On Sat, Oct 05, 2019 at 08:21:09PM +0100, Adam D. Barratt wrote:
> On Sat, 2019-10-05 at 12:16 -0400, James Cloos wrote:
> > Using ed25519 keys (host and client) should work around this issue.
>
> FWIW according to #941665, this should also only affect users running
> buster on kernels < 3.19.
Th
On Sat, 2019-10-05 at 12:16 -0400, James Cloos wrote:
> Using ed25519 keys (host and client) should work around this issue.
FWIW according to #941665, this should also only affect users running
buster on kernels < 3.19.
Regards,
Adam
Just tried that and same error...
-Original Message-
From: James Cloos
Sent: zaterdag 5 oktober 2019 18:17
To: 941...@bugs.debian.org
Subject: Bug#941663: openssh-server: fatal: privsep_preauth: preauth child
terminated by signal 31
Using ed25519 keys (host and client) should work
Using ed25519 keys (host and client) should work around this issue.
-JimC
--
James Cloos OpenPGP: 0x997A9F17ED7DAEA6
Also affected.
On Fri, 4 Oct 2019 14:46:17 -0700 Mike Laiosa wrote:
> This affects me too. The only solution I've found is to downgrade
> openssl.
>
> Mike
>
>
This affects me too. The only solution I've found is to downgrade
openssl.
Mike
Package: openssh-server
Version: 1:7,9p1-10
We recently installed the latest openssl
patches(https://www.debian.org/security/2019/dsa-4540
https://www.debian.org/security/2019/dsa-4539 ) on a machine running Debian
10.1, since the upgrade, ssh connections are immediately dropped (below is an
7 matches
Mail list logo