Your message dated Tue, 08 Nov 2005 14:32:58 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#338152: fixed in php-radius 1.2-3
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 8 Nov 2005 13:36:08 +0000
>From [EMAIL PROTECTED] Tue Nov 08 05:36:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from relay.cdlan.net [217.171.33.200]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EZTdw-000802-00; Tue, 08 Nov 2005 05:36:08 -0800
Received: from cdlan.net (unknown [217.171.42.6])
by relay.cdlan.net (Postfix) with SMTP
id 0A47D3D8F; Tue, 8 Nov 2005 14:35:35 +0100 (CET)
Received: (nullmailer pid 15602 invoked by uid 10050);
Tue, 08 Nov 2005 09:57:08 -0000
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Luca Corti <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: Malformed RADIUS packet
X-Mailer: reportbug 3.17
Date: Tue, 08 Nov 2005 10:57:08 +0100
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-7.6 required=4.0 tests=BAYES_00,DATE_IN_PAST_03_06,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02
Package: php-radius
Version: 1.2-1
Severity: important
I'm trying to authenticate against a FreeRadius server. This is what I
get in the radius server logs when trying to authenticate using the
example files:
Tue Nov 8 10:51:56 2005 : Error: WARNING: Malformed RADIUS packet from host
1.2.3.4: Invalid attribute 0
thanks
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (990, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686-smp
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages php-radius depends on:
ii apache2-mpm-prefork [httpd-cg 2.0.54-5 traditional model for Apache2
ii php4-cgi 4:4.4.0-4 server-side, HTML-embedded scripti
php-radius recommends no packages.
-- no debconf information
---------------------------------------
Received: (at 338152-close) by bugs.debian.org; 8 Nov 2005 22:38:07 +0000
>From [EMAIL PROTECTED] Tue Nov 08 14:38:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1EZc1S-0003ef-00; Tue, 08 Nov 2005 14:32:58 -0800
From: Roberto Lumbreras <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#338152: fixed in php-radius 1.2-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 08 Nov 2005 14:32:58 -0800
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Source: php-radius
Source-Version: 1.2-3
We believe that the bug you reported is fixed in the latest version of
php-radius, which is due to be installed in the Debian FTP archive:
php-radius_1.2-3.diff.gz
to pool/main/p/php-radius/php-radius_1.2-3.diff.gz
php-radius_1.2-3.dsc
to pool/main/p/php-radius/php-radius_1.2-3.dsc
php-radius_1.2-3_all.deb
to pool/main/p/php-radius/php-radius_1.2-3_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Roberto Lumbreras <[EMAIL PROTECTED]> (supplier of updated php-radius package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 08 Nov 2005 20:47:01 +0100
Source: php-radius
Binary: php-radius
Architecture: source all
Version: 1.2-3
Distribution: unstable
Urgency: low
Maintainer: Roberto Lumbreras <[EMAIL PROTECTED]>
Changed-By: Roberto Lumbreras <[EMAIL PROTECTED]>
Description:
php-radius - Radius protocol implementation in PHP
Closes: 338152
Changes:
php-radius (1.2-3) unstable; urgency=low
.
* Fixed NAS-IP-Port length in the radius packet (Closes: #338152).
* Send $_SERVER['SERVER_PORT'] as the NAS-IP-Port, and
$_SERVER['SERVER_ADDR'] instead of $SERVER_ADDR as the NAS-IP-Address.
* Use SOL_UDP as protocol instead of 17. Increased socket_select timeout to
60 seconds to be sure that the answer is received. Look at the id of the
answer and reject access if not the same as the request (this should be
done in a better way)
Files:
0ac13ed1baa33dee63972d399736f791 595 web optional php-radius_1.2-3.dsc
ca8d0cd062dd75ed700c8761961198af 5095 web optional php-radius_1.2-3.diff.gz
b4109baa610df3c52df410132e29e132 8246 web optional php-radius_1.2-3_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDcQizfIEQE/XJcI0RAlCDAKCnLFtJpWxb/wWppKt+MIDpA4x5swCfXzbS
2oEQytBINkZUdMhd4p4CtR8=
=sFJn
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]