Your message dated Sat, 09 Apr 2022 13:34:58 +0000 with message-id <[email protected]> and subject line Bug#144579: fixed in openssh 1:9.0p1-1 has caused the Debian Bug report #144579, regarding ssh: scp fails if source file name contains a space to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 144579: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=144579 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: ssh Version: 1:3.5p1-4 Severity: normal This behaviour is broken: ------------ dpt@lotus:~$ scp "petunia.bostoncoop.net:/tmp/foo bar" /tmp Password: scp: /tmp/foo: No such file or directory scp: bar: No such file or directory ------------ Here's the full log: ------------ dpt@lotus:~$ scp -v "petunia.bostoncoop.net:/tmp/foo bar" /tmp Executing: program /usr/bin/ssh host petunia.bostoncoop.net, user (unspecified), command scp -v -f /tmp/foo bar OpenSSH_3.5p1 Debian 1:3.5p1-4, SSH protocols 1.5/2.0, OpenSSL 0x0090701f debug1: Reading configuration data /etc/ssh/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to petunia.bostoncoop.net [140.247.28.55] port 22. debug1: Connection established. debug1: identity file /home/dpt/.ssh/identity type -1 debug1: identity file /home/dpt/.ssh/id_rsa type -1 debug1: identity file /home/dpt/.ssh/id_dsa type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_3.5p1 Debian 1:3.5p1-4 debug1: match: OpenSSH_3.5p1 Debian 1:3.5p1-4 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.5p1 Debian 1:3.5p1-4 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 129/256 debug1: bits set: 1581/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'petunia.bostoncoop.net' is known and matches the RSA host key. debug1: Found key in /home/dpt/.ssh/known_hosts:1 debug1: bits set: 1604/3191 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password,keyboard-interactive debug1: next auth method to try is publickey debug1: try privkey: /home/dpt/.ssh/identity debug1: try privkey: /home/dpt/.ssh/id_rsa debug1: try privkey: /home/dpt/.ssh/id_dsa debug1: next auth method to try is keyboard-interactive Password: debug1: ssh-userauth2 successful: method keyboard-interactive debug1: fd 4 setting O_NONBLOCK debug1: fd 5 setting O_NONBLOCK debug1: channel 0: new [client-session] debug1: send channel open 0 debug1: Entering interactive session. debug1: ssh_session2_setup: id 0 debug1: Sending command: scp -v -f /tmp/foo bar debug1: channel request 0: exec debug1: channel 0: open confirm rwindow 0 rmax 32768 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 scp: /tmp/foo: No such file or directory scp: bar: No such file or directory debug1: channel 0: rcvd eof debug1: channel 0: output open -> drain debug1: channel 0: obuf empty debug1: channel 0: close_write debug1: channel 0: output drain -> closed debug1: channel 0: rcvd close debug1: channel 0: close_read debug1: channel 0: input open -> closed debug1: channel 0: almost dead debug1: channel 0: gc: notify user debug1: channel 0: gc: user detached debug1: channel 0: send close debug1: channel 0: is dead debug1: channel 0: garbage collecting debug1: channel_free: channel 0: client-session, nchannels 1 debug1: fd 0 clearing O_NONBLOCK debug1: fd 1 clearing O_NONBLOCK debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.1 seconds debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 debug1: Exit status 1 ------------ Best, Dylan Thurston -- System Information: Debian Release: testing/unstable Architecture: i386 Kernel: Linux lotus 2.4.18 #1 Sat Nov 16 16:27:52 EST 2002 i686 Locale: LANG=C, LC_CTYPE=C Versions of packages ssh depends on: ii adduser 3.49 Add and remove users and groups ii debconf 1.2.31 Debian configuration management sy ii libc6 2.3.1-14 GNU C Library: Shared libraries an ii libpam-modules 0.76-9 Pluggable Authentication Modules f ii libpam0g 0.76-9 Pluggable Authentication Modules l ii libssl0.9.7 0.9.7a-1 SSL shared libraries ii libwrap0 7.6-ipv6.1-3 Wietse Venema's TCP wrappers libra ii zlib1g 1:1.1.4-11 compression library - runtime -- debconf information: ssh/insecure_rshd: ssh/privsep_ask: true * ssh/user_environment_tell: * ssh/forward_warning: ssh/insecure_telnetd: ssh/new_config: true * ssh/use_old_init_script: true * ssh/SUID_client: true * ssh/privsep_tell: ssh/ssh2_keys_merged: * ssh/protocol2_only: true ssh/encrypted_host_key_but_no_keygen: * ssh/run_sshd: true
--- End Message ---
--- Begin Message ---Source: openssh Source-Version: 1:9.0p1-1 Done: Colin Watson <[email protected]> We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <[email protected]> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 09 Apr 2022 14:14:10 +0100 Source: openssh Architecture: source Version: 1:9.0p1-1 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <[email protected]> Changed-By: Colin Watson <[email protected]> Closes: 144579 204546 327019 1007822 Changes: openssh (1:9.0p1-1) unstable; urgency=medium . * New upstream release (https://www.openssh.com/releasenotes.html#9.0p1): - scp(1): Use the SFTP protocol by default (closes: #144579, #204546, #327019). This changes scp's quoting semantics by no longer performing wildcard expansion using the remote shell, and (with some server versions) no longer expanding ~user paths. The -O option is available to use the old protocol. See NEWS.Debian for more details. - ssh(1), sshd(8): use the hybrid Streamlined NTRU Prime + x25519 key exchange method by default ("[email protected]"). The NTRU algorithm is believed to resist attacks enabled by future quantum computers and is paired with the X25519 ECDH key exchange (the previous default) as a backstop against any weaknesses in NTRU Prime that may be discovered in the future. The combination ensures that the hybrid exchange offers at least as good security as the status quo. - sftp-server(8): support the "copy-data" extension to allow server- side copying of files/data, following the design in draft-ietf-secsh-filexfer-extensions-00. - sftp(1): add a "cp" command to allow the sftp client to perform server-side file copies. - ssh(1), sshd(8): upstream: fix poll(2) spin when a channel's output fd closes without data in the channel buffer (closes: #1007822). - sshd(8): pack pollfd array in server listen/accept loop. Could cause the server to hang/spin when MaxStartups > RLIMIT_NOFILE. - ssh-keygen(1): avoid NULL deref via the find-principals and check-novalidate operations. bz3409 and GHPR307 respectively. - scp(1): fix a memory leak in argument processing. - sshd(8): don't try to resolve ListenAddress directives in the sshd re-exec path. They are unused after re-exec and parsing errors (possible for example if the host's network configuration changed) could prevent connections from being accepted. - sshd(8): when refusing a public key authentication request from a client for using an unapproved or unsupported signature algorithm include the algorithm name in the log message to make debugging easier. - ssh(1), sshd(8): Fix possible integer underflow in scan_scaled(3) parsing of K/M/G/etc quantities. - sshd(8): default to not using sandbox when cross compiling. On most systems poll(2) does not work when the number of FDs is reduced with setrlimit, so assume it doesn't when cross compiling and we can't run the test. * Remove obsolete FAQ, removed from openssh.com in 2016. Checksums-Sha1: 10bef2e8c5736db098294e86fb3de29cd37af262 3347 openssh_9.0p1-1.dsc 06dd658874dcd22d66311cf5999bd56c614de509 1822183 openssh_9.0p1.orig.tar.gz af112ac3c8d4ebd515e71fb6ef4d7633056c11e1 833 openssh_9.0p1.orig.tar.gz.asc ce125a7f2ed78c5830b0f0273bce9772df56c64a 176128 openssh_9.0p1-1.debian.tar.xz Checksums-Sha256: ff368f3247c89eea2be10cd2ad2fcb9d0811fc6652c9cab9d01d087203e28fdd 3347 openssh_9.0p1-1.dsc 03974302161e9ecce32153cfa10012f1e65c8f3750f573a73ab1befd5972a28a 1822183 openssh_9.0p1.orig.tar.gz 5db3a2eb3e8e9c8ae62527ea55f5a6fa41c395ebd0bbb65f4b3dfebeeee5fa00 833 openssh_9.0p1.orig.tar.gz.asc 46f24ab534892c55c82ebafdac23564579f9be73a7cc0230730a2e6aa64e17ab 176128 openssh_9.0p1-1.debian.tar.xz Files: 7c4fc7db25ae43e139147c863c58dcce 3347 net standard openssh_9.0p1-1.dsc 5ed8252a0ee379c0f7c9e0d25d32424d 1822183 net standard openssh_9.0p1.orig.tar.gz eb64a4f2d204c43658c2d9d3bc6b3a2a 833 net standard openssh_9.0p1.orig.tar.gz.asc 69841d0ed1008a71168dd4277df50e69 176128 net standard openssh_9.0p1-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmJRhtcACgkQOTWH2X2G UAvu3BAAjS5VRJ+iDTnJzL8wNTKEwfC8pbK3EovhYNXGVZPgYRUSFVHcuCS0NWwR 11TRkiugwBrM60y5ZzNU0N8T7ypn0gTdFf6S3HhN5DxM2IWb+xNmk/27/RPp1LrI /Ywg3pXGXPnveJvVI9TS/AWBp4n/D7ABqTrD8+H3P33MC70Otgwuw5MvJmD+RM5z N5C3/q3B8/8ciuW7h8pm/YDKkbxod1oKCJqRPLGGE4f5bqFGh0V3dKQaPS1tnxkj +6adxCN1ix0Ci3jJurFjFw1QxTITl/PV1kyNiuaBhu2a7tGqV3vs9dt3mD5B7pt3 DEuw3MzEpZoU31sR+uGeksMnYqyxh+4P7o8qOQtP7LMuR/0iS2pwNG+mSDBMp5mq J4svdzn0dYBut9ic2qr2Aj/Bf/pISTnA8EWr3l9zyN4Oo9QzmtD/PLZ7FNVvCCii 0v5poNVVuZANWKGDCNnhGDOPvIsxKG/IQ+3sU1EUv79dnFvrTDEhzLTLigA5hGH2 cJhD4BbxfMky1SnqMSOKW7MHBH4eKdf7AI83zlXjMPBe4F5xJ113F2BiMJHuvu99 S7fPdWMrhoTXXaB0MCFr1B02lBiJXDG0oho2P6pUXQaWoN5qajy/IJrWryxwfhxM rYuPGD+QuXhEgTD5q/Gjccdq/FEXExnJDzYskclgJ2+onNOc7i4= =gUly -----END PGP SIGNATURE-----
--- End Message ---

