New F11 "Compat" and "Unknown" scope addresses on tun6to4?
by Allen Kistler
I've set up a virtual test box with two NICs, one to be Internet facing
(simulated, eth1 below) and one intranet facing (eth0 below). I
configured 6to4 to tunnel IPv6 traffic through an IPv4-only test ISP.
The tun6to4 setup provided by scripts in /etc/sysconfig/network-scripts
is adding IPv4-compatible IPv6 addresses for all the IPv4 addresses to
the tunnel.
Here's the (truncated for brevity) ifconfig output.
eth0 Link encap:Ethernet HWaddr 00:0C:29:8C:47:72
inet addr:172.16.9.7 Bcast:172.16.9.255 Mask:255.255.255.0
inet6 addr: 2002:101:102:1:20c:29ff:fe8c:4772/16 Scope:Global
inet6 addr: fe80::20c:29ff:fe8c:4772/64 Scope:Link
eth1 Link encap:Ethernet HWaddr 00:0C:29:8C:47:7C
inet addr:1.1.1.2 Bcast:1.1.1.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:fe8c:477c/64 Scope:Link
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
tun6to4 Link encap:IPv6-in-IPv4
inet6 addr: 2002:101:102::1/16 Scope:Global
inet6 addr: ::1.1.1.2/96 Scope:Compat
inet6 addr: ::172.16.9.7/96 Scope:Compat
inet6 addr: ::127.0.0.1/96 Scope:Unknown
What's up with the Compat and Unknown scope addresses? Generally
speaking, they shouldn't be there. Absolutely the loopback and RFC1918
addresses shouldn't be there. For reference, nothing other than the
6to4 address (2002::/16) is there in F9 and RHEL5. (I haven't used F10,
so I can't comment on it.) Did somebody (would somebody) actually
*want* the current F11 behavior, or is it a bug? I'm inclined to think
"bug," but I figured I'd ask before I BZ it.
Perspective? Knowledge? Anyone?
15 years, 1 month
adopting bugbot
by John Poelstra
How do we invite bugbot to come and live at #fedora-bugzappers?
John
15 years, 1 month
Newest Bugzappah
by Mike Chambers
Hello all,
I am a newbie zapper to the group. I have been around awhile though,
actually using Red Hat since 5.2 or 6.0, can't remember. Was a member of
the Red Hat Beta Program group for few years before Fedora was formed
(for those of you that remember that stuff hehe). Not a developer and/or
packager/maintainer or anything, just power user I guess. Trying to
find more ways to help contribute and this should be one of them.
Besides, I hate those reports that says "this don't work, fix it" and
they don't provide info or anything, grrrrrrr!
Anyways, I do have a day job that pays the bills, 6am-3:30pm (CST), so
that usually leaves me some time in evenings (some longer than others)
to help out and maybe weekends providing we don't work on Saturdays (as
we often do actually). So hopefully I can help out on way or another.
Soo, thanks for having me, and um, er, do I get a zapper gun n stuff
too? :P
--
Mike Chambers
Fedora Project - Bug Zapper, Tester, User, etc..
mikec302(a)fedoraproject.org
15 years, 1 month
um ... what's with the "." after the directory perms?
by Robert P. J. Day
yes, i'm sure i'm about to embarrass myself here but i just checked
some directory perms created while root and they display as
drwxr-xr-x.
^ ????
what's that period? i've never seen that before. or have i just
not been paying attention?
rday
--
========================================================================
Robert P. J. Day
Linux Consulting, Training and Annoying Kernel Pedantry:
Have classroom, will lecture.
http://crashcourse.ca Waterloo, Ontario, CANADA
========================================================================
15 years, 1 month
Rawhide grc fails to run
by Chuck Forsberg WA7KGX
Missing critical module: "wx"
repeat by: type "grc" from the shell
The grc in Fedora 10 does not have this problem.
--
Chuck Forsberg caf(a)omen.com www.omen.com 503-614-0430
Developer of Industrial ZMODEM(Tm) for Embedded Applications
Omen Technology Inc "The High Reliability Software"
10255 NW Old Cornelius Pass Portland OR 97231 FAX 629-0665
15 years, 1 month
tomcat not starting with tomcat-native installed on x86_64
by Bruno Medeiros
People,
Some time ago i reported a bug in fedora 9 about this subject, and it's
still open.
https://bugzilla.redhat.com/show_bug.cgi?id=455543
This bug continues on fedora 10 (i gave a try some months ago) and want to
ask two things:
1st:
Should i report a new bug to fedora 10 or just comment on the existing
fodora 9's bug.
2nd:
This problem affects tomcat5 and tomcat6, and it's probably caused by
tomcat-native package.
Which one should i use on the bug report?
Thanks,
Bruno Medeiros.
15 years, 1 month
Apache + mod_ldap seg faulting
by Bruno Medeiros
Hi, People!
Recently i tried to set up a svn server with ldap authentication and waste a
lot of time to solve the problem i found.
As described here,
http://www.linuxquestions.org/questions/fedora-35/apache-modldap-seg-faul...
the fedora 10 apache come with the mod_ldap enable by default, but the
package apr-util-ldap, which is required to mod_ldap work, is not mapped as
httpd dependency.
The seg fault error in apache`s log doesn`t give any clue about the problem,
only this thread above helped me.
Should i report a package bug or any other bug? where can i do that?
Thanks,
Bruno Medeiros
15 years, 1 month
Fedora 10 updates-testing report
by updates@fedoraproject.org
The following builds have been pushed to Fedora 10 updates-testing
bugzilla-3.2.2-2.fc10
Details about builds:
================================================================================
bugzilla-3.2.2-2.fc10 (FEDORA-2009-2417)
Bug tracking system
--------------------------------------------------------------------------------
ChangeLog:
* Thu Mar 5 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.2.2-2
- fix from BZ #474250 Comment #16, from Chris Eveleigh -->
- add python BR for contrib subpackage
- fix description
- change Requires perl-SOAP-Lite to perl(SOAP::Lite) according guidelines
* Sun Mar 1 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.2.2-1
- thanks to Chris Eveleigh <chris dot eveleigh at planningportal dot gov dot uk>
- for contributing with patches :-)
- Upgrade to upstream 3.2.2 to fix multiple security vulns
- Removed old perl_requires exclusions, added new ones for RADIUS, Oracle and sanitycheck.cgi
- Added Oracle to supported DBs in description (and moved line breaks)
- Include a patch to fix max_allowed_packet warnin when using with mysql
* Sat Feb 28 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.0.8-1
- Upgrade to 3.0.8, fix #466077 #438080
- fix macro in changelog rpmlint warning
- fix files-attr-not-set rpmlint warning for doc and contrib sub-packages
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> - 3.0.4-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
* Mon Feb 2 2009 Stepan Kasal <skasal(a)redhat.com> - 3.0.4-3
- do not require perl-Email-Simple, it is (no longer) in use
- remove several explicit perl-* requires; the automatic dependencies
do handle them
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #465956 - CVE-2008-4437 bugzilla directory traversal flaw
https://bugzilla.redhat.com/show_bug.cgi?id=465956
[ 2 ] Bug #484755 - CVE-2008-6098 bugzilla: quip moderation bypass for authenticated users
https://bugzilla.redhat.com/show_bug.cgi?id=484755
[ 3 ] Bug #484805 - CVE-2009-0481 bugzilla: XSS vulnerability via HTML and JavaScript attachments
https://bugzilla.redhat.com/show_bug.cgi?id=484805
[ 4 ] Bug #484807 - CVE-2009-0483 bugzilla: CSRF vuln via editkeywords.cgi and userprefs.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484807
[ 5 ] Bug #484811 - CVE-2009-0484 bugzilla: CSRF vuln via buglist.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484811
[ 6 ] Bug #484812 - CVE-2009-0485 bugzilla: CSRF vuln via editflagtypes.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484812
[ 7 ] Bug #484813 - CVE-2009-0486 bugzilla: CSRF protection bypass when running under mod_perl
https://bugzilla.redhat.com/show_bug.cgi?id=484813
[ 8 ] Bug #484806 - CVE-2009-0482 bugzilla: CSRF vuln via process_bug.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484806
--------------------------------------------------------------------------------
15 years, 1 month
Fedora 9 updates-testing report
by updates@fedoraproject.org
The following builds have been pushed to Fedora 9 updates-testing
bugzilla-3.2.2-2.fc9
Details about builds:
================================================================================
bugzilla-3.2.2-2.fc9 (FEDORA-2009-2418)
Bug tracking system
--------------------------------------------------------------------------------
ChangeLog:
* Thu Mar 5 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.2.2-2
- fix from BZ #474250 Comment #16, from Chris Eveleigh -->
- add python BR for contrib subpackage
- fix description
- change Requires perl-SOAP-Lite to perl(SOAP::Lite) according guidelines
* Sun Mar 1 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.2.2-1
- thanks to Chris Eveleigh <chris dot eveleigh at planningportal dot gov dot uk>
- for contributing with patches :-)
- Upgrade to upstream 3.2.2 to fix multiple security vulns
- Removed old perl_requires exclusions, added new ones for RADIUS, Oracle and sanitycheck.cgi
- Added Oracle to supported DBs in description (and moved line breaks)
- Include a patch to fix max_allowed_packet warnin when using with mysql
* Sat Feb 28 2009 Itamar Reis Peixoto <itamar(a)ispbrasil.com.br> 3.0.8-1
- Upgrade to 3.0.8, fix #466077 #438080
- fix macro in changelog rpmlint warning
- fix files-attr-not-set rpmlint warning for doc and contrib sub-packages
* Mon Feb 23 2009 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> - 3.0.4-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
* Mon Feb 2 2009 Stepan Kasal <skasal(a)redhat.com> - 3.0.4-3
- do not require perl-Email-Simple, it is (no longer) in use
- remove several explicit perl-* requires; the automatic dependencies
do handle them
* Mon Jul 14 2008 Tom "spot" Callaway <tcallawa(a)redhat.com> - 3.0.4-2
- fix license tag
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #465956 - CVE-2008-4437 bugzilla directory traversal flaw
https://bugzilla.redhat.com/show_bug.cgi?id=465956
[ 2 ] Bug #484755 - CVE-2008-6098 bugzilla: quip moderation bypass for authenticated users
https://bugzilla.redhat.com/show_bug.cgi?id=484755
[ 3 ] Bug #484805 - CVE-2009-0481 bugzilla: XSS vulnerability via HTML and JavaScript attachments
https://bugzilla.redhat.com/show_bug.cgi?id=484805
[ 4 ] Bug #484807 - CVE-2009-0483 bugzilla: CSRF vuln via editkeywords.cgi and userprefs.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484807
[ 5 ] Bug #484811 - CVE-2009-0484 bugzilla: CSRF vuln via buglist.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484811
[ 6 ] Bug #484812 - CVE-2009-0485 bugzilla: CSRF vuln via editflagtypes.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484812
[ 7 ] Bug #484813 - CVE-2009-0486 bugzilla: CSRF protection bypass when running under mod_perl
https://bugzilla.redhat.com/show_bug.cgi?id=484813
[ 8 ] Bug #484806 - CVE-2009-0482 bugzilla: CSRF vuln via process_bug.cgi
https://bugzilla.redhat.com/show_bug.cgi?id=484806
--------------------------------------------------------------------------------
15 years, 1 month