Your message dated Fri, 18 May 2012 13:34:54 +0100
with message-id <[email protected]>
and subject line Bug#668037: fixed in jwhois 4.0-2
has caused the Debian Bug report #668037,
regarding jwhois complains with "[Unable to connect to remote host]"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
668037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668037
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: jwhois
Version: 4.0-1
Severity: grave
Tags: upstream
Justification: renders package unusable

Running jwhois 4.0-1 on debian stable (amd64) keeps complaining with the
following:

$ jwhois -v 173.194.70.94
[Querying whois.arin.net]
[Unable to connect to remote host]

This is what tcpdump thinks about the conversation to whois.arin.net

# tcpdump -n -i wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 65535 bytes
15:37:51.470376 IP 192.168.2.10.43915 > 192.168.2.1.53: 47042+ A?
whois.arin.net. (32)
15:37:51.470420 IP 192.168.2.10.43915 > 192.168.2.1.53: 47012+ AAAA?
whois.arin.net. (32)
15:37:51.484500 IP 192.168.2.1.53 > 192.168.2.10.43915: 47042 6/0/0 A
199.71.0.49, A 199.212.0.48, A 199.71.0.47, A 199.212.0.47, A 199.71.0.48, A
199.212.0.46 (128)
15:37:51.484707 IP 192.168.2.1.53 > 192.168.2.10.43915: 47012 5/0/0 AAAA
2001:500:13::48, AAAA 2001:500:31::47, AAAA 2001:500:31::48, AAAA
2001:500:13::46, AAAA 2001:500:13::47 (172)
15:37:51.484924 IP 192.168.2.10.37982 > 199.71.0.49.43: Flags [S], seq
3689994316, win 5840, options [mss 1460], length 0
15:37:51.672562 IP 199.71.0.49.43 > 192.168.2.10.37982: Flags [S.], seq
714943012, ack 3689994317, win 1460, options [mss 1460], length 0
15:37:51.672607 IP 192.168.2.10.37982 > 199.71.0.49.43: Flags [.], ack 1, win
5840, length 0
15:37:51.672643 IP 192.168.2.10.42591 > 199.212.0.48.43: Flags [S], seq
2528060221, win 5840, options [mss 1460], length 0
15:37:51.801813 IP 199.212.0.48.43 > 192.168.2.10.42591: Flags [S.], seq
1637307527, ack 2528060222, win 1460, options [mss 1460], length 0
15:37:51.801843 IP 192.168.2.10.42591 > 199.212.0.48.43: Flags [.], ack 1, win
5840, length 0
15:37:51.801883 IP 192.168.2.10.39607 > 199.71.0.47.43: Flags [S], seq
1827779179, win 5840, options [mss 1460], length 0
15:37:51.988203 IP 199.71.0.47.43 > 192.168.2.10.39607: Flags [S.], seq
3866797450, ack 1827779180, win 1460, options [mss 1460], length 0
15:37:51.988233 IP 192.168.2.10.39607 > 199.71.0.47.43: Flags [.], ack 1, win
5840, length 0
15:37:51.988272 IP 192.168.2.10.55037 > 199.212.0.47.43: Flags [S], seq
1127087815, win 5840, options [mss 1460], length 0
15:37:52.110157 IP 199.212.0.47.43 > 192.168.2.10.55037: Flags [S.], seq
2596832808, ack 1127087816, win 1460, options [mss 1460], length 0
15:37:52.110188 IP 192.168.2.10.55037 > 199.212.0.47.43: Flags [.], ack 1, win
5840, length 0
15:37:52.110230 IP 192.168.2.10.40777 > 199.71.0.48.43: Flags [S], seq
3214164637, win 5840, options [mss 1460], length 0
15:37:52.295858 IP 199.71.0.48.43 > 192.168.2.10.40777: Flags [S.], seq
714830429, ack 3214164638, win 1460, options [mss 1460], length 0
15:37:52.295888 IP 192.168.2.10.40777 > 199.71.0.48.43: Flags [.], ack 1, win
5840, length 0
15:37:52.295930 IP 192.168.2.10.50832 > 199.212.0.46.43: Flags [S], seq
2039824520, win 5840, options [mss 1460], length 0
15:37:52.432034 IP 199.212.0.46.43 > 192.168.2.10.50832: Flags [S.], seq
1897361856, ack 2039824521, win 1460, options [mss 1460], length 0
15:37:52.432070 IP 192.168.2.10.50832 > 199.212.0.46.43: Flags [.], ack 1, win
5840, length 0
15:37:52.432257 IP 192.168.2.10.37982 > 199.71.0.49.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.432294 IP 192.168.2.10.42591 > 199.212.0.48.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.432344 IP 192.168.2.10.39607 > 199.71.0.47.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.432369 IP 192.168.2.10.55037 > 199.212.0.47.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.432396 IP 192.168.2.10.40777 > 199.71.0.48.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.432456 IP 192.168.2.10.50832 > 199.212.0.46.43: Flags [F.], seq 1, ack
1, win 5840, length 0
15:37:52.553187 IP 199.212.0.46.43 > 192.168.2.10.50832: Flags [.], ack 2, win
1459, length 0
15:37:52.553637 IP 199.212.0.46.43 > 192.168.2.10.50832: Flags [F.], seq 1, ack
2, win 1459, length 0
15:37:52.553669 IP 192.168.2.10.50832 > 199.212.0.46.43: Flags [.], ack 2, win
5840, length 0
15:37:52.555819 IP 199.212.0.47.43 > 192.168.2.10.55037: Flags [F.], seq 1, ack
2, win 1460, length 0
15:37:52.555848 IP 192.168.2.10.55037 > 199.212.0.47.43: Flags [.], ack 2, win
5840, length 0
15:37:52.559230 IP 199.212.0.48.43 > 192.168.2.10.42591: Flags [F.], seq 1, ack
2, win 1460, length 0
15:37:52.559260 IP 192.168.2.10.42591 > 199.212.0.48.43: Flags [.], ack 2, win
5840, length 0
15:37:52.618789 IP 199.71.0.47.43 > 192.168.2.10.39607: Flags [.], ack 2, win
1459, length 0
15:37:52.618896 IP 199.71.0.47.43 > 192.168.2.10.39607: Flags [F.], seq 1, ack
2, win 1459, length 0
15:37:52.618922 IP 192.168.2.10.39607 > 199.71.0.47.43: Flags [.], ack 2, win
5840, length 0
15:37:52.619012 IP 199.71.0.48.43 > 192.168.2.10.40777: Flags [F.], seq 1, ack
2, win 1460, length 0
15:37:52.619038 IP 192.168.2.10.40777 > 199.71.0.48.43: Flags [.], ack 2, win
5840, length 0
15:37:52.620770 IP 199.71.0.49.43 > 192.168.2.10.37982: Flags [F.], seq 1, ack
2, win 1460, length 0
15:37:52.620795 IP 192.168.2.10.37982 > 199.71.0.49.43: Flags [.], ack 2, win
5840, length 0



