Your message dated Sun, 20 Jan 2008 13:17:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#451809: fixed in cfs 1.4.1-19
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: cfs
Version: 1.4.1-18
Severity: serious
--- Please enter the report below this line. ---
Hello,
I can't use cfs on my 64 bit system ("private" is an existing cfs which works
on other machines):
[EMAIL PROTECTED]:~$ cattach private
Key:
[EMAIL PROTECTED]:~$ mount | grep cfs
localhost:/var/lib/cfs/.cfsfs on /var/cfs type nfs
(rw,port=3049,intr,nfsvers=2,udp,addr=127.0.0.1)
[EMAIL PROTECTED]:~$ cd /crypt/private/
[EMAIL PROTECTED]:/crypt/private$ ls
ls: reading directory .: Input/output error
[EMAIL PROTECTED]:/crypt/private$ echo hallo > test
bash: test: Invalid argument
[EMAIL PROTECTED]:/crypt/private$ cat test
[EMAIL PROTECTED]:/crypt/private$ echo *
*
[EMAIL PROTECTED]:/crypt/private$ cd
[EMAIL PROTECTED]:~$ cdetach private
[EMAIL PROTECTED]:~$ exit
It seems this bug is old:
http://www.mail-archive.com/[EMAIL PROTECTED]/msg20439.html
--- System information. ---
Architecture: amd64
Kernel: Linux 2.6.22.5gru
Debian Release: lenny/sid
500 testing www.debian-multimedia.org
500 testing security.debian.org
500 testing ftp2.de.debian.org
500 testing ftp.debian-unofficial.org
--- Package information. ---
Depends (Version) | Installed
================================-+-===========
libc6 (>= 2.6-1) | 2.6.1-1
nfs-kernel-server | 1:1.1.1~git-20070929-1
OR nfs-user-server |
--
Markus Grunwald
Registered Linux User Nr 101577 gpg/pgp fingerprint: 7E01F5FE15CEDD0A
http://counter.li.org (gpg --recv-keys 7E01F5FE15CEDD0A)
icq 314331831
--- End Message ---
--- Begin Message ---
Source: cfs
Source-Version: 1.4.1-19
We believe that the bug you reported is fixed in the latest version of
cfs, which is due to be installed in the Debian FTP archive:
cfs_1.4.1-19.diff.gz
to pool/main/c/cfs/cfs_1.4.1-19.diff.gz
cfs_1.4.1-19.dsc
to pool/main/c/cfs/cfs_1.4.1-19.dsc
cfs_1.4.1-19_powerpc.deb
to pool/main/c/cfs/cfs_1.4.1-19_powerpc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Gerrit Pape <[EMAIL PROTECTED]> (supplier of updated cfs package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 20 Jan 2008 12:28:28 +0000
Source: cfs
Binary: cfs
Architecture: source powerpc
Version: 1.4.1-19
Distribution: unstable
Urgency: low
Maintainer: Gerrit Pape <[EMAIL PROTECTED]>
Changed-By: Gerrit Pape <[EMAIL PROTECTED]>
Description:
cfs - Cryptographic Filesystem
Closes: 438678 451809
Changes:
cfs (1.4.1-19) unstable; urgency=low
.
[ Klaus Ethgen ]
* Reverting the accidentally removed blowfish support. Closes: #438678.
* Hopefully fix the amd64 problem. Hopefully closes: #451809.
* Fixing some warnings reported by lintian.
* Bumped to new policy 3.7.3
.
[ Gerrit Pape ]
* apply NMU 1.4.1-18.1 from Klaus Ethgen (thx!).
Files:
13087a053a15983dad8d135d5a9c4eff 508 utils optional cfs_1.4.1-19.dsc
d9a0733d23ef1e63c454274621b9e7f3 26066 utils optional cfs_1.4.1-19.diff.gz
b2ce048158924a00c4f32c100c8b5869 215988 utils optional cfs_1.4.1-19_powerpc.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHk0dLGJoyQbxwpv8RAi6KAJwM/w8f84VPR/8/uXGEgndT+6UojgCeNlNZ
gMzbg6N+8T01d2ozjAyaJcM=
=Y5pg
-----END PGP SIGNATURE-----
--- End Message ---