Your message dated Thu, 24 Aug 2006 19:17:09 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#380632: fixed in hostapd 1:0.5.4-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: hostapd Version: 1:0.5.3-1 Severity: wishlist Please consider setting the hostapd.conf access mode to 600 by default, because it might contain passwords if used in WPA-PSK mode. Thanks, Lenart -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (990, 'testing'), (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-k7 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages hostapd depends on: ii libc6 2.3.6-7 GNU C Library: Shared libraries ii libssl0.9.8 0.9.8b-2 SSL shared libraries hostapd recommends no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: hostapd Source-Version: 1:0.5.4-1 We believe that the bug you reported is fixed in the latest version of hostapd, which is due to be installed in the Debian FTP archive: hostapd_0.5.4-1.diff.gz to pool/main/h/hostapd/hostapd_0.5.4-1.diff.gz hostapd_0.5.4-1.dsc to pool/main/h/hostapd/hostapd_0.5.4-1.dsc hostapd_0.5.4-1_amd64.deb to pool/main/h/hostapd/hostapd_0.5.4-1_amd64.deb hostapd_0.5.4.orig.tar.gz to pool/main/h/hostapd/hostapd_0.5.4.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Faidon Liambotis <[EMAIL PROTECTED]> (supplier of updated hostapd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 25 Aug 2006 04:28:00 +0300 Source: hostapd Binary: hostapd Architecture: source amd64 Version: 1:0.5.4-1 Distribution: unstable Urgency: low Maintainer: Faidon Liambotis <[EMAIL PROTECTED]> Changed-By: Faidon Liambotis <[EMAIL PROTECTED]> Description: hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authentica Closes: 376327 377054 378703 380632 384504 Changes: hostapd (1:0.5.4-1) unstable; urgency=low . [ Kel Modderman ] * New upstream release. (Closes: #378703) * Add LSB INIT info header to init script, as per specs. Source lsb-base init functions, use them to report daemon status in a standard way. (Closes: #376327) * Add dpatch (30_hostapd_pidfile) to allow hostapd process to create a pid file when daemonized. * The init daemon now creates a pid file at /var/run/hostapd.pid. * Allow multiple configuration files to be given to hostapd via /etc/default/hostapd, enabling the possibility of managing multiple interfaces with one process. If the configuration files are not specified use /etc/hostapd/hostapd.conf to preserve backwards compatability. This also allows the user to use a single configuration file != /etc/hostapd/hostapd.conf. (Closes: #377054) * Add 'reload' option to init script. Send HUP signal to hostapd, causing it to reload its configuration file. * Add some extra DAEMON_OPTIONS hints to the /etc/default/hostapd file. * Set hostapd.conf permissions to 0600, it may contain sensitive details. (Closes: #380632) * Update madwifi headers to r1705. This should ensure maximum compatibility with the madwifi-source package currently available. (Closes: #384504) * Slightly change the way madwifi is activated, add an extra CFLAG instead of hardcoding the paths to the headers in driver_madwifi.c. * Add myself to uploaders. . [ Faidon Liambotis ] * Fixes a potential DoS fix in RSN preauthentication (upstream bug #152). * Add lintian override for hostapd.conf unusual permissions. * Exclude hostapd.conf from dh_fixperms. * Fix permissions of hostapd.conf retroactively in upgrades. Files: 37dbca19b39c0bfb7dc8d9b9080a81c6 634 net optional hostapd_0.5.4-1.dsc 18e203b3038f8d12fbf5924e60cfd6f3 395052 net optional hostapd_0.5.4.orig.tar.gz 335d57093c5125ae3c95a2390466bba1 30045 net optional hostapd_0.5.4-1.diff.gz f6beb11fc08efaa98e13e4ea7a8a69f0 198880 net optional hostapd_0.5.4-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFE7lsiVty5d8XpUzMRAiWfAJ0cHnq8/f23UC3EGlaeQKKn+Nhv3wCfRDqz Tzj+1hTabNBbUzgZsD8erj8= =DzXx -----END PGP SIGNATURE-----
--- End Message ---

