Bug#1072233: mosh: use wtmpdb to write wtmp entries
I think Mosh would be happy to support this transition, but Mosh doesn't write to utmp/wtmp itself or with a PAM module; Mosh uses libutempter for this. If libutempter is going to be updated to use wtmpdb, I don't think Mosh itself has to change. Sincerely, Keith On Thu, May 30, 2024 at 11:49 AM Chris Hofstaedtler wrote: > Source: mosh > Severity: important > > Per the discussion on debian-devel, Debian will switch to wtmpdb for > Y2038-safe wtmp recording. If your package writes wtmp entries, > please switch to libwtmpdb. > > https://lists.debian.org/debian-devel/2024/04/msg00406.html > > Chris >
Bug#1005718: mosh: FTBFS with OpenSSL 3.0
forwarded 1005718 https://github.com/mobile-shell/mosh/issues/1174 thankyou On Sun, Feb 13, 2022 at 1:03 PM Sebastian Andrzej Siewior wrote: > > Source: mosh > Version: 1.3.2-2.1 > Severity: important > Tags: bookworm sid > User: pkg-openssl-de...@lists.alioth.debian.org > Usertags: ftbfs-3.0 > > Your package is failing to build using OpenSSL 3.0 with the > following error: > > | c++ -DHAVE_CONFIG_H -I. -I../.. -I./../util -Wdate-time > -D_FORTIFY_SOURCE=2 -Wall -Werror -Wextra -pedantic -Wno-long-long -Weffc++ > -Wmissing-declarations -fno-strict-overflow -D_FORTIFY_SOURCE=2 > -fstack-protector-all -Wstack-protector --param ssp-buffer-size=1 -fPIE > -fno-default-inline -pipe -g -O2 -ffile-prefix-map=/<>=. > -Wformat -Werror=format-security -c -o ocb.o ocb.cc > | ocb.cc: In function ‘void AES_ecb_encrypt_blks(block*, unsigned int, > AES_KEY*)’: > | ocb.cc:360:80: error: ‘void AES_encrypt(const unsigned char*, unsigned > char*, const AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 360 | AES_encrypt((unsigned char *)(blks+nblks), (unsigned char > *)(blks+nblks), key); > | | >^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:57:6: note: declared here > |57 | void AES_encrypt(const unsigned char *in, unsigned char *out, > | | ^~~ > | ocb.cc: In function ‘void AES_ecb_decrypt_blks(block*, unsigned int, > AES_KEY*)’: > | ocb.cc:367:80: error: ‘void AES_decrypt(const unsigned char*, unsigned > char*, const AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 367 | AES_decrypt((unsigned char *)(blks+nblks), (unsigned char > *)(blks+nblks), key); > | | >^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:60:6: note: declared here > |60 | void AES_decrypt(const unsigned char *in, unsigned char *out, > | | ^~~ > | ocb.cc: In function ‘int ae_init(ae_ctx*, const void*, int, int, int)’: > | ocb.cc:804:75: error: ‘int AES_set_encrypt_key(const unsigned char*, int, > AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 804 | AES_set_encrypt_key((unsigned char *)key, key_len*8, > >encrypt_key); > | | > ^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:51:5: note: declared here > |51 | int AES_set_encrypt_key(const unsigned char *userKey, const int > bits, > | | ^~~ > | ocb.cc:808:82: error: ‘int AES_set_decrypt_key(const unsigned char*, int, > AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 808 | AES_set_decrypt_key((unsigned char *)key, (int)(key_len*8), > >decrypt_key); > | | > ^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:54:5: note: declared here > |54 | int AES_set_decrypt_key(const unsigned char *userKey, const int > bits, > | | ^~~ > | ocb.cc:817:76: error: ‘void AES_encrypt(const unsigned char*, unsigned > char*, const AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 817 | (unsigned char *)>Lstar, > >encrypt_key); > | | >^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:57:6: note: declared here > |57 | void AES_encrypt(const unsigned char *in, unsigned char *out, > | | ^~~ > | ocb.cc: In function ‘block gen_offset_from_nonce(ae_ctx*, const void*)’: > | ocb.cc:854:72: error: ‘void AES_encrypt(const unsigned char*, unsigned > char*, const AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 854 | AES_encrypt(tmp.u8, (unsigned char *)>KtopStr, > >encrypt_key); > | | >^ > | In file included from ocb.cc:354: > | /usr/include/openssl/aes.h:57:6: note: declared here > |57 | void AES_encrypt(const unsigned char *in, unsigned char *out, > | | ^~~ > | ocb.cc: In function ‘int ae_decrypt(ae_ctx*, const void*, const void*, > int, const void*, int, void*, const void*, int)’: > | ocb.cc:1338:68: error: ‘void AES_encrypt(const unsigned char*, unsigned > char*, const AES_KEY*)’ is deprecated: Since OpenSSL 3.0 > [-Werror=deprecated-declarations] > | 1338 | AES_encrypt((unsigned char *), tmp.u8, > >encrypt_key); > | |^ > | In file included from ocb.cc:354: > |
Bug#977684: mahimahi: reproducible builds: Embeds paths to iptables and ip in binaries
Hi, sorry, I should have clarified that I am also the upstream maintainer, and I keep the "debian" directory in the same source repository as everything else. That's what I meant about submitting a pull request on GitHub. It would still be a modification to debian/rules. The backstory here is that because those mahimahi programs (mm-link, mm-delay, mm-onoff, mm-loss, mm-webrecord, mm-webreplay) run setuid root, we are paranoid about using PATH at runtime. So we try to resolve these absolute pathnames at build-time. If Debian wants to hardcode the locations, fine with me. I am curious -- why is it important that builds be identical between usrmerge systems and non-usrmerge systems? It's not like we try to have builds be identical between systems with different versions of the compiler, etc. Still, though, if this is the notion of reproducibility that Debian wants its packages to have, I'm happy to comply and have no quibbles with your patch. Cheers, Keith On Fri, Dec 18, 2020 at 3:24 PM Vagrant Cascadian < vagr...@reproducible-builds.org> wrote: > On 2020-12-18, Keith Winstein wrote: > > Thank you for tracking this down! Happy to take the patch -- would you > mind > > filing this as an upstream pull request at > > https://github.com/ravinet/mahimahi ? That way we will have this in one > > place when we next have cycles to upload a new mahimahi package. > > I'm not sure an "upstream" patch would make sense in this specific case; > in Debian, the most compatible path should be in /bin and /sbin, but > this would not necessarily be the case with all distros, and relying on > the path detection might actually be appropriate in some cases. > > So the patch I submitted only modifies debian/rules, not any of the > upstream code. > > > An upstream fix *might* be to not embed the full paths at all, and rely > a working system PATH, though there may be cases where this does not > work... but I am not familiar enough with mahimahi to know if that would > be workable. The upstream code that triggers this is the use of > AC_PATH_PROG in configure.ac. > > For what it's worth, it also embeds the path to other binaries through > AC_PATH_PROG, but many of those don't change on a Debian usrmerge > system. > > > Happy to dialog a little further to sort this out, and thanks for the > quick response! > > > live well, > vagrant >
Bug#977684: mahimahi: reproducible builds: Embeds paths to iptables and ip in binaries
