Bug#977590: freeradius: After upgrade to buster, freeradius doesn't talk over the network anymore

2020-12-21 Thread Harald Hannelius
 freeradius:amd64 3.0.12+dfsg-5+deb9u1
2020-12-17 14:11:18 status unpacked freeradius:amd64 3.0.17+dfsg-1.1
2020-12-17 14:11:18 upgrade libfreeradius3:amd64 3.0.12+dfsg-5+deb9u1 
3.0.17+dfsg-1.1
2020-12-17 14:11:18 status half-configured libfreeradius3:amd64 
3.0.12+dfsg-5+deb9u1
2020-12-17 14:11:18 status unpacked libfreeradius3:amd64 3.0.12+dfsg-5+deb9u1
2020-12-17 14:11:18 status half-installed libfreeradius3:amd64 
3.0.12+dfsg-5+deb9u1
2020-12-17 14:11:19 status unpacked libfreeradius3:amd64 3.0.17+dfsg-1.1
2020-12-17 14:12:22 configure libfreeradius3:amd64 3.0.17+dfsg-1.1 
2020-12-17 14:12:22 status unpacked libfreeradius3:amd64 3.0.17+dfsg-1.1
2020-12-17 14:12:22 status half-configured libfreeradius3:amd64 3.0.17+dfsg-1.1
2020-12-17 14:12:22 status installed libfreeradius3:amd64 3.0.17+dfsg-1.1
2020-12-17 14:12:22 configure freeradius-utils:amd64 3.0.17+dfsg-1.1 
2020-12-17 14:12:22 status unpacked freeradius-utils:amd64 3.0.17+dfsg-1.1
2020-12-17 14:12:22 status half-configured freeradius-utils:amd64 
3.0.17+dfsg-1.1
2020-12-17 14:12:22 status installed freeradius-utils:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:31 configure freeradius:amd64 3.0.17+dfsg-1.1 
2020-12-17 14:14:31 status unpacked freeradius:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:31 status half-configured freeradius:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:32 status installed freeradius:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:33 configure freeradius-ldap:amd64 3.0.17+dfsg-1.1 
2020-12-17 14:14:33 status unpacked freeradius-ldap:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:33 status half-configured freeradius-ldap:amd64 3.0.17+dfsg-1.1
2020-12-17 14:14:33 status installed freeradius-ldap:amd64 3.0.17+dfsg-1.1


--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020

Bug#977590: freeradius: After upgrade to buster, freeradius doesn't talk over the network anymore

2020-12-21 Thread Harald Hannelius



On Mon, 21 Dec 2020, Bernhard Schmidt wrote:

Am 21.12.20 um 10:21 schrieb Harald Hannelius:

Hi Harald,




I have a recursive diff of both config dirs, but haven't been
able to see what has done what. I still have a test-server so
I can help with providing more info is so needed.


Please attach the diff to this bug report.


I attached the diff. Thanks.


Thanks, this one sounds like the culprit.

Only in freeradius-debian-9.0/3.0/sites-enabled: default
Only in freeradius-debian-9.0/3.0/sites-enabled: inner-tunnel

Can you "ls -la" the sites-enabled directory in both the working and the
non-working configuration?


~# ls -l /etc/freeradius-debian-9.0/3.0/sites-enabled/
total 52
-rw-r- 1 freerad freerad  2040 Feb 23  2018 control-socket
-rw-r- 1 freerad freerad 27043 Feb 23  2018 default
-rw-r- 1 freerad freerad   728 Feb 23  2018 eduroam
-rw-r- 1 freerad freerad   625 Feb 23  2018 eduroam-inner-tunnel
-rw-r- 1 freerad freerad 11784 Feb 23  2018 inner-tunnel
~# ls -l /etc/freeradius-debian-10.0/3.0/sites-enabled/
total 12
-rw-r- 1 freerad freerad 2040 Feb 23  2018 control-socket
-rw-r- 1 freerad freerad  728 Feb 23  2018 eduroam
-rw-r- 1 freerad freerad  625 Feb 23  2018 eduroam-inner-tunnel



There are some code paths touching those directories in postinst, but
they appear to be correctly guarded to be executed only from jessie to
stretch, not from stretch to buster.


Something missing in the postinst-scripts then I guess.

--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020



Bug#977590: freeradius: After upgrade to buster, freeradius doesn't talk over the network anymore

2020-12-21 Thread Harald Hannelius


On Fri, 18 Dec 2020, Bernhard Schmidt wrote:

Earlier Harald Hannelius wrote:



I have a recursive diff of both config dirs, but haven't been
able to see what has done what. I still have a test-server so
I can help with providing more info is so needed.


Please attach the diff to this bug report.


I attached the diff. Thanks.

