Your message dated Thu, 24 Aug 2006 19:17:09 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#384504: fixed in hostapd 1:0.5.4-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: hostapd
Version: 1:0.5.3-1
Severity: important
My madwifi is uptodate (0.svnr1697.0.9.2-1), but hostapd fails with
these messages:
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
Could not connect to kernel driver.
Deauthenticate all stations
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i586)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-386
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages hostapd depends on:
ii libc6 2.3.6-7 GNU C Library: Shared libraries
ii libssl0.9.8 0.9.8b-2 SSL shared libraries
hostapd recommends no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: hostapd
Source-Version: 1:0.5.4-1
We believe that the bug you reported is fixed in the latest version of
hostapd, which is due to be installed in the Debian FTP archive:
hostapd_0.5.4-1.diff.gz
to pool/main/h/hostapd/hostapd_0.5.4-1.diff.gz
hostapd_0.5.4-1.dsc
to pool/main/h/hostapd/hostapd_0.5.4-1.dsc
hostapd_0.5.4-1_amd64.deb
to pool/main/h/hostapd/hostapd_0.5.4-1_amd64.deb
hostapd_0.5.4.orig.tar.gz
to pool/main/h/hostapd/hostapd_0.5.4.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Faidon Liambotis <[EMAIL PROTECTED]> (supplier of updated hostapd package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 25 Aug 2006 04:28:00 +0300
Source: hostapd
Binary: hostapd
Architecture: source amd64
Version: 1:0.5.4-1
Distribution: unstable
Urgency: low
Maintainer: Faidon Liambotis <[EMAIL PROTECTED]>
Changed-By: Faidon Liambotis <[EMAIL PROTECTED]>
Description:
hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authentica
Closes: 376327 377054 378703 380632 384504
Changes:
hostapd (1:0.5.4-1) unstable; urgency=low
.
[ Kel Modderman ]
* New upstream release. (Closes: #378703)
* Add LSB INIT info header to init script, as per specs. Source lsb-base
init functions, use them to report daemon status in a standard way.
(Closes: #376327)
* Add dpatch (30_hostapd_pidfile) to allow hostapd process to create a pid
file when daemonized.
* The init daemon now creates a pid file at /var/run/hostapd.pid.
* Allow multiple configuration files to be given to hostapd via
/etc/default/hostapd, enabling the possibility of managing multiple
interfaces with one process. If the configuration files are not specified
use /etc/hostapd/hostapd.conf to preserve backwards compatability.
This also allows the user to use a single configuration file !=
/etc/hostapd/hostapd.conf. (Closes: #377054)
* Add 'reload' option to init script. Send HUP signal to hostapd, causing it
to reload its configuration file.
* Add some extra DAEMON_OPTIONS hints to the /etc/default/hostapd file.
* Set hostapd.conf permissions to 0600, it may contain sensitive details.
(Closes: #380632)
* Update madwifi headers to r1705. This should ensure maximum compatibility
with the madwifi-source package currently available. (Closes: #384504)
* Slightly change the way madwifi is activated, add an extra CFLAG instead of
hardcoding the paths to the headers in driver_madwifi.c.
* Add myself to uploaders.
.
[ Faidon Liambotis ]
* Fixes a potential DoS fix in RSN preauthentication (upstream bug #152).
* Add lintian override for hostapd.conf unusual permissions.
* Exclude hostapd.conf from dh_fixperms.
* Fix permissions of hostapd.conf retroactively in upgrades.
Files:
37dbca19b39c0bfb7dc8d9b9080a81c6 634 net optional hostapd_0.5.4-1.dsc
18e203b3038f8d12fbf5924e60cfd6f3 395052 net optional hostapd_0.5.4.orig.tar.gz
335d57093c5125ae3c95a2390466bba1 30045 net optional hostapd_0.5.4-1.diff.gz
f6beb11fc08efaa98e13e4ea7a8a69f0 198880 net optional hostapd_0.5.4-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFE7lsiVty5d8XpUzMRAiWfAJ0cHnq8/f23UC3EGlaeQKKn+Nhv3wCfRDqz
Tzj+1hTabNBbUzgZsD8erj8=
=DzXx
-----END PGP SIGNATURE-----
--- End Message ---