Your message dated Sun, 31 Jul 2005 23:34:14 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Removed from Debian - unmaintained
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Nov 1998 20:55:45 +0000
Received: (qmail 7666 invoked from network); 4 Nov 1998 20:54:36 -0000
Received: from song.medialab.sonera.net (195.156.109.170)
  by master.debian.org with SMTP; 4 Nov 1998 20:54:36 -0000
Received: (from [EMAIL PROTECTED])
        by song.medialab.sonera.net (8.9.1a/8.9.1/Debian/GNU) id WAA00960;
        Wed, 4 Nov 1998 22:54:30 +0200
Date: Wed, 4 Nov 1998 22:54:30 +0200
Message-Id: <[EMAIL PROTECTED]>
From: Topi Miettinen <[EMAIL PROTECTED]>
Subject: ipautofw cleanup (PATCH)
To: [EMAIL PROTECTED]
X-Mailer: bug 3.1.7

Package: netbase
Version: 3.11-1

This patch changes ipautofw error output to stderr. Also if the last
socket and setsockopt calls fail, exit(1).

BTW: There's a new upstream version available, but no functionality
has changed.

-Topi

diff -ru netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c.orig 
netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c
--- netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c.orig  Sun Nov  1 22:03:10 1998
+++ netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c       Wed Nov  4 22:30:01 1998
@@ -65,32 +65,32 @@
        af.next=NULL;
        if (argc<2)
        {
-               printf("Usage:\n");
-               printf("    ipautofw <command> <options>\n\n");
-               printf("Valid commands:\n");
-               printf("    -A                           add new autoforward 
entry\n");
-               printf("    -D                           delete an autoforward 
entry\n");
-               printf("    -F                           flush the autoforward 
table\n");
-               printf("\nValid options:\n");
-               printf("    -r <type> <low> <high>       forwarding on ports 
<low> to <high> using\n");
-               printf("                                 protocol <type> (tcp 
or udp)\n\n");
-               printf("    -h <host>                    IP address of host to 
receive forwarded\n");
-               printf("                                 packets\n\n");
-               printf("    -d <type> <low> <high>       specifies a set of 
ports which will not use\n");
-               printf("                                 the default high range 
(60000+) masquerade\n");
-               printf("                                 port area\n\n");
-               printf("    -p <type> <visible> <host>:<hidden>\n");
-               printf("                                 set up port bouncing 
from visible host port\n");
-               printf("                                 to masqueraded host 
<host> on port <hidden>,\n");
-               printf("                                 protocol <type> 
(currently not supported)\n\n");
-               printf("    -c <type> <port>             specifies a control 
port and protocol\n\n");
-               printf("    -u                           Do _not_ require that 
a host connect within\n");
-               printf("                                 15 seconds of 
triggering the control port\n\n");
-               printf("    -i                           Insecure mode; any 
host many connect after\n");
-               printf("                                 implied by not using 
the -c option or implied\n");
-               printf("                                 by using the -h 
option\n");
-               printf("                                 once the control port 
has been triggered\n");
-               printf("    -v                           Verbose mode\n\n");
+               fprintf(stderr, "Usage:\n");
+               fprintf(stderr, "    ipautofw <command> <options>\n\n");
+               fprintf(stderr, "Valid commands:\n");
+               fprintf(stderr, "    -A                           add new 
autoforward entry\n");
+               fprintf(stderr, "    -D                           delete an 
autoforward entry\n");
+               fprintf(stderr, "    -F                           flush the 
autoforward table\n");
+               fprintf(stderr, "\nValid options:\n");
+               fprintf(stderr, "    -r <type> <low> <high>       forwarding on 
ports <low> to <high> using\n");
+               fprintf(stderr, "                                 protocol 
<type> (tcp or udp)\n\n");
+               fprintf(stderr, "    -h <host>                    IP address of 
host to receive forwarded\n");
+               fprintf(stderr, "                                 packets\n\n");
+               fprintf(stderr, "    -d <type> <low> <high>       specifies a 
set of ports which will not use\n");
+               fprintf(stderr, "                                 the default 
high range (60000+) masquerade\n");
+               fprintf(stderr, "                                 port 
area\n\n");
+               fprintf(stderr, "    -p <type> <visible> <host>:<hidden>\n");
+               fprintf(stderr, "                                 set up port 
bouncing from visible host port\n");
+               fprintf(stderr, "                                 to 
masqueraded host <host> on port <hidden>,\n");
+               fprintf(stderr, "                                 protocol 
<type> (currently not supported)\n\n");
+               fprintf(stderr, "    -c <type> <port>             specifies a 
control port and protocol\n\n");
+               fprintf(stderr, "    -u                           Do _not_ 
require that a host connect within\n");
+               fprintf(stderr, "                                 15 seconds of 
triggering the control port\n\n");
+               fprintf(stderr, "    -i                           Insecure 
mode; any host many connect after\n");
+               fprintf(stderr, "                                 implied by 
not using the -c option or implied\n");
+               fprintf(stderr, "                                 by using the 
-h option\n");
+               fprintf(stderr, "                                 once the 
control port has been triggered\n");
+               fprintf(stderr, "    -v                           Verbose 
mode\n\n");
                exit(1);
        }
        switch(argv[1][1])
@@ -105,12 +105,12 @@
                        command=IP_AUTOFW_FLUSH;
                        break;
                default:
-                       printf("Command must be either -A, -D, or -F\n");
+                       fprintf(stderr, "Command must be either -A, -D, or 
-F\n");
                        exit(1);
        }
        if (argc>2 && command==IP_AUTOFW_FLUSH)
        {
-               printf("The flush command does not take options\n");
+               fprintf(stderr, "The flush command does not take options\n");
                exit(1);
        }
        
@@ -124,7 +124,7 @@
                                        tmp=argv[index+1];
                                        if (*tmp!='t' && *tmp!='u')
                                        {
-                                               printf("protocol must be either 
tcp or udp\n");
+                                               fprintf(stderr, "protocol must 
be either tcp or udp\n");
                                                exit(1);
                                        }
                                        if (*tmp=='t')
@@ -135,13 +135,13 @@
                                        sscanf(argv[index+3],"%hu",&af.high);
                                        if (af.low==0 || af.high==0 || 
af.high<af.low)
                                        {
-                                               printf("Illegal port 
numbers\n");
+                                               fprintf(stderr, "Illegal port 
numbers\n");
                                                exit(1);
                                        }
                                        index+=3;
                                        if (af.type)
                                        {
-                                               printf("-r cannot be used in 
conjunction with -p or -d\n");
+                                               fprintf(stderr, "-r cannot be 
used in conjunction with -p or -d\n");
                                                exit(1);
                                        }
                                        af.type=IP_FWD_RANGE;
@@ -150,7 +150,7 @@
                                        tmp=argv[index+1];
                                        if (*tmp!='t' && *tmp!='u')
                                        {
-                                               printf("protocol must be either 
tcp or udp\n");
+                                               fprintf(stderr, "protocol must 
be either tcp or udp\n");
                                                exit(1);
                                        }
                                        if (*tmp=='t')
@@ -161,13 +161,13 @@
                                        sscanf(argv[index+3],"%hu",&af.high);
                                        if (af.low==0 || af.high==0 || 
af.high<af.low)
                                        {
-                                               printf("Illegal port 
numbers\n");
+                                               fprintf(stderr, "Illegal port 
numbers\n");
                                                exit(1);
                                        }
                                        index+=3;
                                        if (af.type)
                                        {
-                                               printf("-d cannot be used in 
conjunction with -p or -r\n");
+                                               fprintf(stderr, "-d cannot be 
used in conjunction with -p or -r\n");
                                                exit(1);
                                        }
                                        af.type=IP_FWD_DIRECT;
@@ -175,7 +175,7 @@
                                case 'h':
                                        if 
(sscanf(argv[index+1],"%hd.%hd.%hd.%hd",&b1,&b2,&b3,&b4)<0)
                                        {
-                                               printf("Invalid IP address: 
%s\n",argv[index+1]);
+                                               fprintf(stderr, "Invalid IP 
address: %s\n",argv[index+1]);
                                                exit(1);
                                        }
                                        
af.where=b1+b2*256+b3*256*256+b4*256*256*256;
@@ -186,7 +186,7 @@
                                        tmp=argv[index+1];
                                        if (*tmp!='t' && *tmp!='u')
                                        {
-                                               printf("protocol must be either 
tcp or udp\n");
+                                               fprintf(stderr, "protocol must 
be either tcp or udp\n");
                                                exit(1);
                                        }
                                        if (*tmp=='t')
@@ -198,13 +198,13 @@
                                        
af.where=b1+b2*256+b3*256*256+b4*256*256*256;
                                        if (af.visible==0 || af.hidden==0)
                                        {
-                                               printf("Illegal port 
numbers\n");
+                                               fprintf(stderr, "Illegal port 
numbers\n");
                                                exit(1);
                                        }
                                        index+=3;
                                        if (af.type)
                                        {
-                                               printf("-p cannot be used in 
conjunction with -r or -d\n");
+                                               fprintf(stderr, "-p cannot be 
used in conjunction with -r or -d\n");
                                                exit(1);
                                        }
                                        af.type=IP_FWD_PORT;
@@ -213,7 +213,7 @@
                                        tmp=argv[index+1];
                                        if (*tmp!='t' && *tmp!='u')
                                        {
-                                               printf("Control protocol must 
be either tcp or udp\n");
+                                               fprintf(stderr, "Control 
protocol must be either tcp or udp\n");
                                                exit(1);
                                        }
                                        if (*tmp=='t')
@@ -233,18 +233,18 @@
                                        verbose=1;
                                        break;
                                default:
-                                       printf("Invalid option: 
%s\n",argv[index]);
+                                       fprintf(stderr, "Invalid option: 
%s\n",argv[index]);
                                        exit(1);
                        }
                }
                else
                {
-                       printf("Invalid option: %s\n",argv[index]);
+                       fprintf(stderr, "Invalid option: %s\n",argv[index]);
                }
        }
        if (af.where && (af.flags & IP_AUTOFW_SECURE) && af.type!=IP_FWD_PORT)
        {
-               printf("Cannot use -h in secure mode\n");
+               fprintf(stderr, "Cannot use -h in secure mode\n");
        }
        if (!(af.ctlport && af.ctlproto))
        {
@@ -252,11 +252,11 @@
        }
        if (af.ctlport && af.ctlproto && !(af.flags & IP_AUTOFW_SECURE))
        {
-               printf("-i cannot be specified with a control port\n");
+               fprintf(stderr, "-i cannot be specified with a control port\n");
        }
        if (!af.type && command!=IP_AUTOFW_FLUSH)
        {
-               printf("You must select a type of forwarding (direct, port, or 
range)\n");
+               fprintf(stderr, "You must select a type of forwarding (direct, 
port, or range)\n");
                exit(1);
        }
        if (verbose)
@@ -267,7 +267,7 @@
                                printf("Adding autofwd ");
                                break;
                        case IP_AUTOFW_DEL:
-                               printf("Deleteing autofwd ");
+                               printf("Deleting autofwd ");
                                break;
                        case IP_AUTOFW_FLUSH:
                                printf("Flushing autoforward table\n");
@@ -296,7 +296,14 @@
                printf("\n");
        }
        socket_fd=socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
-       if (setsockopt(socket_fd, IPPROTO_IP, command, &af, sizeof(af))<0)
+       if (socket_fd < 0) {
+               perror("socket");
+               exit(1);
+       }
+
+       if (setsockopt(socket_fd, IPPROTO_IP, command, &af, sizeof(af))<0) {
                perror("setsockopt");
+               exit(1);
+       }
        exit(0);
 }
---------------------------------------
Received: (at 28957-done) by bugs.debian.org; 31 Jul 2005 22:34:29 +0000
>From [EMAIL PROTECTED] Sun Jul 31 15:34:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from sorrow.cyrius.com [65.19.161.204] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1DzMO4-0008VG-00; Sun, 31 Jul 2005 15:34:29 -0700
Received: by sorrow.cyrius.com (Postfix, from userid 10)
        id 9F3BC64D55; Sun, 31 Jul 2005 22:34:23 +0000 (UTC)
Received: by deprecation.cyrius.com (Postfix, from userid 1000)
        id 026B685FC; Sun, 31 Jul 2005 23:34:14 +0100 (BST)
Date: Sun, 31 Jul 2005 23:34:14 +0100
From: Martin Michlmayr <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Removed from Debian - unmaintained
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 107

This package has now been removed from Debian because nobody was
interested in maintaining it; see
http://lists.debian.org/debian-devel-announce/2005/06/msg00014.html
for more information.

-- 
Martin Michlmayr
http://www.cyrius.com/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to