Your message dated Sun, 3 Mar 2019 20:35:55 +0100
with message-id <[email protected]>
and subject line close release-notes bugs for releases before stretch
has caused the Debian Bug report #769388,
regarding 'PermitRootLogin without-password' in new installations breaks some 
use cases
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
769388: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769388
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:6.0p1-4
Severity: grave

Installed openssh-server on debian stable. As soon as i update the
package to latest version (it is reported for the other version as 
i cannot login if the package is not at that version) login becomes impossible 
with the error

Oct 17 20:11:34 nl-01 sshd[25206]: Accepted password for root from IP port 
44676 ssh2
Oct 17 20:11:34 nl-01 sshd[25206]: pam_loginuid(sshd:session): set_loginuid 
failed
Oct 17 20:11:34 nl-01 sshd[25206]: pam_unix(sshd:session): session opened for 
user root by (uid=0)
Oct 17 20:11:34 nl-01 sshd[25206]: error: PAM: pam_open_session(): Cannot 
make/remove an entry for the specified session
Oct 17 20:11:34 nl-01 sshd[25206]: Received disconnect from IP: 11: 
disconnected by user

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (x86_64)

Kernel: Linux 2.6.32-5-vserver-amd64 (SMP w/24 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssh-server depends on:
ii  adduser                3.113+nmu3
ii  debconf [debconf-2.0]  1.5.51
ii  dpkg                   1.17.1
ii  libc6                  2.17-93
ii  libcomerr2             1.42.8-1
ii  libgssapi-krb5-2       1.11.3+dfsg-3
ii  libkrb5-3              1.11.3+dfsg-3
ii  libpam-modules         1.1.3-7.1
ii  libpam-runtime         1.1.3-7.1
ii  libpam0g               1.1.3-7.1
ii  libselinux1            2.1.13-3
ii  libssl1.0.0            1.0.1e-3
ii  libwrap0               7.6.q-24
ii  lsb-base               4.1+Debian12
ii  openssh-client         1:6.0p1-4
ii  procps                 1:3.3.8-2
ii  zlib1g                 1:1.2.8.dfsg-1

Versions of packages openssh-server recommends:
ii  ncurses-term             5.9+20130608-1
ii  openssh-blacklist        0.4.1+nmu1
ii  openssh-blacklist-extra  0.4.1+nmu1
ii  xauth                    1:1.0.7-1

Versions of packages openssh-server suggests:
pn  molly-guard   <none>
pn  monkeysphere  <none>
pn  rssh          <none>
pn  ssh-askpass   <none>
pn  ufw           <none>

-- debconf information:
  ssh/vulnerable_host_keys:
  ssh/encrypted_host_key_but_no_keygen:
* ssh/use_old_init_script: true
  ssh/disable_cr_auth: false

--- End Message ---
--- Begin Message ---
Hi,

We are sorry that we were not able to handle your contribution or
suggestion for changes to the release-notes. I am going over old bugs
and I am closing all the items that were suggested for the release-notes
of Debian releases before stretch. On the good side, some even appear to
have been applied, without the bug being closed.

Please don't hesitate to open a new bug if you think your suggestion is
still valuable for the release-notes of buster. If you do that, we'd
appreciate it when you try to summarize the issue properly when the
closed bug was more than a couple of messages.

Paul


Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---

Reply via email to