-- System Information:
Debian Release: 6.0.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages jwhois depends on:
ii  adduser                       3.112+nmu2 add and remove users and groups
ii  dpkg                          1.15.8.12  Debian package management system
ii  libc6                         2.11.3-3   Embedded GNU C Library: Shared lib
ii  libgdbm3                      1.8.3-9    GNU dbm database routines (runtime

Versions of packages jwhois recommends:
ii  lynx                        2.8.8dev.5-1 Text-mode WWW Browser (transitiona

jwhois suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: jwhois
Source-Version: 4.0-2

On Fri, May 18, 2012 at 01:57:28PM +0200, Matthias Guentert wrote:
> That still doesn't work on my side.
>
> $ jwhois -v 173.194.70.94
> [Querying whois.arin.net]
> [Unable to connect to remote host]

Ah, you're right, this was fixed in <http://bugs.debian.org/542148>:

On Mon, Aug 17, 2009 at 11:44:13PM -0500, Alan Curry wrote:
> With the current version of jwhois, I can't do IP address lookups. It fails
> to connect to whois.arin.net, whois.ripe.net, and whois.apnic.net. These
> lookups used to work with some older version (I'm not sure which).
[...]

I've checked, 4.0-1 doesn't work and 4.0-2 does; closing.

Thanks,

Matej


--- End Message ---

Reply via email to