[Bug 1772705] Re: IKEv2 VPN connections fail to use DNS servers provided by the server
Since this bug is marked as "Fix Released", I did not find it in https://launchpad.net/ubuntu/+source/strongswan/+bugs I only found now. 18.04 is still affected, so a "Fix Released" seams wrong here, at least for 18.04 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1772705 Title: IKEv2 VPN connections fail to use DNS servers provided by the server To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1772705/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1837704] Re: strongswan-nm passes wrong DNS servers to NetworkManager
*** This bug is a duplicate of bug 1772705 *** https://bugs.launchpad.net/bugs/1772705 ** This bug has been marked a duplicate of bug 1772705 IKEv2 VPN connections fail to use DNS servers provided by the server -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1837704 Title: strongswan-nm passes wrong DNS servers to NetworkManager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1837704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1837704] [NEW] strongswan-nm passes wrong DNS servers to NetworkManager
Public bug reported: With a strongswan server sending a DNS server to the client, a client running strongswan-nm 5.6.2-1ubuntu2.4 receives random DNS servers. This could lead to a data leak issue, if one of these random DNS servers actually _is_ a DNS server and processes the query (or even a security issue if ths server sends malicious answers). This was fixed upstream after 5.6.2: https://git.strongswan.org/?p=strongswan.git;a=commit;h=ee8c25516a97a2c880a8033e1663628b6b05646a Applying this patch solved the issue. ** Affects: strongswan (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1837704 Title: strongswan-nm passes wrong DNS servers to NetworkManager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1837704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1775673] Re: ruby-ncurses is broken in ubuntu 18.04
The attached patch also links against libmenuw, which provides set_menu_win. ** Patch added: "Patch for ruby-ncurses to also link libmenuw" https://bugs.launchpad.net/ubuntu/+source/ruby-ncurses/+bug/1775673/+attachment/5232452/+files/ruby-ncurses-menu.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1775673 Title: ruby-ncurses is broken in ubuntu 18.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ruby-ncurses/+bug/1775673/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787763] Re: ruby-ncurses is broken: try ruby -e 'require "ncurses"'
*** This bug is a duplicate of bug 1775673 *** https://bugs.launchpad.net/bugs/1775673 The attached patch also links against libmenuw, which provides set_menu_win. ** Patch added: "Patch for ruby-ncurses to also link libmenuw" https://bugs.launchpad.net/ubuntu/+source/ruby-ncurses/+bug/1787763/+attachment/5230209/+files/ruby-ncurses-menu.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787763 Title: ruby-ncurses is broken: try ruby -e 'require "ncurses"' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ruby-ncurses/+bug/1787763/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1397932] Re: libpcap pcap-ng timestamp fraction calculation is wrong
A patch for the issue is now in upstream master. https://github.com/the-tcpdump- group/libpcap/commit/6a9c2cb19cb7eebdab8d2fa7a592d39130f8bf61.patch It would be nice to backport this for ubuntu 14.10. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to libpcap in Ubuntu. https://bugs.launchpad.net/bugs/1397932 Title: libpcap pcap-ng timestamp fraction calculation is wrong To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpcap/+bug/1397932/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1397932] Re: libpcap pcap-ng timestamp fraction calculation is wrong
A patch for the issue is now in upstream master. https://github.com/the-tcpdump- group/libpcap/commit/6a9c2cb19cb7eebdab8d2fa7a592d39130f8bf61.patch It would be nice to backport this for ubuntu 14.10. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1397932 Title: libpcap pcap-ng timestamp fraction calculation is wrong To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpcap/+bug/1397932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1397932] [NEW] libpcap pcap-ng timestamp fraction calculation is wrong
Public bug reported: Description of problem: Version-Release number of selected component (if applicable): lipcap 1.6.0 and above How reproducible: Open a pcap-ng file with nanosecod resolution. The timestamp fractions returned by pcap_next_ex() will be bigger than the requested fraction (i.e. a value 1.000.000 for microsecond resolution). Additional info: The problem is described in more detail in the libpcap github issue tracker: https://github.com/the-tcpdump-group/libpcap/issues/396 ** Affects: libpcap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to libpcap in Ubuntu. https://bugs.launchpad.net/bugs/1397932 Title: libpcap pcap-ng timestamp fraction calculation is wrong To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpcap/+bug/1397932/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1397932] [NEW] libpcap pcap-ng timestamp fraction calculation is wrong
