Your message dated Thu, 14 Jan 2021 20:24:58 +0000
with message-id <e1l09aw-00050y...@fasolo.debian.org>
and subject line Bug#980116: fixed in openafs 1.8.6-5
has caused the Debian Bug report #980116,
regarding connection failure when rx initialized after 08:25:36 GMT 14 Jan 2021
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
980116: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980116
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openafs-client
Version: 1.8.2-1
Severity: grave
Control: clone -1 -2
Control: reassign -2 openafs-fileserver

The Rx RPC stack requires a connection identifier for each new connection a
system initiates.  In 2014 support to generate the initial identifier
randomly was added to the core Rx implementation (instead of relying on the
security layer to do so), but code that attempted to use the current system
time as part of a not-very-random initialization was not removed at that
time.  When the unix epoch time is later than 0x60000000, that stale
initialization interacts with a bug in code designed to avoid signed
integer overflow when incrementing the global conneciton ID counter,
resulting in the connection ID of 0x80000002 being used for all
connections, leading to connection failure due to the collision.  This
renders all clients and servers started after 14 Jan 2021 08:25:36 UTC
unusable.

--- End Message ---
--- Begin Message ---
Source: openafs
Source-Version: 1.8.6-5
Done: Benjamin Kaduk <ka...@mit.edu>

We believe that the bug you reported is fixed in the latest version of
openafs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 980...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk <ka...@mit.edu> (supplier of updated openafs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 14 Jan 2021 11:48:18 -0800
Source: openafs
Architecture: source
Version: 1.8.6-5
Distribution: unstable
Urgency: emergency
Maintainer: Benjamin Kaduk <ka...@mit.edu>
Changed-By: Benjamin Kaduk <ka...@mit.edu>
Closes: 980115 980116
Changes:
 openafs (1.8.6-5) unstable; urgency=emergency
 .
   * Pull in upstream patches to fix outgoing connections after
     unix epoch time 0x60000000 (Closes: #980115, #980116)
Checksums-Sha1:
 1a3eb2d72038da45c2368510c244d0495d339d63 3571 openafs_1.8.6-5.dsc
 66ed07d1ab5cbd7304285a55200d9c25ae80f565 150620 openafs_1.8.6-5.debian.tar.xz
 ab0c496f933d82a451962e48f17b38db09ada96e 16265 openafs_1.8.6-5_amd64.buildinfo
Checksums-Sha256:
 cebc7852d4dafed2f27b137246dd1f0707e358d88902b73f81fb988c819b2ba2 3571 
openafs_1.8.6-5.dsc
 02ff53dc42220733f8f47f2fea178a1811fa97a0c699dc3459a1e3933ca417d5 150620 
openafs_1.8.6-5.debian.tar.xz
 6f9309c61667bb7dc9add82c9fd17152444e1d323782e378fa681e87bd6bc2a2 16265 
openafs_1.8.6-5_amd64.buildinfo
Files:
 d79f194a1b43c03a0be393eba5cee648 3571 net optional openafs_1.8.6-5.dsc
 9bfc8f862828a4969d918a041873579b 150620 net optional 
openafs_1.8.6-5.debian.tar.xz
 1360d22df4007169cf3cd117c8805eae 16265 net optional 
openafs_1.8.6-5_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=FRd1
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to