Bug#1003168: qemu-user-static: fails to run lyx user directory configuation

2022-05-01 Thread Michael Tokarev
Control: tag -1 + confirmed Control: found -1 1:7.0+dfsg-2 I just tried to reproduce this and was able to see the same issue with qemu-user-static 7.0. However the issues here is not with python failing. lyx does not even try to run the python script. It first spawns /bin/sh -c "python3 -tt -V"

Bug#1003450: qemu-system: dns resolution does not work within the guest if the host have only nameserver in /etc/resolv.conf

2022-04-30 Thread Michael Tokarev
Version: 4.7.0-1 On Mon, 10 Jan 2022 12:40:59 +0100 mc36 wrote: Package: qemu-system Version: 1:6.2+dfsg-1 Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? i recently moved to an ipv6-only netw

Bug#1003168: qemu-user-static: fails to run lyx user directory configuation

2022-04-30 Thread Michael Tokarev
Control: tag -1 + moreinfo On Thu, 13 Jan 2022 16:00:26 +0100 Andreas Beckmann wrote: On 11/01/2022 08.25, Michael Tokarev wrote: > 1. try qemu 6.2 (qemu-user-static is self-contained, more or less, so >    it can be installed on earlier debian releases too) same behavior :-( >

Bug#1007260: performance regression due to linking against libnettle

2022-04-29 Thread Michael Tokarev
So.. what should we do? Build it with libssl again because it is not ready to be used when built with nettle, and reopen #828699? Steinar, can you raise this upstream please? It'd be good if whole unbound can be built with nettle instead of openssl, and actually work :) Thanks! /mjt

Bug#914405: appears to not update auto-trust-anchors without requests

2022-04-29 Thread Michael Tokarev
Control: tag -1 - moreinfo It looks there's an upstream TODO item about this: o timers rfc 5011 support. (see /usr/share/doc/unbound/TODO.gz) /mjt

Bug#508053: please provide 'host'

2022-04-29 Thread Michael Tokarev
Control: tag -1 + wontfix [Replying to a bug report which is more than 10 years old..] On Tue, 21 Jul 2009 19:13:06 +0200 martin f krafft wrote: .. > if the use case is 'lookup a DNS record and print it like > bind9-host does' then bind9-host and unbound-host fit that > description. Right. A

Bug#641704: unbound-host should be preconfigured with DNS root trust anchor

2022-04-29 Thread Michael Tokarev
This is interesting from a few other points of view. unbound-host should probably not use /var/lib/unbound/root.key which is an untrusted-owned file in an untrusted-owned directory. So probably the default value for this root.key file should not point to this location. We probably can change bot

Bug#927747: bind9_dlz backend is entirely broken in Debian

2022-04-28 Thread Michael Tokarev
Control: severity -1 normal On Wed, 8 May 2019 22:35:53 +0200 "Steinar H. Gunderson" wrote: On Wed, May 08, 2019 at 10:02:46PM +0200, Mathieu Parent wrote: > Downgrading the severity as the AppArmor side is already fixed it seems in sid. serious and grave are of equal severity; serious is fo

Bug#826241: fixed in unbound 1.5.9-2

2022-04-28 Thread Michael Tokarev
Replying to an old bugreport which is marked as fixed since 1.5.9-2 version. This is, in fact, a context of resolvconf, for which we have several other bugreports. This one has a lenghtly discussion and debugging. But I can't understand the main thing there: why on the Earth one needs to reloa

Bug#900241: no root.key provided by libunbound2

2022-04-28 Thread Michael Tokarev
Control: tag -1 + moreinfo So, will adding a Recommends: dns-root-data either to libunbound or to various software packages (eg unbound-host) fix this? I don't think adding this to libunbound is a good idea since software using it isn't necessary being used the root key, but adding it to the bin

Bug#862207: error: libcrypto does not provide GOST

2022-04-28 Thread Michael Tokarev
28.04.2022 19:22, Ondřej Surý wrote: On 28. 4. 2022, at 15:23, Michael Tokarev wrote: Yeah. Formally we should do either one or another. In practice I *highly* doubt anyone is using these 4 symbols, so maybe we can just disable the thing without doing anything. I'm too lazy now to provid

Bug#862207: error: libcrypto does not provide GOST

2022-04-28 Thread Michael Tokarev
28.04.2022 15:27, Ondřej Surý wrote: .. Yes, it’s the old one. The 2012 hasn’t been specified for use in DNSSEC - there was a draft, but it has expired. Ok, that makes sense. Thank you for clarification. Please note there are at least 4 symbols in the libldns3 library which are gost-related:

Bug#862207: error: libcrypto does not provide GOST

2022-04-28 Thread Michael Tokarev
27.04.2022 12:08, Ondřej Surý wrote: Hi, GOST has been deprecated for use in DNSSEC, and the actual standard actually says it MUST NOT be used for signing (and MAY be used for verification), see RFC 8624. I think the best course of action here is to actually disable it everywhere where GOST R 3

Bug#1010271: unbound-control: Please use unix socket as default control-interface

2022-04-27 Thread Michael Tokarev
27.04.2022 19:38, ceddral wrote: ... attention now being explicit in the config. Now that I'm aware I do believe a unix socket would be the more sensible default. This variant (the unix socket) weren't always available. It was implemented in version 1.5.2, and I wasn't aware of this until 1.15.

