8lM9/3oTljN416pBAWRKdVWnED5du8b7iMTGyFRifyQOH1ILnpsHJFPkp y32f8AY51IKxzhGX1Le8yAcs4nGkXxNVTGncML868G7zFfusCm8vGNtaMO6Ugf3I FUuG1ZlPdA8Utrhz6doD4baYNWIZLMOlCRVtjTleNOumun1PLJt5wl0OMWhhoxV5 r0doVb5IfX6DvdsXkHePwyPxMeJIuKUdNgw2EnRdGTojVXwIwpHK/ezB0c5XoBAN ou89EHIYGuwMspiJmYCpF3/xpwZv7INpRKnSZkqpREaS1d+y6lxXdoqCLLw3KlX3 9HQiGc6wSUb9eQMhD3zoW6CC5uXNbNiNEFcv6in5qw9jjsrXXK8TE92b/52rt+2Y ACEna6sHbycefrua7fAhs+Q1+nNS8urnJ6CeoZR722+E72pqb/ghZYqECWlx1fZ1 Tvw1f9erAs7FfUpyr99DCXEzIKpt9+JDO6Bh7aLX0nd06Le3sFOpKUCjgLp2eYdd o/cDwhACHlldyn/Uvo9evKn4seBO2xPJoSdBLKTPyzmWYpE8RyBmHmLx7+EPe3Tm w42ahfhE8utPEe35xlXz =Wmto -----END PGP SIGNATURE-----
--- End Message ---