Public bug reported: Description of problem: Version-Release number of selected component (if applicable): lipcap 1.6.0 and above How reproducible: Open a pcap-ng file with nanosecod resolution. The timestamp fractions returned by pcap_next_ex() will be bigger than the requested fraction (i.e. a value 1.000.000 for microsecond resolution). Additional info: The problem is described in more detail in the libpcap github issue tracker: https://github.com/the-tcpdump-group/libpcap/issues/396 ** Affects: libpcap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1397932 Title: libpcap pcap-ng timestamp fraction calculation is wrong To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpcap/+bug/1397932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 995165] Re: IPv4 connectivity broken after installing from ubuntu-12.04-alternate-amd64.iso
I think this is not a bug of network-manager but of the installer who creates /etc/network/interfaces ... This line should not be created in the first place. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/995165 Title: IPv4 connectivity broken after installing from ubuntu-12.04-alternate- amd64.iso To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/995165/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 713088] Re: [natty] plymouth boot screen corrupted with nouveau on Thinkpad T61
Removing vt.handoff=7 from kernel parameters worked for me too. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/713088 Title: [natty] plymouth boot screen corrupted with nouveau on Thinkpad T61 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/713088/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 924364] [NEW] muon does not show package name, version information
Public bug reported: I cannot see the name of the package or the version change (from, to) in the table. Version step is somehow visible via changelog, but package name is completely missing. Sometimes the descriptions are useless. Example for these descriptions (and only these are shown in the table): 1. scalable distributed version control system 2. fast, scalable, distributed revision control system 3. easy to use distributed version control system 4. distributed, interactive, smart revision control system These are the descriptions shown for four different DVCS. Now guess what is what ;) Found in update manager for KDE version 1.2.80, 1.2.95 Upstream bug report: https://bugs.kde.org/show_bug.cgi?id=288902 ** Affects: muon (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/924364 Title: muon does not show package name, version information To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/muon/+bug/924364/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 713088] Re: [natty] plymouth boot screen corrupted with nouveau on Thinkpad T61
I tried this one but it did not work for me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/713088 Title: [natty] plymouth boot screen corrupted with nouveau on Thinkpad T61 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/713088/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 782984] Re: strongswan-4.5.0 has known bug: causes charon to crash: killing ourself, received critical signal
Any progress here? Can someone help to get this into natty (4.5.1, 4.5.2 or the patch?) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/782984 Title: strongswan-4.5.0 has known bug: causes charon to crash: killing ourself, received critical signal -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 666975] [NEW] backport patch to allow cgroup mount in sysfs
Public bug reported: It would be nice to backport the following patch to the 2.6.35 series for an easier testing of systemd in ubuntu maverick.: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=676db4af043014e852f67ba0349dae0071bd11f3 This is the only kernel patch required to test systemd. Without this patch, a separate kernel has to be maintained (which is done atm by Andrew Edmunds). ** Affects: linux-meta (Ubuntu) Importance: Undecided Status: New ** Tags: cgroup systemd -- backport patch to allow cgroup mount in sysfs https://bugs.launchpad.net/bugs/666975 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574664] Re: strongswan's charon crashes shortly after authentication
I have the same problem. When starting /usr/lib/ipsec/starter --nofork --debug-all I get the following output : 10[DMN] thread 1005078288 received 11 dumping 12 stack frame addresses: /lib/libpthread.so.0 @ 0x7fbc48d21000 [0x7fbc48d308f0] - ??:0 /lib/libcrypto.so.0.9.8 @ 0x7fbc47021000 (EVP_CIPHER_CTX_set_key_length+0x7) [0x7fbc470f1c27] - ??:0 /usr/lib/ipsec/plugins/libstrongswan-openssl.so @ 0x7fbc44b8c000 [0x7fbc44b90352] - ??:0 /usr/lib/ipsec/plugins/libstrongswan-openssl.so @ 0x7fbc44b8c000 [0x7fbc44b90454] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc49399fb0] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc49396230] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc493ab986] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc493ac34d] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc4939f920] - ??:0 /usr/lib/ipsec/charon @ 0x7fbc49382000 [0x7fbc493a0dfe] - ??:0 When recompiling strongswan from git (tag 4.3.2) without any changes, I do not get any errors -- strongswan's charon crashes shortly after authentication https://bugs.launchpad.net/bugs/574664 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574664] Re: strongswan's charon crashes shortly after authentication
