Your message dated Sat, 24 Dec 2016 19:20:32 +0000
with message-id <e1ckrrs-000gwn...@fasolo.debian.org>
and subject line Bug#847135: fixed in openconnect 7.08-1
has caused the Debian Bug report #847135,
regarding openconnect: vpn connection mtu too big
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
847135: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847135
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openconnect
Version: 7.07-1
Severity: important
Dear Maintainer,
* What led up to the situation?
Connecting to the VPN
Any connection sending large amounds of data fails
http downloads of any non trivial file, opening a remote desktop connection
* What exactly did you do (or not do) that was effective (or ineffective)?
connections fail when sending large data as the packet size is too bug
* What was the outcome of this action?
Connections seem to hand or fail
* What outcome did you expect instead?
Successful data transfer
Please see this for discussion of the problem:
https://bbs.archlinux.org/viewtopic.php?id=200183
Adding the script as proposed at the top of the thread works well as does just
setting the MTU to a lower value after connecting
ip link set vpn0 mtu 1186
please could we fix this, it took a little tracking down and I imagine others
might find this harder to find.
*** End of the template - remove these template lines ***
-- System Information:
Debian Release: stretch/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 4.8.3 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages openconnect depends on:
ii libc6 2.24-5
ii libgnutls30 3.5.6-7
ii libopenconnect5 7.07-1
ii libproxy1v5 0.4.13-1.1
ii libxml2 2.9.4+dfsg1-2.1
ii vpnc-scripts 0.1~git20150318-1
openconnect recommends no packages.
openconnect suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: openconnect
Source-Version: 7.08-1
We believe that the bug you reported is fixed in the latest version of
openconnect, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 847...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Mike Miller <mtmil...@debian.org> (supplier of updated openconnect package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 24 Dec 2016 10:50:15 -0800
Source: openconnect
Binary: openconnect openconnect-dbg libopenconnect-dev libopenconnect5
libopenconnect5-dbg
Architecture: source
Version: 7.08-1
Distribution: unstable
Urgency: medium
Maintainer: Mike Miller <mtmil...@debian.org>
Changed-By: Mike Miller <mtmil...@debian.org>
Description:
libopenconnect-dev - open client for Cisco AnyConnect VPN - development files
libopenconnect5 - open client for Cisco AnyConnect VPN - shared library
libopenconnect5-dbg - debugging symbols for the libopenconnect5 shared library
openconnect - open client for Cisco AnyConnect VPN
openconnect-dbg - debugging symbols for the OpenConnect VPN client
Closes: 847135
Changes:
openconnect (7.08-1) unstable; urgency=medium
.
* New upstream version 7.08
- Fix MTU detection (Closes: #847135)
* d/libopenconnect5.{shlibs,symbols}: Update for new release
* d/p/juniper-content-length.patch: Drop, applied upstream
* d/p/fix-tests-shell-syntax.patch: Fix test suite shell bashisms
* d/p/softhsm2-module-workaround.patch: Hard-code Debian location of
libsofthsm2.so
* d/control:
- Add Build-Depends: libsocket-wrapper, libuid-wrapper, ocserv, openssl,
and
softhsm2 for test suite
- Add Build-Depends: libpcsclite-dev to enable Yubikey support
(LP: #1649227)
- Add Build-Depends: dpkg-dev (>= 1.17.14) for build profiles support
- Drop obsolete Build-Depends: liboath-dev
- Reorder fields according to "cme fix dpkg-control"
* Bump debhelper compatibility level to 10
* Drop explicit dependency on dh-autoreconf and disabling silent rules, now
enabled by default
Checksums-Sha1:
5b216f708104c1feac8871cba998c0576fc0e197 2585 openconnect_7.08-1.dsc
ac106457c6a94808096552b6dc2037ad4cce7858 1686133 openconnect_7.08.orig.tar.gz
78ced5263738c158c9f59e0fbbd213e0f8d55145 175536
openconnect_7.08-1.debian.tar.xz
Checksums-Sha256:
c23d8bbb398fe5b14d06723b3f63b7dd064a468229c1342350557de81b0e717b 2585
openconnect_7.08-1.dsc
1c44ec1f37a6a025d1ca726b9555649417f1d31a46f747922b84099ace628a03 1686133
openconnect_7.08.orig.tar.gz
c73e3e7c87d5604dd76a015935161f62809d5ef803c7114ab38415ff7b3ff21f 175536
openconnect_7.08-1.debian.tar.xz
Files:
0955109df9f9d6e1609a622d6f00e99e 2585 net optional openconnect_7.08-1.dsc
ca2ca1f61b8515879b481dcf6ed4366b 1686133 net optional
openconnect_7.08.orig.tar.gz
65c24975934e5b33d6e9803e86cb84d9 175536 net optional
openconnect_7.08-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=CqVD
-----END PGP SIGNATURE-----
--- End Message ---