Your message dated Sat, 22 Aug 2015 17:19:40 -0700 with message-id <[email protected]> has caused the report #796599, regarding openssh-client: ssh -G no longer returns "illegal option" (6.0) or "unknown option" (6.7) to be marked as having been forwarded to the upstream software author(s) [email protected], [email protected]
(NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 796599: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796599 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Hi Nelson, Klaus, The test for Linux/Ebury now returns false positives on OpenSSH 6.8 and later due to the introduction of the "-G" command: * ssh(1): Add a -G option to ssh that causes it to parse its configuration and dump the result to stdout, similar to "sshd -T". (source: http://www.openssh.com/txt/release-6.8) I would suggest that the check be changed to skip version 6.8 and later or to find a different way to test for infected binaries. Cheers, Francois P.S. Also filed on the Debian bug tracker: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796599
--- End Message ---