--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020diff -u -r freeradius-debian-9.0/3.0/README.rst 
freeradius-debian-10.0/3.0/README.rst
--- freeradius-debian-9.0/3.0/README.rst2017-08-10 10:05:06.0 
+0300
+++ freeradius-debian-10.0/3.0/README.rst   2019-04-23 00:23:36.0 
+0300
@@ -76,8 +76,8 @@
 
 Modules can be enabled by creating a soft link.  For module ``foo``, do::
 
-  $ cd raddb
-  $ ln -s mods-available/foo mods-enabled/foo
+  $ cd raddb/mods-enabled
+  $ ln -s ../mods-available/foo
 
 To create "local" versions of the modules, we suggest copying the file
 instead.  This leaves the original file (with documentation) in the
@@ -660,6 +660,6 @@
 Dialup_admin
 
 
-The dialip_admin directory has been removed.  No one stepped forward
+The dialup_admin directory has been removed.  No one stepped forward
 to maintain it, and the code had not been changed in many years.
 
diff -u -r freeradius-debian-9.0/3.0/certs/Makefile 
freeradius-debian-10.0/3.0/certs/Makefile
--- freeradius-debian-9.0/3.0/certs/Makefile2017-08-10 10:05:06.0 
+0300
+++ freeradius-debian-10.0/3.0/certs/Makefile   2019-04-23 00:23:36.0 
+0300
@@ -5,16 +5,22 @@
 #
 #  See the README file in this directory for more information.
 #
-#  $Id: cc12464c6c7754aff2f0c8d6e116708c94ff2168 $
+#  $Id: 16447a023d2cdce2d16d39cf31bcde4dba600df5 $
 #
 ##
 
 DH_KEY_SIZE= 2048
+OPENSSL= openssl
+EXTERNAL_CA= $(wildcard external_ca.*)
+
+ifneq "$(EXTERNAL_CA)" ""
+PARTIAL= -partial_chain
+endif
 
 #
 #  Set the passwords
 #
--include passwords.mk
+include passwords.mk
 
 ##
 #
@@ -33,11 +39,15 @@
 .PHONY: server
 server: server.pem server.vrfy
 
+.PHONY: inner-server
+inner-server: inner-server.pem inner-server.vrfy
+
 .PHONY: verify
 verify: server.vrfy client.vrfy
 
-passwords.mk: server.cnf ca.cnf client.cnf
+passwords.mk: server.cnf ca.cnf client.cnf inner-server.cnf
@echo "PASSWORD_SERVER  = '$(shell grep output_password server.cnf | 
sed 's/.*=//;s/^ *//')'"   > $@
+   @echo "PASSWORD_INNER   = '$(shell grep output_password 
inner-server.cnf | sed 's/.*=//;s/^ *//')'" >> $@
@echo "PASSWORD_CA  = '$(shell grep output_password ca.cnf | sed 
's/.*=//;s/^ *//')'"   >> $@
@echo "PASSWORD_CLIENT  = '$(shell grep output_password client.cnf | 
sed 's/.*=//;s/^ *//')'"   >> $@
@echo "USER_NAME= '$(shell grep emailAddress client.cnf | grep 
'@' | sed 's/.*=//;s/^ *//')'"   >> $@
@@ -49,7 +59,7 @@
 #
 ##
 dh:
-   openssl gendh -out dh -2 $(DH_KEY_SIZE)
+   $(OPENSSL) dhparam -out dh -2 $(DH_KEY_SIZE)
 
 ##
 #
@@ -59,11 +69,12 @@
 ca.key ca.pem: ca.cnf
@[ -f index.txt ] || $(MAKE) index.txt
@[ -f serial ] || $(MAKE) serial
-   openssl req -new -x509 -keyout ca.key -out ca.pem \
+   $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \
-days $(CA_DEFAULT_DAYS) -config ./ca.cnf
+   chmod g+r ca.key
 
 ca.der: ca.pem
-   openssl x509 -inform PEM -outform DER -in ca.pem -out ca.der
+   $(OPENSSL) x509 -inform PEM -outform DER -in ca.pem -out ca.der
 
 ##
 #
@@ -71,20 +82,23 @@
 #
 ##
 server.csr server.key: server.cnf
-   openssl req -new  -out server.csr -keyout server.key -config 
./server.cnf
+   $(OPENSSL) req -new  -out server.csr -keyout server.key -config 
./server.cnf
+   chmod g+r server.key
 
 server.crt: server.csr ca.key ca.pem
-   openssl ca -batch -keyfile ca.key -cert ca.pem -in server.csr  -key 
$(PASSWORD_CA) -out server.crt -extensions xpserver_ext -extfile xpextensions 
-config ./server.cnf
+   $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr  -key 
$(PASSWORD_CA) -out server.crt -extensions xpserver_ext -extfile xpextensions 
-config ./server.cnf
 
 server.p12: server.crt
-   openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12 
 -passin pass:$(PASSWORD_SERVER) -pa

Bug#977590: freeradius: After upgrade to buster, freeradius doesn't talk over the network anymore

2020-12-18 Thread Harald Hannelius



On Fri, 18 Dec 2020, Bernhard Schmidt wrote:


Control: severity -1 important
Control: tags -1 moreinfo

Hi Harald,

I'm going to downgrade this because

- it does not break unrelated software ... The radius server not running
might cause other software not to be able to authenticate anymore, but
Radius can be easily made redundant.
- this is the first report received from oldstable to stable (which has
been out for 1,5 years), so I don't think it's widespread.