Thank you for tracking this down! Happy to take the patch -- would you mind filing this as an upstream pull request at https://github.com/ravinet/mahimahi ? That way we will have this in one place when we next have cycles to upload a new mahimahi package. Sincerely, Keith On Fri, Dec 18, 2020 at 12:45 PM Vagrant Cascadian < vagr...@reproducible-builds.org> wrote: > Source: mahimahi > Severity: normal > Tags: patch > User: reproducible-bui...@lists.alioth.debian.org > Usertags: usrmerge > X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org > > The paths to "iptables" and "ip" may vary when built on a usrmerge and > non-usrmerge system, and get embedded in /usr/bin/mm-link and possibly > other binaries: > > > https://tests.reproducible-builds.org/debian/rb-pkg/bullseye/amd64/diffoscope-results/mahimahi.html > > It's a little hard to notice, but I caught these differences in mm-link: > > /sbin/ipH > vs. > /usr/sbiH > > > The attached patch fixes this by passing IPTABLES and IP to configure in > debian/rules. With this patch applied, it should build reproducibly in > our test infrastructure. > > > Thanks for maintaining mahimahi! > > > live well, > vagrant >
Bug#920698: mosh-server not found
Hello -- unfortunately mosh-server does need to be installed on the server (it is sort of like ssh in this respect). You can either install it from a package (which probably requires root -- you would need to ask the sysadmin), or you can compile it from source, install it in your own home directory, and give the location when starting mosh (e.g. "mosh --server=/home/kaction/bin/mosh-server"). There are some instructions at https://mosh.org you may find helpful. Best regards, Keith On Mon, Jan 28, 2019 at 4:39 AM Dmitry Bogatov wrote: > > Package: mosh > Version: 1.3.2-2.1+b1 > Severity: wishlist > > Dear Maintainer, > > maybe I am doing it wrong, but I fail to make mosh do anything. Any > attempt to connect host results in: > > $ mosh kact...@people.debian.org > bash: mosh-server: Komando ne trovita > Connection to people.debian.org closed. > /usr/bin/mosh: Did not find mosh server startup message. (Have you > installed mosh on > your server?) > > Isn't it the idea, that mosh-server gets installed automatically? > Obliviously, I do not have permission to do `apt-get install mosh' on > remote host. > > -- System Information: > Debian Release: buster/sid > APT prefers buildd-unstable > APT policy: (500, 'buildd-unstable'), (500, 'unstable'), (500, > 'testing'), (1, 'buildd-experimental'), (1, 'experimental') > Architecture: amd64 (x86_64) > > Kernel: Linux 4.19.0-1-amd64 (SMP w/4 CPU cores) > Locale: LANG=eo.utf8, LC_CTYPE=eo.utf8 (charmap=UTF-8), LANGUAGE=eo.utf8 > (charmap=UTF-8) > Shell: /bin/sh linked to /usr/bin/dash > Init: runit (via /run/runit.stopit) > > Versions of packages mosh depends on: > ii dpkg1.19.2 > ii libc6 2.28-5 > ii libgcc1 1:8.2.0-14 > ii libprotobuf17 3.6.1.3-1 > ii libssl1.1 1.1.1a-1 > ii libstdc++6 8.2.0-14 > ii libtinfo6 6.1+20181013-1 > ii libutempter01.1.6-3 > ii openssh-client 1:7.9p1-5 > ii zlib1g 1:1.2.11.dfsg-1 > > Versions of packages mosh recommends: > pn libio-socket-ip-perl > > mosh suggests no packages. > > -- no debconf information >
Bug#899300: mosh: apt-get install error in jessie-backports
Thank you for the bug report. I believe this is a duplicate of bug 803253, which was fixed in mosh 1.2.5-1.1. 2018-05-22 1:08 GMT-07:00 ikar.us: > Package: mosh > Version: 1.2.5-1~bpo8+1 > Severity: important > > > root@:~# apt-get -t jessie-backports install mosh > Paketlisten werden gelesen... Fertig > Abhängigkeitsbaum wird aufgebaut. > Statusinformationen werden eingelesen Fertig > Die folgenden Pakete wurden automatisch installiert und werden nicht mehr > benötigt: > libevent-2.0-5 libnfsidmap2 libtirpc1 php5-sqlite > Verwenden Sie »apt-get autoremove«, um sie zu entfernen. > Die folgenden zusätzlichen Pakete werden installiert: > libprotobuf9 libutempter0 > Die folgenden NEUEN Pakete werden installiert: > libprotobuf9 libutempter0 mosh > 0 aktualisiert, 3 neu installiert, 0 zu entfernen und 44 nicht > aktualisiert. > Es müssen 580 kB an Archiven heruntergeladen werden. > Nach dieser Operation werden 2.287 kB Plattenplatz zusätzlich benutzt. > Möchten Sie fortfahren? [J/n] J > Holen: 1 http://ftp.de.debian.org/debian/ jessie/main libprotobuf9 amd64 > 2.6.1-1 [361 kB] > Holen: 2 http://ftp.de.debian.org/debian/ jessie/main libutempter0 amd64 > 1.1.5-4 [8.020 B] > Holen: 3 http://ftp.de.debian.org/debian/ jessie-backports/main mosh > amd64 1.2.5-1~bpo8+1 [211 kB] > Es wurden 580 kB in 0 s geholt (2.867 kB/s). > Vormals nicht ausgewähltes Paket libprotobuf9:amd64 wird gewählt. > (Lese Datenbank ... 37354 Dateien und Verzeichnisse sind derzeit > installiert.) > Vorbereitung zum Entpacken von .../libprotobuf9_2.6.1-1_amd64.deb ... > Entpacken von libprotobuf9:amd64 (2.6.1-1) ... > Vormals nicht ausgewähltes Paket libutempter0 wird gewählt. > Vorbereitung zum Entpacken von .../libutempter0_1.1.5-4_amd64.deb ... > Entpacken von libutempter0 (1.1.5-4) ... > Vormals nicht ausgewähltes Paket mosh wird gewählt. > Vorbereitung zum Entpacken von .../mosh_1.2.5-1~bpo8+1_amd64.deb ... > dpkg: Fehler: --compare-versions akzeptiert drei Argumente: > > > Nutzen Sie dpkg --help für Hilfe zur Installation und Deinst. von Paketen > [*]; > Benutzen Sie »apt« oder »aptitude« für benutzerfreundliches > Paketmanagement; > Nutzen Sie dpkg -Dhelp für eine Liste von Debug-Flags von dpkg; > Nutzen Sie dpkg --force-help für eine Liste von Optionen zum Erzwingen; > Nutzen Sie dpkg-deb --help für Hilfe zum Manipulieren von *.deb-Dateien; > > Optionen mit [*] geben viel aus - schicken Sie es durch »less« oder »more«! > Entpacken von mosh (1.2.5-1~bpo8+1) ... > Trigger für man-db (2.7.0.2-5) werden verarbeitet ... > libprotobuf9:amd64 (2.6.1-1) wird eingerichtet ... > libutempter0 (1.1.5-4) wird eingerichtet ... > Creating utempter group... > mosh (1.2.5-1~bpo8+1) wird eingerichtet ... > Trigger für libc-bin (2.19-18+deb8u10) werden verarbeitet ... > root@:~# > > > > -- System Information: > Debian Release: 8.10 > APT prefers oldstable-updates > APT policy: (500, 'oldstable-updates'), (500, 'oldstable') > Architecture: amd64 (x86_64) > > Kernel: Linux 3.16.0-5-amd64 (SMP w/4 CPU cores) > Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > Init: systemd (via /run/systemd/system) > > Versions of packages mosh depends on: > ii dpkg1.17.27 > ii libc6 2.19-18+deb8u10 > ii libgcc1 1:4.9.2-10+deb8u1 > ii libprotobuf92.6.1-1 > ii libssl1.0.0 1.0.1t-1+deb8u8 > ii libstdc++6 4.9.2-10+deb8u1 > ii libtinfo5 5.9+20140913-1+deb8u2 > ii libutempter01.1.5-4 > ii openssh-client 1:6.7p1-5+deb8u4 > ii zlib1g 1:1.2.8.dfsg-2+b1 > > Versions of packages mosh recommends: > ii libio-socket-ip-perl 0.32-1 > ii perl-base [libio-socket-ip-perl] 5.20.2-3+deb8u10 > > mosh suggests no packages. > > -- no debconf information >
Bug#870202: mosh-server failing to start with a missing symbol
Thank you for this report. Is it possible you have a different version of libprotobuf in your LD_LIBRARY_PATH, or a different version of mosh-server in your PATH? (Do you have anything related to libprotobuf in /usr/local ?) On Sun, Jul 30, 2017 at 2:40 PM, Ivan Vucicawrote: > Package: mosh > Version: 1.2.6-1+b2 > Severity: important > > Dear Maintainer, > > Yesterday I updated almost all of my system to stretch / stable. > (Stragglers > include things like php which might break some of my projects.) > > Today I am no longer able to connect to my server with mosh. Running > mosh-server manually results in: > > mosh-server: symbol lookup error: mosh-server: undefined symbol: _ > ZNK6google8protobuf11MessageLite25InitializationErrorStringB5cxx11Ev > > Perhaps there is some incompatibility with libprotobuf? > > Could we please patch stretch / stable? > > -- System Information: > Debian Release: 9.1 > APT prefers stable > APT policy: (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) > Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968), LANGUAGE=en_US:en > (charmap=ANSI_X3.4-1968) > Shell: /bin/sh linked to /bin/dash > Init: systemd (via /run/systemd/system) > > Versions of packages mosh depends on: > ii dpkg1.18.24 > ii libc6 2.24-11+deb9u1 > ii libgcc1 1:6.3.0-18 > ii libprotobuf10 3.0.0-9 > ii libssl1.1 1.1.0f-3 > ii libstdc++6 6.3.0-18 > ii libtinfo5 6.0+20161126-1 > ii libutempter01.1.6-3 > ii openssh-client 1:7.4p1-10+deb9u1 > ii zlib1g 1:1.2.8.dfsg-5 > > Versions of packages mosh recommends: > ii perl-base [libio-socket-ip-perl] 5.24.1-3+deb9u1 > > mosh suggests no packages. > > -- no debconf information >
Bug#854873: mosh FTBFS: FAIL local.test
This is caused by #817236. We are working on a workaround. On Sat, Feb 11, 2017 at 4:05 AM, Adrian Bunkwrote: > Source: mosh > Version: 1.3.0~rc2-1 > Severity: serious > > https://buildd.debian.org/status/package.php?p=mosh > > ... > FAIL: local > === > > ../../scripts/mosh: Did not find mosh server startup message. (Have you > installed mosh on your server?) > FAIL local.test (exit status: 10) > ... > > > Testsuite summary for mosh 1.3.0-rc2 > > > # TOTAL: 28 > # PASS: 4 > # SKIP: 23 > # XFAIL: 0 > # FAIL: 1 > # XPASS: 0 > # ERROR: 0 > > > See src/tests/test-suite.log > Please report to mosh-de...@mit.edu > > > Makefile:853: recipe for target 'test-suite.log' failed > make[6]: *** [test-suite.log] Error 1 >
Bug#844514: mosh: major issues with queued control sequences
Hello Dominik, Mosh, OpenSSH, and TELNET all just literally convey these characters from the client to the pty. None of these programs try to interpret sequences like "Ctrl-A n" or "ESC #". (To double-check, I have just tested ESC # using "mosh localhost" and I could not see any difference in the behavior with or without Mosh.) I am not sure if you have identified a problem with screen and the timing of its input, but I do not think this report describes a Mosh bug. If you disagree, please consider opening a bug report with replication instructions at the upstream GitHub: https://github.com/mobile-shell/mosh Thank you, Keith On Wed, Nov 16, 2016 at 4:24 AM, Dominik Georgewrote: > Package: mosh > Version: 1.2.6-1+b1 > Severity: important > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > I have trouble using mosh together with screen and even a normal shell > because mosh does not handle control sequences correctly. > > Two example: > > Ctrl-A n for switching to the next screen inside GNU screen works > under normal circumstances, but when the connection gets bad and > mosh starts queueing and predicting things, once the connection comes > back, ^An is written to the shell verbatim, making the behaviour > wrong and non-deterministic and even leading to data corruption > if unnoticed. > > Escape sequences, like Esc # for terminating the current shell > input line and prefixing it with a #, do not work at all. > > - -- System Information: > Debian Release: stretch/sid > APT prefers unstable > APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 4.7.0-1-amd64 (SMP w/4 CPU cores) > Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/lksh > Init: systemd (via /run/systemd/system) > > Versions of packages mosh depends on: > ii dpkg1.18.10 > ii libc6 2.24-5 > ii libgcc1 1:6.2.0-10 > ii libprotobuf10 3.0.0-7 > ii libssl1.0.2 1.0.2j-1 > ii libstdc++6 6.2.0-10 > ii libtinfo5 6.0+20160917-1 > ii libutempter01.1.6-3 > ii openssh-client 1:7.3p1-2 > ii zlib1g 1:1.2.8.dfsg-2+b1 > > Versions of packages mosh recommends: > ii libio-socket-ip-perl 0.37-1 > ii perl-base [libio-socket-ip-perl] 5.24.1~rc3-3 > > mosh suggests no packages. > > - -- no debconf information > > -BEGIN PGP SIGNATURE- > > iQJhBAEBCABLBQJYLFAAMRpodHRwczovL3d3dy5kb21pbmlrLWdlb3JnZS5kZS9n > cGctcG9saWN5LnR4dC5hc2MSHG5pa0BuYXR1cmFsbmV0LmRlAAoJELeaPBagxPKW > MOMP/i/hkXApBtJh6XQIPpgn+OCmQJ+0XU+KaAQs2/DHWZ3Hq8ECkL7wF8ZXB9RS > gtMyDcLvCo7WTp6FWdAosZ3ScITn/gq99r+u74wKUdowPbVwykvnJDZZVDmE1JS6 > 3+EJujCBUMI6A8SldgtfDal9KCbVK+rOYayAf//lIoAkP32kT+Xy6vhCTuCRFcUB > zHXGuYG0g0JeEjS8o01vsyDc9mrWamKId7gaHme3wNXWuUTILaxVC93O5XauBtYW > VNjq9wNof/fR9lHAcTR1bSV2X+7mRUyRtmrznZ/H/ikw/0j/+V68HiYT0JE9hS1O > bEo3nFlkOKAOk/zcMoYMdzM8pzQOXGQ72SymaEwb7H6R2R2rHHPTjhQtuByagHq8 > yvY58sQnmAhQ+UUK8d8JYJdBFxwVt6uVxrv6iYLhSM41tNsMzcQRUZcu9XfvDPaL > XK6A2d/gdMRROYDExJQ0wontaaRqnPGPYbg/YLd/NrGuJsz5Ot3l2XqIFJF3tY8w > ksac7cKThYS0SjdsJhtC/I657t2Acz8HNeSInJXX3s3seVuS3rqhLI0rfuJYeC8a > jFTXfST0PQCAeXz41enan8DuewVlm+HFYfRd4+7L+fEJgLzTfUhZ0wI6Ua5KOToU > Q6H9Hyo1mknfcvGTDghNfWNrOVr+uecLr/mRvrxGNnhSq4Jg > =Av/J > -END PGP SIGNATURE- >
Bug#843523: mosh: screen corruption with long lines
On Tue, Nov 8, 2016 at 1:53 AM, Philipp Marekwrote: > > 3) Can you please send all *three* logs from "script"? We need > simultaneous > > captures of the output (1) entering tmux, (2) leaving tmux and entering > > mosh, and then (3) leaving mosh. > All three things are included in the previous file. > > > So three invocations of script, each > > producing one logfile. > Sorry, I don't understand. I need to call "script" before running tmux; how > would I get the output of _leaving_ tmux alone? The "outer" script will > still be running? > We need you to run three separate invocations of "script", each one writing to a different logfile. The first invocation will be before you even run mosh. Run something like "script mosh_output" on your local machine. Then, *inside the resulting shell*, run "mosh server". Then, *inside that remote shell*, run "script tmux_output_and_mosh_input". Then, *inside the resulting shell*, run tmux. Then, *inside that*, run "script tmux_input". Then, *inside the resulting shell*, do whatever you can do to demonstrate the problem. Then exit all the shells cleanly. The result will be two logfiles on the remote machine ("tmux_input" and "tmux_output_and_mosh_input") and one logfile on the local machine ("mosh_output"). We'll need to examine all three logfiles to figure out where the problem is happening. Thanks, Keith
Bug#843523: mosh: screen corruption with long lines
Thanks Philipp! 1) Can you fill me in -- what version of Mosh is running on the server in your setup? 2) There are packages for pre-1.2.6 versions of Mosh in wheezy, jessie, and jessie-backports (please see https://packages.debian. org/search?keywords=mosh). You could also build from source (it would need to be on both the client and server though to be sure). https://mosh.org/mosh-1.2.5.tar.gz 3) Can you please send all *three* logs from "script"? We need simultaneous captures of the output (1) entering tmux, (2) leaving tmux and entering mosh, and then (3) leaving mosh. So three invocations of script, each producing one logfile. (Use the command-line argument to give the logfile name.) Also can you please tell me your terminal size so I can properly replay the captures? Thanks much, Keith On Tue, Nov 8, 2016 at 1:06 AM, Philipp Marekwrote: > Hi Keith, > > > What version of Mosh is running on the server? > > What architecture is the server (is it also a Debian amd64 machine)? > Debian amd64, yes. > > > Could you please also test running Mosh 1.2.5 on the client *and* server, > > and seeing if you can replicate the bug? That will help us determine if > > this is a regression. > Do you know when such a package was available in Debian, so that I can find > it in the archives? > > > > Depending on the results, the next request will be for you to use > "script" > > to capture the output (1) entering tmux, (2) leaving tmux and entering > > mosh, and then (3) leaving mosh. > Here you are. > > > > Thanks very much for finding this, > Hah! You're welcome, but I'd be happier if I didn't ;) > > >
Bug#843523: mosh: screen corruption with long lines
Thank you for this report. What version of Mosh is running on the server? What architecture is the server (is it also a Debian amd64 machine)? Could you please also test running Mosh 1.2.5 on the client *and* server, and seeing if you can replicate the bug? That will help us determine if this is a regression. Depending on the results, the next request will be for you to use "script" to capture the output (1) entering tmux, (2) leaving tmux and entering mosh, and then (3) leaving mosh. Thanks very much for finding this, Keith On Mon, Nov 7, 2016 at 4:04 AM, Ph. Marekwrote: > Package: mosh > Version: 1.2.6-1+b1 > Severity: normal > > Some interaction of tmux and mosh to access a remote machine makes long > lines being displayed badly. > > For example, scrolling "less /var/log/kern.log" line by line > should be uninterrupted long lines. > > It should be > > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |5: +3.07 V (min = +1.95 V, max = +1.15 V) [ALARM] | > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |7: +3.33 V (min = +3.68 V, max = +2.24 V) [ALARM] | > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |8: +3.30 V (min = +1.39 V, max = +2.43 V) [ALARM] | > > and copy/paste of tha > > But when scrolling individual lines forward the output looks like > > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |5: +3.07 V (min = +1.95 V, max = +1.15 V) [ALARM] | > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |: | > |7: +3.33 V (min = +3.68 V, max = +2.24 V) [ALARM] | > |Nov 7 08:10:50 much sensord: Sensor alarm: Chip w83627hf-isa-0290: in| > |: | > |8: +3.30 V (min = +1.39 V, max = +2.43 V) [ALARM] | > > To clarify: these combinations work normally: > > xterm > mosh > less > xterm > mosh > screen > less > konsole > mosh > screen > less > konsole > ssh > screen > less > konsole > tmux > ssh> less > konsole > tmux > ssh> screen > less > > I get the corruption with > > konsole > tmux > mosh > less > xterm > tmux > mosh > less > konsole > tmux > mosh > screen > less > konsole > tmux > mosh > screen > cat > konsole > tmux > mosh > screen > other terminal output > > > When having a "screen" behind "mosh", the results are even more bizarry. > When switching to an (empty, clean) screen window when such a screen > corruption is visible, the freshly displayed screen is garbled, too: > > | b t i '//www.rsyslog.com/e/2359 ] | > |r2 -0290: i | > | +3 0 . = R | > | 0h i w83627hf-isa-0290: i | > | | > | + | > > I guess that mosh tries to optimize for bandwidth by only pushing "changed" > characters, but as the display is out of sync, it doesn't match up again. > > mosh tries to optimize for bandwidth by only pushing "changed" characters, > but as the display is out of sync, it doesn't match up again. > > mosh tries to optimize for bandwidth by only pushing "changed" characters, > but as the display is out of sync, it doesn't match up again. > > tmux and the mosh-clients have TERM=screen-256color; "tput cols" shows the > same value outside tmux, inside tmux but before mosh, and behind mosh. > > > -- System Information: > Debian Release: stretch/sid > APT prefers testing > APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, > 'experimental') > Architecture: amd64 (x86_64) > > Kernel: Linux 4.7.0-1-amd64 (SMP w/4 CPU cores) > Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > Init: systemd (via /run/systemd/system) > > Versions of packages mosh depends on: > ii dpkg1.18.10 > ii libc6 2.24-5 > ii libgcc1 1:6.2.0-10 > ii libprotobuf10 3.0.0-7 > ii libssl1.0.2 1.0.2j-1 > ii libstdc++6 6.2.0-10 > ii libtinfo5 6.0+20160917-1 > ii libutempter01.1.6-3 > ii openssh-client 1:7.3p1-1 > ii zlib1g 1:1.2.8.dfsg-2+b3 > > Versions of packages mosh recommends: > ii libio-socket-ip-perl 0.38-1 > ii perl-base [libio-socket-ip-perl] 5.24.1~rc3-3 > > mosh suggests no packages. > > -- no debconf information >
Bug#803253: mosh: diff for NMU version 1.2.5-1.1
Thank you. I'm not sure what the etiquette is here -- I am fine with this proposed change (we have taken the patch upstream but have not released a new version of Mosh or an updated package yet). I'm happy to let your NMU go through as-is, but if you would like me to do a 1.2.5-2 upload that cherry-picks this patch, also fine. -Keith On Sun, Jan 31, 2016 at 7:43 AM, Laurent Bigonvillewrote: > Control: tags 803253 + pending > > Dear maintainer, > > I've prepared an NMU for mosh (versioned as 1.2.5-1.1) and > uploaded it to DELAYED/5. Please feel free to tell me if I > should delay it longer. > > Regards. > diff -Nru mosh-1.2.5/debian/changelog mosh-1.2.5/debian/changelog > --- mosh-1.2.5/debian/changelog 2015-07-23 08:45:07.0 +0200 > +++ mosh-1.2.5/debian/changelog 2016-01-31 16:19:12.0 +0100 > @@ -1,3 +1,11 @@ > +mosh (1.2.5-1.1) unstable; urgency=medium > + > + * Non-maintainer upload. > + * debian/mosh.maintscript: Fix /etc/bash_completion.d/mosh removal, > thanks > +to for the patch Jakub Wilk (Closes: #803253) > + > + -- Laurent Bigonville Sun, 31 Jan 2016 16:19:09 > +0100 > + > mosh (1.2.5-1) unstable; urgency=low > >* Version 1.2.5 released. > diff -Nru mosh-1.2.5/debian/mosh.maintscript > mosh-1.2.5/debian/mosh.maintscript > --- mosh-1.2.5/debian/mosh.maintscript 2015-07-23 08:45:07.0 +0200 > +++ mosh-1.2.5/debian/mosh.maintscript 2016-01-31 16:14:18.0 +0100 > @@ -1 +1 @@ > -rm_conffile /etc/bash_completion.d/mosh 1.2.5~ -- "$@" > +rm_conffile /etc/bash_completion.d/mosh 1.2.5~ >
Bug#803253: mosh: error: --compare-versions takes three arguments:
My suspicion is that this error is coming from some package that mosh depends on, instead of from mosh itself. Mosh doesn't try to run dpkg itself. Do you see this error message if you remove the mosh package (dpkg --purge mosh) and then re-install mosh only? On Wed, Oct 28, 2015 at 5:30 AM, Jakub Wilkwrote: > Package: mosh > Version: 1.2.5-1+b1 > > I get this when I install mosh: > > Preparing to unpack .../mosh_1.2.5-1+b1_i386.deb ... > dpkg: error: --compare-versions takes three arguments: > > > Type dpkg --help for help about installing and deinstalling packages [*]; > Use 'apt' or 'aptitude' for user-friendly package management; > Type dpkg -Dhelp for a list of dpkg debug flag values; > Type dpkg --force-help for a list of forcing options; > Type dpkg-deb --help for help about manipulating *.deb files; > > Options marked [*] produce a lot of output - pipe it through 'less' or > 'more' ! > Unpacking mosh (1.2.5-1+b1) ... > > > -- System Information: > Debian Release: stretch/sid > APT prefers unstable > APT policy: (990, 'unstable'), (500, 'experimental') > Architecture: i386 (x86_64) > Foreign Architectures: amd64 > > Kernel: Linux 4.2.0-1-amd64 (SMP w/2 CPU cores) > Locale: LANG=C, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > Init: sysvinit (via /sbin/init) > > Versions of packages mosh depends on: > ii dpkg1.18.3 > ii libc6 2.19-22 > ii libgcc1 1:5.2.1-22 > ii libprotobuf9v5 2.6.1-1.3 > ii libssl1.0.0 1.0.2d-1 > ii libstdc++6 5.2.1-22 > ii libtinfo5 6.0+20151024-1 > ii libutempter01.1.6-1 > ii openssh-client 1:6.9p1-2 > ii zlib1g 1:1.2.8.dfsg-2+b1 > > Versions of packages mosh recommends: > ii perl-base [libio-socket-ip-perl] 5.20.2-6 > > -- > Jakub Wilk >
Bug#803253: mosh: error: --compare-versions takes three arguments:
Thanks -- can you confirm that this fixes the problem for you? If so I'm happy to apply it. On Wed, Oct 28, 2015 at 2:47 PM, Jakub Wilkwrote: > Control: tags -1 + patch > > -- > Jakub Wilk >
Bug#793158: mosh: Please provide a backport for jessie
I have just packaged and uploaded the upstream 1.2.5 release. Please feel free to upload this package to backports once it reaches testing. Best regards, Keith On Tue, Jul 21, 2015 at 1:17 PM, Miguel Landaeta nomad...@debian.org wrote: Package: mosh Version: 1.2.4a-1+b2 Severity: wishlist Now 1.2.4.95rc2-1 finally reached testing with long awaited features I think a backport for jessie is needed. Please provide one or just let me know if you don't have time or interest. I can take care of that backport. Thanks. -- System Information: Debian Release: 8.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.0.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages mosh depends on: ii libc6 2.19-18 ii libgcc1 1:4.9.2-10 ii libprotobuf92.6.1-1 ii libssl1.0.0 1.0.1k-3+deb8u1 ii libstdc++6 4.9.2-10 ii libtinfo5 5.9+20140913-1+b1 ii libutempter01.1.5-4 ii openssh-client 1:6.7p1-5 ii zlib1g 1:1.2.8.dfsg-2+b1 mosh recommends no packages. mosh suggests no packages. -- no debconf information -- Miguel Landaeta, nomadium at debian.org secure email with PGP 0x6E608B637D8967E9 available at http://miguel.cc/key. Faith means not wanting to know what is true. -- Nietzsche -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#686956: incompatible with sslh
This is fixed in git (adding a new mosh option, --bind-server=ANY) and will be in the next release. On Fri, Sep 7, 2012 at 12:12 PM, chrysn chr...@fsfe.org wrote: Package: mosh, sslh Severity: minor mosh can't be used on hosts that hide their ssh services behind sslh. when connecting to such a host, mosh displays mosh: Nothing received from server on UDP port 60001. then: mosh: Nothing received from server on UDP port 60001. (... s without contact) the problem seems to be caused by the way the ssh connection is established in sslh: sslh forwards the connection by creating another tcp stream from itself to the ssh server, causing SSH_CONNECTION have 127.0.0.1 in both source and destination ip fields -- and mosh, when started with -s, binds to the address it finds in SSH_CONNECTION. the mosh server seems to get started with -s automatically (even though the client seems to just call mosh-server, it shows up in the process list as `mosh-server new -s ...`). several solutions seem feasible, in increasing order of my preference: * provide a way for the client to specify he doesn't want to use the `-s` option server-side (fix on mosh side) * have a server-side configuration option to turn off the `-s` flag for the host (better, as it has to be done only once per host) (fix on mosh side) * provide a way to find out the real address (fix on ssh side) as a workaround, i have provided a way around sslh for clients to connect directly, but that's not usually what an sslh user wants to do. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.4-trunk-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.13-35 ii libgcc1 1:4.7.1-7 ii libio-pty-perl 1:1.08-1+b2 ii libprotobuf72.4.1-3 ii libstdc++6 4.7.1-7 ii libtinfo5 5.9-10 ii libutempter01.1.5-4 ii openssh-client 1:6.0p1-3 ii zlib1g 1:1.2.7.dfsg-13 mosh recommends no packages. mosh suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#693519: mosh: Broken watchfile
Thank you for catching this. We applied the patch and pushed to Github. It will be in the next release. On Sat, Nov 17, 2012 at 8:29 AM, Jonathan McCrohan jmccro...@gmail.com wrote: Package: mosh Severity: normal Tags: patch Hi, Github have changed their website which breaks debian/watch. I have attached a patch which fixes this issue. Jon -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (650, 'testing'), (600, 'unstable'), (450, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_IE.utf8, LC_CTYPE=en_IE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#678020: mosh: 1.2 seems a lot less reliable than 1.1
Package: mosh Version: 1.2.3-1 Closing, as we believe performance over this kind of network has been improved in 1.2.3 and have not heard back from filer. Please reopen if this is not your experience. On Fri, Oct 5, 2012 at 9:11 PM, Keith Winstein kei...@mit.edu wrote: Hello, Could you please try the 1.2.2.95rc1-1 package, recently uploaded to unstable, and see if you still have trouble? The source package should build fine on stable as well. We can't think of something that could have gotten worse between 1.1 and 1.2, but 1.2.3 (and its release candidate) have some new techniques to try to punch through challenging client-side NATs. Best regards, and thank you for this report, Keith On Mon, Jun 18, 2012 at 1:09 PM, Jon Dowland j...@debian.org wrote: Package: mosh Version: 1.2-1~bpo60+1 Severity: normal Hi, I'm using mosh as reported above on the server and 1.2.1-1 on the client end. Since the upgrade from 1.1 at both ends, I've found mosh a lot less reliable. It can typically establish a connection but then loses contact with the server after ~30 seconds or so and never regains it. My normal environment for using it is a 3G connection on a train. I found 1.1 fairly good in that environment and bad with 1.2. I also tried it this weekend on some mainline trains (travelled ~350 miles each way) and my experience was the same. -- System Information: Debian Release: 6.0.5 APT prefers stable APT policy: (700, 'stable'), (650, 'testing'), (500, 'stable-updates') Architecture: i386 (i686) Kernel: Linux 3.0.18-linode43 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.11.3-3 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.5-8 GCC support library ii libio-pty-perl1:1.08-1 Perl module for pseudo tty IO ii libncurses5 5.7+20100313-5 shared libraries for terminal hand ii libprotobuf6 2.3.0-4protocol buffers C++ library ii libstdc++64.4.5-8The GNU Standard C++ Library v3 ii libutempter0 1.1.5-3A privileged helper for utmp/wtmp ii openssh-client1:5.5p1-6+squeeze2 secure shell (SSH) client, for sec ii zlib1g1:1.2.3.4.dfsg-3 compression library - runtime mosh recommends no packages. mosh suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#691293: unblock: mosh/1.2.3-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hello, We respectfully request that you unblock mosh 1.2.3-1 and include it in the wheezy release. A debdiff from mosh 1.2.2-1 is available at http://mosh.mit.edu/mosh_1.2.2-1_to_mosh-1.2.3-1.debdiff.txt . mosh 1.2.3 is an upstream microrelease that fixes several issues we learned about during the first six months of widespread use. It is well-tested and has passed the regressions tests. Most prominently, mosh now links against OpenSSL and uses OpenSSL's implementation of AES. Previously, Mosh 1.2.2 shipped its own AES reference implementation for licensing reasons. The reference implementation has been criticized for possible timing leakage, and it is preferable to avoid shipping a duplicate cipher implementation. Mosh 1.2.3 also includes several robustness fixes, including increased resilience when transiting problematic NATs and VPNs and compatibility with the KDE konsole and dual-stack IPv4/v6 sshds. More security and robustness improvements are listed in the changelog. I regret the lateness of this upstream release in the wheezy freeze cycle. But given the expected lifetime of wheezy as a stable release, upstream would much rather be supporting 1.2.3 instead of 1.2.2 for the long term. We appreciate your consideration of our request. unblock mosh/1.2.3-1 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#678020: mosh: 1.2 seems a lot less reliable than 1.1
Hello, Could you please try the 1.2.2.95rc1-1 package, recently uploaded to unstable, and see if you still have trouble? The source package should build fine on stable as well. We can't think of something that could have gotten worse between 1.1 and 1.2, but 1.2.3 (and its release candidate) have some new techniques to try to punch through challenging client-side NATs. Best regards, and thank you for this report, Keith On Mon, Jun 18, 2012 at 1:09 PM, Jon Dowland j...@debian.org wrote: Package: mosh Version: 1.2-1~bpo60+1 Severity: normal Hi, I'm using mosh as reported above on the server and 1.2.1-1 on the client end. Since the upgrade from 1.1 at both ends, I've found mosh a lot less reliable. It can typically establish a connection but then loses contact with the server after ~30 seconds or so and never regains it. My normal environment for using it is a 3G connection on a train. I found 1.1 fairly good in that environment and bad with 1.2. I also tried it this weekend on some mainline trains (travelled ~350 miles each way) and my experience was the same. -- System Information: Debian Release: 6.0.5 APT prefers stable APT policy: (700, 'stable'), (650, 'testing'), (500, 'stable-updates') Architecture: i386 (i686) Kernel: Linux 3.0.18-linode43 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.11.3-3 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.5-8 GCC support library ii libio-pty-perl1:1.08-1 Perl module for pseudo tty IO ii libncurses5 5.7+20100313-5 shared libraries for terminal hand ii libprotobuf6 2.3.0-4protocol buffers C++ library ii libstdc++64.4.5-8The GNU Standard C++ Library v3 ii libutempter0 1.1.5-3A privileged helper for utmp/wtmp ii openssh-client1:5.5p1-6+squeeze2 secure shell (SSH) client, for sec ii zlib1g1:1.2.3.4.dfsg-3 compression library - runtime mosh recommends no packages. mosh suggests no packages. -- no debconf information
Bug#676132: debian-maintainers: Please add Keith Winstein as a Debian Maintainer
Package: debian-maintainers Dear Maintainer, Please add Keith Winstein kei...@mit.edu to the Debian Maintainers keyring. I attached the jetring changeset. Thanks very much, KeithComment: Add Keith Winstein kei...@mit.edu as a Debian Maintainer Date: Mon, 04 Jun 2012 19:06:47 -0400 Action: import Recommended-By: Christine Spang christ...@spang.cc Agreement: http://lists.debian.org/debian-newmaint/2012/05/msg00050.html Advocates: http://lists.debian.org/debian-newmaint/2012/05/msg00051.html Data: -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.4.11 (GNU/Linux) mQINBE8uz+YBEADRlVWHFoznSp/ooMt8gHd5YTkyhaPQWBmpZG6ERJttgLjAvMdQ a4fUU994dNfu0ATcamedRcMtKcCCVM6DLMMZ3IVxaYx4J658BgTG/+mbVr9RBQQC qs89cQCGbjpEFvJHcgsiK6WMqYVUqo9Jqc9DXVea8iTjcAUvkm68ad2pnF/Y5EEK wFwZzn7Kyd0Khbhe6fBpIqyeoqbm/ir1zRwbQZKIG8jLkDGxP0ySpXxUqOTpWall d1q1uK7aOJgL63YFEu+5UNCSV5OeZl+Womrk/z3CpvergPgtwwxE8ZQNyN534wUH gPKRJQLKFB58DNwYrMFvmvUKOruPu5s7xP0Boin8dVEg+D+U0CzRSHp57Qt+6Sm9 Y9jGrdrAmneDaF8nihesVCP3etmHdE1qpYkA5NXJ+y8Wf25gqR0Q+mDnq6B9N7UI GBBOcl0rYFXH+G4NvxnNeBc7r1xwbfGJYKzWmBWfpo48m8VyzJCYOH0g1bRFN2u6 SOIgbcmdg4QGUhnttCRYla/XaEvAP9p9EY+KAbBcbmLBYMzWZ/pZoJCnqMCuqboY de4fAsrajav1V9SLUSxUsVAn0yB5CyTh3eyijEHqUK7p/f2OptfNl54ufMN7tyM1 fAiCgL7K/bnuSCQjCxl8/PNF5nGFaoKF7ciq7qqWzQJyGef0ORK+8aDpfwARAQAB tB9LZWl0aCBXaW5zdGVpbiA8a2VpdGh3QG1pdC5lZHU+iQI9BBMBAgAnAhsDBQkF o5qAAh4BAheABQJPxhGOBQsJCAcDBRUKCQgLBRYCAwEAAAoJECC3KDr+JUxpI2QP /A+GCtT3+bxGBSWsfBd2iVqb4L+QGVpS0JCFYGCgAvkq8Au6M+IvVRRWLggHDgpU QDtmMA2RzFHcLedbbR04c9ULt0RIbztC1+7d8ZBd2RMehlLR0GSPjtSGzSJsc2I6 DRC6Ge4R5Icc7orKOdPXaRCoUNCZyaAB/fZEkV6nsHC5Bd4zLbsoNy+DcXeOWQKS 59ZzBZK1ztiYq0jhdQt6kpRu8CoZatC0EWkOoOi5jF0Z7X0YiaafV/Gj6+x9Fx8y HC95kioeuWu1SDVjKxkQk5KOPbPyDbcMJT8jmPxPiwea6w2aCLu55M2526ib3Wd7 o/3OgCuOQ79U8nRTKx0//21l9ut/HCuMRRHdxtUhhoP7GDDFtkmpI0TjJtWeq68L vGwzhUJf/c27ufLZIZ5pUwSQgfDuHPgMQtyY4fXY2OW7veizQVEHMvcFV6BqxqnV 9T7nkkbOdE4+NQgSmetOUG4fJiHnEyUOtsf4nEVouMs8nRU73ZfnYx/chw0LtZSZ uDstKbqKU9/KW8wEB34O4tNQKcLvAMxuLkBKbUho6znbt9N+aAp1ojKrbYlfFgo0 Hiwgf2Huv1VOuW1bi5nfLZ8kBWg21AdN7/qE2rjTB6wK5/MvdKVtwRZlj9M3cnR2 1GFZ1Vhs+hnLZZrHZBKs0rMIMZX+M6Wt47bee3IOfFqPiEYEExEIAAYFAk/Fh+8A CgkQscqS6KfYa5XHnwCeLD7NaxX+93QeX3P46HxunPJGSbUAoI7NUW6MMrtADNvJ HNWu1HTD4f/kiQIcBBABCAAGBQJPxOyDAAoJEGSVn+mDjfGcUfUP/jkBEVYvCkqR AOr60RQfZQ6GB8pEIRlRxlrre+vk5WZZJVeX/qavfSdyEppk8Z6dryHgxnBvxy4O FZBD0JVBoORS62pSZER2P06Ox/uZWNIs4cQ9Uq7w0hhTxYmXjnMA5vmPjMAlgs7F 6FXFPn7Ye/IrldgnAA2I5ZkQ7mDEOlfcv9ohk0utHmBizNj1HuIzcfMQ+v80siMo 1o6wc/BT/6CMlPnxS/ePzJlN9eOZp/+43+ePyf5aMzbkC5zk9eF5upke/e9Foi3V sNR3u4VjP95dFLlJ3sgLTZzAiogNaB74yXOPjmeO+ejN+8LJKAxhjmvzXzFXrlcG glZg8AuSLTytd0HDKGfoOYdhsmYib+YYBjMfr222G/oLg5Zr/578roC3CPyGrVVT kyuLvE3d1MW5n5f7GVX+NbZVdt6Od3RW+T5OnKzB+x4lzqDnfk3SYuMXBZdrEwUf S8grPcnnVqcFH2NnvC1fF38y1SmimAq7O5luom9U04HoGu3RMwUiKCH6QyCMop8h MIwghWOpEETFJEFq1H0v0y8Vx3tPJ2Y6aS84hcy+CT7SgN6incTlHNI8ZjYAR5/J Z7BnkaGG0TwCEf/hjptPFt22CyZ6GaY2c7wd8+Z6001AU4YudP6elQR+qkKbrT+t qtmVgmEnFD1LiUPDM/STvADgdujTTc1XiQIcBBMBCAAGBQJPxYmRAAoJEOY3FvTg aZSeWfoQANq83eIiy9Qk853TLbgKFzTN2lhytDhg4OKS8Qels3TTAoTrjvbGonVa ZbmafpVLNAEGHoWQJ1y3IOB5cikwqjWxr7HP4gY1Yt+h4sW9rqhP0Azk/l/Rq9H0 GqcluEpgGJnSGeNQv7MSp8DdoskC4QGBkoQr4g1al/bLzWMaB8IbFX0ScMjcP6Fv 2+v2/o/Z0fSW91o6EWXHlcrxpVbpXzUsxv5hIKUjEekBL5nt6SVspYDjMR9v3tvw Gq5ukGNEEGfDzMD4nCpwrODAkasM/F0k+6JotkR6grRib+XFj/z6DYiegGHbArAK U/w/Cv7eARDXtpDowbWvhVDFqvwz2D+XrbJmJ4KXByaN6QUDcvlJJpSIOjsiMNzL k7rmuZOZG+Ap+cW6Nz4T6VHBk4FMNHu3H6HO7uegvE6LMtsiUiPTF8NgVoQ9m+VL px/mcVpAmntpDqcb5eVR8L+o+lzy0d33D5Ye6vIyW06WQbhbb7HXjNXzmBHYVZDp MEM0MJEeiprU+P5QeP3NLonMIN+5npglopHXheF+elXkvliDBLJN3T9p2R3aJapN kqE16tSmDUanqIq6/SmEtlk2pPTNa2O5XsXKe9uGZuJ9L9pVnRWGl//AeCMd8tq9 27HQC4f1oTOeRUly07wGvtx3PLsoc0vYYe7lgSJEk4F/3hdHLk04uQINBE8uz+YB EACuXXgaYGjt2p29kSX0HmzqcdIobK6W1PNNomXCaIDn92LJGCt+zsyK9G0ZBktp A35atn1/VLBQFzrbPwM3GoUBndjkXqGCBsXLbO4Xa66SXFLrJNXDwor6kJMfl5Z/ is80srlN7tFt5FFPDqLJeS9e+BW/vOWH7gjetxjDcsc9BUY4kj9YvmMte7NOxKPh cO+lCdxfH4AVxfcsOmGCBOKRvJ8yp99yKov4X25Eda63rvuLWkW78VUiYXnGrw34 4MNB8QehYXU2Rlr2DRqTSbrA/Jd/g2YJdE18RCTII9MnnkyT3nO5H16x5CxMmYq8 /EyBGZedPaXj+7Fd66YIxAJe8uCZilqNSHi5x08aRt+DCnyP2j7qtcvTREr0doOo U40Nj7jDZaOj/8EqnKMQ9C1rgRLYOqWgScvM7XOaR+0pHlstfOxEwMqWQlmUwsgg mWTWn6hnyf9ssVDYzZDIkNJ0dhEdnMNAYzl5PTPetKNhXb2hYU/3ap4zbdyUpKeF YcSDnjH78Ax8TaEurgxN+wzi2DHSQMTTSDHT1j3v3/UyNIZQM8Juafivj+WQyMGN gRT+abi/x2Focx1D/NtyfN3g11suobZLgbJeYZfdfwO7214jDiSqrFDUsPzQ/o4v 7pHF55ZXIEnbrWygZJOjzTp3HXtMzAulnjbbsY14jiImgwARAQABiQIlBBgBAgAP BQJPLs/mAhsMBQkFo5qAAAoJECC3KDr+JUxpF7QP/2EvDHd/JDdaMCqcOjn64g0e XtIMvQQc/EGjF1s2ag5uiCYWkiyfOfFfw4Le/zB0emQPXyjBjb0tZuOaXIsK1HGQ 7N6Obyc+1PdtCAKg2L9mD+YKCLtWg+TqdAuidYyDnYxHz8A0kP0LEvPbEhWxiPzf 5FRD/IMPBmefJQvURgP0W1DDPG+ID9Sd1I7QaAOue/GSCB2jKdQ2FBRkSFxHA8X3 i7lmZX5WQotje9/Q0EeWUSkSDkPRUXrPgRcXyNO6FvUOO5d4vgrgjKYwPhYpHzjK 9SXPWX7duHkwQJeN5LKpeFw3XhgrLX3QuVWecLJTQPmStfrHO20j+AGPo1vzB05k zjNL+c8+Ddnmdzu6669shBM4s2exp+0L3YCfB
Bug#674127: mosh: Add UFW integration file
Thanks for this. This has been added to the version in Git and the 1.2.1 release candidate if you would like to test it. (https://github.com/downloads/keithw/mosh/mosh-1.2.0.97.tar.gz) We are planning to release 1.2.1 imminently so please let me know if this does not meet your needs asap. Best regards, Keith On Wed, May 23, 2012 at 4:49 AM, Fumihito YOSHIDA h...@kugutsu.org wrote: Package: mosh Version: 1.2-1 Severity: wishlist Tags: patch Dear Maintainer, Please add UFW(Uncomplicated Firewall) integration file from LP: 985981 (1.2-1ubuntu1) [1]. [1] https://bugs.launchpad.net/ubuntu/+source/mosh/+bug/985981
Bug#673871: malicious escape sequences can cause denial of service for mosh-server
Thanks, Timo, and thanks for submitting the original bug as well. This bug allows applications and unscreened terminal input (run or catted by the user) to DOS the mosh-server (also run by the user). It also allowed the mosh-server process (invoked by the user but resident on a remote host and not trusted by the client) to DOS the mosh-client (run by the user). Based on the severity, I don't think it warrants a backported patch or emergency release. We do intend to do a 1.2.1 release in the coming weeks that will roll up the bugfixes we have done in the wake of 1.2, including this one. Thanks again, Keith On Mon, May 21, 2012 at 3:43 PM, Timo Juhani Lindfors timo.lindf...@iki.fi wrote: Package: mosh Version: 1.2-1 Severity: important Tags: security I submitted details upstream at https://github.com/keithw/mosh/issues/271 but here's also a copy: The commands echo -en \e[2147483647L echo -en \e[2147483647M echo -en \e[2147483647@ echo -en \e[2147483647P all cause mosh-server to enter very long for-loops in terminalfunctions.cc. Upstream has released a fix, please consider including it in the debian package. Security team, this also affects gnome-terminal and probably all other terminal emulators that use libvte. Its upstream is also working a fix but they made their bug report restricted for now: https://bugzilla.gnome.org/show_bug.cgi?id=676090 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/6 CPU cores) Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages mosh depends on: ii libc6 2.13-32 ii libgcc1 1:4.7.0-8 ii libio-pty-perl 1:1.08-1+b2 ii libprotobuf7 2.4.1-1 ii libstdc++6 4.7.0-8 ii libtinfo5 5.9-7 ii libutempter0 1.1.5-4 ii openssh-client 1:5.9p1-5 ii zlib1g 1:1.2.7.dfsg-1 mosh recommends no packages. mosh suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670078: mosh: UTF-8 error misleading
Package: mosh Version: 1.2-1 Thanks for this report. We made this much smoother in version 1.2 (just released), both in avoiding the error and in giving a clear diagnostic when it can't be avoided. In previous versions, you do need to have SSH set up to pass the locale-related environment variables over the connection. This is the default on new Debian installations (I think since lenny) but may not be there if you have upgraded. More information is here: https://github.com/keithw/mosh/issues/98 Thanks for filing this, Keith On Sun, Apr 22, 2012 at 2:24 PM, Colin Turner c...@piglets.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: mosh Version: 1.1.3-1 Severity: minor Dear Maintainer, I first installed mosh on Debian client and server and on trying to connect got a fatal error that a UTF-8 locale was required; but the client only had a utf8 locale (see below) and the server supported that locale among others. In the end I was able on the server to set the default locale to the utf8 rather than what it was set to, which appeared to be none. I guess I'm surprised that you need to not only have the locale on the server but have it set as default? Many thanks for packaging this program. Regards, CT. - -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.13-27 ii libgcc1 1:4.7.0-1 ii libio-pty-perl 1:1.08-1+b2 ii libncurses5 5.9-4 ii libprotobuf7 2.4.1-1 ii libstdc++6 4.7.0-1 ii libtinfo5 5.9-4 ii libutempter0 1.1.5-4 ii openssh-client 1:5.9p1-5 ii zlib1g 1:1.2.6.dfsg-2 mosh recommends no packages. mosh suggests no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJPlEzMAAoJEJhSfHbQK6t7f+EP/27TmxFkznDRJLXfPwtmR90r bFM67cUYUBnBrNXLY3KDKqfz3OXs8VjImkWwjBgw4/90nw/lIXkpwoySEd6Ucj/g EkEMskXMHS7X7LL2IbJ7lD47pIb3nxAWnEatk6DYKyP7jWXN58kzFQbheVm8FviC 59SP3ftURwoA9CqiyP23jpyd6EfpgjfcRPvd4HCQhuHCVGzmphUo+m/stOKPKvEC TK3KQRhheHKGz08OUMNu/TDsnyRQCJVLYfbTerzvf78GMGjTFntDGQDSwS4R4qey di0Nm0dfXrSKk0qMWAh5PWhsilFSXgjdLUuSLPVVfrQjpxF1c5d0urshyEC9TCqJ lgSgQqKELvLLSy8V0/7KfwQYxJNfvtP20XcUI8I6EqJb+rOtRasuKdUMU67/WuEd wwjSUxf5ukTosil/bQcK9U86bEsJDQdV8n/DVv/RNYKz3siq0sYZeuyFggdmRLp7 b254pTl0E9n4GJlYgECbAEqm0EU90gcu789+1QjBijUI7yqIOdlBUEC/r9D8SYep WkZmpGGsDpiMZPSCpaGv//9EtOT3ZB1JPP2cn626jeiemGTbw/HpaOevCr7rwYt+ mYSn7VbCAmVcICPBUFZ2+JyyxxGp7v8DljIzFZQ8v96n4FkFBNROuCeSzsQy2ngD MJVgUmdKtsftRlxjhAgp =3chs -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#670079: mosh: Mosh problems with firewall (xxx s without contact
Hello, Thanks for the report. Mosh does need to have working UDP passing in both directions. In the documentation (http://mosh.mit.edu), we recommend just opening UDP ports 6-61000, but you can open a smaller range if you like (e.g. 6-60010) or just open a single port and request it with the -p option. Unfortunately, at least with the current design, we can't rely on your proposed strategy of having the server initiate the connection, because this won't work after the client has roamed to a new IP address. (How will the firewall know to allow UDP packets from the new client IP?) Best regards, Keith On Sun, Apr 22, 2012 at 2:22 PM, Colin Turner c...@piglets.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: mosh Version: 1.1.3-1 Severity: normal Dear Maintainer, Thanks very much for packaging this very interesting application, I could really do with it. I found some problems getting it to connect to my main server, which evaporated when I disabled the firewall. My firewall essentially disables most access and then opens it for specific ports. But it includes this section. === Start Clip === # Anything on the external interface which is related to, or otherwise to do # with an existing connection is allowed. Also allow new outbound connections. iptables -A OUTPUT -o $DMZ_INTERFACE -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -i $DMZ_INTERFACE -m state --state ESTABLISHED,RELATED -j ACCEPT #iptables -A FORWARD -i $DMZ_INTERFACE -o $LAN_INTERFACE -m state - --state ESTABLISHED,RELATED -j ACCEPT === End Clip === which I would have expected would have allowed mosh through. Indeed, I switched off the firewall, initiated a mosh connection and brought the firewall back up. That connection is still live as I type, and working; but another mosh session I just tried failed. This suggests to me that the bypass may be partially working after the initial connect. Perhaps mosh starts the connection on SSH, and then relies on the client to contact the server process - if the server process initiated this first it would solve this problem without having to open hundreds of UDP ports on the firewall. Kind regards, CT. - -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.13-27 ii libgcc1 1:4.7.0-1 ii libio-pty-perl 1:1.08-1+b2 ii libncurses5 5.9-4 ii libprotobuf7 2.4.1-1 ii libstdc++6 4.7.0-1 ii libtinfo5 5.9-4 ii libutempter0 1.1.5-4 ii openssh-client 1:5.9p1-5 ii zlib1g 1:1.2.6.dfsg-2 mosh recommends no packages. mosh suggests no packages. - -- no debconf information -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJPlEyDAAoJEJhSfHbQK6t7RsUP/ia7NGsJ+8sUWPsAPZf/fQo8 A98sAyWV2D8Fb6hM+9aYDHTfRck00CW5f5KzEyE7w8dVLCzQk2dtp5p/knyiWW69 FWjZ90FcodYxUAwYHLyxm23RpjJNLAuj10pcLlkivb5T4+azrHQsubZs5VwuJEPW I2Kor59n8ozbKvaExhwDWFsT5srxN76n2xhHKx65C2H50D1DV3L4ryR26rWbjWhC nm6LG0BdEaihU8f1rNBzOFme0whKJQaFy1KtUVKR6C8iNWaAIXfQNj7HvgxKDDLi IvRrTfJ3gN20GpZX+a+v6+JdLEBDJ0SbCQSKgoOmf3xAlgB7LWyedecLdn2OHIKM LfhgAJz8xw204juwIJoUIvgqwtTMzzFfL5mjWl4/1DxGGrpTi3mwSds/6jPiIE4x AKkeHC/0Y6bLF+Z7267bHcspCGV05RUbfeeF/aC1P+PA6kazFIYbgO8HqS7XGPSK fP62hh2BRfY1PYyjvbmpiPZ3gCgv3rVWByNfBxby0QnO0DLFKNDehzrfr2ICLOnE ckU1a6WjZbxJ2dpR2eJevb2M9KOmzUQFiFVY60UW05QJG2SjTTa7YB/up0pCqbsz qj5D7hPhEjEAuvHxndC0dgxB4g1IDziQubEKCiYTUN9VVcmsyA79lHjrJWHlBgrL 6J/A5XegzEp3+Eax1mQk =SrX3 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#665757: FTBFS on kfreebsd (IUTF8 termio is not POSIX) patch attached
Further testing indicates that FreeBSD just doesn't have working UTF-8 character-erase (yet); the kernel does leave garbage in the input buffer when it tries to erase a multibyte character in canonical mode. We decided to just add an autoconf test for IUTF8, triggering a patch along the lines submitted here. mosh-server also prints a warning on startup in that case. This has been pushed to master at http://github.com/keithw/mosh and I would be grateful if you could let me know if it works for you. This will be in the next version of the Debian package (1.1.3-1). Best regards, and thank you, Keith -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#665760: mosh fails with IPv6 hosts
Hello, Thanks for filing -- you are correct. The mosh protocol is IPv4 only for now. We have some people working on an IPv6 port and I plan to commit these changes as soon as I can verify that IPv4-to-IPv6-to-IPv4 roaming is correctly implemented and that mosh behaves sensibly in common configurations. We are tracking this issue at https://github.com/keithw/mosh/issues/81 Best regards, Keith On Sun, 25 Mar 2012, Christoph Egger wrote: Package: mosh Version: 1.1-1 Severity: normal Tags: ipv6 Hi! Seems mosh can't deal with IPv6 (only) hosts. Regards Christoph christoph@hepworth ~ 20:00 0 % mosh myron.siccegge.de /usr/bin/mosh: Could not resolve hostname myron.siccegge.de ssh_exchange_identification: Connection closed by remote host /usr/bin/mosh: Did not find remote IP address (is SSH ProxyCommand disabled?). christoph@hepworth ~ 20:00 5 % host myron.siccegge.de myron.siccegge.de has IPv6 address 2001:a60:f01c:0:70:1:6:f00 christoph@myron ~ 20:02 0 % host myron.siccegge.de myron.siccegge.de has IPv6 address 2001:a60:f01c:0:70:1:6:f00 -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/6 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.13-27 ii libgcc1 1:4.6.3-1 ii libio-pty-perl 1:1.08-1+b2 ii libncurses5 5.9-4 ii libprotobuf72.4.1-1 ii libstdc++6 4.6.3-1 ii libtinfo5 5.9-4 ii libutempter01.1.5-4 ii openssh-client 1:5.9p1-3 ii zlib1g 1:1.2.6.dfsg-2 mosh recommends no packages. mosh suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#665757: FTBFS on kfreebsd (IUTF8 termio is not POSIX) patch attached
Hello, Thanks for filing this. I can't take this patch as written, but I am very interested in getting mosh working on FreeBSD. (1) We need and use IUTF8 on Mac OS X (XNU), so #ifdef __linux__ is not quite the right test. (2) On platforms without IUTF8, we still need _some_ solution to the deletion of multibyte characters problem. If you can tell me what mechanism FreeBSD uses to avoid this problem so that backspace works correctly in non-canonical mode with non-US-ASCII characters, I'm happy to make mosh enable it. Here's how to demonstrate the problem: (1) Open a UTF-8 terminal emulator. (2) Run cat /tmp/test.txt (3) Type (or paste): The problem’s not obvious., including the curly Unicode apostrophe (U+2019) after problem. Do not type a carriage return at the end of the line. (4) Hit the backspace key 15 times to back up to The problem. (5) Type is not obvious. and hit carriage return and then ^D. (5a) You should see The problem is not obvious. on the screen. (6) Run cat /tmp/test.txt (7) With IUTF8, the apostrophe will have been correctly deleted, and you should see The problem is not obvious. (just as you saw when typing it) (8) Without IUTF8, the kernel will not have correctly deleted the (three-byte) apostrophe, and you should see The problem? is not obvious. (with the Unicode replacement character in place of ?) (8a) If you run od -c /tmp/test.txt, you'll see it has garbage after the word problem. === On the other hand, if FreeBSD really just has this bug and there is no way to fix it yet, I guess we can disable the use of IUTF8 on FreeBSD if that's what it takes to get mosh running... :-/ Perhaps the right approach is an autoconf test to see whether the platform has IUTF8. Best regards, and thanks for using/testing mosh, Keith On Sun, 25 Mar 2012, Christoph Egger wrote: Package: mosh Version: 1.1-1 Severity: important Tags: patch User: debian-...@lists.debian.org Usertags: kfreebsd the IUTF8 termio constant isn't POSIX and isn't used on freebsd. We still have UTF-8 enabled terminals though. Find below a patch I used to make it buildwork on Debian GNU/kFreeBSD Regards Christoph -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-1-amd64 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc0.1 2.13-27 ii libgcc1 1:4.7.0-1 ii libio-pty-perl 1:1.08-1+b2 ii libncurses5 5.9-4 ii libprotobuf72.4.1-1 ii libstdc++6 4.7.0-1 ii libtinfo5 5.9-4 ii libutempter01.1.5-4 ii openssh-client 1:5.9p1-4 ii zlib1g 1:1.2.6.dfsg-2 mosh recommends no packages. mosh suggests no packages. -- no debconf information
Bug#663291: please split package into server and client packages
Thanks for this. My thinking has been that the client and server really just sit there, linked with the same libraries, and it would be silly to split them into two separate packages. (It is true that the client pulls in openssh-client, but that also just sits there and is relatively small.) But I am new here and if the weight of Debian opinion is otherwise, I do not feel that strongly about it. On Sat, Mar 10, 2012 at 2:42 AM, martin f krafft madd...@debian.org wrote: Package: mosh Version: 0.96a-2 Severity: wishlist Subject says it all. I do not need/want the client on all hosts that I want to become mosh-servers. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=en_NZ, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages mosh depends on: ii libc6 2.13-27 ii libgcc1 1:4.6.3-1 ii libio-pty-perl 1:1.08-1+b2 ii libprotobuf7 2.4.1-1 ii libstdc++6 4.6.3-1 ii libutempter0 1.1.5-4 ii openssh-client 1:5.9p1-3 ii zlib1g 1:1.2.6.dfsg-2 mosh recommends no packages. mosh suggests no packages. -- no debconf information -- .''`. martin f. krafft madduck@d.o Related projects: : :' : proud Debian developer http://debiansystem.info `. `'` http://people.debian.org/~madduck http://vcs-pkg.org `- Debian - when you have better things to do than fixing systems -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#662939: mosh: Should probably depend on openssh-client | openssh-server instead of just openssh-client
tag wontfix thanks Please feel free to reopen if necessary. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org