[Bug 1321257] Re: The neutron-plugin-openvswitch-agent package no longer depends on neutron-plugin-openvswitch

2014-10-22 Thread Adam Nelson
I've updated the title to reflect the requested name change (otherwise
this ticket can be closed).  I agree with the name change as this is
confusing and anyway, ml2 supports plugins, it isn't a plugin itself.

** Summary changed:

- The neutron-plugin-openvswitch-agent package no longer depends on 
neutron-plugin-openvswitch
+ Rename neutron-plugin-ml2 to neutron-ml2 to avoid confusion

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1321257

Title:
  Rename neutron-plugin-ml2 to neutron-ml2 to avoid confusion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/neutron/+bug/1321257/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384109] [NEW] Mechanism driver 'l2population' failed in update_port_postcommit

2014-10-22 Thread James Page
Public bug reported:

OpenStack Juno, Ubuntu 14.04, 3 x neutron-server's with 32 API workers
each, rally/boot-and-delete with a concurrency level of 150:

2014-10-21 16:37:04.615 16312 ERROR neutron.plugins.ml2.managers 
[req-c4cdefd5-b2d9-46fa-a031-bddd03d981e6 None] Mechanism driver 'l2population' 
failed in update_port_postcommit
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers Traceback 
(most recent call last):
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/managers.py, line 291, 
in _call_on_drivers
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers 
getattr(driver.obj, method_name)(context)
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/drivers/l2pop/mech_driver.py,
 line 135, in update_port_postcommit
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers 
self._update_port_up(context)
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/drivers/l2pop/mech_driver.py,
 line 228, in _update_port_up
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers 
agent_ports += self._get_port_fdb_entries(binding.port)
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/drivers/l2pop/mech_driver.py,
 line 45, in _get_port_fdb_entries
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers 
ip['ip_address']] for ip in port['fixed_ips']]
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers TypeError: 
'NoneType' object has no attribute '__getitem__'
2014-10-21 16:37:04.615 16312 TRACE neutron.plugins.ml2.managers
2014-10-21 16:37:04.618 16312 ERROR oslo.messaging.rpc.dispatcher 
[req-c4cdefd5-b2d9-46fa-a031-bddd03d981e6 ] Exception during message handling: 
update_port_postcommit failed.
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher Traceback 
(most recent call last):
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 134, 
in _dispatch_and_reply
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher 
incoming.message))
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 177, 
in _dispatch
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher return 
self._do_dispatch(endpoint, method, ctxt, args)
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 123, 
in _do_dispatch
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher result = 
getattr(endpoint, method)(ctxt, **new_args)
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/rpc.py, line 161, in 
update_device_up
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher host)
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/plugin.py, line 1136, in 
update_port_status
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher 
self.mechanism_manager.update_port_postcommit(mech_context)
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/managers.py, line 527, 
in update_port_postcommit
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher 
continue_on_failure=True)
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/managers.py, line 302, 
in _call_on_drivers
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher 
method=method_name
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher 
MechanismDriverError: update_port_postcommit failed.
2014-10-21 16:37:04.618 16312 TRACE oslo.messaging.rpc.dispatcher
2014-10-21 16:37:04.620 16312 ERROR oslo.messaging._drivers.common 
[req-c4cdefd5-b2d9-46fa-a031-bddd03d981e6 ] Returning exception 
update_port_postcommit failed. to caller
2014-10-21 16:37:04.621 16312 ERROR oslo.messaging._drivers.common 
[req-c4cdefd5-b2d9-46fa-a031-bddd03d981e6 ] ['Traceback (most recent call 
last):\n', '  File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 134, 
in _dispatch_and_reply\nincoming.message))\n', '  File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 177, 
in _dispatch\nreturn self._do_dispatch(endpoint, method, ctxt, args)\n', '  
File /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 
123, in _do_dispatch\nresult = getattr(endpoint, method)(ctxt, 

[Bug 1384108] Re: Exception during message handling: QueuePool limit of size 10 overflow 20 reached, connection timed out, timeout 10

2014-10-22 Thread James Page
Environment was being exercises using the boot-and-delete task/rally

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1384108

Title:
  Exception during message handling: QueuePool limit of size 10 overflow
  20 reached, connection timed out, timeout 10

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1384108/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384108] [NEW] Exception during message handling: QueuePool limit of size 10 overflow 20 reached, connection timed out, timeout 10

2014-10-22 Thread James Page
Public bug reported:

OpenStack Juno release, Ubuntu 14.04 using Cloud Archive; under
relatively high instance creation concurrency (150), neutron starts to
throw some errors:

2014-10-21 16:40:44.124 16312 ERROR oslo.messaging._drivers.common 
[req-8e3ebbdb-bc01-439d-af86-655176f206a6 ] ['Traceback (most recent call 
last):\n', '  File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 134, 
in _dispatch_and_reply\nincoming.message))\n', '  File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 177, 
in _dispatch\nreturn self._do_dispatch(endpoint, method, ctxt, args)\n', '  
File /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 
123, in _do_dispatch\nresult = getattr(endpoint, method)(ctxt, 
**new_args)\n', '  File 
/usr/lib/python2.7/dist-packages/neutron/api/rpc/handlers/securitygroups_rpc.py,
 line 74, in security_group_info_for_devices\nports = 
self._get_devices_info(devices_info)\n', '  File 
/usr/lib/python2.7/dist-packages/neutron/api/rpc/handlers/securitygroups_rpc.py,
 line 41, in _get_devices_info\nport = 
self.plugin.get_port_from_device(device)\n', '  File /us
 r/lib/python2.7/dist-packages/neutron/plugins/ml2/plugin.py, line 1161, in 
get_port_from_device\nport = db.get_port_and_sgs(port_id)\n', '  File 
/usr/lib/python2.7/dist-packages/neutron/plugins/ml2/db.py, line 222, in 
get_port_and_sgs\nport_and_sgs = query.all()\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2300, in all\n 
   return list(self)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2412, in 
__iter__\nreturn self._execute_and_instances(context)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2425, in 
_execute_and_instances\nclose_with_result=True)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2416, in 
_connection_from_session\n**kw)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/session.py, line 854, in 
connection\nclose_with_result=close_with_result)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/sessi
 on.py, line 858, in _connection_for_bind\nreturn 
self.transaction._connection_for_bind(engine)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/orm/session.py, line 322, in 
_connection_for_bind\nconn = bind.contextual_connect()\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/engine/base.py, line 1799, in 
contextual_connect\nself.pool.connect(),\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 338, in connect\n   
 return _ConnectionFairy._checkout(self)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 641, in _checkout\n 
   fairy = _ConnectionRecord.checkout(pool)\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 440, in checkout\n  
  rec = pool._do_get()\n', '  File 
/usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 957, in _do_get\n   
 (self.size(), self.overflow(), self._timeout))\n', 'TimeoutError: QueuePool 
limit of size 10 overflow 20 reached, connection timed out, timeo
 ut 10\n']
2014-10-21 16:40:44.126 16312 ERROR oslo.messaging.rpc.dispatcher 
[req-ea96dc85-dc0f-4ddc-a827-dbc25ab32a03 ] Exception during message handling: 
QueuePool limit of size 10 overflow 20 reached, connection timed out, timeout 10
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher Traceback 
(most recent call last):
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 134, 
in _dispatch_and_reply
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher 
incoming.message))
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 177, 
in _dispatch
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher return 
self._do_dispatch(endpoint, method, ctxt, args)
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line 123, 
in _do_dispatch
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher result = 
getattr(endpoint, method)(ctxt, **new_args)
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/db/agents_db.py, line 237, in 
report_state
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher 
self.plugin.create_or_update_agent(context, agent_state)
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File 
/usr/lib/python2.7/dist-packages/neutron/db/agents_db.py, line 197, in 
create_or_update_agent
2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher return 
self._create_or_update_agent(context, agent)
2014-10-21 16:40:44.126 16312 TRACE 

[Bug 1381537] Re: Dovecot version in precise too old to switch off SSLv3 protocol for poodle fix

2014-10-22 Thread Marius Rieder
So basicaly the following commit has to be backported to the 2.0
Version. http://hg.dovecot.org/dovecot-2.1/rev/406a1d52390b

I created a patch for 2.0.19 and tried it on our staging systems. This
worked quite well for ous.

