Your message dated Sun, 23 Jun 2019 13:48:46 +0000 with message-id <[email protected]> and subject line Bug#930671: fixed in libauthen-radius-perl 0.29-2 has caused the Debian Bug report #930671, regarding libauthen-radius-perl: most basic usage stopped working to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 930671: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930671 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: libauthen-radius-perl Version: 0.29-1 Severity: important Dear Maintainer, I recently upgraded to buster and noticed that our RADIUS test plugin does not work anymore. Downgrading libauthen-radius-perl to 0.27-1 fixes the issue. Take the first example from the top of the man page: use Authen::Radius; $r = new Authen::Radius(Host => 'myserver', Secret => 'mysecret'); print "auth result=", $r->check_pwd('myname', 'mypwd'), "\n"; If I substitute the correct IPv4 address, secret, user name and password into the above, the result is 1 (success) with 0.27-1, but upgrading to 0.29-1 gives an error message instead: unknown attr name 1 at /usr/share/perl5/Authen/Radius.pm line 865. There might be a workaround via using the lower level operations instead of the check_pwd method, but I haven't found it yet. Please advise. -- Thanks, Feri.
--- End Message ---
--- Begin Message ---Source: libauthen-radius-perl Source-Version: 0.29-2 We believe that the bug you reported is fixed in the latest version of libauthen-radius-perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. gregor herrmann <[email protected]> (supplier of updated libauthen-radius-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 23 Jun 2019 15:32:33 CEST Source: libauthen-radius-perl Binary: Architecture: source Version: 0.29-2 Distribution: unstable Urgency: medium Maintainer: Debian Perl Group <[email protected]> Changed-By: gregor herrmann <[email protected]> Description: Closes: 930671 Changes: libauthen-radius-perl (0.29-2) unstable; urgency=medium . * Add debian/patches/04_fix_check_pwd.patch. Backport from upstream's 0.31 release. This fixes the check_pwd() method when dictionaries are not loaded and attribute ID is used instead of Name. Thanks to Ferenc Wágner for the bug report. (Closes: #930671) Checksums-Sha256: 8dfe11b9bb15c622fa276c2c443a8483d4cd243cc68caef637a37d250b294a1d 2376 libauthen-radius-perl_0.29-2.dsc 31df2e17ad5248f5bab464448ec062212cc32543b69417b922eae555eb2b4ca1 10408 libauthen-radius-perl_0.29-2.debian.tar.xz 61a72ce8dc2268fb3349e55b3f2670c5195b231f3d86b14bb874c6bbff6d028d 5571 libauthen-radius-perl_0.29-2_sourceonly.buildinfo Checksums-Sha1: 0d5ef8e262fe0cf91bdcf4faf943f8d4eef0a7e2 2376 libauthen-radius-perl_0.29-2.dsc 305091e5322cd6b964dfa3bc6c320d902438b99f 10408 libauthen-radius-perl_0.29-2.debian.tar.xz 5c3b62cdad5e6a519c5d367ddc30077c4e6f8ed2 5571 libauthen-radius-perl_0.29-2_sourceonly.buildinfo Files: cf0653212ee90fb2d194fc582ebd066e 2376 perl optional libauthen-radius-perl_0.29-2.dsc 323e0ae23e85f0adeed55f0e1faa3de8 10408 perl optional libauthen-radius-perl_0.29-2.debian.tar.xz cba36122c25b32c353961e22cfc4e0a7 5571 - - libauthen-radius-perl_0.29-2_sourceonly.buildinfo -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAl0Pf3JfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ qgZR9w//dKUIkyJIul/Srhvugul3AGgHQMPaL+wv+e8RhTdYl7Ndfoashy9puP/D +YqFxUOsDQajRTXop7nejPMLcs41E7wIkYXhWJ1vCpr3O4VDNeKyt/JTkMQHKBxt K6SV9xcjP0P18rIgd5itEoyTV/WxpRCHQhAi0prV6eF4cqrvJP3PT7Uirc8tkB9F 3N+txx+wfQlStYpZnWJST+bde2LmVX1ZWwNauEOX4Svo8E/pYNqkV9GfVvoXAX73 PA7AKm/PEtM9ZB1LOZnDMc4qlo2dKSPWw/FYaEX8+iKpocmF7xYFYyWfeZMq4jVH Xlr56LULo/3LjdVTER5XjWNSvEsEaMgaugIaAnwGpZgXZBbGxbTpAySPucQc35X4 l5ecEUa2HGlyquZ1xy87mBFy1U7+e9KuptX8XoFyoIFcrO83aPD+g557hnWcK8zo y2ku3cN0p0GBU7kLjkeiD8zsAZyoy117SVRfo9Fa8o+RApcxMPL65MkbD9JxnsG4 FoCuiut/951kIFxHLh0Mnuy906GpAoYkyZEy8hWcQFwxuiZpm/KU/suiOfJFM3Hj hjS38NKQ3MettdftQJM90ra9aeLyCaNQ/KspnH6G1fgaodC7H8/0dxxTshfs1AS0 R1y+/uTnUu54L8/YomDg2W806IeM8424OyIDLiG1RU3NXe0vZjI= =5rvk -----END PGP SIGNATURE-----
--- End Message ---