Bug#1010271: unbound-control: Please use unix socket as default control-interface

2022-04-27 Thread Michael Tokarev
27.04.2022 19:38, ceddral wrote: .. Tested it, as far as i can tell it works for me with chroot: "/var/lib/unbound" and control-interface: "/run/unbound-control.socket" Thank you for confirming this. I too did the similar test locally, you made me curious. (and BindPaths=/run/systemd/notify:

Bug#1010271: unbound-control: Please use unix socket as default control-interface

2022-04-27 Thread Michael Tokarev
Control: severity -1 wishlist Control: tag -1 confirmed 27.04.2022 16:48, ceddral wrote: Package: unbound Version: 1.15.0-4 Severity: normal X-Debbugs-Cc: debian...@ceddral.org Dear Maintainer, unbound package upgrade introduced a default config to enable remote-control via tcp socket. Can y

Bug#821801: smbclient: Problems with smbclient since badlock update

2022-04-27 Thread Michael Tokarev
Control: tag -1 + moreinfo Replying to an old bug... On Tue, 19 Apr 2016 13:43:29 +0200 tkla wrote: Package: smbclient Version: 4.2.10 Severity: normal Tags: upstream Dear Maintainer, since the badlock fixes my backup software Amanda stopped working when we're trying to backup Windows shares.

Bug#1009907: Smbclient error: "Failed to mount Window share: invalid argument"

2022-04-27 Thread Michael Tokarev
27.04.2022 14:38, Salis, Antonello (NFOD) wrote: The new update 2:4.16.0+dfsg-7 is affected as well. Sure, there was nothing done in there about this issue. Or else I'd mark it as fixed or at least asked you guys to try it out :) Thanks! /mjt

Bug#716056: [Mayhem] ldnsutils: numerous input/options parsing errors in example utilities

2022-04-26 Thread Michael Tokarev
This has been merged in a strange way. Here are the actual testcases: ldns-dpa -f "&" -- -f for expression, a & b ldns-keyfetcher '. .' -v (does not work w/o -v) ldns-zcat /dev/null /mjt

Bug#576093: error: No nameservers defined in the resolver

2022-04-26 Thread Michael Tokarev
Control: severity -1 minor Control: tag -1 + confirmed upstream Control: found -1 1.8.1-1 On Wed, 31 Mar 2010 22:52:09 +0200 Piotr Engelking wrote: Package: ldnsutils Version: 1.6.4-4 Severity: normal If the 'nameserver' option is not present in /etc/resolv.conf, drill refuses to run: Yeah,

Bug#998308: /usr/bin/drill: drill does not respect the /etc/resolv.conf nameserver order

2022-04-26 Thread Michael Tokarev
Control: severity -1 minor Control: tag -1 + wontfix upstream On Tue, 02 Nov 2021 09:27:40 +0100 Bjørn Mork wrote: Package: ldnsutils Version: 1.7.1-2+b1 Severity: normal File: /usr/bin/drill -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 ... This is the documented behaviour in debian. Qu

Bug#1001074: ldns FTCBFS: python uses the build architecture library

2022-04-26 Thread Michael Tokarev
Control: tag -1 + moreinfo Hello! On Fri, 3 Dec 2021 17:05:59 +0100 Helmut Grohne wrote: Source: ldns Version: 1.7.1-2 Tags: patch User: debian-cr...@lists.debian.org Usertags: ftcbfs ldns fails to cross build from source, because the python build misdetects the python libraries and attempts

Bug#862207: error: libcrypto does not provide GOST

2022-04-26 Thread Michael Tokarev
Control: tag -1 + moreinfo On Tue, 9 May 2017 21:44:45 +0200 martin f krafft wrote: Package: ldnsutils Version: 1.7.0-1 Severity: normal When trying ti use ldns-key2ds with -g, I get an error about GOST not being available. % ldns-key2ds -g -n _combined.key error: libcrypto does n

Bug#716060: [Mayhem] Bug report on ldnsutils: ldns-keyfetcher crashes with exit status 139

2022-04-26 Thread Michael Tokarev
Control: forcemerge -1 716056 716074 Control: tag -1 + confirmed upstream Control: found -1 1.8.1-1 Control: retitle -1 numerous input/options parsing errors in ldns example utilities ldns-dpa -f "&" -- -f for expression, a & b ldns-keyfetcher '. .' -v (does not work w/o -v) ldns-zcat /dev/

Bug#716056: [Mayhem] Bug report on ldnsutils: ldns-dpa crashes with exit status 139

2022-04-26 Thread Michael Tokarev
In order to make this *significantly* easier, the whole thing boils down to: ldns-dpa -f "&" /mjt

Bug#1009726: bullseye-pu: package samba/2:4.13.13+dfsg-1+deb11u4

2022-04-26 Thread Michael Tokarev
So, is there anything else needed on my side to help this? I can re-send the debdiff (the change against the previous one was the removal of closing of #1002059 from d/changelog which slipped there by mistake, and going from -1+deb11u4 to -1~deb11u4 per carnil@ suggestion. Thanks, /mjt

Bug#1009726: bullseye-pu: package samba/2:4.13.13+dfsg-1+deb11u4

2022-04-26 Thread Michael Tokarev
26.04.2022 10:37, Salvatore Bonaccorso wrote: Hi, On Fri, Apr 15, 2022 at 05:12:38PM +0300, Michael Tokarev wrote: * switch from weird ~deb11uN to the usual +deb11uN release numbering scheme since a more recent upstream version is available in testing now It is not really a change per

Bug#814382: RFA: samba -- SMB/CIFS file, print, and login server for Unix

2022-04-25 Thread Michael Tokarev
Control: tag -1 + pending So, should we add something like "pending" tag to this bug? ;) I'm in the process of helping with samba package maintenance for quite some time now... ;)) I come across this bug report because it popped up in tracker.d.o page for another package I maintain, with a warni

Bug#1009907: cloning it back to smbclient for people to see

2022-04-24 Thread Michael Tokarev
Control: clone -1 -2 Control: reassing -2 smbclient 2:4.16.0+dfsg-1 Control: tag -2 - upstream patch Control: block -2 by -1 Since this is something people see in samba and are trying to look up in between samba bugs, let's clone it properly. It would be really nice to have this patch backported

Bug#990055: qemu-system-x86: Cannot set PCI slot 2 for Intel IGD Passthrough using Xen

2022-04-24 Thread Michael Tokarev
Control: tag -1 - patch On Mon, 28 Jun 2021 18:23:08 +0300 Michael Tokarev wrote: .. Please address this upstream. If the problem is real, I think this way everyone will benefit from this. I don't think patching this in Debian is a good idea, at least I want debian version to be as clo

Bug#919921: qemu-user Linux ELF loader fails to handle pure BSS segments

2022-04-24 Thread Michael Tokarev
Control: tag -1 - patch On Sun, 20 Jan 2019 17:55:00 + Ben Hutchings wrote: Package: qemu-user Version: 1:3.1+dfsg-2 Severity: normal Tags: patch I've been building and testing klibc across many architectures using qemu-user, and I found that qemu-user fails to load a few programs on a few

Bug#898772: qemu: Keys still get stuck when window loses focus

2022-04-24 Thread Michael Tokarev
Control: tag -1 + moreinfo - patch On Tue, 26 Feb 2019 23:18:19 + Benjamin Moody wrote: Control: found 898772 1:3.1+dfsg-4 This bug does affect qemu 1:3.1+dfsg-4, except that the list of known modifier keys is expanded to include "META_L" and "META_R". The issue is thus somewhat less seve

Bug#1010082: please drop qemu from recommends

2022-04-24 Thread Michael Tokarev
23.04.2022 23:39, Michael Tokarev wrote: Package: due Version: 3.0.0-1 Severity: normal X-Debbugs-Cc: pkg-qemu-de...@lists.alioth.debian.org Please drop "qemu" package from Recommends. It makes no sense, qemu is a dummy no-op package for a few debian releases already and is going a

Bug#1010081: please drop qemu from recommends

2022-04-23 Thread Michael Tokarev
24.04.2022 05:46, Shengjing Zhu wrote: .. recommending qemu makes no sense. It is a dummy package for a few debian releases already and is going away. I think you have a broken script to find the affected package. That script would be my own eyes and fingers, apparently ;) packer only sugge

Bug#1010082: please drop qemu from recommends

2022-04-23 Thread Michael Tokarev
Package: due Version: 3.0.0-1 Severity: normal X-Debbugs-Cc: pkg-qemu-de...@lists.alioth.debian.org Please drop "qemu" package from Recommends. It makes no sense, qemu is a dummy no-op package for a few debian releases already and is going away. /mjt

Bug#1010081: please drop qemu from recommends

2022-04-23 Thread Michael Tokarev
Package: packer Version: 1.6.6+ds1-4 Severity: normal X-Debbugs-Cc: pkg-qemu-de...@lists.alioth.debian.org recommending qemu makes no sense. It is a dummy package for a few debian releases already and is going away. /mjt

Bug#968036: samba: segfault with aio_pthread

2022-04-23 Thread Michael Tokarev
Control: tag -1 + moreinfo On Fri, 07 Aug 2020 10:33:25 +0200 "Josep M. Perez" wrote: Package: samba Version: 2:4.12.5+dfsg-3 Severity: normal Tags: upstream X-Debbugs-Cc: josep.m.pe...@gmail.com Dear Maintainer, * What led up to the situation? Enabled aio_pthread. * What exactly did

Bug#998328: smbclient: missing alternative for smbspool_krb5_wrapper cups backend

2022-04-23 Thread Michael Tokarev
On Tue, 02 Nov 2021 15:17:42 +0100 Laurent Grawet wrote: Package: smbclient Version: 2:4.13.5+dfsg-2 Severity: normal Dear Maintainer, * What led up to the situation? no way to choose between smb and smbspool_krb5_wrapper cups backend * What exactly did you do (or not do) that was effec

Bug#993347: samba: recent systemd update (DSA-4942-1) makes samba-ad-dc complain about PID's.

2022-04-23 Thread Michael Tokarev
Control: tag -1 + moreinfo So, as suggested by FeRD, has it been fixed by subsequent samba release(s)? Louis, can you test a more recent version, or are you on stable/bullseye now (which still does not have the mentioned fix)? It looks like this issue has been fixed by 4.14... Thanks, /mjt

Bug#1009726: bullseye-pu: package samba/2:4.13.13+dfsg-1+deb11u4

2022-04-23 Thread Michael Tokarev
23.04.2022 11:28, Michael Tokarev wrote: ... This also fixes a *sporaric* (rare) broken build which actually happened with previous security update: #1006935, #1009855, #1002059 The #1002059 slipped there by a mistake. It is a different problem, most likely a misconfiguration on the OP side

Bug#1009726: bullseye-pu: package samba/2:4.13.13+dfsg-1+deb11u4

2022-04-23 Thread Michael Tokarev
11uN release numbering scheme +since a more recent upstream version is available in testing now + * d/salsa-ci.yml: target bullseye + + -- Michael Tokarev Sat, 23 Apr 2022 11:13:39 +0300 + samba (2:4.13.13+dfsg-1~deb11u3) bullseye-security; urgency=high * Non-maintainer upload by the

Bug#1009726: broken build of samba_4.13.13+dfsg-1~deb11u3 on i386

2022-04-23 Thread Michael Tokarev
Hello! It turned out the security-uploaded build of samba on i386 is broken. There were several reports about smbd segfaulting at startup or other weirdness. This is specific to i386 build, the x64 build is fine (and I know nothing about the other architectures). An example bugreport is #1006935

Bug#1006935: Same problem

2022-04-22 Thread Michael Tokarev
22.04.2022 21:37, Michael Tokarev wrote: Lemme re-build deb11u3 locally to see if this is maybe a build issue?.. So I just rebuilt ~deb11u3 in a clean bullseye i386 schroot environment, the standard way. With the resulting samba-libs package samba does not crash at startup anymore, and it all

Bug#1006935: Same problem

2022-04-22 Thread Michael Tokarev
22.04.2022 21:20, Michael Tokarev wrote: .. Lemme see if to-be 4.13.13+dfsg-1+deb11u4 works... And this one works indeed. There's no changes between deb11u3 and deb11u4 which can fix this issue, but the prob (with locally built deb11u4) is gone. The build is performed on a stable bul

Bug#1010026: qemu-system-x86: fails to start VM with "host" cpu missing features

2022-04-22 Thread Michael Tokarev
Control: retitle -1 qemu-system-x86_64: ../../target/i386/kvm/kvm.c:2996: kvm_buf_set_msrs: Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed. 22.04.2022 20:34, Adrian Davey wrote: Hi Michael, Please ignore the 5.16.0-5-amd64 that is the laptop kernel, it only features on the bug report due to

Bug#1006935: [Pkg-samba-maint] Bug#1006935: Same problem

2022-04-22 Thread Michael Tokarev
Control: tag -1 + confirmed 22.04.2022 19:15, Andrés Maldonado wrote: Hello, I got the same problem as 1. after an 'apt upgrade', which upgraded Samba and it's dependencies from 2:4.13.13+dfsg-1~deb11u2 to 2:4.13.13+dfsg-1~deb11u3. I'm on Debian Bullseye, I also use a i386 package and I have

Bug#1010026: qemu-system-x86: fails to start VM with "host" cpu missing features

2022-04-22 Thread Michael Tokarev
22.04.2022 19:01, Adrian Davey wrote: HI Michael, Apologies the reportbug package is installed on a laptop, the issue is on a headless system [..] That's okay, that happens. This headless server has both Kernel: Linux 5.16.0-6-amd64 as well as Linux 5.17.0-1-amd64 #1 SMP PREEMPT Debian 5.1

Bug#1010026: qemu-system-x86: fails to start VM with "host" cpu missing features

2022-04-22 Thread Michael Tokarev
22.04.2022 17:10, Adrian Davey wrote: Package: qemu-system-x86 Version: 1:7.0+dfsg-1 Severity: normal 2022-04-21T17:07:40.354354Z qemu-system-x86_64: warning: This feature depends on other features that were not requested: CPUID.800AH:EDX.npt [bit 0] As I said, this is unrelated. 2022-04

Bug#1010026: qemu-system-x86: fails to start VM with "host" cpu missing features

2022-04-22 Thread Michael Tokarev
Control: tag -1 + moreinfo 22.04.2022 17:10, Adrian Davey wrote: Package: qemu-system-x86 Version: 1:7.0+dfsg-1 Severity: normal Dear Maintainer, VMs controlled by libvirt failed to start when using "host" cpu type with kvm acceleration libvirt log gives: 2022-04-21T17:07:40.354354Z qemu-sys

Bug#1009928: postinst runs unbound-resolvconf even with disabled/masked unbound

2022-04-20 Thread Michael Tokarev
20.04.2022 23:56, Petr Cech wrote: Package: unbound Version: 1.15.0-4 Severity: normal Hi, I have unbound installed but masked in systemd. So when postinst of unbound runs unbound-resolvconf.service I end up with "broken" resolv.conf pointing to localhost but with no running resolver. I'm not su

Bug#1009907: Smbclient error: "Failed to mount Window share: invalid argument"

2022-04-20 Thread Michael Tokarev
Control: reassign -1 gvfs-backends 1.50.0-1 Control: tag -1 + upstream patch 20.04.2022 16:06, Salis, Antonello (NFOD) wrote: Package: smbclient Version: 2:4.16.0+dfsg-6 Debian testing When I try to browse Windows folders with Nautilus or Nemo i get "Failed to mount Window share: inval

Bug#1009907: Smbclient error: "Failed to mount Window share: invalid argument"

2022-04-20 Thread Michael Tokarev
20.04.2022 19:44, Michael Tokarev wrote: .. An interesting find.  I quickly browsed there, but don't immediately see a solution in there. I'll take a closer look. This appears to be the fix: https://gitlab.gnome.org/GNOME/gvfs/-/merge_requests/138 (which is in gnome-vfs). But does

Bug#1009907: Smbclient error: "Failed to mount Window share: invalid argument"

2022-04-20 Thread Michael Tokarev
20.04.2022 16:06, Salis, Antonello (NFOD) wrote: Package: smbclient Version: 2:4.16.0+dfsg-6 Debian testing When I try to browse Windows folders with Nautilus or Nemo i get "Failed to mount Window share: invalid argument". This never happened before last week. Does smbclient work by i

Bug#1009903: unbound: /etc/resolvconf/update.d/unbound is enabled by default after upgrade

2022-04-20 Thread Michael Tokarev
20.04.2022 16:18, Vincent Lefevre wrote: On 2022-04-20 15:27:16 +0300, Michael Tokarev wrote: .. This is exactly what dpkg does: it preserves local permission changes for conffilies, even if you tell it to replace your locally- modified conffile with a new conffile coming from the updated

Bug#1009903: unbound: /etc/resolvconf/update.d/unbound is enabled by default after upgrade

2022-04-20 Thread Michael Tokarev
Control: severity -1 normal Control: tag -1 + moreinfo 20.04.2022 14:11, Vincent Lefevre wrote: Package: unbound Version: 1.15.0-3 Severity: important In the upgrade to unbound 1.15.0-3, I chose to replace the script to the default one (following the recent discussions, I intend to revert to th

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
20.04.2022 00:58, Vincent Lefevre wrote: On 2022-04-20 00:43:48 +0300, Michael Tokarev wrote: 20.04.2022 00:40, Vincent Lefevre wrote: Well, systemd already have its own nameserver configuration and its own resolver cache which does not need any reload of daemons, since resolv.conf does not

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
20.04.2022 00:40, Vincent Lefevre wrote: Well, systemd already have its own nameserver configuration and its own resolver cache which does not need any reload of daemons, since resolv.conf does not change (It does not change with resolvconf and unbound running with resolvconf hook enabled, eithe

Bug#989959: closed by Debian FTP Masters (reply to Michael Tokarev ) (Bug#989959: fixed in unbound 1.15.0-2)

2022-04-19 Thread Michael Tokarev
19.04.2022 23:38, Dennis Filder wrote: I wasn't CC'ed, thus the late reply. I didn't know either, Dennis. I just replied to the bug :) But now I've a question: how the initial problem happened? Okay, it smells like it is, and it definitely it should not be copied from /usr/share/dns/root.key

Bug#1003135: resolvconf: prevents wifi.sncf from being resolved

2022-04-19 Thread Michael Tokarev
On Wed, 5 Jan 2022 16:36:40 +0100 Vincent Lefevre wrote: .. But I don't understand. The upstream nameservers are supposed to be used as a fallback. Even if upstream nameservers do not perform DNSSEC validation, this is still better than a failure when DNSSEC is not required. For the record, th

Bug#888999: unbound-anchor: please move unbound-anchor from /usr/sbin to /usr/bin

2022-04-19 Thread Michael Tokarev
Control: tag -1 + upstream Hello! On Wed, 31 Jan 2018 22:12:59 -0500 Daniel Kahn Gillmor wrote: Package: unbound-anchor Version: 1.6.7-1 Severity: wishlist the dns-root-data package's debian/rules uses unbound-anchor in its get_orig_source target. It currently specifies the path explicitly,

Bug#537899: could respect domain search path from resolv.conf

2022-04-19 Thread Michael Tokarev
Control: tag -1 + confirmed upstream Hello! Replying to a bug from 2009, this is more than 12 years old! :) On Tue, 21 Jul 2009 18:07:14 +0200 martin f krafft wrote: Package: unbound-host Version: 1.3.2-1 Severity: wishlist File: /usr/bin/unbound-host I understand unbound-host does not read

Bug#641704: unbound-host should be preconfigured with DNS root trust anchor

2022-04-19 Thread Michael Tokarev
Control: tag -1 + confirmed Hi Janus! Replying to a bugreport which is more than 10 years old already.. :) On Thu, 15 Sep 2011 11:46:58 +0200 Thue Janus Kristensen wrote: Package: unbound-host Version: 1.4.12-1 Severity: normal Dear Maintainer, Using a simple "aptitude install unbound-host

Bug#907314: unbound: exception in python module due to the dnameAsStr() function

2022-04-19 Thread Michael Tokarev
Control: tag -1 + moreinfo unreproducible On Sun, 26 Aug 2018 11:13:22 + root wrote: Package: unbound Version: 1.7.3-1 Severity: normal Dear Maintainer, * What led up to the situation? trying to implement an unbound python module (python code executed while the unbound serve

Bug#914405: appears to not update auto-trust-anchors without requests

2022-04-19 Thread Michael Tokarev
Control: tag -1 + upstream moreinfo On Fri, 23 Nov 2018 07:19:05 + Peter Palfrader wrote: Package: unbound Version: 1.6.0-3+deb9u2 Severity: normal Hi! we have unbound configured as a recursor on most of our hosts, and we have a few trust-anchors in addition to the root zone's configured

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
19.04.2022 17:49, Vincent Lefevre wrote: .. I don't think this is in the scope of resolvconf people, because the whole purpose of resolvconf is different. I don't know what you mean here. In my case, the purpose of resolvconf is just to restart postfix each time /etc/resolv.conf is modified r

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
19.04.2022 16:02, Vincent Lefevre wrote: On 2022-04-19 15:15:11 +0300, Michael Tokarev wrote: unbound resolvconf integration (the disabled one) works by setting DNS servers obtained via DHCP to become the forwarders in unbound. As simple as that. I'm not saying about 127.0.0.1 filtering

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
19.04.2022 14:11, Vincent Lefevre wrote: On 2022-04-19 13:22:53 +0300, Michael Tokarev wrote: In my understanding over the years, I expected the nameservers received from/by DHCP should be used *first*. I did this with unbound or dnsmasq even before resolvconf has been written - using custom

Bug#989959: unbound: Corrupt/empty trust anchor file is not healed upon start

2022-04-19 Thread Michael Tokarev
On Mon, 18 Apr 2022 08:43:24 +0300 Michael Tokarev wrote: .. Maybe we can always update this (very small) file as a part of the daemon startup procedure. It looks like I completely misunderstood this file purpose. Am I right this is just the initial key and unbound updates this key

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-19 Thread Michael Tokarev
19.04.2022 13:09, Vincent Lefevre wrote: ...> The way resolvconf expects it to work is to use the usual method, and in case of an error, fall back to the upstream nameservers. Since the upstream nameservers should be used as a fallback, I don't see why this would be problematic. hm.. now this

Bug#927877: unbound: "Warning: query response not set" with dig, i.e. QR bit not set in the response

2022-04-19 Thread Michael Tokarev
19.04.2022 12:59, Vincent Lefevre wrote: On 2022-04-19 12:38:24 +0300, Michael Tokarev wrote: .. I for one don't know what a maintainer has to do with this bug. Note that I've let the bug closed since it is not clear that the issue will occur again. Oh. This is what happens when

Bug#927877: unbound: "Warning: query response not set" with dig, i.e. QR bit not set in the response

2022-04-19 Thread Michael Tokarev
19.04.2022 11:51, Vincent Lefevre wrote: .. Since there is no way to know whether there was any fix (or even any change that would make the issue disappear as a side effect), let's rather tag the bug as unreproducible. Hi Vincent! Out of curiocity, what do you expect this bug staying like this

Bug#900028: closed by Michael Tokarev (Re: unbound: Fails to start)

2022-04-18 Thread Michael Tokarev
18.04.2022 22:25, James Cloos wrote: closing the report like that makes no sense whatsoever. Please feel free to reopen this bug report and be ready to provide some more information to debug it and to find and fix the problem. Lacking that it makes no sense whatsoever to keep it. FWIW, 1.7.1-1

Bug#1009204: vdirsyncer: diff for NMU version 0.18.0-6.1

2022-04-18 Thread Michael Tokarev
nd on +all pythons. Closes: #1009204 + + -- Michael Tokarev Mon, 18 Apr 2022 17:39:33 +0300 + vdirsyncer (0.18.0-6) unstable; urgency=medium * avoid checking flaky test test_fuzzing; diff -Nru vdirsyncer-0.18.0/debian/tests/control vdirsyncer-0.18.0/debian/tests/control --- vdirsyncer-0

Bug#927435: upgrade-reports: Buster upgrade: had to re-create unbound certs/keys

2022-04-18 Thread Michael Tokarev
Control: severity -1 normal Control: tag -1 + confirmed [ https://bugs.debian.org/927435 ] The talk is about stretch -> buster upgrade. John Eikenberry: > Package: upgrade-reports > Severity: normal > > After upgrading to buster, unbound-control would fail to run with this error.. > > error:

Bug#949156: unbound: Please enable ipset support

2022-04-18 Thread Michael Tokarev
Control: tag -1 + confirmed moreinfo On Fri, 17 Jan 2020 22:39:27 +0800 hypeng wrote: Package: unbound Version: 1.9.4-2+b1 Severity: wishlist Hi, On Jun 2019, unbound supported the ipset that could add the domain's ip to a list easily.Like dnsmasq. use "./configure --enable-ipset" to enable

Bug#991586: unbound systemd service should use network-online.target instead of network.target

2022-04-18 Thread Michael Tokarev
Control: tag -1 + moreinfo On Tue, 27 Jul 2021 18:05:51 -0400 Marcus Furlong wrote: Package: unbound Version: 1.9.0-2+deb10u2 When starting unbound and binding to a specific interface using the `interface` keyword, unbound can fail if the interface is not configured correctly on boot. Changin

Bug#997811: unbound crashes, remote dos?

2022-04-18 Thread Michael Tokarev
Version: 1.15.0-1 On Mon, 25 Oct 2021 07:57:22 +0300 Aleksi Suhonen wrote: Package: unbound Version: 1.13.1-1 Severity: normal Our unbound crashed a twice over the weekend, until I shut it down and replaced it with different software. Now that I'm back at work, I'm looking at the logs and f

Bug#991017: unbound: remote-control port 127.0.0.1:8953 was opened to listen unexpectedly

2022-04-18 Thread Michael Tokarev
Control: tag -1 + confirmed On Tue, 13 Jul 2021 01:11:30 + laalaa laalaa wrote: Package: unbound Version: 1.13.1-1 Severity: normal After upgrade from buster to bullseye with same config file, port 127.0.0.1:8953 was additionally listened for. From man page, this is "remote-control" port

Bug#1004032: unbound: /etc/resolvconf/update.d/unbound is buggy

2022-04-18 Thread Michael Tokarev
On Wed, 19 Jan 2022 16:33:46 +0100 Vincent Lefevre wrote: Package: unbound Version: 1.13.1-1 Severity: important Note: The changes I've done on /etc/resolvconf/update.d/unbound is just logging messages (to known what's going on). When /run/resolvconf/interface/NetworkManager is obsolete (which

Bug#1009309: udhcpc: allow usage without busybox

2022-04-17 Thread Michael Tokarev
13.04.2022 09:31, Helmut Grohne wrote: Control: tags -1 + moreinfo On Wed, Apr 13, 2022 at 09:13:58AM +0300, Michael Tokarev wrote: No, as far as I understand. B/c udhcpc package lacks the main binary if there's no busybox... ;) Can you explain please? :) Head -> table. I now unders

Bug#989959: unbound: Corrupt/empty trust anchor file is not healed upon start

2022-04-17 Thread Michael Tokarev
On Wed, 16 Jun 2021 18:57:26 +0200 Dennis Filder wrote: Package: unbound Version: 1.13.1-1 Severity: normal Tags: patch I ran out of space on /var and unbound still tried to update the root trust anchor file which ended up empty. Then later after reboot the package-helper failed to detect and

Bug#1007260: performance regression due to linking against libnettle

2022-04-17 Thread Michael Tokarev
On Mon, 14 Mar 2022 23:58:37 +0100 "Steinar H. Gunderson" wrote: Package: libunbound8 Version: 1.13.1-1 Severity: normal Hi, We were investigating a performance regression in production that crept in at some point (we noticed by accident that something had become very slow and started investi

Bug#1009726: bullseye-pu: package samba/2:4.13.13+dfsg-1+deb11u4

2022-04-15 Thread Michael Tokarev
3738-dsdb-crash-4.13-v03.patch +to make patch deapply happy (quilt does not notice this situation) + * switch from weird ~deb11uN to the usual +deb11uN release numbering scheme +since a more recent upstream version is available in testing now + * d/salsa-ci.yml: target bullseye + + -- Michae

Bug#1009385: communication

2022-04-13 Thread Michael Tokarev
[Resending whole thing. I think it is is important to have it publicly available and to reach you, so adding it to the bugreport too. Apparently team+dns@tracker.d.o isn't working and there's no archives] I want to follow up on the todays ldns incident. I think it was quite interesting. The whol

Bug#1001053: also being affected

2022-04-13 Thread Michael Tokarev
13.04.2022 22:37, Daniel Lakeland wrote: My wife has a dual mirrored glusterfs file server that is used for central storage of biology research data. They'd been running old versions of Debian, until one of them had a hard drive failure. After replacing hardware and installing the latest Debian r

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
BTW, Daniel, please re-tag 1.7.1-3 - this is what's at the tip of master now. I hope anyway :) Thanks, /mjt

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
Fixed my branch on the ldns repo, rebasing it on top of now-okay master. If we ever need one more 1.7 release it will be easier to rebase now with the conflicts resolved. I have to review my branch again, I think something might not be right there after the rebase on top of dkg's changes. I will

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
Okay guys. I thought about this a bit more. One wrong action by one developer does not make the environment unhealthy. I fixed the mess done to the master branch. I think - provided this wont happen again - it's okay to work on this to fix the rest of the mess done. I'm doing this right now.

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
13.04.2022 21:19, Daniel Kahn Gillmor wrote: .. reviewed and i'll push that to salsa as a "debian/experimental" branch later today, if either of you want to take a look at what i'm considering for release. The whole thing was ready, polished, everything addressed. If you wanted another 1.7.1 up

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
13.04.2022 21:29, Michael Tokarev wrote: The only prob is that the master branch on the ldns repository is seriously messed up. Also you've made similar commits as I did, but in an incomplete way (like the watch file update). Thanks, /mjt

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
13.04.2022 21:19, Daniel Kahn Gillmor wrote: Hi Michael and Santiago-- I've now uploaded ldns 1.7.1-3 with the associated fix for 1009385. I'm reviewing Michael's changes for 1.8.1, and they're looking good to me. Thank you for all that work, Michael! I think we should consider uploading 1.8.1

Bug#904999: : autodep8: python autopkg tests are always run for all supported python versions

2022-04-13 Thread Michael Tokarev
On Mon, 30 Jul 2018 12:37:50 +0200 Matthias Klose wrote: Package: autodep8 Version: 0.13 Severity: important The python autopkg tests are always run for all supported python versions, ignoring, if a module is available for all available versions. This is the case for extensions only built for

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
On 13.04.2022 16:44, Santiago Ruano Rincón wrote: .. So what do we do now? I think the best is to include this fix as 1.7.1-3 (provided it actually fixes the issue) for now, instead of uploading 1.8. Why just don't uploading 1.8.1? Well, we know 1.7 (sort of) works while 1.8 might cause surp

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
[Just a quick follow-up] On 13.04.2022 15:52, Santiago Ruano Rincón wrote: [...] It seems it was fixed on 1.8.0. https://github.com/NLnetLabs/ldns/commit/4d2057f0b5220487882be1b19c302833b84cffe3 Wonderful.. :) Thank you Santiago! So, the prob should've be there after just any recompile of ldn

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
13.04.2022 10:09, Michael Tokarev wrote: .. But let's try. How this utility is used in building of dns-root-data?  Lemme take a look at this package.  If you can provide me some minimal testcase to produce just the DS record which differs, it will be nice. I don't have time for

Bug#1009385: libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data [was: Re: Bug#1009385: dns-root-data: FTBFS: root-anchors.ds root.ds differ]

2022-04-13 Thread Michael Tokarev
13.04.2022 09:50, Daniel Kahn Gillmor wrote: Control: reassign 1009385 libldns3 1.7.1-2.1 Control: retitle 1009385 libldns3 1.7.1-2.1 changes output of ldns-key2ds, causing FTBFS on dns-root-data Control: affects 1009385 + dns-root-data X-Debbugs-Cc: Michael Tokarev Control: tags 1009385

Bug#1009309: udhcpc: allow usage without busybox

2022-04-12 Thread Michael Tokarev
11.04.2022 15:21, Helmut Grohne wrote: Source: busybox Version: 1:1.30.1-7 Severity: wishlist Tags: patch Hi Aurelien, would it be possible to avoid the udhcpc -> busybox dependency? It may seem strange to remove busybox in a quest to reduce file system usage at first, but if you need iproute2

Bug#1009371: architecture.mk: run dpkg-architecture 33 times before executing first command in d/rules

2022-04-12 Thread Michael Tokarev
Package: dpkg Version: 1.21.7 Severity: minor Tags: patch /usr/share/dpkg/architecture.mk sets up variables in a way so that every single variable out of 33 DEB_{HOST,..}_{ARCH,..} total is set separately by its own call to dpkg-architecture if it is not already defined. On my (not slow at all) s

Bug#961867: python3?-talloc multiarch support is broken because of the dependency on python

2022-04-09 Thread Michael Tokarev
On Sat, 30 May 2020 18:25:55 +0200 Francois Gouget wrote: Package: python-talloc Version: 2.1.14-2 Severity: normal Dear Maintainer, python-talloc is 'multiarch: same' but the i386 package is not coinstallable with the amd64 one because of their python dependency. Hi! Aside of this package

Bug#1003477: talloc FTCBFS: it's difficult

2022-04-09 Thread Michael Tokarev
Hello! On Mon, 10 Jan 2022 20:44:31 +0100 Helmut Grohne wrote: Source: talloc Version: 2.3.3-2 Tags: patch User: debian-cr...@lists.debian.org Usertags: cross-satisfiability ftcbfs talloc fails to cross build from source. I'm inclined to say it's because waf. Really, stop using waf if you can.

<    1   2   3   4   5   6   7   8   9   10   >