** Patch added: Backport of 406a1d52390b
   
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1381537/+attachment/4241680/+files/ssl_protocols.patch

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to dovecot in Ubuntu.
https://bugs.launchpad.net/bugs/1381537

Title:
  Dovecot version in precise  too old to switch off SSLv3 protocol for
  poodle fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1381537/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1384108] [NEW] Exception during message handling: QueuePool limit of size 10 overflow 20 reached, connection timed out, timeout 10

2014-10-22 Thread Kevin Benton
Can you try setting the max connections for SQL to the number of API
workers?
http://docs.openstack.org/trunk/config-reference/content/networking-options-db.html
On Oct 22, 2014 4:31 AM, James Page james.p...@ubuntu.com wrote:

 Public bug reported:

 OpenStack Juno release, Ubuntu 14.04 using Cloud Archive; under
 relatively high instance creation concurrency (150), neutron starts to
 throw some errors:

 2014-10-21 16:40:44.124 16312 ERROR oslo.messaging._drivers.common
 [req-8e3ebbdb-bc01-439d-af86-655176f206a6 ] ['Traceback (most recent call
 last):\n', '  File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 134, in _dispatch_and_reply\nincoming.message))\n', '  File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 177, in _dispatch\nreturn self._do_dispatch(endpoint, method, ctxt,
 args)\n', '  File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 123, in _do_dispatch\nresult = getattr(endpoint, method)(ctxt,
 **new_args)\n', '  File
 /usr/lib/python2.7/dist-packages/neutron/api/rpc/handlers/securitygroups_rpc.py,
 line 74, in security_group_info_for_devices\nports =
 self._get_devices_info(devices_info)\n', '  File
 /usr/lib/python2.7/dist-packages/neutron/api/rpc/handlers/securitygroups_rpc.py,
 line 41, in _get_devices_info\nport =
 self.plugin.get_port_from_device(device)\n', '  File
 /usr/lib/python2.7/dist-packages/neutron/plugins/ml2/plugin.py, line
 1161, in get_port_from_device\nport = db.get_port_and_sgs(port_id)\n',
 '  File /usr/lib/python2.7/dist-packages/neutron/plugins/ml2/db.py, line
 222, in get_port_and_sgs\nport_and_sgs = query.all()\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2300, in
 all\nreturn list(self)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2412, in
 __iter__\nreturn self._execute_and_instances(context)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2425, in
 _execute_and_instances\nclose_with_result=True)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/query.py, line 2416, in
 _connection_from_session\n**kw)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/session.py, line 854, in
 connection\nclose_with_result=close_with_result)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/session.py, line 858, in
 _connection_for_bind\nreturn
 self.transaction._connection_for_bind(engine)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/orm/session.py, line 322, in
 _connection_for_bind\nconn = bind.contextual_connect()\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/engine/base.py, line 1799, in
 contextual_connect\nself.pool.connect(),\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 338, in
 connect\nreturn _ConnectionFairy._checkout(self)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 641, in
 _checkout\nfairy = _ConnectionRecord.checkout(pool)\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 440, in
 checkout\nrec = pool._do_get()\n', '  File
 /usr/lib/python2.7/dist-packages/sqlalchemy/pool.py, line 957, in
 _do_get\n(self.size(), self.overflow(), self._timeout))\n',
 'TimeoutError: QueuePool limit of size 10 overflow 20 reached, connection
 timed out, timeout 10\n']
 2014-10-21 16:40:44.126 16312 ERROR oslo.messaging.rpc.dispatcher
 [req-ea96dc85-dc0f-4ddc-a827-dbc25ab32a03 ] Exception during message
 handling: QueuePool limit of size 10 overflow 20 reached, connection timed
 out, timeout 10
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher
 Traceback (most recent call last):
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 134, in _dispatch_and_reply
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher
  incoming.message))
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 177, in _dispatch
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher
  return self._do_dispatch(endpoint, method, ctxt, args)
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File
 /usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py, line
 123, in _do_dispatch
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher
  result = getattr(endpoint, method)(ctxt, **new_args)
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File
 /usr/lib/python2.7/dist-packages/neutron/db/agents_db.py, line 237, in
 report_state
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher
  self.plugin.create_or_update_agent(context, agent_state)
 2014-10-21 16:40:44.126 16312 TRACE oslo.messaging.rpc.dispatcher   File
 

[Bug 1384122] [NEW] SNMPD defaultmonitors not working

2014-10-22 Thread vavoem
Public bug reported:

i run ubuntu 14.04 LTS server 64 Bit

snmpd:
  Installed: 5.7.2~dfsg-8.1ubuntu3
  Candidate: 5.7.2~dfsg-8.1ubuntu3
  Version table:
 *** 5.7.2~dfsg-8.1ubuntu3 0
500 http://us.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages
100 /var/lib/dpkg/status


I have snmpd installed and can do a snmpwalk to read out all kinds of data
but it just won't send a trap whenever i monitor something with the 
defaultmonitors ie. 

proc apache2

in /var/log/syslog  i get the following error messages

snmpd[1225]: /etc/snmp/snmpd.conf: line 179: Warning: Unknown token: 
defaultMonitors.
snmpd[1225]: /etc/snmp/snmpd.conf: line 180: Warning: Unknown token: 
linkUpDownNotifications.

this is similair to debian problem

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746399

please help!

** Affects: net-snmp (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in Ubuntu.
https://bugs.launchpad.net/bugs/1384122

Title:
  SNMPD defaultmonitors not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1384122/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Michael Hudson-Doyle
The shell cannot work without js.  It's a bug that binary is included in
the package.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1274947] Re: juju lxc instances deployed via MAAS don't have resolvable hostnames

2014-10-22 Thread Christian Reis
** Changed in: maas
Milestone: None = next

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1274947

Title:
  juju lxc instances deployed via MAAS don't have resolvable hostnames

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1274947/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Andrew Cloke
Michael, many thanks for your comment.
Could you confirm that we should be using juju-mongodb 
(https://launchpad.net/ubuntu/+source/juju-mongodb) on ARM64 for the time 
being? ISTR that juju-mongodb has omitted the libv8 engine, and associated 
functionality.
Thanks again, Andy.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Blueprint servercloud-u-server-core] General server work for Utopic

2014-10-22 Thread Robie Basak
Blueprint changed by Robie Basak:

Work items changed:
  Work items for ubuntu-14.06:
  [serge-hallyn] convert libvirt to cgmanager (4d): DONE
  [racb] Early cycle merge report: POSTPONED
  [serge-hallyn] merge qemu: DONE
  
  Work items for ubuntu-14.07:
  [serge-hallyn] cgmanager package into debian: DONE
  [serge-hallyn] systemd-shim integration for cgmanager: DONE
  [jamespage] (with raharper) docker 1.0 in 14.04: INPROGRESS
  
