The outspoken users here seem to be a little too brash. I think rudeness
is uncalled for. Please "request" the developers for help gently.

To the developers, please provide more information before closing the
bug. This is a reproducible bug and I think it is a security concern in
two ways:

1. By default, connections are being established in the background. This
could be used to track users on the server side.

2. These connections are then not getting closed!

Even if you don't agree that this is a security issue, this is
definitely a valid bug!

Also, I am a little confused about what is called upstream bugs v/s
ubuntu bugs. If Ubuntu is maintaining a patchset, should bugs be tracked
against Ubuntu or upstream? Secondly, is there a Ubuntu patchset
involved here?

Finally, which packages are affected? If I don't want any of these
connections until the bug s fixed, which all packages should I remove
from my system?

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/760344

Title:
  gvfsd-http not closing tcp connections

To manage notifications about this bug go to:
https://bugs.launchpad.net/gvfs/+bug/760344/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to