On Wed, Feb 23, 2005 at 10:20:01AM +0100, nodata wrote:
This bug report is completely wrong, logging into X once doesn't solve the
problem.
DISPLAY is not being set anywhere, and the .Xauthority file is empty.
Do you have xbase-clients installed on the remote machine?
--
Colin Watson
openssh-client
openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.1p1-1
Distribution: experimental
Urgency: low
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
; Sam, let me know when this is done and I'll update my
Conflicts again.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
tags 313949 pending
thanks
On Tue, Jun 14, 2005 at 11:29:15PM +0200, Jens Seidel wrote:
attached you will find an update of the German PO file de.po.
Committed to CVS. Thanks!
--
Colin Watson [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL
documentation disappearing entirely (!).
I'll try again at some point.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
and not regain
them, will it provide additional security to use a special-purpose
group? The Red Hat packages in OpenSSH CVS use group nobody.
Thanks,
--
Colin Watson [EMAIL PROTECTED]
On Tue, Jan 07, 2003 at 01:57:21PM +, Colin Watson wrote:
For those who are interested (any of the million or so who've filed bugs
about it, perhaps ...), OpenSSH upstream have decided to apply a
workaround for the sockaddr_in6 scope-id incompatibility between glibc
2.2/2.3 and Linux 2.2
. Enjoy.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
On Tue, Apr 01, 2003 at 04:50:04PM -0500, Cyrus Dantes wrote:
Does anyone know the status of OpenSSH 3.6.1 for Debian? It was
released last night. Thanks.
Hi,
Have a look at recent messages to this list in the archives.
Cheers,
--
Colin Watson [EMAIL
it as such and we can revisit it for
testing when 3.7 is released.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
On Thu, Sep 04, 2003 at 06:09:46AM +0900, Junichi Uekawa wrote:
Colin Watson wrote:
retitle 69601 ssh: protocol 2 incompatibility with F-Secure 2.0.10
thanks
On Fri, Aug 31, 2001 at 04:00:08PM +0900, Junichi Uekawa wrote:
retitle 69601 Please add notes on README.Debian or appropriate
-4. However, a status indicator would still be nice.
OpenSSL provides a facility for this in its key generation functions,
but OpenSSH doesn't currently use them.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
* :)
Cheers,
--
Colin Watson [EMAIL PROTECTED]
On Tue, Sep 16, 2003 at 05:20:15PM -0700, Marc Singer wrote:
On Wed, Sep 17, 2003 at 12:54:58AM +0100, Colin Watson wrote:
You were running the hostbased-auth-fixed version in proposed-updates,
which has not yet been upgraded. The stable release manager has refused
to install that version
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Tue, 16 Sep 2003 14:32:28 +0100
Source: openssh
Binary: ssh-askpass-gnome ssh
Architecture: source i386
Version: 1:3.6.1p2-7
Distribution: unstable
Urgency: high
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson
severity 211305 normal
tags 211305 unreproducible
retitle 211305 ssh: Bad packet length errors
thanks
On Wed, Sep 17, 2003 at 12:01:50AM +0100, Colin Watson wrote:
On Tue, Sep 16, 2003 at 10:32:19PM +, Lazarus Long wrote:
$ slogin localhost
5072 6f74 6f63 6f6c
Disconnecting: Bad packet
On Wed, Sep 17, 2003 at 02:46:56AM +, Adam M. Costello wrote:
Colin Watson [EMAIL PROTECTED] wrote:
Fixes are underway already.
You rock. :)
I have one small additional plea: If it wouldn't be too much trouble,
could the new 3.7.1 package not depend on the unstable libc6? Since
certainly yes. But that is a separate (and filed) bug.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Wed, 17 Sep 2003 03:07:19 +0100
Source: openssh
Binary: ssh-askpass-gnome ssh
Architecture: source i386
Version: 1:3.6.1p2-8
Distribution: unstable
Urgency: high
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson
advisory at
http://www.openpkg.org/security/OpenPKG-SA-2003.040-openssh.html
As if you folks haven't been busy enough lately. Good luck.
Here's the patch.
Thanks. However, with something like this I'd like to see it go into
portable OpenSSH CVS first, I think.
--
Colin Watson
replaced, and if so, you
can ignore this portion of the bug.
It has been replaced; the upstream copyright file is simply out of date.
They've done a licence audit in 3.7 which polishes this sort of thing
up.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
cryptographic signatures for its source tarball
distributed by upstream, I would rather consult them first.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
. No PAM patches were ever taken from 3.7 into Debian 3.6.1,
because the codebases differed too much.
--
Colin Watson [EMAIL PROTECTED]
On Tue, Sep 23, 2003 at 06:27:26PM -0400, [EMAIL PROTECTED] wrote:
It's so trivial it's hard to write a *really* different version,
but here's a tested, public-domain, implementation.
