Your message dated Sun, 3 Mar 2019 20:35:55 +0100
with message-id <[email protected]>
and subject line close release-notes bugs for releases before stretch
has caused the Debian Bug report #769388,
regarding 'PermitRootLogin without-password' in new installations breaks some
use cases
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
769388: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769388
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:6.0p1-4
Severity: grave
Installed openssh-server on debian stable. As soon as i update the
package to latest version (it is reported for the other version as
i cannot login if the package is not at that version) login becomes impossible
with the error
Oct 17 20:11:34 nl-01 sshd[25206]: Accepted password for root from IP port
44676 ssh2
Oct 17 20:11:34 nl-01 sshd[25206]: pam_loginuid(sshd:session): set_loginuid
failed
Oct 17 20:11:34 nl-01 sshd[25206]: pam_unix(sshd:session): session opened for
user root by (uid=0)
Oct 17 20:11:34 nl-01 sshd[25206]: error: PAM: pam_open_session(): Cannot
make/remove an entry for the specified session
Oct 17 20:11:34 nl-01 sshd[25206]: Received disconnect from IP: 11:
disconnected by user
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1,
'experimental')
Architecture: i386 (x86_64)
Kernel: Linux 2.6.32-5-vserver-amd64 (SMP w/24 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Versions of packages openssh-server depends on:
ii adduser 3.113+nmu3
ii debconf [debconf-2.0] 1.5.51
ii dpkg 1.17.1
ii libc6 2.17-93
ii libcomerr2 1.42.8-1
ii libgssapi-krb5-2 1.11.3+dfsg-3
ii libkrb5-3 1.11.3+dfsg-3
ii libpam-modules 1.1.3-7.1
ii libpam-runtime 1.1.3-7.1
ii libpam0g 1.1.3-7.1
ii libselinux1 2.1.13-3
ii libssl1.0.0 1.0.1e-3
ii libwrap0 7.6.q-24
ii lsb-base 4.1+Debian12
ii openssh-client 1:6.0p1-4
ii procps 1:3.3.8-2
ii zlib1g 1:1.2.8.dfsg-1
Versions of packages openssh-server recommends:
ii ncurses-term 5.9+20130608-1
ii openssh-blacklist 0.4.1+nmu1
ii openssh-blacklist-extra 0.4.1+nmu1
ii xauth 1:1.0.7-1
Versions of packages openssh-server suggests:
pn molly-guard <none>
pn monkeysphere <none>
pn rssh <none>
pn ssh-askpass <none>
pn ufw <none>
-- debconf information:
ssh/vulnerable_host_keys:
ssh/encrypted_host_key_but_no_keygen:
* ssh/use_old_init_script: true
ssh/disable_cr_auth: false
--- End Message ---
--- Begin Message ---
Hi,
We are sorry that we were not able to handle your contribution or
suggestion for changes to the release-notes. I am going over old bugs
and I am closing all the items that were suggested for the release-notes
of Debian releases before stretch. On the good side, some even appear to
have been applied, without the bug being closed.
Please don't hesitate to open a new bug if you think your suggestion is
still valuable for the release-notes of buster. If you do that, we'd
appreciate it when you try to summarize the issue properly when the
closed bug was more than a couple of messages.
Paul
signature.asc
Description: OpenPGP digital signature
--- End Message ---