Debian Bug report logs -
#577600
ekeyd: drops out, restart fixes
Reported by: Matt Taggart <taggart@debian.org>
Date: Mon, 12 Apr 2010 23:57:02 UTC
Severity: normal
Found in version ekeyd/1.1.1-1
Fixed in version ekeyd/1.1.3-1
Done: Daniel Silverstone <dsilvers@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Simtec Electronics <support@simtec.co.uk>:
Bug#577600; Package ekeyd.
(Mon, 12 Apr 2010 23:57:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Matt Taggart <taggart@debian.org>:
New Bug report received and forwarded. Copy sent to Simtec Electronics <support@simtec.co.uk>.
(Mon, 12 Apr 2010 23:57:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: ekeyd
Version: 1.1.1-1
I use munin to graph entropy levels and I notice that ekeyd drops out some
times. When this happens here's what list shows
# ekeydctl list
NR,OK,Status,Path,SerialNo
1,NO,Long-Term-Key is bad,/dev/entropykey/XXXXXXXXXXXXXXXX,XXXXXXXXXXXXXXXX
A restart fixes it
# /etc/init.d/ekeyd restart
Stopping Simtec Entropy Key Daemon: ekeyd.
Starting Simtec Entropy Key Daemon: ekeyd.
# ekeydctl list
NR,OK,Status,Path,SerialNo
1,YES,Running OK,/dev/entropykey/XXXXXXXXXXXXXXXX,XXXXXXXXXXXXXXXX
--
Matt Taggart
taggart@debian.org
Information forwarded
to debian-bugs-dist@lists.debian.org, Simtec Electronics <support@simtec.co.uk>:
Bug#577600; Package ekeyd.
(Tue, 08 Jun 2010 03:33:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Cristian Rodriguez <yo@cristianrodriguez.net>:
Extra info received and forwarded to list. Copy sent to Simtec Electronics <support@simtec.co.uk>.
(Tue, 08 Jun 2010 03:33:03 GMT) (full text, mbox, link).
Message #10 received at 577600@bugs.debian.org (full text, mbox, reply):
reproduced in 1.1.2, using cdc_acm on openSUSE 11.2 as well, the deamon drops
at least once a day, restart fixes the problem, hard to reproduce
consistently.
Reply sent
to Daniel Silverstone <dsilvers@debian.org>:
You have taken responsibility.
(Wed, 01 Sep 2010 10:03:12 GMT) (full text, mbox, link).
Notification sent
to Matt Taggart <taggart@debian.org>:
Bug acknowledged by developer.
(Wed, 01 Sep 2010 10:03:12 GMT) (full text, mbox, link).
Message #15 received at 577600-close@bugs.debian.org (full text, mbox, reply):
Source: ekeyd
Source-Version: 1.1.3-1
We believe that the bug you reported is fixed in the latest version of
ekeyd, which is due to be installed in the Debian FTP archive:
ekeyd-egd-linux_1.1.3-1_amd64.deb
to main/e/ekeyd/ekeyd-egd-linux_1.1.3-1_amd64.deb
ekeyd-uds_1.1.3-1_amd64.deb
to main/e/ekeyd/ekeyd-uds_1.1.3-1_amd64.deb
ekeyd_1.1.3-1.diff.gz
to main/e/ekeyd/ekeyd_1.1.3-1.diff.gz
ekeyd_1.1.3-1.dsc
to main/e/ekeyd/ekeyd_1.1.3-1.dsc
ekeyd_1.1.3-1_amd64.deb
to main/e/ekeyd/ekeyd_1.1.3-1_amd64.deb
ekeyd_1.1.3.orig.tar.gz
to main/e/ekeyd/ekeyd_1.1.3.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 577600@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Silverstone <dsilvers@debian.org> (supplier of updated ekeyd package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 29 Aug 2010 14:08:38 +0100
Source: ekeyd
Binary: ekeyd ekeyd-uds ekeyd-egd-linux
Architecture: source amd64
Version: 1.1.3-1
Distribution: unstable
Urgency: low
Maintainer: Simtec Electronics <support@simtec.co.uk>
Changed-By: Daniel Silverstone <dsilvers@debian.org>
Description:
ekeyd - Simtec Electronics UDEKEY01 Entropy Key Daemon
ekeyd-egd-linux - Transfers entropy from an EGD to the Linux kernel pool
ekeyd-uds - Simtec Electronics UDEKEY01 Entropy Key Daemon (UDS variant)
Closes: 577600
Changes:
ekeyd (1.1.3-1) unstable; urgency=low
.
* New upstream release
- Fixes a lot of performance issues.
- Improved rekeying operation to be more resilient
* We expect this to (Closes: #577600)
Checksums-Sha1:
13cdb317e05d6abd21e667234b6448499bc313f7 1473 ekeyd_1.1.3-1.dsc
8414b7e162f0a2f68a2dcf343c3303c304185261 95166 ekeyd_1.1.3.orig.tar.gz
a0c380d6c632f6132963aef67c2eb0a91674c8c7 6180 ekeyd_1.1.3-1.diff.gz
ae61ed9b7d3defc82485e99a2d3b91ef2383f116 89752 ekeyd_1.1.3-1_amd64.deb
7c5223e2604158c655014e46f27f1101f2385046 13648 ekeyd-uds_1.1.3-1_amd64.deb
1eb337c2a1c9fe58a4688e7e550a64256acf1740 15864 ekeyd-egd-linux_1.1.3-1_amd64.deb
Checksums-Sha256:
3d5e303fc7138e487c18393665c55f5ebabf2554c5f96b7048f5ed1dc6664039 1473 ekeyd_1.1.3-1.dsc
3b5c4fd96c9e490faf7aa8d09d346c19f826761c56dd427044182de79666239f 95166 ekeyd_1.1.3.orig.tar.gz
e7492466e15836d690aa94e132fe21abd73ad7cd133da035822c1f6457ff582f 6180 ekeyd_1.1.3-1.diff.gz
374a76f40994747453df9eb1cd135ab38560fd8bbc2b2de4ac74919819ddfeea 89752 ekeyd_1.1.3-1_amd64.deb
f8c50188f0dac0d88a8c152c002c186d03a48538f72b8221afe45d28572c14af 13648 ekeyd-uds_1.1.3-1_amd64.deb
82b55963363675a8f028c28f54b41821adeb93a68cca7c29958a53a9de46db77 15864 ekeyd-egd-linux_1.1.3-1_amd64.deb
Files:
f2a5b54d386785e866411e56d0ff9074 1473 utils optional ekeyd_1.1.3-1.dsc
9638878f1944d4a7d272efe90aeb7e76 95166 utils optional ekeyd_1.1.3.orig.tar.gz
06a609dd6cbb7da2e2f99d3194e4aed5 6180 utils optional ekeyd_1.1.3-1.diff.gz
2be73a8abf6d13f7b637f10128f12b54 89752 utils optional ekeyd_1.1.3-1_amd64.deb
26d2cd0a9f63536ec4e77769ecdecbc4 13648 utils optional ekeyd-uds_1.1.3-1_amd64.deb
0e0b2ed23158f3df0feb566590e9429e 15864 utils optional ekeyd-egd-linux_1.1.3-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEVAwUBTH4iFMMN9DnymH10AQoLZQf/U8iM+f2Xd5G559pqvdJpQ7GsehojpAGe
/h9Yc9pPOwsKb1y0EMBE9LXejtW00J65SYCwVRTgbX3ChaZ3ZaBQJVdwSA5ThOqK
DTryMGoRGi3bEdsDXYg27tp7Ij9OzjoDYPrSweTxFy33Z0Ulvj5AfPBAVq0oM+kp
DyUtUCdvVGJghRA+StwuSqcg+Fn9RQiKTd4U7+w81B3E9KHvDZE6AiQfY/NcVuvo
KcXfYAbr+MN4WhrOMK0Wf9DwklnDGyYktQfgvqPwA7Lp+/wTsEbOe0LjAHDSVrk+
OOCZvUpTT9OWgnbU/LhYrIWJCqPZL+uq6GMrD/IGBAY3HnMdHRwQbg==
=Go+5
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 22 Oct 2010 07:29:52 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Aug 29 09:29:14 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.