I recompiled the package like suggested in comment #2 (and an additional change to -O0 and reran the test: Here is the data: 0x75cf2c27 in EVP_CIPHER_CTX_set_key_length () from /lib/libcrypto.so.0.9.8 (gdb) bt #0 0x75cf2c27 in EVP_CIPHER_CTX_set_key_length () from /lib/libcrypto.so.0.9.8 #1 0x73789936 in crypt (this=0x78255110, data=..., iv=..., dst=0x7fffeea76970, enc=1) at openssl_crypter.c:136 #2 0x73789ab1 in encrypt (this=0x78255110, data=..., iv=..., dst=0x7fffeea76970) at openssl_crypter.c:159 #3 0x77fa93ce in encrypt (this=0x78256e90) at encoding/payloads/encryption_payload.c:366 #4 0x77fa2ae0 in encrypt_payloads (this=0x78252430, crypter=0x78255110, signer=0x78254cb0) at encoding/message.c:1085 #5 0x77fa2df9 in generate (this=0x78252430, crypter=0x78255110, signer=0x78254cb0, packet=0x782506b0) at encoding/message.c:1142 #6 0x77fbb888 in generate_message (this=0x7824fec0, message=0x78252430, packet=0x782506b0) at sa/ike_sa.c:900 #7 0x77fc409f in build_request (this=0x78250650) at sa/task_manager.c:446 #8 0x77fc4357 in process_response (this=0x78250650, message=0x782527e0) at sa/task_manager.c:517 #9 0x77fc5158 in process_message (this=0x78250650, msg=0x782527e0) at sa/task_manager.c:889 #10 0x77fbcce6 in process_message (this=0x7824fec0, message=0x782527e0) at sa/ike_sa.c:1302 #11 0x77fb27a6 in execute (this=0x78244e70) at processing/jobs/process_message_job.c:78 #12 0x77fb4094 in process_jobs (this=0x78207940) at processing/processor.c:123 #13 0x779299ca in start_thread (arg=value optimized out) at pthread_create.c:300 #14 0x771ff6fd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:112 (gdb) p/x *this $1 = {public = {crypter_interface = {encrypt = 0x73789a57, decrypt = 0x737899f6, get_block_size = 0x73789ab8, get_key_size = 0x73789acf, set_key = 0x73789ae1, destroy = 0x73789b27}}, key = {ptr = 0x782550b0, len = 0x10}, cipher = 0x75f8c2a0} -- strongswan's charon crashes shortly after authentication https://bugs.launchpad.net/bugs/574664 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574664] Re: strongswan's charon crashes shortly after authentication
I installed the debug packages for libssl0.9.8 and added some debugging code. EVP_CipherInit_ex fails (returns 0) ctx-cipher is null, which causes the segfault. (gdb) p *this-cipher $2 = {nid = 419, block_size = 16, key_len = 16, iv_len = 16, flags = 5122, init = 0x75cf47b0 aes_init_key, do_cipher = 0x75cf4c90 aes_128_cbc_cipher, cleanup = 0, ctx_size = 244, set_asn1_parameters = 0, get_asn1_parameters = 0, ctrl = 0, app_data = 0x0} My cpu supports aesni. This might cause the problem. I will have a look into the aesni patches in libssl0.9.8 My test with vanilla strongswan 4.3.2 was w/o openssl support, this may be the reason why it worked there -- strongswan's charon crashes shortly after authentication https://bugs.launchpad.net/bugs/574664 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574664] Re: strongswan's charon crashes shortly after authentication
I added some ssl debugging code and get these errors: 140737079842576:error:260B9092:engine routines:ENGINE_get_cipher:unimplemented cipher:tb_cipher.c:126: 140737079842576:error:0608C086:digital envelope routines:DO_EVP_ENC_ENGINE:initialization error:enc_min.c:172: -- strongswan's charon crashes shortly after authentication https://bugs.launchpad.net/bugs/574664 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574664] Re: strongswan's charon crashes shortly after authentication
updating openssl/libssl with packages from lucid-proposed (see bug #590639) fixes my crashes. -- strongswan's charon crashes shortly after authentication https://bugs.launchpad.net/bugs/574664 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 610094] [NEW] libpcap0.8 - packet names a bit outdated
Public bug reported: I think this issue is different from bug #311634, so I report it as a new bug. The packet containing libpcap 1.x is called libpcap0.8 - I see no point in using this name. The API (= dev package) might be the same, but the implementation is different and the so name also changed to libpcap.so.1.x. So, the packet names are misleading and should either be changed to libpcap1, libpcap1.0 or libpcap. ** Affects: libpcap (Ubuntu) Importance: Undecided Status: New -- libpcap0.8 - packet names a bit outdated https://bugs.launchpad.net/bugs/610094 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 523756] [NEW] make strongswan a container package
Public bug reported: Binary package hint: strongswan At the moment (karmic, lucid), there is the (not up-to-date) package strongswan on one side and all the strongswan-*/libstrongswan packages on the other side. I would like to make strongswan a container package which depends on the strongswan-* packages (maybe except the nm plugin, which could be a suggestion). ** Affects: strongswan (Ubuntu) Importance: Undecided Status: New -- make strongswan a container package https://bugs.launchpad.net/bugs/523756 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 523756] Re: make strongswan a container package
This is karmic-only, sorry -- make strongswan a container package https://bugs.launchpad.net/bugs/523756 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs