Your message dated Sun, 31 Jul 2005 23:34:14 +0100 with message-id <[EMAIL PROTECTED]> and subject line Removed from Debian - unmaintained has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 4 Nov 1998 20:55:45 +0000 Received: (qmail 7666 invoked from network); 4 Nov 1998 20:54:36 -0000 Received: from song.medialab.sonera.net (195.156.109.170) by master.debian.org with SMTP; 4 Nov 1998 20:54:36 -0000 Received: (from [EMAIL PROTECTED]) by song.medialab.sonera.net (8.9.1a/8.9.1/Debian/GNU) id WAA00960; Wed, 4 Nov 1998 22:54:30 +0200 Date: Wed, 4 Nov 1998 22:54:30 +0200 Message-Id: <[EMAIL PROTECTED]> From: Topi Miettinen <[EMAIL PROTECTED]> Subject: ipautofw cleanup (PATCH) To: [EMAIL PROTECTED] X-Mailer: bug 3.1.7 Package: netbase Version: 3.11-1 This patch changes ipautofw error output to stderr. Also if the last socket and setsockopt calls fail, exit(1). BTW: There's a new upstream version available, but no functionality has changed. -Topi diff -ru netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c.orig netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c --- netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c.orig Sun Nov 1 22:03:10 1998 +++ netbase-3.11/ipautofw-960628/ipautofw-2.0.0.c Wed Nov 4 22:30:01 1998 @@ -65,32 +65,32 @@ af.next=NULL; if (argc<2) { - printf("Usage:\n"); - printf(" ipautofw <command> <options>\n\n"); - printf("Valid commands:\n"); - printf(" -A add new autoforward entry\n"); - printf(" -D delete an autoforward entry\n"); - printf(" -F flush the autoforward table\n"); - printf("\nValid options:\n"); - printf(" -r <type> <low> <high> forwarding on ports <low> to <high> using\n"); - printf(" protocol <type> (tcp or udp)\n\n"); - printf(" -h <host> IP address of host to receive forwarded\n"); - printf(" packets\n\n"); - printf(" -d <type> <low> <high> specifies a set of ports which will not use\n"); - printf(" the default high range (60000+) masquerade\n"); - printf(" port area\n\n"); - printf(" -p <type> <visible> <host>:<hidden>\n"); - printf(" set up port bouncing from visible host port\n"); - printf(" to masqueraded host <host> on port <hidden>,\n"); - printf(" protocol <type> (currently not supported)\n\n"); - printf(" -c <type> <port> specifies a control port and protocol\n\n"); - printf(" -u Do _not_ require that a host connect within\n"); - printf(" 15 seconds of triggering the control port\n\n"); - printf(" -i Insecure mode; any host many connect after\n"); - printf(" implied by not using the -c option or implied\n"); - printf(" by using the -h option\n"); - printf(" once the control port has been triggered\n"); - printf(" -v Verbose mode\n\n"); + fprintf(stderr, "Usage:\n"); + fprintf(stderr, " ipautofw <command> <options>\n\n"); + fprintf(stderr, "Valid commands:\n"); + fprintf(stderr, " -A add new autoforward entry\n"); + fprintf(stderr, " -D delete an autoforward entry\n"); + fprintf(stderr, " -F flush the autoforward table\n"); + fprintf(stderr, "\nValid options:\n"); + fprintf(stderr, " -r <type> <low> <high> forwarding on ports <low> to <high> using\n"); + fprintf(stderr, " protocol <type> (tcp or udp)\n\n"); + fprintf(stderr, " -h <host> IP address of host to receive forwarded\n"); + fprintf(stderr, " packets\n\n"); + fprintf(stderr, " -d <type> <low> <high> specifies a set of ports which will not use\n"); + fprintf(stderr, " the default high range (60000+) masquerade\n"); + fprintf(stderr, " port area\n\n"); + fprintf(stderr, " -p <type> <visible> <host>:<hidden>\n"); + fprintf(stderr, " set up port bouncing from visible host port\n"); + fprintf(stderr, " to masqueraded host <host> on port <hidden>,\n"); + fprintf(stderr, " protocol <type> (currently not supported)\n\n"); + fprintf(stderr, " -c <type> <port> specifies a control port and protocol\n\n"); + fprintf(stderr, " -u Do _not_ require that a host connect within\n"); + fprintf(stderr, " 15 seconds of triggering the control port\n\n"); + fprintf(stderr, " -i Insecure mode; any host many connect after\n"); + fprintf(stderr, " implied by not using the -c option or implied\n"); + fprintf(stderr, " by using the -h option\n"); + fprintf(stderr, " once the control port has been triggered\n"); + fprintf(stderr, " -v Verbose mode\n\n"); exit(1); } switch(argv[1][1]) @@ -105,12 +105,12 @@ command=IP_AUTOFW_FLUSH; break; default: - printf("Command must be either -A, -D, or -F\n"); + fprintf(stderr, "Command must be either -A, -D, or -F\n"); exit(1); } if (argc>2 && command==IP_AUTOFW_FLUSH) { - printf("The flush command does not take options\n"); + fprintf(stderr, "The flush command does not take options\n"); exit(1); } @@ -124,7 +124,7 @@ tmp=argv[index+1]; if (*tmp!='t' && *tmp!='u') { - printf("protocol must be either tcp or udp\n"); + fprintf(stderr, "protocol must be either tcp or udp\n"); exit(1); } if (*tmp=='t') @@ -135,13 +135,13 @@ sscanf(argv[index+3],"%hu",&af.high); if (af.low==0 || af.high==0 || af.high<af.low) { - printf("Illegal port numbers\n"); + fprintf(stderr, "Illegal port numbers\n"); exit(1); } index+=3; if (af.type) { - printf("-r cannot be used in conjunction with -p or -d\n"); + fprintf(stderr, "-r cannot be used in conjunction with -p or -d\n"); exit(1); } af.type=IP_FWD_RANGE; @@ -150,7 +150,7 @@ tmp=argv[index+1]; if (*tmp!='t' && *tmp!='u') { - printf("protocol must be either tcp or udp\n"); + fprintf(stderr, "protocol must be either tcp or udp\n"); exit(1); } if (*tmp=='t') @@ -161,13 +161,13 @@ sscanf(argv[index+3],"%hu",&af.high); if (af.low==0 || af.high==0 || af.high<af.low) { - printf("Illegal port numbers\n"); + fprintf(stderr, "Illegal port numbers\n"); exit(1); } index+=3; if (af.type) { - printf("-d cannot be used in conjunction with -p or -r\n"); + fprintf(stderr, "-d cannot be used in conjunction with -p or -r\n"); exit(1); } af.type=IP_FWD_DIRECT; @@ -175,7 +175,7 @@ case 'h': if (sscanf(argv[index+1],"%hd.%hd.%hd.%hd",&b1,&b2,&b3,&b4)<0) { - printf("Invalid IP address: %s\n",argv[index+1]); + fprintf(stderr, "Invalid IP address: %s\n",argv[index+1]); exit(1); } af.where=b1+b2*256+b3*256*256+b4*256*256*256; @@ -186,7 +186,7 @@ tmp=argv[index+1]; if (*tmp!='t' && *tmp!='u') { - printf("protocol must be either tcp or udp\n"); + fprintf(stderr, "protocol must be either tcp or udp\n"); exit(1); } if (*tmp=='t') @@ -198,13 +198,13 @@ af.where=b1+b2*256+b3*256*256+b4*256*256*256; if (af.visible==0 || af.hidden==0) { - printf("Illegal port numbers\n"); + fprintf(stderr, "Illegal port numbers\n"); exit(1); } index+=3; if (af.type) { - printf("-p cannot be used in conjunction with -r or -d\n"); + fprintf(stderr, "-p cannot be used in conjunction with -r or -d\n"); exit(1); } af.type=IP_FWD_PORT; @@ -213,7 +213,7 @@ tmp=argv[index+1]; if (*tmp!='t' && *tmp!='u') { - printf("Control protocol must be either tcp or udp\n"); + fprintf(stderr, "Control protocol must be either tcp or udp\n"); exit(1); } if (*tmp=='t') @@ -233,18 +233,18 @@ verbose=1; break; default: - printf("Invalid option: %s\n",argv[index]); + fprintf(stderr, "Invalid option: %s\n",argv[index]); exit(1); } } else { - printf("Invalid option: %s\n",argv[index]); + fprintf(stderr, "Invalid option: %s\n",argv[index]); } } if (af.where && (af.flags & IP_AUTOFW_SECURE) && af.type!=IP_FWD_PORT) { - printf("Cannot use -h in secure mode\n"); + fprintf(stderr, "Cannot use -h in secure mode\n"); } if (!(af.ctlport && af.ctlproto)) { @@ -252,11 +252,11 @@ } if (af.ctlport && af.ctlproto && !(af.flags & IP_AUTOFW_SECURE)) { - printf("-i cannot be specified with a control port\n"); + fprintf(stderr, "-i cannot be specified with a control port\n"); } if (!af.type && command!=IP_AUTOFW_FLUSH) { - printf("You must select a type of forwarding (direct, port, or range)\n"); + fprintf(stderr, "You must select a type of forwarding (direct, port, or range)\n"); exit(1); } if (verbose) @@ -267,7 +267,7 @@ printf("Adding autofwd "); break; case IP_AUTOFW_DEL: - printf("Deleteing autofwd "); + printf("Deleting autofwd "); break; case IP_AUTOFW_FLUSH: printf("Flushing autoforward table\n"); @@ -296,7 +296,14 @@ printf("\n"); } socket_fd=socket(AF_INET, SOCK_RAW, IPPROTO_RAW); - if (setsockopt(socket_fd, IPPROTO_IP, command, &af, sizeof(af))<0) + if (socket_fd < 0) { + perror("socket"); + exit(1); + } + + if (setsockopt(socket_fd, IPPROTO_IP, command, &af, sizeof(af))<0) { perror("setsockopt"); + exit(1); + } exit(0); } --------------------------------------- Received: (at 28957-done) by bugs.debian.org; 31 Jul 2005 22:34:29 +0000 >From [EMAIL PROTECTED] Sun Jul 31 15:34:29 2005 Return-path: <[EMAIL PROTECTED]> Received: from sorrow.cyrius.com [65.19.161.204] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1DzMO4-0008VG-00; Sun, 31 Jul 2005 15:34:29 -0700 Received: by sorrow.cyrius.com (Postfix, from userid 10) id 9F3BC64D55; Sun, 31 Jul 2005 22:34:23 +0000 (UTC) Received: by deprecation.cyrius.com (Postfix, from userid 1000) id 026B685FC; Sun, 31 Jul 2005 23:34:14 +0100 (BST) Date: Sun, 31 Jul 2005 23:34:14 +0100 From: Martin Michlmayr <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Removed from Debian - unmaintained Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.9i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 107 This package has now been removed from Debian because nobody was interested in maintaining it; see http://lists.debian.org/debian-devel-announce/2005/06/msg00014.html for more information. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]