[Bug 1966125] Re: Suspend (to ram) fails after upgrade from 5.13.0-35-generic to 5.13.0-37-generic

2022-03-25 Thread Darren Spiteri
Same issue for me on an AMD system after booting into 5.13.0-37-generic.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1966125

Title:
  Suspend (to ram) fails after upgrade from 5.13.0-35-generic to
  5.13.0-37-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.13/+bug/1966125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1056626] [NEW] source distributes personal information

2012-09-26 Thread Darren Spiteri
Public bug reported:

It was reported that the file ubuntu/tests/smsbackups/k800i.smsbackup in
gammu source ships with personal information. I have informed the person
to contact upstream about the shipping file, but if we could remove this
as requested by the person, that would be swell

** Affects: gammu (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1056626

Title:
  source distributes personal information

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gammu/+bug/1056626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1053746] [NEW] Cloud-images all run cron jobs simultaneously

2012-09-20 Thread Darren Spiteri
Public bug reported:

Cloud-images all run their cron jobs simultaneously, causing a large
resource usage spike on the hosting physical infrastructure. It would be
great if cron run-parts were run with a randomized sleep to spread this
load.

** Affects: cron (Ubuntu)
 Importance: Undecided
 Assignee: Ben Howard (utlemming)
 Status: Confirmed


** Tags: cloud-images

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1053746

Title:
  Cloud-images all run cron jobs simultaneously

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cron/+bug/1053746/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 795355] Re: Intermittent SSL connection faults

2011-06-27 Thread Darren Spiteri
On 06/28/2011 04:02 AM, Andreas Hasenack wrote:
 Do any of you have compression (deflate) enabled server-side on these
 machines where the error occurs?


Deflate was disabled during inital testing on the oem-ibs site.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/795355

Title:
  Intermittent SSL connection faults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 795355] Re: Intermittent SSL connection faults

2011-06-15 Thread Darren Spiteri
Hi I'll try backporting the Natty openssl package and see how it goes.

Not using a wildcard cert, although I have tested with one, as well as
two seperate certs.

I have plenty of Apache debug logs, I'll distill some and upload when I
have a moment Here's an ssldump that accompanied the s_client output
above:

7 1  0.3464 (0.3464)  CS SSLv2 compatible client hello
  Version 3.1 
  cipher suites
  Unknown value 0x39  
  Unknown value 0x38  
  Unknown value 0x35  
  TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA  
  TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA  
  TLS_RSA_WITH_3DES_EDE_CBC_SHA  
  SSL2_CK_3DES  
  Unknown value 0x33  
  Unknown value 0x32  
  Unknown value 0x2f  
  SSL2_CK_RC2  
  TLS_RSA_WITH_RC4_128_SHA  
  TLS_RSA_WITH_RC4_128_MD5  
  SSL2_CK_RC4  
  TLS_DHE_RSA_WITH_DES_CBC_SHA  
  TLS_DHE_DSS_WITH_DES_CBC_SHA  
  TLS_RSA_WITH_DES_CBC_SHA  
  SSL2_CK_DES  
  TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA  
  TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA  
  TLS_RSA_EXPORT_WITH_DES40_CBC_SHA  
  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5  
  SSL2_CK_RC2_EXPORT40  
  TLS_RSA_EXPORT_WITH_RC4_40_MD5  
  SSL2_CK_RC4_EXPORT40  
  Unknown value 0xff  
7 2  0.3557 (0.0093)  SCV3.1(81)  Handshake
  ServerHello
Version 3.1 
random[32]=
  4d f1 5f 69 e8 65 f9 9e 0e 21 fd f8 6e 05 11 bb 
  45 6b b8 97 49 62 04 68 60 a2 4a 94 11 4a 81 84 
session_id[32]=
  c0 ca 5b 73 a3 9a 33 0a 65 30 8f 28 c2 db d1 d6 
  47 ff b6 0c bf 48 0f dd 1e 95 33 9b 56 8b 04 3e 
cipherSuite Unknown value 0x39
compressionMethod   NULL
7 3  0.3557 (0.)  SCV3.1(3382)  Handshake
  Certificate
7 4  0.3557 (0.)  SCV3.1(525)  Handshake
  ServerKeyExchange
7 5  0.3557 (0.)  SCV3.1(4)  Handshake
  ServerHelloDone
7 6  0.7052 (0.3494)  CSV3.1(2)  Alert
level   fatal
value   decrypt_error
70.7054 (0.0002)  SC  TCP FIN
70.7066 (0.0012)  CS  TCP RST

For comparison, here's the ssldump of the prior, successful connection:

6 1  0.3416 (0.3416)  CS SSLv2 compatible client hello
  Version 3.1 
  cipher suites
  Unknown value 0x39  
  Unknown value 0x38  
  Unknown value 0x35  
  TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA  
  TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA  
  TLS_RSA_WITH_3DES_EDE_CBC_SHA  
  SSL2_CK_3DES  
  Unknown value 0x33  
  Unknown value 0x32  
  Unknown value 0x2f  
  SSL2_CK_RC2  
  TLS_RSA_WITH_RC4_128_SHA  
  TLS_RSA_WITH_RC4_128_MD5  
  SSL2_CK_RC4  
  TLS_DHE_RSA_WITH_DES_CBC_SHA  
  TLS_DHE_DSS_WITH_DES_CBC_SHA  
  TLS_RSA_WITH_DES_CBC_SHA  
  SSL2_CK_DES  
  TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA  
  TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA  
  TLS_RSA_EXPORT_WITH_DES40_CBC_SHA  
  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5  
  SSL2_CK_RC2_EXPORT40  
  TLS_RSA_EXPORT_WITH_RC4_40_MD5  
  SSL2_CK_RC4_EXPORT40  
  Unknown value 0xff  
6 2  0.3512 (0.0095)  SCV3.1(81)  Handshake
  ServerHello
Version 3.1 
random[32]=
  4d f1 5f 5c 41 3e 94 a9 68 9d 48 73 90 29 b2 08 
  62 b4 b6 6a 6b 98 ac 81 70 7d 44 a7 0c 6d fe ef 
session_id[32]=
  dd 42 bf a7 3b 46 a0 eb 38 19 a0 bf 56 c1 22 17 
  1c aa b4 0c 97 79 ea b7 90 d1 78 f8 85 7c 00 c0 
cipherSuite Unknown value 0x39
compressionMethod   NULL
6 3  0.3512 (0.)  SCV3.1(3382)  Handshake
  Certificate
6 4  0.3512 (0.)  SCV3.1(525)  Handshake
  ServerKeyExchange
6 5  0.3512 (0.)  SCV3.1(4)  Handshake
  ServerHelloDone
6 6  0.7370 (0.3858)  CSV3.1(134)  Handshake
  ClientKeyExchange
6 7  0.7370 (0.)  CSV3.1(1)  ChangeCipherSpec
6 8  0.7370 (0.)  CSV3.1(48)  Handshake
6 9  0.7403 (0.0032)  SCV3.1(1)  ChangeCipherSpec
6 10 0.7403 (0.)  SCV3.1(48)  Handshake
6 11 10.9898 (10.2495)  SCV3.1(32)  Alert
610.9899 (0.)  SC  TCP FIN
6 12 11.3304 (0.3404)  CSV3.1(32)  Alert
611.3314 (0.0010)  CS  TCP FIN

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/795355

Title:
  Intermittent SSL connection faults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 795355] [NEW] Intermittent SSL connection faults

2011-06-09 Thread Darren Spiteri
Public bug reported:

Binary package hint: openssl

Reported intermittent SSL connection issue on some apache mod_ssl
vhosts.

Platform:  Ubuntu 10.04.2 LTS
Tested: Apache2-2.2.14-5ubuntu8.4 and backported 2.2.17-1ubuntu1 from Natty

Firefox client will intermittently report:
Secure Connection Failed
An error occurred during a connection to oem-ibs.canonical.com.
Peer's certificate has an invalid signature.
(Error code: sec_error_bad_signature)

Condition will clear on reload.

Occassionally the server will alternately serve a good page followed by
an SSL error until Apache is restarted. I am unable to reproduce the
condition on demand, but have output from when the fault occurs. When
the fault condition occurs it can be reproduced with any SSL client.

The fault presents on multiple distinct servers.

Initially suspected to be a bug with mod_ssl
https://issues.apache.org/bugzilla/show_bug.cgi?id=46952, backport has
eliminated this as has anecdotal reports of this same error presented
from Dovecot.

Tested with SSL certs from different CAs.

Example:

$ openssl s_client -connect oem-ibs.canonical.com:443
CONNECTED(0003)
depth=2 /C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 
thawte, Inc. - For authorized use only/CN=thawte Primary Root CA
verify error:num=20:unable to get local issuer certificate
verify return:0
14563:error:0407006A:rsa routines:RSA_padding_check_PKCS1_type_1:block type is 
not 01:rsa_pk1.c:100:
14563:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check 
failed:rsa_eay.c:697:
14563:error:1408D07B:SSL routines:SSL3_GET_KEY_EXCHANGE:bad 
signature:s3_clnt.c:1449:

** Affects: openssl (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/795355

Title:
  Intermittent SSL connection faults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 795355] Re: Intermittent SSL connection faults

2011-06-09 Thread Darren Spiteri
And Lucid openssl 0.9.8k-7ubuntu8.6

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/795355

Title:
  Intermittent SSL connection faults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 326442] Re: Realtime ops hard lockup

2010-03-14 Thread Darren Spiteri
Hi I can confirm that this bug doesn't seem to be reproducible any
more. Using kernel  2.6.24-26-rt.

On Sun, Mar 14, 2010 at 12:54 PM, Jeremy Foshee
jeremy.fos...@canonical.com wrote:
 Hi Darren,

 This bug was reported a while ago and there hasn't been any activity in
 it recently. We were wondering if this is still an issue? Can you try
 with the latest development release of Ubuntu?  ISO CD images are
 available from http://cdimage.ubuntu.com/releases/lucid.

 If it remains an issue, could you run the following command from a
 Terminal (Applications-Accessories-Terminal).  It will automatically
 gather and attach updated debug information to this report.

 apport-collect -p linux 326442

 Also, if you could test the latest upstream kernel available that would
 be great.  It will allow additional upstream developers to examine the
 issue.  Refer to https://wiki.ubuntu.com/KernelMainlineBuilds .  Once
 you've tested the upstream kernel, please remove the 'needs-upstream-
 testing' tag.  This can be done by clicking on the yellow pencil icon
 next to the tag located at the bottom of the bug description and
 deleting the 'needs-upstream-testing' text.  Please let us know your
 results.

 Thanks in advance.

 [This is an automated message.  Apologies if it has reached you
 inappropriately; please just reply to this message indicating so.]


 ** Tags added: needs-kernel-logs

 ** Tags added: needs-upstream-testing

 ** Tags added: kj-triage

 ** Changed in: linux (Ubuntu)
       Status: New = Incomplete

 --
 Realtime ops hard lockup
 https://bugs.launchpad.net/bugs/326442
 You received this bug notification because you are a direct subscriber
 of the bug.

 Status in “linux” package in Ubuntu: Incomplete

 Bug description:
 Binary package hint: linux-image-2.6.24-23-rt

 Using Jack with realtime enabled causes hard lockups on 
 linux-image-2.6.24-23-rt, no problem with linux-image-2.6.24-22-rt or any 
 other previous Hardy kernel with exactly the same configuration. Possibly 
 attributable to:

 * rt: Updated PREEMPT_RT support to rt21
    - LP: #302138

 Configuration is Jackd - freebob with M-Audio firewire solo, Ti firewire 
 interface.

 Description:    Ubuntu 8.04.2
 Release:        8.04
 32bit install.

 Play and record will intermittently lockup requiring power off to recover. No 
 ping or any other sign of life. Same operations run indefinately on earlier 
 kernels, reproducable.

 To unsubscribe from this bug, go to:
 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/326442/+subscribe


-- 
Realtime ops hard lockup
https://bugs.launchpad.net/bugs/326442
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 326442] [NEW] Realtime ops hard lockup

2009-02-06 Thread Darren Spiteri
Public bug reported:

Binary package hint: linux-image-2.6.24-23-rt

Using Jack with realtime enabled causes hard lockups on linux-
image-2.6.24-23-rt, no problem with linux-image-2.6.24-22-rt or any
other previous Hardy kernel with exactly the same configuration.
Possibly attributable to:

* rt: Updated PREEMPT_RT support to rt21
- LP: #302138

Configuration is Jackd - freebob with M-Audio firewire solo, Ti firewire
interface.

Description:Ubuntu 8.04.2
Release:8.04
32bit install.

Play and record will intermittently lockup requiring power off to
recover. No ping or any other sign of life. Same operations run
indefinately on earlier kernels, reproducable.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
Realtime ops hard lockup
https://bugs.launchpad.net/bugs/326442
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 297123] Re: Incorrect (?) quoting means ekiga/libopal can't connect to some sip services

2009-01-14 Thread Darren Spiteri
This bug affects Hardy LTS as well. I applied this patch and Ekiga now
works fine with Nodephone.

-- 
Incorrect (?) quoting means ekiga/libopal can't connect to some sip services
https://bugs.launchpad.net/bugs/297123
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs