Your message dated Tue, 06 Oct 2009 07:47:14 +0000
with message-id <e1mv4lo-00088d...@ries.debian.org>
and subject line Bug#549585: fixed in udev 146-4
has caused the Debian Bug report #549585,
regarding udev: creates /dev/{u,}random with too strict permissions
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
549585: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549585
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: mandos-client
Version: 1.0.12-1
Severity: grave
Justification: renders package unusable

After installing mandos I tested my configuration as described in
README.Debian. That worked successfully. However, booting a
mandos-enabled kernel, mandos will not run. The cryptsetup password
prompt appears and I have to type in the crypt volume's password
manually to make the system continue to boot.
At virtually the same time the cryptsetup password prompt appears,
an error message is printed on the console:
Fatal: no entropy gathering module detected

According to google that message seems to be related to gnutls.
However, as mandos-client doesn't seem to have a debug mode when run
from initrd, I wasn't able to dig deeper. There is no such error
message when testing mandos-client as described in README.Debian

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mandos-client depends on:
ii  adduser                       3.111      add and remove users and groups
ii  cryptsetup                    2:1.0.7-2  configures encrypted block devices
ii  libavahi-common3              0.6.25-1   Avahi common library
ii  libavahi-core6                0.6.25-1   Avahi's embeddable mDNS/DNS-SD lib
ii  libc6                         2.9-27     GNU C Library: Shared libraries
ii  libgnutls26                   2.8.4-1    the GNU TLS library - runtime libr
ii  libgpg-error0                 1.6-1      library for common error values an
ii  libgpgme11                    1.2.0-1    GPGME - GnuPG Made Easy

mandos-client recommends no packages.

mandos-client suggests no packages.

-- no debconf information


Regards,
C. Dominik Bodi



--- End Message ---
--- Begin Message ---
Source: udev
Source-Version: 146-4

We believe that the bug you reported is fixed in the latest version of
udev, which is due to be installed in the Debian FTP archive:

gir1.0-gudev-1.0_146-4_i386.deb
  to pool/main/u/udev/gir1.0-gudev-1.0_146-4_i386.deb
libgudev-1.0-0_146-4_i386.deb
  to pool/main/u/udev/libgudev-1.0-0_146-4_i386.deb
libgudev-1.0-dev_146-4_i386.deb
  to pool/main/u/udev/libgudev-1.0-dev_146-4_i386.deb
libudev-dev_146-4_i386.deb
  to pool/main/u/udev/libudev-dev_146-4_i386.deb
libudev0_146-4_i386.deb
  to pool/main/u/udev/libudev0_146-4_i386.deb
udev-udeb_146-4_i386.udeb
  to pool/main/u/udev/udev-udeb_146-4_i386.udeb
udev_146-4.diff.gz
  to pool/main/u/udev/udev_146-4.diff.gz
udev_146-4.dsc
  to pool/main/u/udev/udev_146-4.dsc
udev_146-4_i386.deb
  to pool/main/u/udev/udev_146-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 549...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marco d'Itri <m...@linux.it> (supplier of updated udev package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 06 Oct 2009 09:01:08 +0200
Source: udev
Binary: udev libudev0 libudev-dev udev-udeb libgudev-1.0-0 gir1.0-gudev-1.0 
libgudev-1.0-dev
Architecture: source i386
Version: 146-4
Distribution: unstable
Urgency: high
Maintainer: Marco d'Itri <m...@linux.it>
Changed-By: Marco d'Itri <m...@linux.it>
Description: 
 gir1.0-gudev-1.0 - libgudev-1.0 introspection data
 libgudev-1.0-0 - GObject-based wrapper library for libudev
 libgudev-1.0-dev - libgudev-1.0 development files
 libudev-dev - libudev development files
 libudev0   - libudev shared library
 udev       - /dev/ and hotplug management daemon
 udev-udeb  - /dev/ and hotplug management daemon (udeb)
Closes: 549275 549311 549585 549702
Changes: 
 udev (146-4) unstable; urgency=high
 .
   * Restore the signal mask before executing event RUN commands.
     (Closes: #549702)
   * Earliest kernel release supported raised from 2.6.18 to 2.6.22.
   * Copy 64-md-raid.rules in the initramfs because the mdadm package
     does not do it. (Closes: #549275)
   * Copy 91-permissions.rules too because there is at least one package
     which run as non-root in the initramfs. (Closes: #549585)
   * permissions.rules: removed usage of group scanner which is not one
     of the standard groups in base-passwd. (Closes: #549311)
   * Removed the rules needed to work around bugs in now unsupported
     kernel releases.
Checksums-Sha1: 
 f970fbd67203955e8ae3d09cbac4f2a6133498fa 1253 udev_146-4.dsc
 f7ebd8a53a8f303be0c2a49145e858f85fd2f3aa 74959 udev_146-4.diff.gz
 16eb31af3cb8a50ff334310432b92d471e2d7507 437048 udev_146-4_i386.deb
 e48bae7538fdc6f235b84789fa055b224b1a6834 99598 libudev0_146-4_i386.deb
 f93e54f367418d9462474ed5e82f98954d3cbb2c 30188 libudev-dev_146-4_i386.deb
 ea3c4b2e0f6e60be6fef36b57326ffaa754a95b6 149728 udev-udeb_146-4_i386.udeb
 2a3e57e80f72845adf57782527b0cc6464f012b9 86472 libgudev-1.0-0_146-4_i386.deb
 82de4d5cc161dc1deb90a35c9d6c34b01a8068fc 2246 gir1.0-gudev-1.0_146-4_i386.deb
 8471eea278f4ea07b17942664662016aab56a676 19450 libgudev-1.0-dev_146-4_i386.deb
Checksums-Sha256: 
 e5ea45f95415c4ca32165b8e5e3959988eb48aa7663ebf9e883abd30f7e7c057 1253 
udev_146-4.dsc
 d75810a16ec6e7cf3c49c3a0c2051fa630516e21fc62ccfdb7ecdf4c440433e1 74959 
udev_146-4.diff.gz
 0f820f8239e1eec2b0440a893814f29be2547ba4d80692dc1251d54a57cb0b2b 437048 
udev_146-4_i386.deb
 dbfbca8ca38358324288dd4d56583c83f7c61193d01553a71d1ec3572f178365 99598 
libudev0_146-4_i386.deb
 04162b4136f382e238e18daa3178a1903ca43b1e8b43fe3664103c0de1de8dce 30188 
libudev-dev_146-4_i386.deb
 60a18510957132211ac93a5ffa979a29712c4c44ffe91fae86f1ea07270e5b79 149728 
udev-udeb_146-4_i386.udeb
 ef2f93f1f22a1cba078a6b32e13b56af75f21843691f8e4f77cf59d26b15d052 86472 
libgudev-1.0-0_146-4_i386.deb
 132e86cd01aee699b0f44bbce47e0c7f6798db8aabe2ea5bdda5a70d25659ba3 2246 
gir1.0-gudev-1.0_146-4_i386.deb
 643d284293720ce8d8ced2f26286de5d60a56ac4c9492c70acc6adaf93d95e9a 19450 
libgudev-1.0-dev_146-4_i386.deb
Files: 
 233de3ace437b0771ad8ee16eaa7ec2c 1253 admin important udev_146-4.dsc
 0f9e230e5018cd68cf7da315583e857c 74959 admin important udev_146-4.diff.gz
 58a861ab0e52fc7d62c780ababc00bb9 437048 admin important udev_146-4_i386.deb
 700325b54dddf8febba35cd05591cddc 99598 libs optional libudev0_146-4_i386.deb
 6ad6316791735a03c40b6cfd0248ccc5 30188 libdevel optional 
libudev-dev_146-4_i386.deb
 8935c53ee1032908f95398b51c1a5a09 149728 debian-installer important 
udev-udeb_146-4_i386.udeb
 c0e4f327ca9fdc9e04897e0b69936918 86472 libs optional 
libgudev-1.0-0_146-4_i386.deb
 709fb4d6898b0f1716bd3060557e07db 2246 libs optional 
gir1.0-gudev-1.0_146-4_i386.deb
 5d17c850d014b3a1c0ae409d0c52ccc0 19450 libdevel optional 
libgudev-1.0-dev_146-4_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrK81wACgkQFGfw2OHuP7GbNgCgpaj+G4m/IQJvp2d6ECxiIoEi
5bgAn38sJwAXuXe9dDPdV0GMumvwd03u
=qMdH
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to