Your message dated Sat, 21 Mar 2020 09:52:43 +0100
with message-id <20200321085243.v6455x36bfubzosk@crossbow>
and subject line Re: apt leaks SRV requests for _socks._tcp.localhost for tor
proxy
has caused the Debian Bug report #923316,
regarding apt leaks SRV requests for _socks._tcp.localhost for tor proxy
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
923316: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923316
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: apt
Version: 1.3~rc1
Severity: important
Tags: security
Control: fixed -1 1.7.0~alpha1
apt, starting with 1.3~rc1, and prior to 1.7.0~alpha1, generates a
SRV request when trying to use the Tor proxy, asking the DNS server
SRV _socks._tcp.localhost.
This might cause information to be leaked that the user is about to
use tor for Debian package installation, as no other tool is likely to perform
such queries.
--
debian developer - deb.li/jak | jak-linux.org - free software dev
ubuntu core developer i speak de, en
--- End Message ---
--- Begin Message ---
Version: 1.7.0~alpha1
This was reported as already fixed in our main branch to have a record
of it for backporting to older branches. As supposedly all the
backporting that will be done for this has happened and our BTS has
version tracking we can confidently close this report for good as it has
served its purpose.
Best regards
David Kalnischkies
signature.asc
Description: PGP signature
--- End Message ---