  Work items for ubuntu-14.08:
- [racb] Late cycle merge report: TODO
+ [racb] Late cycle merge report: POSTPONED
  [smoser] add simplestreams data to ubuntu core images: TODO
  [serge-hallyn] triage qemu bugs: DONE
  [serge-hallyn] go over high prio qemu bugs: DONE
  [racb] bcache in universe: DONE
  [kick-d] validate bcache in archive: DONE
  [kick-d] write up and publish bcache test plan: TODO
  [racb] add scribe (https://github.com/facebook/scribe) to universe: POSTPONED
  [racb] add meteor (https://github.com/meteor/meteor) to universe: POSTPONED
  
  Work items for ubuntu-14.09:
  [smoser] write documentation on the process of how to do image customization 
in simplestreams: TODO
  [serge-hallyn] triage libvirt bugs: DONE
  [serge-hallyn] go over high prio libvirt bugs: DONE
  
  Work items for ubuntu-14.10:
  [serge-hallyn] discuss cgmanager features through systemd/cgfs (plumbers): 
POSTPONED
  determine ssd caching solution (bcache is it): DONE
  investigate support of ruby for puppet: POSTPONED

-- 
General server work for Utopic
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-u-server-core

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Robie Basak
You shouldn't be using juju-mongodb for anything but Juju. AIUI, the
security team don't support it for security updates for any other
purpose.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Robie Basak
Although that was the plan, it occurs to me that juju-mongodb never
entered main. So perhaps I am mistaken.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384108] Re: Exception during message handling: QueuePool limit of size 10 overflow 20 reached, connection timed out, timeout 10

2014-10-22 Thread James Page
I've bumped the max connections to 4 x the worker configuration just to
be on the safe side.

Retesting now to see if this helps.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1384108

Title:
  Exception during message handling: QueuePool limit of size 10 overflow
  20 reached, connection timed out, timeout 10

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1384108/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384229] [NEW] When I turn on the laptop after suspend, it displays the boot loader instead of the operating system.

2014-10-22 Thread Михаил
Public bug reported:

When I turn on the laptop after suspend, it displays the boot loader
instead of the operating system. This bug has been detected in Ubuntu
Precise Pangolin (the first version which I installed) and it is not
fixed still.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: pm-utils 1.4.1-13ubuntu0.1
ProcVersionSignature: Ubuntu 3.13.0-35.62-generic 3.13.11.6
Uname: Linux 3.13.0-35-generic i686
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: i386
CurrentDesktop: Unity
Date: Wed Oct 22 16:07:40 2014
InstallationDate: Installed on 2014-03-25 (210 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha i386 (20140323)
PackageArchitecture: all
SourcePackage: pm-utils
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: pm-utils (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-bug failed i386 suspend trusty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pm-utils in Ubuntu.
https://bugs.launchpad.net/bugs/1384229

Title:
  When I turn on the laptop after suspend, it displays the boot loader
  instead of the operating system.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pm-utils/+bug/1384229/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384229] Re: When I turn on the laptop after suspend, it displays the boot loader instead of the operating system.

2014-10-22 Thread Михаил
** Description changed:

  When I turn on the laptop after suspend, it displays the boot loader
  instead of the operating system. This bug has been detected in Ubuntu
  Precise Pangolin (the first version which I installed) and it is not
- fixed still.
+ fixed still. Sony Vaio vgn-sr19vrn
  
  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: pm-utils 1.4.1-13ubuntu0.1
  ProcVersionSignature: Ubuntu 3.13.0-35.62-generic 3.13.11.6
  Uname: Linux 3.13.0-35-generic i686
  ApportVersion: 2.14.1-0ubuntu3.5
  Architecture: i386
  CurrentDesktop: Unity
  Date: Wed Oct 22 16:07:40 2014
  InstallationDate: Installed on 2014-03-25 (210 days ago)
  InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Alpha i386 (20140323)
  PackageArchitecture: all
  SourcePackage: pm-utils
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pm-utils in Ubuntu.
https://bugs.launchpad.net/bugs/1384229

Title:
  When I turn on the laptop after suspend, it displays the boot loader
  instead of the operating system.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pm-utils/+bug/1384229/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Andrew Cloke
Thanks Robie, so for ARM64 platforms we should be using MongoDb, but just 
avoiding the shell and any scripting functions (in order to avoid invoking 
libv8). Is that correct?
Thanks again, Andy.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382632] Re: Insecure key file permissions

2014-10-22 Thread Ryan Beisner
** Tags added: openstack

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1382632

Title:
  Insecure key file permissions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1382632/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384232] Re: Certificate hostname verification fix

2014-10-22 Thread Seth Arnold
Do you know if a CVE has been assigned for this issue?

Thanks

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to exim4 in Ubuntu.
https://bugs.launchpad.net/bugs/1384232

Title:
  Certificate hostname verification fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exim4/+bug/1384232/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1373261] Re: pserv.yaml rewrite breaks when MAAS URL uses IPv6 address

2014-10-22 Thread Christian Reis
The problem is that I need to leave them triaged or I miss them in the
milestone list.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1373261

Title:
  pserv.yaml rewrite breaks when MAAS URL uses IPv6 address

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1373261/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1332120] Re: panic error while backup mailboxes with doveadm backup

2014-10-22 Thread Lars
Hi there!

Is there someone reading this report?
The fix is included already.
It is a server critical bug, because it influences the imap backup 
functionality.

Please give it a chance.

I'm manually repairing the imap backup every time a user deletes an imap
folder.

Please. It is the LTS server release!

Thanks
Lars

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to dovecot in Ubuntu.
https://bugs.launchpad.net/bugs/1332120

Title:
  panic error while backup mailboxes with doveadm backup

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dovecot/+bug/1332120/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1361357] Re: metadata service performance regression ~8x

2014-10-22 Thread Maru Newby
** Changed in: neutron
 Assignee: Oleg Bondarev (obondarev) = (unassigned)

** Changed in: neutron
Milestone: kilo-1 = None

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1361357

Title:
  metadata service performance regression ~8x

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1361357/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1361357] Re: metadata service performance regression ~8x

2014-10-22 Thread Maru Newby
As per a thread on the mailing list [1], this issue was already fixed
[2] in Neutron in Juno and backported to Icehouse, so I'm going to
remove Neutron as an affected project.

1: http://lists.openstack.org/pipermail/openstack-dev/2014-October/048916.html
2: https://bugs.launchpad.net/neutron/+bug/1276440

** No longer affects: neutron

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1361357

Title:
  metadata service performance regression ~8x

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1361357/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384279] [NEW] Enhancement Request Version and program data About

2014-10-22 Thread Douglas Sikora
Public bug reported:

Request adding version and program information in the web interface.

Foreman has a fantastic approach to this, which we should just
mimic/copy.  Reference the foreman about page and note system
information in the bottom right.

** Affects: maas (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1384279

Title:
  Enhancement Request Version and program data About

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1384279/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381383] Re: Vm destroyed when created with virsh create without --autodestroy

2014-10-22 Thread Serge Hallyn
I'm marking this low priority per guidelines since there is a workaround
(use virsh define).  However it most certainly looks like a bug,
especially since --autodestroy is listed as an option in the help
usage.

** Summary changed:

- Vm destroyed when created virsh create without --autodestroy
+ Vm destroyed when created with virsh create without --autodestroy

** Changed in: libvirt (Ubuntu)
   Importance: Undecided = Low

** Changed in: libvirt (Ubuntu)
   Status: Invalid = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/1381383

Title:
  Vm destroyed when created with virsh create without --autodestroy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1381383/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1363729] Re: pam_mount Broken with util-linux 2.25

2014-10-22 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: libpam-mount (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libpam-mount in Ubuntu.
https://bugs.launchpad.net/bugs/1363729

Title:
  pam_mount Broken with util-linux 2.25

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpam-mount/+bug/1363729/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1039420] Re: NTP security vulnerability because not using authentication by default

2014-10-22 Thread Marc Deslauriers
Unfortunately, ntp autokey is broken and insecure, it can't be used to
provide any additional security.

http://zero-entropy.de/autokey_analysis.pdf

The only solution for the moment is for system administrators to set up
their own symmetric keys with their own ntp server.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1039420

Title:
  NTP security vulnerability because not using authentication by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1039420/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Attachment added: Precise debdiff of working patch
   
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+attachment/4241831/+files/precise-debdiff.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Thomas Ward
In discussion with mdeslaur on IRC, I'm attaching DebDiffs for Ubuntu in
the off chance the release team wishes to push these changes.

A few extra details as to why this is extremely relevant to being pushed
and updated:  A lot of newbie users that we see in the NGINX IRC channel
for support end up using the default configuration file(s) as a
template/law for their sites, and we end up seeing them just uncomment
the SSL portion and use it.  That opens them up to the POODLE
vulnerability.

Upstream, in Debian, this was revised per POODLE so newbies wouldn't be
exposing themselves to vulnerability, hence the rationale for this
perhaps being pushed/updated.  Unfortunately, all versions of nginx
(including Lucid, which is being ignored intentionally) are impacted by
POODLE and SSLv3, so it's better to just remove the SSLv3 protocol from
the ssl_protocols line, mainly to prevent newbies from making their
systems open to attack.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Thomas Ward
** Patch added: Precise Debdiff for Ubuntu
   
https://bugs.launchpad.net/nginx/+bug/1383379/+attachment/4241830/+files/nginx_sslv3_remove_debdiff_precise.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Raghuram Kota
I believe the only *ARM64* MongoDB version that is reasonably expected
to work (i.e. without server side scripting and at demo grade quality)
is out  of a PPA : https://launchpad.net/~mongodb-
arm64/+archive/ubuntu/ppa .

The mongoDB charm was recently enhanced (By Charles Butler)  to  add an
option  to speficy this PPA when installing MongoDB. So I thinkany ARM64
testing  should be focused on this PPA.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Attachment added: Utopic debdiff of working patch
   
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+attachment/4241834/+files/utopic-debdiff.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Attachment added: Trusty debdiff of working patch
   
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+attachment/4241833/+files/trusty-debdiff.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Thomas Ward
NOTE: I didn't know where to target this for Utopic, so I just targeted
it to 'utopic'.  Please change that if it is not valid.

** Patch added: Utopic Debdiff for Ubuntu
   
https://bugs.launchpad.net/nginx/+bug/1383379/+attachment/4241835/+files/nginx_sslv3_remove_debdiff_utopic.debdiff

** Changed in: nginx
   Status: Confirmed = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Thomas Ward
** Patch added: Trusty Debdiff for Ubuntu
   
https://bugs.launchpad.net/nginx/+bug/1383379/+attachment/4241832/+files/nginx_sslv3_remove_debdiff_trusty.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384327] [NEW] lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Simon Déziel
Public bug reported:

Here is the problem in more details:

 # Clearing the env
 $ printf 'echo $PATH\n' | sudo lxc-attach --clear-env -n p1
 /bin:/usr/bin

 # Keeping the env
 $ printf 'echo $PATH\n' | sudo lxc-attach --keep-env -n p1
 /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

While keeping the env seems like a good workaround it cause other
undesirable effects like preserving $HOME that doesn't (always) exist in
the container.

Additional information:

$ apt-cache policy lxc
lxc:
  Installed: 1.0.6-0ubuntu0.1
  Candidate: 1.0.6-0ubuntu0.1
  Version table:
 *** 1.0.6-0ubuntu0.1 0
500 http://archive.ubuntu.com/ubuntu/ trusty-proposed/main amd64 
Packages
100 /var/lib/dpkg/status
 1.0.5-0ubuntu0.1 0
500 http://archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 Packages
 1.0.3-0ubuntu3 0
500 http://archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages

Both host and container are:

$ lsb_release -rd
Description:Ubuntu 14.04.1 LTS
Release:14.04

** Affects: lxc (Ubuntu)
 Importance: Undecided
 Status: New

** Summary changed:

- lxc-attach --clear-env resulted in a limited $PATH in the container
+ lxc-attach --clear-env results in a limited $PATH in the container

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Ubuntu Foundations Team Bug Bot
The attachment Precise Debdiff for Ubuntu seems to be a debdiff.  The
ubuntu-sponsors team has been subscribed to the bug report so that they
can review and hopefully sponsor the debdiff.  If the attachment isn't a
patch, please remove the patch flag from the attachment, remove the
patch tag, and if you are member of the ~ubuntu-sponsors, unsubscribe
the team.

[This is an automated message performed by a Launchpad user owned by
~brian-murray, for any issue please contact him.]

** Tags added: patch

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1378441] Re: add GCE support for cloud-init on 12.04

2014-10-22 Thread Ben Howard
Marking this as verification done. I've confirmed that this works on
multiple instances.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1378441

Title:
  add GCE support for cloud-init on 12.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1378441/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Branch linked: lp:~utlemming/ubuntu/precise/precise/lp1383794

** Branch linked: lp:~utlemming/ubuntu/trusty/cloud-init/lp1383794

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1384327] [NEW] lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Serge Hallyn
The minimal PATH comes from

getconf -a | grep ^PATH 

(if confstr were not available then lxc would actually default to a
longer PATH)

 status: invalid


** Changed in: lxc (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1384327] [NEW] lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Simon Déziel
On 10/22/2014 12:54 PM, Serge Hallyn wrote:
 The minimal PATH comes from
 
 getconf -a | grep ^PATH 
 
 (if confstr were not available then lxc would actually default to a
 longer PATH)

I didn't mention but the guest in question was freshly created with
sudo lxc-create -t ubuntu -n p1.

  status: invalid

Are you saying my container is broken somehow or that it's not a bug?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Thomas Ward
(nginx project)
Updated packages uploaded to the staging PPA, pending building.

** Changed in: nginx
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1346538] Re: maas-dns fails to install due to missing config file for bind9

2014-10-22 Thread Launchpad Bug Tracker
This bug was fixed in the package maas - 1.7.0~beta8+bzr3272-0ubuntu1

---
maas (1.7.0~beta8+bzr3272-0ubuntu1) utopic; urgency=medium

  * New Upstream Release, Beta 8 bzr 3272.
- Maintain backward compatibility with status codes to not break
  client MAAS API users.  (LP: #1383609)
- Allow users to disable DHCP NIC scanning during commissioning otherwise
  this can lead machines not being able to commission (LP: #1383384)
- Ensure that MAAS can correctly download, and install HWE Kernels, and
  not crash in the process. (LP: #1357532, LP: #1382281)
- Add a lock to ensure we don't give the same 2 systems to two different
  users when acquiring a machine. (LP: #1382575)

  [ Michael McCracken ]
  * debian/maas-dns.postrm: ensure named.conf is cleaned of maas
includes (LP: #1346538)
 -- Andres Rodriguez andres...@ubuntu.com   Wed, 22 Oct 2014 12:55:08 -0400

** Branch linked: lp:ubuntu/utopic-proposed/maas

** Changed in: maas (Ubuntu)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1346538

Title:
  maas-dns fails to install due to missing config file for bind9

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1346538/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382266] Re: maas-proxy fails to start on freshly installed MAAS

2014-10-22 Thread Andres Rodriguez
Hi Kiko,

If you can reproduce this, can you please attach:

/var/log/upstart/maas-proxy.log?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382266

Title:
  maas-proxy fails to start on freshly installed MAAS

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382266/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1373261] Re: pserv.yaml rewrite breaks when MAAS URL uses IPv6 address

2014-10-22 Thread Andres Rodriguez
Jeroen,

Can you please provide what ends up in pserv.yaml?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1373261

Title:
  pserv.yaml rewrite breaks when MAAS URL uses IPv6 address

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1373261/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1384327] [NEW] lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Serge Hallyn
I'm saying this is not a bug because the limited path is by design.  Your
system in fact is telling lxc which path to use as the default.

If you think that rather than take the value from the system through sysconf,
we should always use a longer PATH, then that could be discussed on the
lxc-devel mailing list.

Really to me the bug seems to be that sysconf(_SC_PATH) on ubuntu isn't giving
the path that root gets by default.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383379] Re: nginx default config has SSLv3 enabled, makes sites using default config options vulnerable to POODLE

2014-10-22 Thread Marc Deslauriers
** Also affects: nginx (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: nginx (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: nginx (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Changed in: nginx (Ubuntu Utopic)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1383379

Title:
  nginx default config has SSLv3 enabled, makes sites using default
  config options vulnerable to POODLE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nginx/+bug/1383379/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-22 Thread dualboot
Hi,

 I confirm this problem with 2 other computers. It seems to be link to Unity or 
Gnome keyring and ssh-agent.
It does not happen with a KDE desktop. If you press ctrl+alt+F1 and test your 
ssh connexion, it should work due to environment variables where echo 
$SSL_AUTH_SOCK return an empty value.

 Into your session Unity/Gnome, you can bypass this problem by adding this line 
into your /home/user/.bashrc file :
export SSH_AUTH_SOCK=0
reload your bash environment with this command :
$ source /home/user/.bashrc

It works for me.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-22 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: openssh (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1384327] [NEW] lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Simon Déziel
On 10/22/2014 02:05 PM, Serge Hallyn wrote:
 Really to me the bug seems to be that sysconf(_SC_PATH) on ubuntu isn't giving
 the path that root gets by default.

Thanks Serge, so I agree with you that's not LXC's fault. Though, with
such a limited PATH, lxc-attach is much less convenient to work with, IMHO.

I'm coming from OpenVZ where I used vzctl enter/exec frequently and
now I'm trying to find an equivalent command for LXC so it's quite
possible I'm looking at the wrong tool. In which case, a hint would be
appreciated ;)

If lxc-attach is the right tool for the job, would you mind, when you
have time, moving the bug to the appropriate package as I can't find
which one it should be.

Regards,
Simon

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Seth Arnold
I reviewed libsmi version 0.4.8+dfsg2-9ubuntu2 as checked into utopic.
This should not be considered a full security audit but rather a quick
gauge of maintainability.

CVE history: CVE-2010-2891

- libsmi provides bindings to manipulate OIDs stored in MIB files
- Build-Depends: flex, bison, debhelper, dh-autoreconf
- No cryptography
- May call wget or similar via smicache mechanism; I believe this isn't
  enabled by default in our packages
- Does not daemonize
- No pre/post inst/rm scripts
- No initscripts
- No dbus
- No setuid
- No sudo fragments
- No cronjobs
- No udev rules
- Binaries smistrip, smicache, smidump, smilint, smiquery, smixlate,
  smidiff
- Test suite isn't run during build
- Build logs are fairly messy
- binaries not PIE

- Subprocesses only spawned for smicache
- Memory management is hectic
- The individual tools will write to files designated by the user
- The logging looked safe
- The environment variable uses looked sane
- No privileged operations
- No cryptography
- May call wget to download MIB files
- No temporary files
- No WebKit
- No PolicyKit
- A handful of errors from cppcheck, some common, some surprising

Here are some notes I've collected while reviewing the code in the hopes
someone finds them useful:

- getOidString() very complicated, no protection against overflowing 's'
  buffer. I suspect bugs live in this function.
- parseDH() very complicated, I suspect bugs live in this function. case
  '*' at least seems to hide memory leaks.
- printClass() no protection against overflowing 'string' buffer
- fprint() missing error return check on 'fputs()'
- getValueString() no protection against overflowing 's' buffer
- optString() may not nul-terminate the return string
- getStringIndexList() insufficient allocation for strIdxLst, uses +4 but
  should use +5, one-byte buffer overflow overwrites space for nul. This
  function may work by accident.
- getStringSubrange() memory leak minStr, maxStr
- getStringRange() memory leak str, subRange
- undefined behaviours (sprintf(dest, %s, dest))
- many warnings
- smidiff.c:840:1: note: the ABI of passing union with long double has
  changed in GCC 4.4

This codebase is pretty messy; there's duplicated code in multiple files
rather than using shared utility files; there's awkward uses of C string
routines, there's extensive memory allocation and re-allocation when
manipulating strings, there's extensive use of fixed-length buffers
without visible bounds checking, etc.

There are doubtless many bugs left in this library; cppcheck has reported
some, gcc reports many warnings, and there is a lot of room for
improvement. It really needs something like a StringBuffer-style
datastructure to replace the extensive C-string operations.

However, despite my large misgivings about this library, by and large it
should process mostly-static data from trusted sources. In this role its
flaws may not be a big deal.

Please enable build-time tests. Please enable PIE for the binaries.

Please ensure that ceilometer does not need the smicache functionality;
this library should not be used on unauthenticated data.

Security team ACK for promoting libsmi to main.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Seth Arnold
I reviewed python-pysnmp4-apps version 0.3.2-1 as checked into utopic.
This should not be considered a full security audit, but rather a quick
gauge of code maintainability.

- This package provides snmp tools similar to the netsnmp tools.
- Build-Depends: debhelper, cdbs, python-all, python-setuptools
- Does not itself do cryptography
- Does not itself do networking
- Does not daemonize
- No pre/post inst/rm
- No initscripts
- No dbus
- No setuid
- No sudo fragments
- No udev rules
- No cronjobs
- No testsuite
- Clean build logs

- No spawned subprocesses
- No memory management (Python)
- No file manipulation
- Logging looks sane
- No environment variables
- No privileged operations
- No cryptography (user interface selects among authentication and privacy
  options to be used in snmp)
- No privileged portions of code
- No temporary files
- No WebKit
- No Javascript
- No PolicyKit

python-pysnmp4-apps is high-quality, high-density code -- while fixes
might be difficult, I suspect there aren't many bugs to be found.

Security team ACK for promoting python-pysnmp4-apps to main.


** Changed in: libsmi (Ubuntu)
 Assignee: Seth Arnold (seth-arnold) = (unassigned)

** Changed in: python-pysnmp4 (Ubuntu)
 Assignee: Seth Arnold (seth-arnold) = (unassigned)

** Changed in: python-pysnmp4-apps (Ubuntu)
 Assignee: Seth Arnold (seth-arnold) = (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Seth Arnold
I reviewed python-pysnmp4 version 4.2.5-1 as checked into utopic. This
should not be considered a full security audit, but rather a quick gauge
of code maintainability.

- python-pysnmp provides a pure-python implementation of snmp
- Build-Depends: debhelper (= 5.0.37.2), cdbs, python-all, python3-all,
  python-setuptools, python3-setuptools, python-crypto, python3-crypto
- Depends: smitools
- Recommends: python-crypto, python-pysnmp4-mibs, python-pysnmp4-apps,
  python-twisted
- Does use encryption
- Does use networking
- Uses smitools, thus libsmi
- Can be added to other applications via twisted, asyncore
- Does not itself daemonize
- No pre/post inst/rm scripts
- No initscripts
- No dbus
- No setuid
- No sudo fragments
- No udev rules
- No cron jobs
- Adds libsmi2pysnmp and build-pysnmp-mib binaries
- Clean build logs

- No subprocesses spawned
- Python, no real memory management
- Only file operation is read-only
- Logging looked safe
- No use of environment variables
- No privileged operations
- Does use cryptography, SNMP-standards-specified use of MD5, DES, 3DES,
  AES, SHA-1, etc. I didn't investigate further, mechanisms all
  standardized
- Extensive networking, looked to be well-managed
- No privileged portions of code
- No temporary files
- No WebKit
- No JavaScript
- No PolicyKit

The code is complicated, though references to relevant RFC sections
abound in much of the code. It all seemed straight-forward enough,
considering the complexity of SNMP.

Security team ACK for promoting python-pysnmp4 to main.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Branch unlinked: lp:~utlemming/ubuntu/precise/precise/lp1383794

** Branch linked: lp:~utlemming/ubuntu/utopic/cloud-init/lp1383794

** Branch linked: lp:~utlemming/ubuntu/precise/cloud-init/lp1383794

** Summary changed:

- GCE datasource should use the short hostname
+ [SRU] GCE datasource should use the short hostname

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  [SRU] GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381967] Re: mongodb shell crash on arm64

2014-10-22 Thread Michael Hudson-Doyle
Yes, please use that PPA for any mongodb on arm64 work.  It's a couple
of point release behind I see -- someone (i.e. me I guess?) should
update it to 2.6.5.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mongodb in Ubuntu.
https://bugs.launchpad.net/bugs/1381967

Title:
  mongodb shell crash on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mongodb/+bug/1381967/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: [SRU] GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Branch linked: lp:~utlemming/cloud-init/lp1383794

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  [SRU] GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Graham Binns
We've agreed that as a fix for the problem — since it's going to
potentially break  a lot of charms on customer deployments — we're going
to put PTR records back in for dynamic-pool IP addresses. I'm going to
investigate using the bind GENERATE directive to make this simpler [1].

 [1] http://www.thedumbterminal.co.uk/?action=showArticlearticleId=116

** Changed in: maas
   Status: Incomplete = Triaged

** Changed in: maas
 Assignee: Julian Edwards (julian-edwards) = Graham Binns (gmb)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380792] Fix proposed to nova (stable/juno)

2014-10-22 Thread OpenStack Infra
Fix proposed to branch: stable/juno
Review: https://review.openstack.org/130342

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1380792

Title:
  requests to EC2 metadata's '/2009-04-04/meta-data/security-groups'
  failing

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1380792/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1383794] Re: [SRU] GCE datasource should use the short hostname

2014-10-22 Thread Ben Howard
** Description changed:

- The GCE datasource uses the long hostname. Hostnames longer than 64
- characters can break several tools.
+ [IMPACT] Since GCE FQDN are usually longer than 64-characters, several
+ hi-profile tools like Java and Hadoop may break.
+ 
+ [FIX] Per GCE's recommendation, Linux instances should use the short
+ hostname over the FQDN. This change sets the system hostname to the
+ short name.
+ 
+ [VERIFICATION]
+ 1. Install new cloud-init from proposed
+ 2. Re-run cloud-config:
+* 14.04/14.10: cloud-init single -n set_hostname --frequency=always
+* 12.04: 
+ 3. Check to make sure that the short name is used for /etc/hostname
+ 
+ [RISK] This is a very low risk change. The actual change is a single
+ line, and has test cases for 14.04 and 14.10. Further, since this change
+ is only in the GCE datasource, it only affects GCE instances.
+ 
+ [ORIGINAL REPORT]
+ The GCE datasource uses the long hostname. Hostnames longer than 64 
characters can break several tools.

** Description changed:

  [IMPACT] Since GCE FQDN are usually longer than 64-characters, several
  hi-profile tools like Java and Hadoop may break.
  
  [FIX] Per GCE's recommendation, Linux instances should use the short
  hostname over the FQDN. This change sets the system hostname to the
  short name.
  
  [VERIFICATION]
  1. Install new cloud-init from proposed
  2. Re-run cloud-config:
-* 14.04/14.10: cloud-init single -n set_hostname --frequency=always
-* 12.04: 
+    * 14.04/14.10: cloud-init single -n set_hostname --frequency=always
+    * 12.04: cloud-init-cfg set_hostname always
  3. Check to make sure that the short name is used for /etc/hostname
  
  [RISK] This is a very low risk change. The actual change is a single
  line, and has test cases for 14.04 and 14.10. Further, since this change
  is only in the GCE datasource, it only affects GCE instances.
  
  [ORIGINAL REPORT]
  The GCE datasource uses the long hostname. Hostnames longer than 64 
characters can break several tools.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1383794

Title:
  [SRU] GCE datasource should use the short hostname

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1383794/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Jamie Strandboge
** Changed in: libsmi (Ubuntu)
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Jamie Strandboge
python-pysnmp4-apps packaging looks fine. There is no testsuite.
Conditional ACK provided there is a bug subscriber.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Jamie Strandboge
libsmi packaging looks fine and ticks all the boxes except for the
issues Seth mentioned. Needs a bug subscriber and to enable the
testsuite. Considering the time, I would find it acceptable to enable
the test suite in an SRU.

** Changed in: python-pysnmp4-apps (Ubuntu)
   Status: New = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Jamie Strandboge
python-pysnmp4 packaging looks fine too. There is no testsuite.
Conditional ACK provided there is a bug subscriber, pending security
review.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Jamie Strandboge
** Changed in: python-pysnmp4 (Ubuntu)
   Status: New = Fix Committed

** Changed in: libsmi (Ubuntu)
 Assignee: (unassigned) = Matthias Klose (doko)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1381359] Re: [SRU] ship new public cert

2014-10-22 Thread Launchpad Bug Tracker
This bug was fixed in the package pollinate - 4.7-0ubuntu1.2

---
pollinate (4.7-0ubuntu1.2) trusty-security; urgency=medium

  * debian/patches/1381359.patch: LP: #1381359
- update expiring SSL certificate
 -- Dustin Kirkland kirkl...@ubuntu.com   Tue, 21 Oct 2014 16:12:43 -0700

** Changed in: pollinate (Ubuntu Trusty)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pollinate in Ubuntu.
https://bugs.launchpad.net/bugs/1381359

Title:
  [SRU] ship new public cert

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pollinate/+bug/1381359/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Graham Binns
I started out by poking the $GENERATE directive into my reverse zone
file manually:

; Zone file modified: 2014-10-21 18:24:59.654931.
; Note that the modification time of this file doesn't reflect
; the actual modification time.  MAAS controls the modification time
; of this file to be able to force the zone to be reloaded by BIND.
$TTL300
@   INSOA maas. nobody.example.com. (
  000260 ; serial
  600 ; Refresh
  1800 ; Retry
  604800 ; Expire
  300 ; TTL
  )

IN  NS  maas.
$GENERATE 1-100 $.0.0.10.in-addr.arpa. IN PTR no-name-yet-$.maas.
129.0.0.10.in-addr.arpa. IN PTR devoted-minute.maas.
128.0.0.10.in-addr.arpa. IN PTR dismayed-clown.maas.

This works perfectly:

graham@dodger:~⟫ dig +noall +answer -x 10.0.0.128 @10.0.0.1 

 
128.0.0.10.in-addr.arpa. 300IN  PTR dismayed-clown.maas.
graham@dodger:~⟫ dig +noall +answer -x 10.0.0.129 @10.0.0.1
129.0.0.10.in-addr.arpa. 300IN  PTR devoted-minute.maas.
graham@dodger:~⟫ dig +noall +answer -x 10.0.0.100 @10.0.0.1
100.0.0.10.in-addr.arpa. 300IN  PTR no-name-yet-100.maas.

So, now all we need to do is have the DNSReverseZoneConfig add this for
the dynamic range (I say all we need to do; obviously that's  1 task,
but I'll divide it up in the morning).