Fair enough, and expected.


That being said...


I then copied the whole /etc/freeradius directory from the previous
setup, and started freeradius -X again. The output is now as it should;


[...]


I have a recursive diff of both config dirs, but haven't been
able to see what has done what. I still have a test-server so
I can help with providing more info is so needed.


Please attach the diff to this bug report.


I will, I have to sanitize it a bit first.

--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020



Bug#977590: freeradius: After upgrade to buster, freeradius doesn't talk over the network anymore

2020-12-17 Thread Harald Hannelius
Package: freeradius
Version: 3.0.17+dfsg-1.1
Severity: critical
Justification: breaks unrelated software

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

I upgraded debian 9 to debian 10, this upgrading freeradius-3.0.12 to 
freeradius-3.0.17
at the same time. 

After the upgrade freeradius starts, but doesn't answer any network requests. 
The 
end of the output of 'freeradius -X' says the following;

radiusd:  Opening IP addresses and Ports 
listen {
type = "control"
 listen {
socket = "/var/run/freeradius/freeradius.sock"
peercred = yes
 }
}
Listening on command file /var/run/freeradius/freeradius.sock
Ready to process requests
EOF

I didn't allow the upgrade process to do any changes in the config
files.

I then copied the whole /etc/freeradius directory from the previous
setup, and started freeradius -X again. The output is now as it should;

listen {
type = "acct"
ipv6addr = ::
port = 0
   limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
   }
}
Listening on command file /var/run/freeradius/freeradius.sock
Listening on auth address * port 1812 bound to server default
Listening on acct address * port 1813 bound to server default
Listening on auth address :: port 1812 bound to server default
Listening on acct address :: port 1813 bound to server default
Listening on proxy address * port 45082
Listening on proxy address :: port 38835
Ready to process requests
EOF

I would have expected a minor software version number upgrade to
lead to a little smoother end result. 

I put this as critical, since a radius server might be quite
important for infrastructures. Sorry if that sounded an alarm
or something like that.

There's clearly some changes that have happened during the 
upgrade to debian 10 that shouldn't have been done.

I have a recursive diff of both config dirs, but haven't been
able to see what has done what. I still have a test-server so
I can help with providing more info is so needed. 

Thank You all for freeradius!


-- System Information:
Debian Release: 10.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-13-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages freeradius depends on:
ii  freeradius-common  3.0.17+dfsg-1.1
ii  freeradius-config  3.0.17+dfsg-1.1
ii  libc6  2.28-10
ii  libcap21:2.25-2
ii  libct4 1.00.104-1+deb10u1
ii  libfreeradius3 3.0.17+dfsg-1.1
ii  libgdbm6   1.18.1-4
ii  libpam0g   1.3.1-5
ii  libpcre3   2:8.39-12
ii  libperl5.285.28.1-6+deb10u1
ii  libreadline7   7.0-5
ii  libsqlite3-0   3.27.2-3+deb10u1
ii  libssl1.1  1.1.1d-0+deb10u4
ii  libtalloc2 2.1.14-2
ii  libwbclient0   2:4.9.5+dfsg-5+deb10u1
ii  lsb-base   10.2019051400

Versions of packages freeradius recommends:
ii  freeradius-utils  3.0.17+dfsg-1.1

Versions of packages freeradius suggests:
pn  freeradius-krb5
ii  freeradius-ldap3.0.17+dfsg-1.1
pn  freeradius-mysql   
pn  freeradius-postgresql  
pn  freeradius-python2 
ii  snmp   5.7.3+dfsg-5+deb10u1

-- no debconf information



Bug#974206: closed by Ben Hutchings (Re: Bug#974206: debian-installer: When entering an IPv6 address, fe80::1 should be a valid gateway)

2020-11-11 Thread Harald Hannelius



On Wed, 11 Nov 2020, Debian Bug Tracking System wrote:


This is an automatic notification regarding your Bug report
which was filed against the debian-installer package:

#974206: debian-installer: When entering an IPv6 address, fe80::1 should be a 
valid gateway

It has been closed by Ben Hutchings .



No, this is a link-local address so you have to also specify the
interface name, e.g. "fe80::1%eth0",


The installer could then give a hint that %eth0 should be added, or any 
interface name that was used in the previous step when the interface got 
it's IP-address. The user doesn't know the correct name for the interface at 
that stage, it might be ens3, eth0, wlan0, eno1, wlp1s3 or something else.


I can't remember when I have had to add the interface name to the gateway 
since this configuration is usually added in the context of the interface 
being configured.


--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020



Bug#974206: debian-installer: When entering an IPv6 address, fe80::1 should be a valid gateway

2020-11-11 Thread Harald Hannelius
Package: debian-installer
Version: Debian 10.6
Severity: normal

Dear Maintainer,

I needed to enter an IPv6-address in the installer. When entering
fe80::1 as a gateway the installer stops with an error that the
address isn't reachable. The address fe80::1 is indeed a valid
address for a gateway.


-- System Information:
Debian Release: 10.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-12-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#962695: iftop resolves all IPv6 addresse to the same hostname

2020-06-12 Thread Harald Hannelius
Package: iftop
Version: 1.0~pre4-4
Severity: minor

Dear Maintainer,

When running iftop on a server with serveral IPv6-connections ongoing,
iftop seems to resolve the ip-addresses to the same hostname. This is a
bit confusing. By pressing 'n' to get numerical output everything looks 
correct.

-- System Information:
Debian Release: 9.12
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-11-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), LANGUAGE=en_US:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages iftop depends on:
ii  libc62.24-11+deb9u4
ii  libncurses5  6.0+20161126-1+deb9u2
ii  libpcap0.8   1.8.1-3
ii  libtinfo56.0+20161126-1+deb9u2

iftop recommends no packages.

iftop suggests no packages.

-- no debconf information



Bug#947927: Got it working

2020-01-02 Thread Harald Hannelius



It seems like a restart of mimedefang was needed after an upgrade of 
spamassassin (and spamd). It might be the spamassassin package's 
responsibility to do that?


--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020



Bug#947927: mimedefang: Mimedefang is unable to start after upgrade of spamassassin

2020-01-02 Thread Harald Hannelius
Package: mimedefang
Version: 2.79-2
Severity: grave
Justification: causes non-serious data loss

Dear Maintainer,


There was an update on spamassassin two days ago, that updated to 
3.4.2-1~deb9u2 on both 
our incoming gateways. Both are debian 9, and both are also using mimedefang. 
Both now 
cause mail to be queued if the mimedefang-milter is enabled. 

Jan  2 10:13:05 server mimedefang-multiplexor[1026]: Starting slave 5 (pid 
156560) (2 running): Bringing slaves up to minSlaves (2)
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): "qr_to_string" is not 
exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Can't continue after import errors at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/Rule2XSBody.pm line 41.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: BEGIN failed--compilation aborted at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/Rule2XSBody.pm line 41.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 94) line 1.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): "compile_regexp" is not 
exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Can't continue after import errors at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/MIMEHeader.pm line 68.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: BEGIN failed--compilation aborted at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/MIMEHeader.pm line 68.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 127) line 1.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): "compile_regexp" is not 
exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr:  "qr_to_string" is not exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Can't continue after import errors at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/ReplaceTags.pm line 55.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: BEGIN failed--compilation aborted at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/ReplaceTags.pm line 55.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 128) line 1.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): Bareword "RULENAME_RE" not 
allowed while "strict subs" in use at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/Check.pm line 32.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 131) line 1.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): "compile_regexp" is not 
exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Can't continue after import errors at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/URIDetail.pm line 71.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: BEGIN failed--compilation aborted at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/URIDetail.pm line 71.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 134) line 1.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: plugin: failed to parse plugin (from @INC): "compile_regexp" is not 
exported by the Mail::SpamAssassin::Util module
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Can't continue after import errors at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/HTMLEval.pm line 27.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: BEGIN failed--compilation aborted at 
/usr/share/perl5/Mail/SpamAssassin/Plugin/HTMLEval.pm line 27.
Jan  2 10:16:31 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Compilation failed in require at (eval 141) line 1.
Jan  2 10:16:32 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Timeout::_run: check: no loaded plugin implements 'check_main': cannot 
scan!
Jan  2 10:16:32 server mimedefang-multiplexor[1026]: 0028GNZ7156694: Slave 8 
stderr: Check that the necessary '.pre' files are in the config directory.
Jan  2 10:16:32 server mimedefang-multiplex

Bug#928164: backports work

2019-05-06 Thread Harald Hannelius



On Mon, 29 Apr 2019, Frederic Peters wrote:

Harald Hannelius wrote:


I forgot to mention that installing of liblasso3 from stretch backports also
fixes the problem and I can operate as an SP and sign requests.


