Your message dated Sat, 06 Feb 2021 11:17:11 +0000
with message-id <e1l8lar-0007fu...@fasolo.debian.org>
and subject line Bug#980116: fixed in openafs 1.8.2-1+deb10u1
has caused the Debian Bug report #980116,
regarding connection failure when rx initialized after 08:25:36 GMT 14 Jan 2021
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
980116: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980116
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openafs-client
Version: 1.8.2-1
Severity: grave
Control: clone -1 -2
Control: reassign -2 openafs-fileserver

The Rx RPC stack requires a connection identifier for each new connection a
system initiates.  In 2014 support to generate the initial identifier
randomly was added to the core Rx implementation (instead of relying on the
security layer to do so), but code that attempted to use the current system
time as part of a not-very-random initialization was not removed at that
time.  When the unix epoch time is later than 0x60000000, that stale
initialization interacts with a bug in code designed to avoid signed
integer overflow when incrementing the global conneciton ID counter,
resulting in the connection ID of 0x80000002 being used for all
connections, leading to connection failure due to the collision.  This
renders all clients and servers started after 14 Jan 2021 08:25:36 UTC
unusable.

--- End Message ---
--- Begin Message ---
Source: openafs
Source-Version: 1.8.2-1+deb10u1
Done: Benjamin Kaduk <ka...@mit.edu>

We believe that the bug you reported is fixed in the latest version of
openafs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 980...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk <ka...@mit.edu> (supplier of updated openafs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 26 Jan 2021 20:13:14 -0800
Source: openafs
Architecture: source
Version: 1.8.2-1+deb10u1
Distribution: buster
Urgency: high
Maintainer: Benjamin Kaduk <ka...@mit.edu>
Changed-By: Benjamin Kaduk <ka...@mit.edu>
Closes: 980115 980116
Changes:
 openafs (1.8.2-1+deb10u1) buster; urgency=high
 .
   * Pull in upstream patches to fix outgoing connections after unix
     epoch time 0x60000000 (Closes: #980115, #980116)
Checksums-Sha1:
 9496df348ad2c02bcdbc52bfa19a81091f0f3bd8 3515 openafs_1.8.2-1+deb10u1.dsc
 be36c9597222c91716f6612cfab0f5bff314aad8 140104 
openafs_1.8.2-1+deb10u1.debian.tar.xz
 47abf26e531d6b3fa24b98a134f21da14d5689a7 17485 
openafs_1.8.2-1+deb10u1_amd64.buildinfo
Checksums-Sha256:
 9fd8658c39232f3fae666e8d399405c5d590b0c33156c1bca35b85e5d0e718f1 3515 
openafs_1.8.2-1+deb10u1.dsc
 e71f21ad42367e34137ffd5bb407790b7e15ddf49490aefcbba214778614d7d6 140104 
openafs_1.8.2-1+deb10u1.debian.tar.xz
 0078b0287076968c55bedb953263725a70d96415aa01e4e02a17f39f2e844b39 17485 
openafs_1.8.2-1+deb10u1_amd64.buildinfo
Files:
 4ac722bf792f7734e1c4e9504d6e4790 3515 net optional openafs_1.8.2-1+deb10u1.dsc
 e3966219adfc6c6994e78d3be05f042f 140104 net optional 
openafs_1.8.2-1+deb10u1.debian.tar.xz
 18653c625ab768303c320daa06377132 17485 net optional 
openafs_1.8.2-1+deb10u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=YTEx
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to