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1377308] Re: booting cloud image without initramfs broken

2014-10-22 Thread Scott Moser
** Attachment added: ppc64el console log without initramfs and with mountall 
debug
   
https://bugs.launchpad.net/cloud-init/+bug/1377308/+attachment/4242046/+files/no-initrd-ppc64el.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1377308

Title:
  booting cloud image without initramfs broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1377308/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1377308] Re: booting cloud image without initramfs broken

2014-10-22 Thread Scott Moser
** Attachment added: amd64 console log without initramfs and with mountall 
debug
   
https://bugs.launchpad.net/cloud-init/+bug/1377308/+attachment/4242047/+files/no-initrd-amd64.txt

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1377308

Title:
  booting cloud image without initramfs broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1377308/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1349868] Re: [MIR] new build dependencies for ceilometer

2014-10-22 Thread Matthias Klose
PIE for libsmi enabled, and packages promoted.

keeping the bug reports open, until the remaining issues are addressed

** Changed in: libsmi (Ubuntu)
   Status: In Progress = Fix Committed

** Changed in: libsmi (Ubuntu)
 Assignee: Matthias Klose (doko) = (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1349868

Title:
  [MIR] new build dependencies for ceilometer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsmi/+bug/1349868/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Graham Binns
I think this will work for IPv6 too, but as Kiko pointed out on IRC so
will wildcards — the main reason I'd like to stick with $GENERATE for
both is that it's one less bit of code to write ;)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Gavin Panella
On 22 October 2014 22:03, Graham Binns graham.bi...@canonical.com wrote:
 This works perfectly:

Awesome, that's great. Sort of brain-dump follows:

How does this work for networks that don't line up with IPv4 octets? For
example, for a dynamic range that covers 192.168.0.0/23, would we need
to write the following?

  $GENERATE 1-254 $.0.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.
  $GENERATE 1-254 $.1.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.

A /16 would need 256 lines.

Is this expanded macro-like within BIND, or is it compiled into a rule?
It may make a difference to performance.

I assume we'll do this only for IPv4? If it's compiled to a rule, we
/could/ do it for IPv6 too, but that may be a slope down which we don't
want to slip. Ultimately we want to steer people towards reserving IP
addresses via MAAS's API.

Is this enough to satisfy RabbitMQ? Some services like to make sure that
they can round-trip through DNS, i.e. that the PTR record resolves to a
name that then resolves back to the starting address.

We could choose the prefix to encourage people to reserve addresses. For
example, dynamic-$, anon-$, temporary-$, or do-not-use-$, in
order of severity. Unfortunately this is bikeshed territory, so I'm
going to put myself out of the running by voting for
do-not-rely-on-this-you-get-to-keep-the-pieces-and-give-me-one-million-dollars-$.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384477] [NEW] install fails: insserv: ssh: Permission denied

2014-10-22 Thread Geoff Jacobsen
Public bug reported:

Setting up openssh-server (1:6.6p1-8) ...
insserv: ssh: Permission denied
update-rc.d: error: insserv rejected the script header
dpkg: error processing package openssh-server (--configure):
 subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
 openssh-server
E: Sub-process /usr/bin/dpkg returned an error code (1)

** Affects: openssh (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1384477

Title:
  install fails: insserv: ssh: Permission denied

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1384477/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1003854] Re: Database upgrade/migration fails with nested db directories (lucid to precise)

2014-10-22 Thread Ryan Tandy
Fixed in Debian in 2.4.40-1.

** Changed in: openldap (Debian)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1003854

Title:
  Database upgrade/migration fails with nested db directories (lucid to
  precise)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1003854/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Graham Binns
On 22 October 2014 23:19, Gavin Panella gavin.pane...@canonical.com wrote:
 On 22 October 2014 22:03, Graham Binns graham.bi...@canonical.com wrote:
 This works perfectly:

 Awesome, that's great. Sort of brain-dump follows:

 How does this work for networks that don't line up with IPv4 octets? For
 example, for a dynamic range that covers 192.168.0.0/23, would we need
 to write the following?

   $GENERATE 1-254 $.0.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.
   $GENERATE 1-254 $.1.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.

 A /16 would need 256 lines.

If I'm reading [1] right (and I may not be; it's late), we could do
something like this:

$GENERATE 1-254 $.$.0.10.in-addr.arpa. IN PTR no-name-yet-$.$.maas.

But a quick check of that on my local MAAS suggests it doesn't work.
I'll dig further tomorrow.

 Is this expanded macro-like within BIND, or is it compiled into a rule?
 It may make a difference to performance.

AFAICT, it's expanded rather than compiled into a rule.

 I assume we'll do this only for IPv4? If it's compiled to a rule, we
 /could/ do it for IPv6 too, but that may be a slope down which we don't
 want to slip. Ultimately we want to steer people towards reserving IP
 addresses via MAAS's API.

True. That said, if we fix this for v6 too it means that some very
nasty hacks in charms can be canned, and that's not a terrible thing
for our users. If it's easy to do, I say we might as well be
consistent. If v6 causes (as I suspect it will) considerable headaches
here, then we'll stick with v4 and push for everyone to use APIs as
they should be doing.

 Is this enough to satisfy RabbitMQ? Some services like to make sure that
 they can round-trip through DNS, i.e. that the PTR record resolves to a
 name that then resolves back to the starting address.

I haven't checked that out yet, but it's a good point. We could always
use $GENERATE to generate the forward zone too, though, if your first
point doesn't make that entirely onerous.

 We could choose the prefix to encourage people to reserve addresses. For
 example, dynamic-$, anon-$, temporary-$, or do-not-use-$, in
 order of severity. Unfortunately this is bikeshed territory, so I'm
 going to put myself out of the running by voting for
 do-not-rely-on-this-you-get-to-keep-the-pieces-and-give-me-one-million-dollars-$.

use-this-at-your-peril-$.maas.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Graham Binns
On 22 October 2014 23:56, Graham Binns graham.bi...@canonical.com wrote:
 $GENERATE 1-254 $.$.0.10.in-addr.arpa. IN PTR no-name-yet-$.$.maas.

 But a quick check of that on my local MAAS suggests it doesn't work.
 I'll dig further tomorrow.

Nope, scratch that, it works fine. Well, named-checkzone generates a
perfectly valid set of rules, but strangely the reverse lookup itself
doesn't work. Definitely more poking to be done on the morrow.

For a /23 (or some other such fun thing), yes, I think we'd have to
write

$GENERATE 1-254 $.0.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.
$GENERATE 1-254 $.1.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.

Again. More `dig`ing (geddit?) tomorrow.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1368815] Re: qemu-img convert intermittently corrupts output images

2014-10-22 Thread Tony Breeds
FWIW the following 2 commits in qemu master resolve the issue for qemu-
img.

  
http://git.qemu.org/?p=qemu.git;a=commit;h=38c4d0aea3e1264c86e282d99560330adf2b6e25
  
http://git.qemu.org/?p=qemu.git;a=commit;h=7c15903789953ead14a417882657d52dc0c19a24

If possible they should be back ported to trusty and utopic.

You'll also need something like:

http://git.qemu.org/?p=qemu.git;a=commit;h=4f11aa8a40351b28c0e67c7276e0003b38cc46ac

before my 2 patches.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1368815

Title:
  qemu-img convert intermittently corrupts output images

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1368815/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1377218] Re: [FFe] ceilometer 2014.2 rc2

2014-10-22 Thread Launchpad Bug Tracker
This bug was fixed in the package ceilometer - 2014.2-0ubuntu1

---
ceilometer (2014.2-0ubuntu1) utopic; urgency=medium

  * New upstream release.
 -- Chuck Short zul...@ubuntu.com   Thu, 16 Oct 2014 14:07:11 -0400

** Changed in: ceilometer (Ubuntu)
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceilometer in Ubuntu.
https://bugs.launchpad.net/bugs/1377218

Title:
  [FFe] ceilometer 2014.2 rc2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1377218/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1373617] Re: Still missing logrotate configuration files

2014-10-22 Thread Launchpad Bug Tracker
This bug was fixed in the package ceilometer - 2014.2-0ubuntu1

---
ceilometer (2014.2-0ubuntu1) utopic; urgency=medium

  * New upstream release.
 -- Chuck Short zul...@ubuntu.com   Thu, 16 Oct 2014 14:07:11 -0400

** Changed in: ceilometer (Ubuntu)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceilometer in Ubuntu.
https://bugs.launchpad.net/bugs/1373617

Title:
  Still missing logrotate configuration files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ceilometer/+bug/1373617/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384503] [NEW] rsync fails on large files with compression

2014-10-22 Thread Joe Harrington
Public bug reported:

Copying large (10GB) files with rsync -z (compression) leads to a long
hang and eventual error after transferring part of the file.  The error
is consistent.  The file copies at normal speed until it reaches its
maximum size (1.4 GB out of 20 GB for one, 6.9 GB out of 29 GB for
another).  Then nothing happens for a while (many minutes).  Finally,
there is an error:

[]
jh/.VirtualBox/win7/win7.vbox
jh/.VirtualBox/win7/win7.vbox-prev
jh/.VirtualBox/win7/win7.vdi
rsync: [sender] write error: Broken pipe (32)
rsync error: error in rsync protocol data stream (code 12) at io.c(837) 
[sender=3.1.0]

In this case, 6.9 GB of 29 GB transferred.  Without -z, it works.

See the following upstream report, with a comment at the end from the
rsync maintainer:

https://bugzilla.samba.org/show_bug.cgi?id=10372

According to this report, version 3.1.0 (included in 14.04) uses a
different compression package from prior versions.  Prior versions did
not have this problem for me using the same command on the same systems.
Both hosts ran Ubuntu 11.10 at the time, and all run 14.04 now, in each
case with all updates applied, Intel hardware.  Network connection
between them is gigabit ethernet through one switch.  A shell ssh
between them in a terminal works and stays up during the failure, so it
is not a network issue.  There are no relevant entries in syslog on
either machine.  There is sufficient capacity on the receiving disk.
All filesystems are ext4.

rsync command:

/usr/bin/rsync -aHSxvz --delete --stats --exclude=lost+found
--exclude=.gvfs --exclude=/nonlaptop /home/
backup.host.edu:/bu/host/home/

(yes, I changed the machine names)

Current release (both hosts):

Description:Ubuntu 14.04.1 LTS
Release:14.04

Current package (both hosts):

rsync:
  Installed: 3.1.0-2ubuntu0.1
  Candidate: 3.1.0-2ubuntu0.1
  Version table:
 *** 3.1.0-2ubuntu0.1 0
500 http://us.archive.ubuntu.com/ubuntu/ trusty-updates/main amd64 
Packages
500 http://security.ubuntu.com/ubuntu/ trusty-security/main amd64 
Packages
100 /var/lib/dpkg/status
 3.1.0-2 0
500 http://us.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages

Thanks,

--jh--

** Affects: rsync (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/1384503

Title:
  rsync fails on large files with compression

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1384503/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1377308] Re: booting cloud image without initramfs broken

2014-10-22 Thread Scott Moser
bah. 
/etc/init/cloud-init-local.conf
- start on mounted MOUNTPOINT=/
+start on mounted MOUNTPOINT=/ and mounted MOUNTPOINT=/run

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1377308

Title:
  booting cloud image without initramfs broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1377308/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1377308] Re: booting cloud image without initramfs broken

2014-10-22 Thread Scott Moser
comment 3 above is ordered wrong. the change that caused this is:
/etc/init/cloud-init-local.conf
+start on mounted MOUNTPOINT=/
+start on mounted MOUNTPOINT=/ and mounted MOUNTPOINT=/run


the reason was that cloud-init-local needs to write to / and to /run. 
previously it was using /run without declaring the need for it. also cloud-init 
generally wants 'mounted' to block things.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1377308

Title:
  booting cloud image without initramfs broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1377308/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Julian Edwards
On Wednesday 22 Oct 2014 23:18:24 you wrote:
 On 22 October 2014 23:56, Graham Binns graham.bi...@canonical.com wrote:
  $GENERATE 1-254 $.$.0.10.in-addr.arpa. IN PTR no-name-yet-$.$.maas.
  
  But a quick check of that on my local MAAS suggests it doesn't work.
  I'll dig further tomorrow.
 
 Nope, scratch that, it works fine. Well, named-checkzone generates a
 perfectly valid set of rules, but strangely the reverse lookup itself
 doesn't work. Definitely more poking to be done on the morrow.
 
 For a /23 (or some other such fun thing), yes, I think we'd have to
 write
 
 $GENERATE 1-254 $.0.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.
 $GENERATE 1-254 $.1.168.192.in-addr.arpa. IN PTR no-name-yet-$.maas.
 
 Again. More `dig`ing (geddit?) tomorrow.


See the related bug 1356012 about that.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384232] Re: Certificate hostname verification fix

2014-10-22 Thread Roca
We sent email to cve-ass...@mitre.org and got the following response,
but we don't agree that this is an intentionally made.

This patch appears to be outside the scope of CVE. For issues of this type, the 
scope of CVE is limited to unintentional implementation mistakes. Here, the 
vendor intentionally did not do a hostname check because (quoting 
http://bugs.exim.org/show_bug.cgi?id=1479#c2) Exim is an MTA, there has been 
no sane approach to determining a hostname suitable for verification of 
certificate identity. The vendor went on to implement a useful security 
enhancement in response to your report.
This is a very good outcome, but security enhancements are not assigned CVE-IDs.

** Bug watch added: bugs.exim.org/ #1479
   http://bugs.exim.org/show_bug.cgi?id=1479

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to exim4 in Ubuntu.
https://bugs.launchpad.net/bugs/1384232

Title:
  Certificate hostname verification fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exim4/+bug/1384232/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384532] [NEW] libvirt-qemu apparmor profile missing kvm-spice

2014-10-22 Thread Don Bowman
Public bug reported:

/usr/bin/kvm-spice is a soft-link to /usr/bin/kvm

in /etc/apparmor.d/abstractions/libvirt-qemu there is no line for kvm-
spice.

This leads rise to the error:
libvirt:  error : unable to set AppArmor profile 
'libvirt-224075ba-a31a-48e9-98fe-337146e9f4f1' for '/usr/bin/kvm-spice': No 
such file or directory

when using e.g. OpenStack

$ lsb_release -rd
Description:Ubuntu 14.10
Release:14.10

$ dpkg -l|grep libvirt-bin
ii  libvirt-bin 1.2.8-0ubuntu11 
amd64programs for the libvirt library

** Affects: libvirt (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/1384532

Title:
  libvirt-qemu apparmor profile missing kvm-spice

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1384532/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1384327] Re: lxc-attach --clear-env results in a limited $PATH in the container

2014-10-22 Thread Serge Hallyn
Looks like the value actually comes straight from a #define in the glibc
source code.

As such, I think it would be pretty reasonable to change lxc to always
use its own path.

** Changed in: lxc (Ubuntu)
   Importance: Undecided = Medium

** Changed in: lxc (Ubuntu)
   Status: Invalid = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1384327

Title:
  lxc-attach --clear-env results in a limited $PATH in the container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1384327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1382190] Re: LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

2014-10-22 Thread Julian Edwards
I think this is a dupe of bug 1274947.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1382190

Title:
  LXCs assigned IPs by MAAS DHCP lack DNS PTR entries

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1382190/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs