Your message dated Thu, 19 Feb 2026 09:16:46 +0100
with message-id <aZbG7tdPqwfE8Rcs@end>
and subject line Re: Bug#436111: openssh-server: password-less login doesn't
work for normal user under Hurd
has caused the Debian Bug report #436111,
regarding openssh-server: password-less login doesn't work for normal user
under Hurd
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
436111: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=436111
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:4.6p1-4
Severity: normal
Before configuring key based login, I was able to log into the Hurd box
as a normal user. But after adding the key using ssh-copy-id, I'm not
able to login to the box at all (with or without the password).
At this momeny ssh works, because I can still login as root.
This is what I got from syslog
Aug 5 19:04:29 hurd sshd[210]: reverse mapping checking getaddrinfo for
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 5 19:04:33 hurd sshd[212]: (pam_unix) session opened for user root by
root(uid=0)
Aug 5 19:05:06 hurd sshd[219]: Accepted publickey for rrs from 172.16.1.1 port
51239 ssh2
Aug 5 19:05:06 hurd sshd[221]: tcgetattr: Inappropriate ioctl for device
Aug 5 19:05:06 hurd sshd[222]: error: open /dev/tty failed - could not set
controlling tty: No such device or address
Aug 5 19:05:43 hurd sshd[228]: Accepted password for root from 172.16.1.1 port
51240 ssh2
Aug 5 19:06:08 hurd sshd[221]: fatal: mm_request_send: write: Bad file
descriptor
Aug 5 19:06:10 hurd sshd[123]: fatal: mm_request_send: write: Bad file
descriptor
Aug 5 19:07:02 hurd sshd[244]: reverse mapping checking getaddrinfo for
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 5 19:07:03 hurd sshd[246]: (pam_unix) session opened for user rrs by
(uid=0)
Aug 5 19:07:03 hurd sshd[247]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request
message ID
Aug 5 19:09:21 hurd sshd[244]: fatal: mm_request_receive: read: bad msg_len
50529027
Aug 5 19:12:08 hurd sshd[264]: (pam_unix) session opened for user rrs by
(uid=0)
Aug 5 19:12:08 hurd sshd[265]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request
message ID
Aug 5 19:12:16 hurd sshd[262]: fatal: mm_request_receive: read: bad msg_len
50529027
Aug 5 19:12:30 hurd sshd[270]: (pam_unix) session opened for user root by
root(uid=0)
Aug 5 19:13:59 hurd sshd[63]: reverse mapping checking getaddrinfo for
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 5 19:14:00 hurd sshd[65]: (pam_unix) session opened for user rrs by (uid=0)
Aug 5 19:14:01 hurd sshd[67]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request
message ID
Aug 5 19:15:18 hurd sshd[114]: reverse mapping checking getaddrinfo for
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 5 19:15:21 hurd sshd[116]: (pam_unix) session opened for user root by
root(uid=0)
I think the BREAK-IN messages are safe to ignore for this bug report
Ritesh
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: hurd-i386 (i686-AT386)
Kernel: GNU-Mach 1.3.99/Hurd-0.3
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.104 add and remove users and groups
ii debconf [debc 1.5.14 Debian configuration management sy
ii dpkg 1.14.4 package maintenance system for Deb
ii libc0.3 2.5-11+hurd.1 GNU C Library: Shared libraries
ii libcomerr2 1.38+1.39-WIP-2005.12.31-1 common error description library
ii libkrb53 1.4.4-8 MIT Kerberos runtime libraries
ii libpam-module 0.76-23 Pluggable Authentication Modules f
ii libpam-runtim 0.79-4 Runtime support for the PAM librar
ii libpam0g 0.76-23 Pluggable Authentication Modules l
ii libssl0.9.8 0.9.8e-5 SSL shared libraries
ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra
ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip
ii openssh-clien 1:4.6p1-4 secure shell client, an rlogin/rsh
ii zlib1g 1:1.2.3.3.dfsg-5 compression library - runtime
openssh-server recommends no packages.
-- debconf information:
ssh/disable_cr_auth: false
ssh/encrypted_host_key_but_no_keygen:
ssh/new_config: true
* ssh/use_old_init_script: true
--- End Message ---
--- Begin Message ---
Hello,
Seeing this old bug report.
password-less login does work on the Hurd in my tests, so closing.
Samuel
Ritesh Raj Sarraf,,,, le dim. 05 août 2007 19:59:11 +0530, a ecrit:
> Package: openssh-server
> Version: 1:4.6p1-4
> Severity: normal
>
> Before configuring key based login, I was able to log into the Hurd box
> as a normal user. But after adding the key using ssh-copy-id, I'm not
> able to login to the box at all (with or without the password).
>
> At this momeny ssh works, because I can still login as root.
> This is what I got from syslog
>
>
> Aug 5 19:04:29 hurd sshd[210]: reverse mapping checking getaddrinfo for
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug 5 19:04:33 hurd sshd[212]: (pam_unix) session opened for user root by
> root(uid=0)
> Aug 5 19:05:06 hurd sshd[219]: Accepted publickey for rrs from 172.16.1.1
> port 51239 ssh2
> Aug 5 19:05:06 hurd sshd[221]: tcgetattr: Inappropriate ioctl for device
> Aug 5 19:05:06 hurd sshd[222]: error: open /dev/tty failed - could not set
> controlling tty: No such device or address
> Aug 5 19:05:43 hurd sshd[228]: Accepted password for root from 172.16.1.1
> port 51240 ssh2
> Aug 5 19:06:08 hurd sshd[221]: fatal: mm_request_send: write: Bad file
> descriptor
> Aug 5 19:06:10 hurd sshd[123]: fatal: mm_request_send: write: Bad file
> descriptor
> Aug 5 19:07:02 hurd sshd[244]: reverse mapping checking getaddrinfo for
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug 5 19:07:03 hurd sshd[246]: (pam_unix) session opened for user rrs by
> (uid=0)
> Aug 5 19:07:03 hurd sshd[247]: error: ioctl(TIOCSCTTY): (ipc/mig) bad
> request message ID
> Aug 5 19:09:21 hurd sshd[244]: fatal: mm_request_receive: read: bad msg_len
> 50529027
> Aug 5 19:12:08 hurd sshd[264]: (pam_unix) session opened for user rrs by
> (uid=0)
> Aug 5 19:12:08 hurd sshd[265]: error: ioctl(TIOCSCTTY): (ipc/mig) bad
> request message ID
> Aug 5 19:12:16 hurd sshd[262]: fatal: mm_request_receive: read: bad msg_len
> 50529027
> Aug 5 19:12:30 hurd sshd[270]: (pam_unix) session opened for user root by
> root(uid=0)
> Aug 5 19:13:59 hurd sshd[63]: reverse mapping checking getaddrinfo for
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug 5 19:14:00 hurd sshd[65]: (pam_unix) session opened for user rrs by
> (uid=0)
> Aug 5 19:14:01 hurd sshd[67]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request
> message ID
> Aug 5 19:15:18 hurd sshd[114]: reverse mapping checking getaddrinfo for
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug 5 19:15:21 hurd sshd[116]: (pam_unix) session opened for user root by
> root(uid=0)
>
> I think the BREAK-IN messages are safe to ignore for this bug report
>
> Ritesh
>
>
> -- System Information:
> Debian Release: lenny/sid
> APT prefers unstable
> APT policy: (500, 'unstable')
> Architecture: hurd-i386 (i686-AT386)
>
> Kernel: GNU-Mach 1.3.99/Hurd-0.3
> Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
> Shell: /bin/sh linked to /bin/bash
>
> Versions of packages openssh-server depends on:
> ii adduser 3.104 add and remove users and groups
> ii debconf [debc 1.5.14 Debian configuration management
> sy
> ii dpkg 1.14.4 package maintenance system for
> Deb
> ii libc0.3 2.5-11+hurd.1 GNU C Library: Shared libraries
> ii libcomerr2 1.38+1.39-WIP-2005.12.31-1 common error description library
> ii libkrb53 1.4.4-8 MIT Kerberos runtime libraries
> ii libpam-module 0.76-23 Pluggable Authentication Modules
> f
> ii libpam-runtim 0.79-4 Runtime support for the PAM
> librar
> ii libpam0g 0.76-23 Pluggable Authentication Modules
> l
> ii libssl0.9.8 0.9.8e-5 SSL shared libraries
> ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers
> libra
> ii lsb-base 3.1-24 Linux Standard Base 3.1 init
> scrip
> ii openssh-clien 1:4.6p1-4 secure shell client, an
> rlogin/rsh
> ii zlib1g 1:1.2.3.3.dfsg-5 compression library - runtime
>
> openssh-server recommends no packages.
>
> -- debconf information:
> ssh/disable_cr_auth: false
> ssh/encrypted_host_key_but_no_keygen:
> ssh/new_config: true
> * ssh/use_old_init_script: true
>
--
Samuel
gawk; talk; nice; date; wine; grep; touch; unzip; strip; \
touch; gasp; finger; gasp; lyx; gasp; latex; mount; fsck; \
more; yes; gasp; umount; make clean; make mrproper; sleep
--- End Message ---