Did you see my followup to this bug?
--
Colin Watson [EMAIL PROTECTED]
On Tue, Sep 23, 2003 at 11:57:00PM +0100, Colin Watson wrote:
On Tue, Sep 23, 2003 at 06:27:26PM -0400, [EMAIL PROTECTED] wrote:
It's so trivial it's hard to write a *really* different version,
but here's a tested, public-domain, implementation.
Did you see my followup to this bug?
I'm
this in conjunction
with upgrading to 3.7.1p2, which still involves some work.
--
Colin Watson [EMAIL PROTECTED]
tracking
system.
--
Colin Watson [EMAIL PROTECTED]
tags 215372 pending
thanks
On Fri, Oct 17, 2003 at 11:29:28AM +0200, cobaco wrote:
On 2003-10-17 11:12, Colin Watson wrote:
It seems OK, thanks, except for this:
Project-Id-Version: openldap2\n
:-O, I translated openssh, and openldap2 one after the other, stupid mistake
*me
On Fri, Nov 14, 2003 at 11:55:27AM +0100, Marc Haber wrote:
On Sat, Sep 27, 2003 at 10:39:38AM +0100, Colin Watson wrote:
[somebody else wrote this]
ssh seems to be one of the few packages left not yet switched to the new
common include pam framework...
Yeah, I know. I'm working
with the
original english templates.
Thanks, applied to CVS.
--
Colin Watson [EMAIL PROTECTED]
tags 217696 pending
thanks
On Sun, Oct 26, 2003 at 08:47:27PM +0100, Robert Millan wrote:
Please update config.{guess,sub} for the GNU/KFreeBSD port. The oldest
version that properly detects GNU/KFreeBSD is 2003-10-07 (available in
autotools-dev).
Done in CVS, thanks.
--
Colin Watson
tags 212497 pending
thanks
On Wed, Sep 24, 2003 at 09:33:30AM +0900, Kenshi Muto wrote:
I updated Japanese translation of debconf messages (ja.po).
Please apply this.
Applied to CVS, thanks.
--
Colin Watson [EMAIL PROTECTED]
tags 211832 pending
thanks
On Sat, Sep 20, 2003 at 04:36:05PM +0200, Carlos Valdivia Yagüe wrote:
Package: ssh
Version: 1:3.6.1p2-3
Severity: wishlist
I've updated the spanish translation of debconf templates. Please, find
it attached.
Applied to CVS, thanks.
--
Colin Watson
doesn't include a Polish man page. What package did
yours come from?
Cheers,
--
Colin Watson [EMAIL PROTECTED]
no' on upgrade and ask whether
ChallengeResponseAuthentication should also be disabled? This appears to
disable authentication with passwords in my tests. I think that's the
best I can do.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh- Secure rlogin/rsh/rcp replacement (OpenSSH)
ssh
Urgency: high
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server - Secure shell server
-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client
openssh-server-udeb
Architecture: source powerpc all
Version: 1:3.8.1p1-11
Distribution: experimental
Urgency: high
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client
On Sat, Oct 16, 2004 at 08:53:49AM +0200, Andreas Barth wrote:
according to bug #272563,
You sent this to #272653 by mistake. Please resend.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
is to use chown --reference and chmod
--reference when setting configuration options. I hope to test and
upload this tomorrow.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh- Secure rlogin/rsh/rcp replacement (OpenSSH)
ssh
this is serious enough to issue a
security advisory, I don't see a reason to argue, so downgrading for
now.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
Version: 1:3.8.1p1-12
Distribution: experimental
Urgency: low
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer
Urgency: low
Maintainer: Matthew Vernon [EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server - Secure shell server
worried about a recurrence of #252676, for instance.
Thanks,
--
Colin Watson [EMAIL PROTECTED]
,
--
Colin Watson [EMAIL PROTECTED]
no identities. if no
identity is loaded, and... doesn't answer if it is not running ;) )
E. :) Why not just look at the agent's exit code?
I'll have a look, but ssh-copy-id is kind of horrible ...
--
Colin Watson [EMAIL PROTECTED]
:: Name or service not known
It occurs to me that perhaps ssh is the tool that should be stripping
the colon, if anything.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
explicitly says root login with public key authentication will be
allowed [with the command option, and nothing else].
The authorized_keys file format is described in sshd(8).
Cheers,
--
Colin Watson [EMAIL PROTECTED]
, I get this message.
That's strange. I can't find that message anywhere in the openssh source
code ...
--
Colin Watson [EMAIL PROTECTED]
in the usual way.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
of which will set
$REMOTEHOST.
You're of course welcome to apply this to your local version of ssh, but
I think it would do more harm than good to apply it to the version
shipped by Debian.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
.
+PO-Revision-Date: 2003-09-20 16:40+0200\n
Otherwise, thanks, I've applied this to our CVS and it'll be in the next
release.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
. if the user
requires the use of v1 for compatibility, there should be an option
to enable v1 only.
There is; it's just not presented by debconf. Not all of OpenSSH's
configuration options are - nor should be - presented by debconf.
Cheers,
--
Colin Watson [EMAIL
On Wed, Jan 21, 2004 at 04:01:41PM +0200, Erno Kuusela wrote:
On Wed, 21 Jan 2004, Colin Watson wrote:
| There is; it's just not presented by debconf. Not all of OpenSSH's
| configuration options are - nor should be - presented by debconf.
i guess i was trying to say that the two sensible
cups configuration exactly as expected (at
localhost:631) from w3m.
Yeah, indeed ssh isn't broken here. (This would be very complicated and
strange brokenness in ssh - very hard to achieve even deliberately, in
fact.)
Cheers,
--
Colin Watson [EMAIL PROTECTED]
be in the next release.
--
Colin Watson [EMAIL PROTECTED]
.
Committed to CVS, thanks. It'll be in the next release.
--
Colin Watson [EMAIL PROTECTED]
be due to another package; I'm unsure how to
troubleshoot. Same results with 1:3.6.1p2-11.
Please install the strace package and run 'strace -f sshd'. (I have a
guess, but we shall see ...)
--
Colin Watson [EMAIL PROTECTED]
: GnuPG v1.2.2 (GNU/Linux)
Comment: Colin Watson [EMAIL PROTECTED] -- Debian developer
iD8DBQFAKfqH9t0zAhD6TNERAtg/AJ9OlkfMOPsGDeX0Rs+yJylG8wL+BwCbB5pO
G9ijf24NRFGzCZ+f0uJUBNg=
=3UfE
-END PGP SIGNATURE-
Accepted:
openssh_3.6.1p2-12.diff.gz
to pool/main/o/openssh/openssh_3.6.1p2-12
host fails.
Example:
scp localhost:file remotehost:file;echo $?
ssh: connect to host remotehost port 22: No route to host
0
This is specific to remote-to-remote copying, so I'm retitling the bug.
I think it's been fixed upstream.
--
Colin Watson [EMAIL
for a while.
Unfortunately it also includes features such as PAM not working
properly out of the box. :) One of these days I'll get round to trying
to fix it so that it can be uploaded ...
Cheers,
--
Colin Watson [EMAIL PROTECTED]
any more.
--
Colin Watson [EMAIL PROTECTED]
produce no output. (Most noticeably,
pam_motd.) I can reproduce this using HEAD of portable CVS. I've mailed
Darren Tucker asking for help.
--
Colin Watson [EMAIL PROTECTED]
-Version: el\n
Shouldn't this be something like the version number of openssh you
translated?
Cheers,
--
Colin Watson [EMAIL PROTECTED]
to child
(closes: #164797).
-- Colin Watson [EMAIL PROTECTED] Sun, 27 Jul 2003 17:31:15 +0100
Cheers,
--
Colin Watson [EMAIL PROTECTED]
/inittab from ssh's postinst is going
to be risky and error-prone.
I'd be happy to document the approach in README.Debian, though: please
feel free to send some suggested text.
(Sorry for taking so long to respond to this bug report.)
Cheers,
--
Colin Watson [EMAIL
,
--
Colin Watson [EMAIL PROTECTED]
, namely for resource limits to be reset in sshd startup.
The other two do indeed seem to be fixed, though: I've confirmed by
comparing 3.6.1p2's behaviour to 3.7.1p2's.
Thanks,
--
Colin Watson [EMAIL PROTECTED]
upgrading from, and was it a locally built
version? This is not intended behaviour at all, and I can't see any way
it could have happened unless the version you were upgrading from was
less than 1:1.3.
Even so, you should have a backup in /etc/ssh/sshd_config.dpkg-old.
--
Colin Watson
' would be a good start.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
the line was wrong).
Simple solution : ensure there is a newline terminating the last line
with echo -e '\nUsePAM yes' instead.
Fixed in CVS, thanks.
--
Colin Watson [EMAIL PROTECTED]
On Sat, Apr 24, 2004 at 01:41:00PM -0700, Phil Dibowitz wrote:
Both ssh-add and ssh-keygen echo your password to the tty in the new
3.8p1-3 version that I just dist-upgraded to. This is a pretty large
security problem.
Er. Not for me they don't! What terminal emulator are you using?
--
Colin
for this diagnosis. I was puzzled.
I supposed that these should be merged with #245735, but I wouldn't
rush to move them off bugs.d.o/ssh or the vacuum will quickly be
filled.
Quite. Perhaps #245735 should be RC; #245714 is very nasty.
--
Colin Watson [EMAIL
that we get
fewer duplicate reports.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
then; I'll close them tomorrow morning.
--
Colin Watson [EMAIL PROTECTED]
any
indication for the reason.
Forwarded upstream as bug #856, thanks.
--
Colin Watson [EMAIL PROTECTED]
about FILE stands.
Thanks,
--
Colin Watson [EMAIL PROTECTED]
, by executing itself with the name it was started as, i.e.,
/usr/sbin/sshd.
This should be 'e.g.', of course, since it might have been invoked
under some other name.
It's in 3.8.1p1 too, so forwarded upstream; sorry for the delay.
--
Colin Watson [EMAIL
from
there to host2; I believe you need to be using public-key authentication
via an ssh-agent and agent forwarding to host1 in order for this to
work. Considering the compatibility limitations of scp
(http://www.openssh.org/faq.html#2.10), I doubt this will be fixed.
Cheers,
--
Colin Watson
features by default since the server will be in
optional rather than standard.
Thanks,
--
Colin Watson [EMAIL PROTECTED]
.
Forwarded upstream as bug #867, thanks. I'll work around it in the
Debian package for now, since I don't want to modify the configure
script and thus have to deal with merging new upstream versions of it.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
.
--
Colin Watson [EMAIL PROTECTED]
:
http://www.openssh.org/faq.html#2.10
This particular feature request was made upstream a while ago, so I'm
marking this bug forwarded.
In the meantime, you could use 'rsync -e ssh'.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
[EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh- Secure rlogin/rsh/rcp replacement (OpenSSH)
Closes: 211640
On Thu, May 20, 2004 at 11:32:21PM +1000, Darren Tucker wrote:
Colin Watson wrote:
Could I impose on you to have a quick look at Debian bug #248125, in
which Ctrl-C-ing ssh at the Password: prompt causes several stray
processes to remain around, including a zombie sshd? I've been looking
it trying to daemonize itself.
If I run it within gdb and let it crash, a bt shows only a
line with a ? without any useful information.
Can anyone on debian-arm help me with this bug, please?
Thanks,
--
Colin Watson [EMAIL PROTECTED]
humbly
suggest this matter is fixed ASAP.
Feel free to do a binary-only NMU for now, as far as I'm concerned.
--
Colin Watson [EMAIL PROTECTED]
OpenSSH tree but the bug is not yet closed (not
confirmed by reporter).
Thanks for that! It works for me, so I'm preparing an upload now.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
[EMAIL PROTECTED]
Changed-By: Colin Watson [EMAIL PROTECTED]
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh- Secure rlogin/rsh/rcp replacement (OpenSSH)
ssh-askpass
tags 252226 pending
thanks
On Wed, Jun 02, 2004 at 10:30:44AM +0200, Helge Kreutzmann wrote:
I updated the po-file for german which is attached.
Applied to CVS; thanks.
--
Colin Watson [EMAIL PROTECTED]
. I don't know
of any resolution yet.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
and
synchronise ACLs and filesystem attributes, if the target filesystem
supports them.
scp is unlikely to be changed, especially for features which require
support in both the client and the server. See:
http://www.openssh.org/faq.html#2.10
Cheers,
--
Colin Watson
On Wed, Jun 16, 2004 at 12:20:56AM +0200, martin f krafft wrote:
also sprach Colin Watson [EMAIL PROTECTED] [2004.06.15.2346 +0200]:
scp is unlikely to be changed, especially for features which require
support in both the client and the server. See:
http://www.openssh.org/faq.html#2.10
On Wed, Jun 16, 2004 at 01:07:00AM +0200, martin f krafft wrote:
also sprach Colin Watson [EMAIL PROTECTED] [2004.06.16.0029 +0200]:
The FAQ entry is there to discourage such requests. No, I don't
believe there's any point. sftp, perhaps.
So the FAQ entry exists to discourage innovation
On Wed, Jun 16, 2004 at 02:27:54AM +0200, martin f krafft wrote:
also sprach Colin Watson [EMAIL PROTECTED] [2004.06.16.0114 +0200]:
scp *can't* be changed in any significant way. Changing it breaks
compatibility, unavoidably. It's not a question of innovation:
innovation can happen in sftp
the duplicate here
for annotation purposes ...
--
Colin Watson [EMAIL PROTECTED]
specific
entry...
Speaking as the base-passwd maintainer, there is no reason for the sshd
user to be in base-passwd, so it will not be added there. This is what
'adduser --system' is for.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
On Fri, Jul 09, 2004 at 10:51:22PM +1000, Damien Miller wrote:
Colin Watson wrote:
I wish I could provide you with a reliable reproduction recipe, but
perhaps this is good enough for a pthreads expert on openssh-unix-dev to
work it out?
Are you compiling with USE_POSIX_THREADS
more awake.
Cheers,
--
Colin Watson [EMAIL PROTECTED]
1 - 100 of 830 matches
Mail list logo