Bug#117318: very urgent
Hello Dear It is very urgent that I pass this important message to you. I will give you more details once I get a response from you Regards Maria Peterson
Bug#903603: ssh upgrade breaks in some openvz container
On Sun, Jul 22, 2018 at 11:40:40AM +0100, Colin Watson wrote: > Do you know of a good support/bug contact for OpenVZ? I'm not familiar > with it at all, and I think we need some idea of what the problem is > there before we even have a clue about what a reasonable workaround in > OpenSSH might be. (Disabling the sandbox doesn't count as reasonable > here, at least not long-term.) Have you asked the hosting provider if > they know what might be going on, or if they have an upstream they could > ask? Presumably somebody maintains this kernel. I grabbed the kernel source in question from https://wiki.openvz.org/Download/kernel/rhel6/042stab127.2 (there are a few newer versions, but it's apparently fairly recent and none of the newer ones mention anything about resource limits). I can't see anything in the implementation of setrlimit that could plausibly make it return EINVAL here, unless, I don't know, there's some silent type mismatch or something. What architecture is the container? I think you do need to ask OpenVZ people about this first, though. I'm not closing this bug since obviously it's bad for sshd's sandbox to stop working, but we need somebody who knows the OpenVZ kernel to tell us what a decent workaround might be (and maybe it's just a straight-up OpenVZ kernel bug and doesn't require a change in OpenSSH at all). -- Colin Watson [cjwat...@debian.org]
Bug#903603: ssh upgrade breaks in some openvz container
On Wed, Jul 11, 2018 at 02:58:00PM -0400, Joey Hess wrote: > After upgrading some openvz container at a hosting provider to unstable, > ssh stopped working; incoming connections closed before password prompt. > > In auth.log, there was this: > > ssh_sandbox_child: setrlimit(RLIMIT_NOFILE, { 0, 0 }): Invalid argument > [preauth] > > Seems like there is no way to disable the sandbox any more, > and so this may cause problems for openvz users. > > That openvz was running kernel version 2.6.32-openvz-042stab127.2. I > have avoided openvz until now, so I don't know if such an outdated > kernel is typical of openvz hosting providers. > > I can't find mention of RLIMIT_NOFILE not being supported in that old > kernel version though (even with 0, 0), so it may not be the fault of an > outdated kernel, but a limitation of openvz generally that RLIMIT_NOFILE > doesn't work. Yeah, I don't see why reducing the limits would be a problem even in such an old kernel. Do you know of a good support/bug contact for OpenVZ? I'm not familiar with it at all, and I think we need some idea of what the problem is there before we even have a clue about what a reasonable workaround in OpenSSH might be. (Disabling the sandbox doesn't count as reasonable here, at least not long-term.) Have you asked the hosting provider if they know what might be going on, or if they have an upstream they could ask? Presumably somebody maintains this kernel. Thanks, -- Colin Watson [cjwat...@debian.org]