Your message dated Thu, 28 Dec 2006 15:19:45 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#391601: fixed in iputils 3:20020927-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: iputils-ping
Version: 3:20020927-3
Severity: serious
Justification: Building from source results in unusable binary


        Hello,

With the binary currently in unstable:
% ping6 ::1
PING ::1(::1) 56 data bytes
64 bytes from ::1: icmp_seq=1 ttl=64 time=0.058 ms

--- ::1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.058/0.058/0.058/0.000 ms

With the binary obtained from unmodified Debian source:
% ping6 ::1
can't receive hop limit: Protocol not available

I've not checked yet, but my best guess is a mixup between the RFC2292-
and RFC3542-style socket options.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages iputils-ping depends on:
ii  libc6                        2.3.6.ds1-5 GNU C Library: Shared libraries

iputils-ping recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: iputils
Source-Version: 3:20020927-4

We believe that the bug you reported is fixed in the latest version of
iputils, which is due to be installed in the Debian FTP archive:

iputils-arping_20020927-4_i386.deb
  to pool/main/i/iputils/iputils-arping_20020927-4_i386.deb
iputils-ping_20020927-4_i386.deb
  to pool/main/i/iputils/iputils-ping_20020927-4_i386.deb
iputils-tracepath_20020927-4_i386.deb
  to pool/main/i/iputils/iputils-tracepath_20020927-4_i386.deb
iputils_20020927-4.diff.gz
  to pool/main/i/iputils/iputils_20020927-4.diff.gz
iputils_20020927-4.dsc
  to pool/main/i/iputils/iputils_20020927-4.dsc
netkit-ping_20020927-4_i386.deb
  to pool/main/i/iputils/netkit-ping_20020927-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Noah Meyerhans <[EMAIL PROTECTED]> (supplier of updated iputils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 19 Dec 2006 17:05:27 -0500
Source: iputils
Binary: iputils-ping iputils-tracepath netkit-ping iputils-arping
Architecture: source i386
Version: 3:20020927-4
Distribution: unstable
Urgency: medium
Maintainer: Noah Meyerhans <[EMAIL PROTECTED]>
Changed-By: Noah Meyerhans <[EMAIL PROTECTED]>
Description: 
 iputils-arping - Tool to send ICMP echo requests to an ARP address
 iputils-ping - Tools to test the reachability of network hosts
 iputils-tracepath - Tools to trace the network path to a remote host
 netkit-ping - The ping utility from netkit (transitional package)
Closes: 233125 384012 391601 397935 402121
Changes: 
 iputils (3:20020927-4) unstable; urgency=medium
 .
   * Acknowledge NMU
   * Apply patch from Loïc Minier <[EMAIL PROTECTED]> to fix arping behavior
     when -w and -c command line flags are given and the target host
     does not reply.  (Closes: Bug#233125)
   * Provide a netkit-ping package so there's a smooth upgrade path for
     people who had the old netkit ping implementation installed.
     (Closes: Bug#384012)
   * Apply patch from Rémi Denis-Courmont <[EMAIL PROTECTED]> to
     fix incompatibilities with 2.4 and older 2.6 kernels in ping6 and
     tracepath6.  (Closes: Bug#402121, Bug#397935)
 .
 iputils (3:20020927-3.1) unstable; urgency=low
 .
   * NMU
   * Use IPV6_RECVHOPLIMIT instead of IPV6_HOPLIMIT in ping6 to build
     with current kernel headers. Closes: #391601
   * Explicitly build-depend on the current version of linux-kernel-headers
     since older ones don't have IPV6_RECVHOPLIMIT.
Files: 
 fc57b0b89dcf4c1bdf5049e0b04fec3c 682 net extra iputils_20020927-4.dsc
 c8d128e5c2861814c2a4d85b7f0396f8 11250 net extra iputils_20020927-4.diff.gz
 1b440c6d28c4bd453b4a7e45a0944f8d 41758 net important 
iputils-ping_20020927-4_i386.deb
 84d2345a81b779438ef11c15fc98ca2c 26510 net optional 
iputils-tracepath_20020927-4_i386.deb
 8a955ce84bfed5a20b118f8e1052e215 19330 net extra 
iputils-arping_20020927-4_i386.deb
 99dd1c09d8b1d902fef643cc6e6c49df 5190 net extra netkit-ping_20020927-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFiHqiYrVLjBFATsMRAmCRAJ9IJP1lFnJQ2Qo7ri4HDYkNCYC9lgCeLZ9s
2x9+UGKzRBjX9xIba/0LORw=
=XzeN
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to