Package: openswan Version: 1:2.6.23+dfsg-1 Severity: normal
I can reproduce this both on my desktop machine and in a KVM guest. When OpenSwan starts up during boot, it fails to acquire the IPv6 address assigned to my eth0 interface. Consequently, the IPv6 tunnels defined in /etc/ipsec.conf (with auto=start) fail to start. I am using dependency-based boot sequencing. If I later run service ipsec restart, the IPv6 address is acquired and the tunnels are brought up. On my desktop machine, the IPv6 address is assigned, as static, in /etc/network/interfaces; in the KVM guest it is obtained via auto-configuration. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-3-amd64 (SMP w/4 CPU cores) Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages openswan depends on: ii bind9-host [host] 1:9.7.0.dfsg.1-1 Version of 'host' bundled with BIN ii bsdmainutils 8.0.8 collection of more utilities from ii debconf [debconf-2.0] 1.5.28 Debian configuration management sy ii debianutils 3.2.2 Miscellaneous utilities specific t ii iproute 20100224-3 networking and traffic control too ii libc6 2.10.2-6 Embedded GNU C Library: Shared lib ii libcurl3 7.20.0-1 Multi-protocol file transfer libra ii libgmp3c2 2:4.3.2+dfsg-1 Multiprecision arithmetic library ii libldap-2.4-2 2.4.17-2.1 OpenLDAP libraries ii libpam0g 1.1.1-2 Pluggable Authentication Modules l ii openssl 0.9.8m-2 Secure Socket Layer (SSL) binary a openswan recommends no packages. Versions of packages openswan suggests: ii curl 7.20.0-1 Get a file from an HTTP, HTTPS or pn openswan-modules-source | lin <none> (no description available) -- debconf information: openswan/existing_x509_key_filename: openswan/x509_state_name: openswan/rsa_key_length: 2048 openswan/restart: true openswan/start_level: earliest openswan/enable-oe: false * openswan/existing_x509_certificate: false openswan/existing_x509_certificate_filename: * openswan/create_rsa_key: true openswan/x509_email_address: openswan/x509_country_code: AT * openswan/x509_self_signed: true openswan/x509_organizational_unit: openswan/x509_locality_name: openswan/x509_common_name: * openswan/rsa_key_type: x509 openswan/x509_organization_name: -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org