Good to know as there's an important diff between 2.5.0 and 2.6.0, and
cherrypicking a specific commit may be difficult; I'll still look at
bisecting but it may take some time.


I don't know how this happened, but there doesn't seem to be a liblasso3 
in backports. Somehow the other server worked, but after a reboot I 
started getting signal 11 on that one too. It worked for a week.


I disabled signing och all of the sites through creating static SP 
Metadata, and now the sites are up again.


I would have been OK to have 2.6.0 of liblasso3 in stretch backports, and 
I was in the believe that I had installed it. But when checking, I'm still 
running 2.5.0-5+b1. Spooky


--
Harald Hannelius | har...@iki.fi | +358505941020



Bug#928164: backports work

2019-04-29 Thread Harald Hannelius




On Mon, 29 Apr 2019, Frederic Peters wrote:


fixed 928164 2.6.0-2
thanks


Will this dribble down to Debian Stretch?

--
Harald Hannelius | har...@iki.fi | +358505941020



Bug#928164: backports work

2019-04-29 Thread Harald Hannelius



I forgot to mention that installing of liblasso3 from stretch backports 
also fixes the problem and I can operate as an SP and sign requests.


--
Harald Hannelius | har...@iki.fi | +358505941020



Bug#928164: liblasso3 dies with signal 11 if signing of requests is enabled

2019-04-29 Thread Harald Hannelius
Package: liblasso3
Version: 2.5.0-5+b1
Severity: important

Dear Maintainer,


I installed liblasso3 (a requirement for mod_auth_mellon). Configured to use 
ADFS 
as authsource. When signing of claims is enabled liblasso3 dies with signal 11 
sigsegv. 

If I disable signing of claims everything works. 

Also see : https://github.com/Uninett/mod_auth_mellon/issues/203

(gdb) run -X -k start
Starting program: /usr/sbin/apache2 -X -k start
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".

Program received signal SIGSEGV, Segmentation fault.
0x73a33a1e in RSA_sign () from 
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.0.2
(gdb) bt
#0 0x73a33a1e in RSA_sign () from 
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.0.2
#1 0x754b11ea in ?? () from /usr/lib/liblasso.so.3
#2 0x754f66d0 in ?? () from /usr/lib/liblasso.so.3
#3 0x754f6894 in ?? () from /usr/lib/liblasso.so.3
#4 0x754f4d74 in ?? () from /usr/lib/liblasso.so.3
#5 0x754f54ac in ?? () from /usr/lib/liblasso.so.3
#6 0x754fb628 in ?? () from /usr/lib/liblasso.so.3
#7 0x754d312a in lasso_login_build_authn_request_msg () from 
/usr/lib/liblasso.so.3
#8 0x75eb6b8d in am_init_authn_request_common 
(r=r@entry=0x7fffddfae0a0, login_return=login_return@entry=0x7fffdea0,
idp=idp@entry=0x7fffddfaa770 "http://adfs.arcada.fi/adfs/services/trust";, 
http_method=http_method@entry=LASSO_HTTP_METHOD_REDIRECT,
destination_url=destination_url@entry=0x55bd31a0 
"https://adfs.arcada.fi/adfs/ls/";,
assertion_consumer_service_url=assertion_consumer_service_url@entry=0x55bb7840
 "https://asta.arcada.fi/endpoint/postResponse";,
return_to_url=0x7fffddfaa5f0 "https://asta.arcada.fi/";, is_passive=0) at 
auth_mellon_handler.c:2945
#9 0x75eb77b4 in am_send_login_authn_request (r=r@entry=0x7fffddfae0a0, 
idp=0x7fffddfaa770 "http://adfs.arcada.fi/adfs/services/trust";,
return_to_url=return_to_url@entry=0x7fffddfaa5f0 "https://asta.arcada.fi/";, 
is_passive=0) at auth_mellon_handler.c:3151
#10 0x75eb8f92 in am_handle_login (r=0x7fffddfae0a0) at 
auth_mellon_handler.c:3282
#11 am_handler (r=0x7fffddfae0a0) at auth_mellon_handler.c:3540
#12 0x555abd60 in ap_run_handler (r=r@entry=0x7fffddfae0a0) at 
config.c:170
#13 0x555ac2f6 in ap_invoke_handler (r=r@entry=0x7fffddfae0a0) at 
config.c:434
#14 0x555c3f33 in ap_process_async_request (r=0x7fffddfae0a0) at 
http_request.c:436
#15 0x555c4040 in ap_process_request (r=r@entry=0x7fffddfae0a0) at 
http_request.c:471
#16 0x555c00fd in ap_process_http_sync_connection (c=0x7fffe58be290) at 
http_core.c:210
#17 ap_process_http_connection (c=0x7fffe58be290) at http_core.c:251
#18 0x555b5bd0 in ap_run_process_connection (c=c@entry=0x7fffe58be290) 
at connection.c:42
#19 0x555b6120 in ap_process_connection (c=c@entry=0x7fffe58be290, 
csd=) at connection.c:226
#20 0x7fffeaf456bf in child_main (child_num_arg=child_num_arg@entry=0, 
child_bucket=child_bucket@entry=0) at prefork.c:723
#21 0x7fffeaf458da in make_child (s=0x77fc34a0, slot=slot@entry=0) at 
prefork.c:768
#22 0x7fffeaf46dfd in prefork_run (_pconf=, plog=0x77fbe028, 
s=0x77fc34a0) at prefork.c:975
#23 0x5558f0fe in ap_run_mpm (pconf=0x77ff0028, 
plog=0x77fbe028, s=0x77fc34a0) at mpm_common.c:94
#24 0x55587cfd in main (argc=, argv=) at main.c:783


-- System Information:
Debian Release: 9.8
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), LANGUAGE=en_US:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages liblasso3 depends on:
ii  libc6   2.24-11+deb9u4
ii  libglib2.0-02.50.3-2
ii  libssl1.0.2 1.0.2r-1~deb9u1
ii  libxml2 2.9.4+dfsg1-2.2+deb9u2
ii  libxmlsec1  1.2.23-0.1
ii  libxmlsec1-openssl  1.2.23-0.1
ii  libxslt1.1  1.1.29-2.1
ii  zlib1g  1:1.2.8.dfsg-5

liblasso3 recommends no packages.

liblasso3 suggests no packages.

-- no debconf information



Bug#892467: Acknowledgement (spfquery (libspf2-2?) and spf-milter-python falsely report "Void lookup limit exceeded")

2018-03-09 Thread Harald Hannelius


Please close this bug. It turned out that the domain mhd.se must have 
-records for the included
'a:' hostnames in DNS, which they didn't. And by using cloud-based e-mail 
they are using IPv6

without actually knowing it.


$ host f-medby.ita.mdh.se
f-medby.ita.mdh.se has address 130.243.84.223


$ host -t  f-medby.ita.mdh.se  # first void lookup
f-medby.ita.mdh.se has no  record
$ host -t   www.netigate.se  # second void lookup
www.netigate.se has no  record
$ host -t  smtp.quicknet.se # third void lookup
smtp.quicknet.se has no  record


Many thanks to Stuart D. Gathman for pointing this out to me.


--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020

Bug#892477: Acknowledgement (spf-milter-python: If connection is IPv6, milter says "Void lookup limit of 2 exceeded")

2018-03-09 Thread Harald Hannelius



Please close this bug. It turned out that the domain mhd.se must have 
-records for the included 'a:' hostnames in DNS, which they didn't. And 
by using cloud-based e-mail they are using IPv6 without actually knowing it.



$ host f-medby.ita.mdh.se
f-medby.ita.mdh.se has address 130.243.84.223


$ host -t  f-medby.ita.mdh.se  # first void lookup
f-medby.ita.mdh.se has no  record
$ host -t   www.netigate.se  # second void lookup
www.netigate.se has no  record
$ host -t  smtp.quicknet.se # third void lookup
smtp.quicknet.se has no  record


Many thanks to Stuart D. Gathman for pointing this out to me.

--

Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020

Bug#892477: spf-milter-python: If connection is IPv6, milter says "Void lookup limit of 2 exceeded"

2018-03-09 Thread Harald Hannelius
Package: spf-milter-python
Version: 0.8.18-2
Severity: grave
Tags: ipv6
Justification: causes non-serious data loss

Dear Maintainer,

I noted that when someone at mdh.se tries to send e-mail to us, and the 
connection is from 
an IPv6-address (almost all connections are these days), spf-milter-python will 
reply "Void 
lookup limit of 2 exceeded". The domain always passes all checks on both 
mxtoolbox.com/spf.aspx and http://www.kitterman.com/spf/validate.html.

I even had a loop running for a day, using spfquery to log the results while 
waiting for a 
failing e-mail. When the mail-server responded "Void lookup limit of 2 
exceeded", the data
in the diagnostic-log looked correct and had not failed.

I can reproduce this by telnetting my SMTP-gateway, and pretend to be sending 
from mdh.se. If
I connect over an IPv6-connection I get a "Void lookup limit of 2 exceeded", 
every time. If 
I telnet the IPv4-address of the SMTP-gateway i get a soft-error (expected 
result).

I have the same software on the other SMTP-gateway, and it has the same 
behaviour.

-- System Information:
Debian Release: 9.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages spf-milter-python depends on:
ii  adduser3.115
ii  lsb-base   9.20161125
ii  python 2.7.13-2
ii  python-milter  1.0-2
ii  python-spf 2.0.12t-3

spf-milter-python recommends no packages.

Versions of packages spf-milter-python suggests:
ii  sendmail  8.15.2-8

-- Configuration Files:
/etc/spf-milter-python/spfmilter.cfg changed:
[milter]
socketname = /var/run/spf-milter-python/spfmiltersock
;umask = 0177
name = pyspffilter
;trusted_relay =
internal_connect = 
127.0.0.1,192.168.0.0/16,10.0.0.0/8,IPv6:0:0:0:0:0:0:0:1,::1,0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1
;best_guess = v=spf1 a mx ptr ?all
;delegate = domain.com
untrapped_exception = CONTINUE
[spf]
access_file = /etc/mail/access.db
;access_file_nulls = false
;trusted_forwarder = careerbuilder.com


-- no debconf information



Bug#892467: spfquery (libspf2-2?) and spf-milter-python falsely report "Void lookup limit exceeded"

2018-03-09 Thread Harald Hannelius
Package: spfquery
Version: 1.2.10-7+b2
Severity: grave
Tags: ipv6
Justification: causes non-serious data loss

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

I got notified that another organization was unable to mail us. This didn't 
happen
all the time, but every few e-mail. The error logged by sendmail was 'Void 
lookup limit exceeded'.
I then had a loop running, doing spfquery for that domain every 5 seconds. When 
the next
fail in the mail-log came, the spfquery test succeeded. 

I then noted that running spfquery for that domain, with an IPv6 address always 
returns
"void lookup limit of 2 exceeded"

 spfquery --sender=some.u...@mdh.se --ip=2001:708:170:33::200
permerror
SPF Permanent Error: Void lookup limit of 2 exceeded
spfquery: permanent error in processing domain of mdh.se: Void lookup limit of 
2 exceeded
Received-SPF: PermError (spfquery: permanent error in processing domain of 
mdh.se: Void lookup limit of 2 exceeded) client-ip=2001:708:170:33::200; 
envelope-from="some.u...@mdh.se"; receiver=spfquery; identity=mailfrom

# apt-show-versions spfquery libspf2-2
libspf2-2:amd64/stretch 1.2.10-7+b2 uptodate
spfquery:amd64/stretch 1.2.10-7+b2 uptodate

Running the same on an Ubuntu 17.10 always succeeds;

$ spfquery --sender=some.u...@mdh.se --ip=2a01:0111:f400:fe1e::0712 
pass

spfquery: domain of mdh.se designates 2a01:111:f400:fe1e::712 as permitted 
sender
Received-SPF: pass (spfquery: domain of mdh.se designates 
2a01:111:f400:fe1e::712 as permitted sender) client-ip=2a01:111:f400:fe1e::712; 
envelope-from=some.u...@mdh.se;

$ apt-show-versions spfquery libspf2-2
libspf2-2:amd64/artful 1.2.10-7build2 uptodate
libspf2-2:i386 not installed
spfquery:amd64/artful 1.2.10-7build2 uptodate
spfquery:i386 not installed


This leads me to believe there's a bug in debian's implementation.


   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 9.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages spfquery depends on:
ii  libc6  2.24-11+deb9u1
ii  libspf2-2  1.2.10-7+b2

spfquery recommends no packages.

spfquery suggests no packages.

-- no debconf information



Bug#819275: check-support-status outputs a blank line, which is not cron friendly

2016-04-27 Thread Harald Hannelius


I was about to file a bug as well, since I just got a lot of e-mail from 
different cron-daemons. The normal convention would be to not say anything 
if there isn't anything to tell, wouldn't it?


At the very least don't output a single newline.

--
A: Top Posters!  |  s/y Charlotta |
Q: What is the most annoying thing on mailing lists? |FIN-2674|
  http://www.fe83.org/ Finn Express Purjehtijat ry   |  = |
Harald H Hannelius | harald (At) iki (dot) fi | GSM +358 50 594 1020



Bug#619240: Typo: position of quote in start-/stop-script /etc/init.d/mimedefang at line 267

2012-03-07 Thread Harald Hannelius



This bug is still present in a freshly installed squeeze 64bit 6.0.4 at 
7th Mar 2012.


The line-number has changed, but the typo it still there.



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#469622: First file download from samba dead slow

2008-03-13 Thread Harald Hannelius


On Fri, 7 Mar 2008, Steve Langasek wrote:


On Thu, Mar 06, 2008 at 10:38:51AM +0200, Harald Hannelius wrote:


Windows XP SP2 client, logged on to samba domain. When copying a file
from the Samba-server download speed is terrible, estimate 10-15 minutes
for a ~150MB file.



Connectivity between computers ok. iperf says 92Mbit/s, scp (cygwin)
copies the same file from the same etch-server in under 10s 7-8MByte/s.
Downloading with firefox on windows using file:///server/share/... gets
around 120KB/sec,
as does copying the file in Windows Explorer. copy in cmd.exe is slow too.


I would suggest pursuing this upstream on the samba user mailing list.
Network performance issues can be caused by any combination of network
problems, client configuration problems, server configuration problems, or
server bugs; the Debian Samba maintainers are not well-equipped to deal with
diagnosing such problems.


Ok, I dropped a note to the samba-list. It probably got stuck in the 
moderation queue.


I installed slackware-12 with stock samba-3.0.28. With the same smb.conf 
and all other testing procedures the same I'm now downloading the testfile 
in under 10s, repeatedly. So I think it's a 64bit or debian problem.


But thanks for your time anyways!

--
A: Top Posters
Q: What is the most annoying thing on mailing lists?

Harald H Hannelius | harald/a\arcada.fi | +358 50 594 1020



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#469622: First file download from samba dead slow

2008-03-06 Thread Harald Hannelius


Package: samba
Version: 3.0.24-6etch9
Severity: important



Etch server running samba (amd64) as domain member. SMP.

Windows XP SP2 client, logged on to samba domain. When copying a file
from the Samba-server download speed is terrible, estimate 10-15 minutes
for a ~150MB file.

Connectivity between computers ok. iperf says 92Mbit/s, scp (cygwin) copies the 
same file from the same etch-server in under 10s 7-8MByte/s. Downloading with 
firefox on windows using file:///server/share/... gets around 120KB/sec,

as does copying the file in Windows Explorer. copy in cmd.exe is slow too.

Copying is slow both from UNC-paths and from a mapped drive.

However, if I in the same session start copying another file, the download 
speed increases massively and the download takes just ~20s or less. It is

even enough if I use smbclient from another computer to download any other
file, while that download is running both instances are fast, until the
other stops. After this the remaining download is slow again, and the estimate 
fron Windows Explorer starts ticking minutes. It is even enough if a another 
domain user, using another client windows-computer starts

a download of another file and both instances speed up.

I built a samba-3.0.28 packages (sid) and installed that, no avail.

I have been playing around with different socket options to no avail.


-- smb.conf follows -
[global]
deadtime = 15
#   max xmit = 65535
#   getwd cache = yes
#   socket options = SO_KEEPALIVE TCP_NODELAY
aio read size = 16384
socket options = TCP_NODELAY SO_SNDBUF=8129 SO_RCVBUF=8192
#   socket options = TCP_NODELAY SO_SNDBUF=4096 SO_RCVBUF=4096
netbios name = atrium
debug level = 0
workgroup = nova
server string = Intranet
load printers = no
log file = /var/log/samba/log.%m
max log size = 100
security = domain
password server = domus
encrypt passwords = true
local master = no
os level = 65
preferred master = no
utmp = yes
syslog = 0
unix extensions = yes

dos charset = ISO8859-15
unix charset = ISO8859-1
display charset = ISO8859-15


[intra]
path = /tftpboot/intra
comment = Nova Intranet
guest ok = no
browseable = yes
read only = no
write list = @domadm
invalid users = root altiuser
directory mode = 2775
create mask = 0665
directory mask = 2775
- smb.conf ends --

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages samba depends on:
ii  deb 1.5.11etch1  Debian configuration management sy
ii  lib 2.2.41-1 Access control list shared library
ii  lib 2.4.32-1 Extended attribute shared library
ii  lib 2.3.6.ds1-13etch5GNU C Library: Shared libraries
ii  lib 1.39+1.40-WIP-2006.11.14+dfsg-2etch1 common error description library
ii  lib 1.2.7-4etch2 Common UNIX Printing System(tm) - 
ii  lib 1.4.4-3  the GNU TLS library - runtime libr

ii  lib 1.4.4-7etch4 MIT Kerberos runtime libraries
ii  lib 2.1.30-13.3  OpenLDAP libraries
ii  lib 0.79-5   Pluggable Authentication Modules f
ii  lib 0.79-5   Runtime support for the PAM librar
ii  lib 0.79-5   Pluggable Authentication Modules l
ii  lib 1.10-3   lib for parsing cmdline parameters
ii  log 3.7.1-3  Log rotation utility
ii  lsb 3.1-23.2etch1Linux Standard Base 3.1 init scrip
ii  net 4.29 Basic TCP/IP networking system
ii  pro 1:3.2.7-3/proc file system utilities
ii  sam 3.0.24-6etch9Samba common files used by both th
ii  zli 1:1.2.3-13   compression library - runtime

Versions of packages samba recommends:
pn  smbldap-tools  (no description available)

-- debconf information:
  samba/run_mode: daemons
  samba/tdbsam: false
  samba/generate_smbpasswd: true

--
A: Top Posters
Q: What is the most annoying thing on mailing lists?

Harald H Hannelius | harald/a\arcada.fi  | GSM +358 50 594 1020



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]