Bug#35253: marked as done (netbase: (On Intel) rpcinfo -p alpha : No remote programs registered.)
Your message dated Mon, 21 Oct 2002 16:13:13 -0700
with message-id <20021021231313.GQ4858@nisa.net>
and subject line Cannot Reproduce Bug
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 30 Mar 1999 06:56:38 +0000
Received: (qmail 17628 invoked from network); 30 Mar 1999 06:56:36 -0000
Received: from alpha.mz.rhein-main.de (@193.141.105.17)
by master.debian.org with SMTP; 30 Mar 1999 06:56:36 -0000
Received: (from neuffer@localhost)
by alpha.mz.rhein-main.de (8.9.2+3.1W/8.9.3/Debian/GNU) id JAA04083;
Tue, 30 Mar 1999 09:04:01 +0200 (CEST)
Date: Tue, 30 Mar 1999 09:04:01 +0200 (CEST)
Message-Id: <199903300704.JAA04083@alpha.mz.rhein-main.de>
From: Michael Neuffer <neuffer@alpha.mz.rhein-main.de>
Subject: netbase: (On Intel) rpcinfo -p alpha : No remote programs registered.
To: submit@bugs.debian.org
X-Mailer: bug 3.1.7
Package: netbase
Version: 3.14-1
The Intel system does not see the registered programms on the
Alpha side. Locally on the Alpha, lpha->Intel and Intel local works fine
schlepflop(intel):~#rpcinfo -p schlepflop
program vers proto port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
100003 2 udp 2049 nfs
100003 2 tcp 2049 nfs
100005 1 udp 740 mountd
100005 2 udp 740 mountd
100005 1 tcp 743 mountd
100005 2 tcp 743 mountd
100007 2 udp 845 ypbind
100007 1 udp 845 ypbind
100007 2 tcp 848 ypbind
100007 1 tcp 848 ypbind
schlepflop:~# rpcinfo -p alpha
No remote programs registered.
chlepflop:~# pcat passwd
YPBINDPROC_DOMAIN: Domain not bound
No such map passwd.byname. Reason: Can't bind to server which serves this domain
alpha:~# rpcinfo -p
program vers proto port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
100004 2 udp 817 ypserv
100004 1 udp 817 ypserv
100004 2 tcp 820 ypserv
100004 1 tcp 820 ypserv
100009 1 udp 818 yppasswdd
600100069 1 udp 821
600100069 1 tcp 823
100007 2 udp 825 ypbind
100007 1 udp 825 ypbind
100007 2 tcp 828 ypbind
100007 1 tcp 828 ypbind
100003 2 udp 2049 nfs
100003 2 tcp 2049 nfs
100005 1 udp 962 mountd
100005 2 udp 962 mountd
100005 1 tcp 965 mountd
100005 2 tcp 965 mountd
alpha:~# rpcinfo -p schlepflop
program vers proto port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
100003 2 udp 2049 nfs
100003 2 tcp 2049 nfs
100005 1 udp 740 mountd
100005 2 udp 740 mountd
100005 1 tcp 743 mountd
100005 2 tcp 743 mountd
100007 2 udp 845 ypbind
100007 1 udp 845 ypbind
100007 2 tcp 848 ypbind
100007 1 tcp 848 ypbind
-- System Information
Debian Release: potato
Kernel Version: Linux alpha 2.2.5-ac1 #5 Tue Mar 30 01:42:35 CEST 1999 alpha unknown
Versions of the packages netbase depends on:
ii libc6.1 2.1.1-0.1 GNU C Library: shared libraries
ii libc6.1 2.1.1-0.1 GNU C Library: shared libraries
--- Begin /etc/init.d/netbase (modified conffile)
#!/bin/sh
#
spoofprotect () {
# This is the best method: turn on Source Address Verification and get
# spoof protection on all current and future interfaces.
if [ -e /proc/sys/net/ipv4/conf/all/rp_filter ]; then
echo -n "Setting up IP spoofing protection..."
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do
echo 1 > $f
done
echo "done."
# rules for linux 2.0.x and 2.1.x (x < 102) kernels
elif [ -e /proc/net/ip_input ]; then
echo -n "NOT Setting up IP spoofing protection here...(happens later)"
# delete and readd entry (this way we don't get duplicate entries)
# deny incoming packets pretending to be from 127.0.0.1
# deny incoming packets pretending to be from our own system.
# set your own IP address below (or use `hostname -i` to set it).
echo "done."
# rules for linux 2.1.x (x > 101) kernels
elif [ -e /proc/net/ip_fwchains ]; then
echo -n "NOT Setting up IP spoofing protection here...(happens later)"
# deny incoming packets pretending to be from our own system.
# set your own IP address below (or use `hostname -i` to set it).
echo "done."
fi
}
checkportmap () {
if ! /usr/bin/rpcinfo -u localhost portmapper >/dev/null 2>/dev/null; then
if grep -v "^ *#" /etc/inetd.conf | grep 'rpc/' >/dev/null; then
echo
echo "WARNING: portmapper inactive - RPC services unavailable!"
echo " (Commenting out the rpc services in inetd.conf will"
echo " disable this message)"
echo
fi
fi
}
case "$1" in
start)
spoofprotect
checkportmap
echo -n "Starting base networking daemons:"
echo -n " inetd" ; start-stop-daemon --start --quiet --exec /usr/sbin/inetd
echo "."
;;
stop)
echo -n "Stopping base networking daemons:"
echo -n " inetd" ; start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/inetd.pid --exec /usr/sbin/inetd
echo "."
;;
reload)
start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/inetd.pid --signal 1 --exec /usr/sbin/inetd
;;
force-reload)
$0 reload
;;
restart)
start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/inetd.pid --exec /usr/sbin/inetd
checkportmap
start-stop-daemon --start --quiet --exec /usr/sbin/inetd
;;
*)
echo "Usage: /etc/init.d/netbase {start|stop|reload|restart}"
exit 1
;;
esac
exit 0
--- End /etc/init.d/netbase
--- Begin /etc/hosts.allow (modified conffile)
sendmail: all
#
#
#
portmap: 192.168.1.0 255.255.255.0
--- End /etc/hosts.allow
--- Begin /etc/hosts.deny (modified conffile)
#
#
#
ALL: PARANOID
portmap: ALL
--- End /etc/hosts.deny
---------------------------------------
Received: (at 35253-done) by bugs.debian.org; 21 Oct 2002 23:13:14 +0000
>From jbailey@olympus.nisa.net Mon Oct 21 18:13:14 2002
Return-path: <jbailey@olympus.nisa.net>
Received: from olympus.nisa.net [207.194.212.100]
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 183ljV-0006ls-00; Mon, 21 Oct 2002 18:13:13 -0500
Received: from olympus.nisa.net (localhost [127.0.0.1])
by olympus.nisa.net (8.12.2/8.12.2/Debian -5) with ESMTP id g9LNDDSZ009312
for <35253-done@bugs.debian.org>; Mon, 21 Oct 2002 16:13:13 -0700
Received: (from jbailey@localhost)
by olympus.nisa.net (8.12.2/8.12.2/Debian -5) id g9LNDDD5009310
for 35253-done@bugs.debian.org; Mon, 21 Oct 2002 16:13:13 -0700
Date: Mon, 21 Oct 2002 16:13:13 -0700
From: Jeff Bailey <jbailey@nisa.net>
To: 35253-done@bugs.debian.org
Subject: Cannot Reproduce Bug
Message-ID: <20021021231313.GQ4858@nisa.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.28i
Delivered-To: 35253-done@bugs.debian.org
X-Spam-Status: No, hits=-7.2 required=5.0
tests=SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,
USER_AGENT_MUTT
version=2.41
X-Spam-Level:
A request for followup was posted in May of 1999 and no response was
received so I'm closing this bug. Please feel free to reopen with
more details.
Tks,
Jeff Bailey
--
learning from failures is nice in theory...
but in practice, it sucks :)
- Wolfgang Jaehrling
Reply to: