Activity log for bug #241305

Date Who What changed Old value New value Message
2008-06-19 13:26:07 Alexandre Dulaunoy bug added bug
2008-06-19 14:23:09 Patrick Kilgore None: status New Confirmed
2008-06-19 14:23:09 Patrick Kilgore None: importance Undecided High
2008-06-21 20:45:25 Henning Eggers update-manager: status Confirmed Invalid
2011-10-12 12:05:50 Alexandre Dulaunoy update-manager (Ubuntu): status Invalid Confirmed
2011-10-12 12:17:01 Jeremy Visser update-manager (Ubuntu): status Confirmed Invalid
2011-10-12 12:45:31 Jeremy Visser bug watch added https://rt.ubuntu.com/Ticket/Display.html?id=2485
2011-10-12 16:58:15 Kenyon Ralph bug added subscriber Kenyon Ralph
2012-01-19 22:51:13 Ryan Rawdon bug added subscriber Ryan Rawdon
2012-01-24 16:31:45 Ronny Roethof bug added subscriber Ronny Roethof
2012-11-05 22:09:17 James Gifford bug task added ubuntu-website
2012-11-06 02:11:30 Nick B. bug added subscriber Nick B.
2012-11-06 14:20:49 Matthias Niess ubuntu-website: status New Confirmed
2012-11-06 14:23:07 Matthias Niess bug added subscriber Matthias Niess
2012-11-07 16:38:53 scottku bug added subscriber scottku
2012-11-11 01:36:53 Mikael Magnusson bug added subscriber Mikael Magnusson
2012-11-17 11:09:37 Mathias Bøhn Grytemark bug added subscriber Mathias Bøhn Grytemark
2012-11-17 11:42:45 Sander Steffann bug added subscriber Sander Steffann
2012-12-11 23:27:40 Takyoji bug added subscriber Caleb Langeslag
2013-01-03 11:15:20 Johannes Rudolph bug added subscriber Johannes Rudolph
2013-01-04 17:34:25 trejrco bug added subscriber trejrco
2013-02-27 11:12:30 Maarten Kossen bug added subscriber Maarten Kossen
2013-03-12 14:44:57 David Ames ubuntu-website: status Confirmed Fix Released
2013-03-12 15:48:45 Henning Eggers removed subscriber Henning Eggers
2013-05-16 17:12:34 Wesley George bug added subscriber Wesley George
2015-01-23 09:07:09 Mark A. Ziesemer bug added subscriber Mark A. Ziesemer
2015-01-23 10:27:27 Hans Spaans bug added subscriber Hans Spaans
2015-01-23 11:08:07 Hans Spaans removed subscriber Hans Spaans
2015-01-23 11:08:20 Hans Spaans bug added subscriber Hans Spaans
2015-04-27 17:45:23 Mathias Menzer attachment added dig utput https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/241305/+attachment/4385868/+files/dig%20AAAA%20security.ubuntu.com
2016-01-18 00:20:55 Haw Loeung bug added subscriber Haw Loeung
2016-03-25 21:21:58 scottku removed subscriber scottku
2016-04-14 13:07:33 BabyBat description Dear, The apt source list for security update is by default configured to security.ubuntu.com. When you have a system using only IPv6 (and having not access to IPv4 via NAT-PT), security.ubuntu.com is only reachable in IPv4. It would be wise to configure an AAAA record to security.ubuntu.com to at least point to one of the many mirrors supporting IPv6 connectivity. That would avoid system running natively in IPv6 to lack by default the security update. Thanks a lot, Kind regards PS : I checked this as being a security vulnerability but this is more a configuration issue on the Ubuntu network infrastructure than a real security vulnerability: A DNS AAAA request : dig -t AAAA security.ubuntu.com ; <<>> DiG 9.4.1-P1 <<>> -t AAAA security.ubuntu.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26872 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;security.ubuntu.com. IN AAAA ;; AUTHORITY SECTION: ubuntu.com. 3600 IN SOA ns1.canonical.com. hostmaster.canonical.com. 2008061805 10800 3600 604800 3600 ;; Query time: 134 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Jun 19 15:17:39 2008 ;; MSG SIZE rcvd: 98 Dear, The apt source list for security update is by default configured to security.ubuntu.com. When you have a system using only IPv6 (and having not access to IPv4 via NAT-PT), security.ubuntu.com is only reachable in IPv4. It would be wise to configure an AAAA record to security.ubuntu.com to at least point to one of the many mirrors supporting IPv6 connectivity. That would avoid system running natively in IPv6 to lack by default the security update. Thanks a lot, Kind regards PS : I checked this as being a security vulnerability but this is more a configuration issue on the Ubuntu network infrastructure than a real security vulnerability: A DNS AAAA request : dig -t AAAA security.ubuntu.com ; <<>> DiG 9.4.1-P1 <<>> -t AAAA security.ubuntu.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26872 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;security.ubuntu.com. IN AAAA ;; AUTHORITY SECTION: ubuntu.com. 3600 IN SOA ns1.canonical.com. hostmaster.canonical.com. 2008061805 10800 3600 604800 3600 ;; Query time: 134 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Jun 19 15:17:39 2008 ;; MSG SIZE rcvd: 98
2016-04-14 13:07:51 BabyBat bug added subscriber BabyBat
2016-04-15 04:46:48 Kenyon Ralph removed subscriber Kenyon Ralph
2017-06-02 22:15:13 Paul Gear description Dear, The apt source list for security update is by default configured to security.ubuntu.com. When you have a system using only IPv6 (and having not access to IPv4 via NAT-PT), security.ubuntu.com is only reachable in IPv4. It would be wise to configure an AAAA record to security.ubuntu.com to at least point to one of the many mirrors supporting IPv6 connectivity. That would avoid system running natively in IPv6 to lack by default the security update. Thanks a lot, Kind regards PS : I checked this as being a security vulnerability but this is more a configuration issue on the Ubuntu network infrastructure than a real security vulnerability: A DNS AAAA request : dig -t AAAA security.ubuntu.com ; <<>> DiG 9.4.1-P1 <<>> -t AAAA security.ubuntu.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26872 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;security.ubuntu.com. IN AAAA ;; AUTHORITY SECTION: ubuntu.com. 3600 IN SOA ns1.canonical.com. hostmaster.canonical.com. 2008061805 10800 3600 604800 3600 ;; Query time: 134 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Jun 19 15:17:39 2008 ;; MSG SIZE rcvd: 98 --------------------------------------- READ THIS BEFORE COMMENTING ON THIS BUG --------------------------------------- security.ubuntu.com and archive.ubuntu.com have been IPv6 enabled since March 2013 (see comment #29 below). Their connectivity is monitored by both internal and 3rd party monitoring systems. If you experience problems with IPv6 connectivity to the archive servers, please DO NOT comment on this bug. Instead, email rt@ubuntu.com explaining the problem, and include the output of the following commands: - date -u --rfc-3339=seconds - ip -6 addr - mtr -6 --report --no-dns -c 3 security.ubuntu.com - host security.ubuntu.com # requires bind9-host to be installed - ip -6 route get $(host security.ubuntu.com|awk '/has IPv6 address/ {print $NF}') # also requires bind9-host to be installed --------------------------------------- Dear, The apt source list for security update is by default configured to security.ubuntu.com. When you have a system using only IPv6 (and having not access to IPv4 via NAT-PT), security.ubuntu.com is only reachable in IPv4. It would be wise to configure an AAAA record to security.ubuntu.com to at least point to one of the many mirrors supporting IPv6 connectivity. That would avoid system running natively in IPv6 to lack by default the security update. Thanks a lot, Kind regards PS : I checked this as being a security vulnerability but this is more a configuration issue on the Ubuntu network infrastructure than a real security vulnerability: A DNS AAAA request : dig -t AAAA security.ubuntu.com ; <<>> DiG 9.4.1-P1 <<>> -t AAAA security.ubuntu.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26872 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;security.ubuntu.com. IN AAAA ;; AUTHORITY SECTION: ubuntu.com. 3600 IN SOA ns1.canonical.com. hostmaster.canonical.com. 2008061805 10800 3600 604800 3600 ;; Query time: 134 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Jun 19 15:17:39 2008 ;; MSG SIZE rcvd: 98