Your message dated Sun, 3 Mar 2019 20:35:55 +0100 with message-id <7b603213-96c5-8056-b6d3-7b2c7a62a7f6@debian.org> and subject line close release-notes bugs for releases before stretch has caused the Debian Bug report #769388, regarding 'PermitRootLogin without-password' in new installations breaks some use cases to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 769388: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769388 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: Does not permit login as root from version 1:6.2p2-6
- From: Andrea Lusuardi <uovobw@gmail.com>
- Date: Thu, 17 Oct 2013 20:56:15 +0000
- Message-id: <20131017205615.15469.57420.reportbug@nl-01>
Package: openssh-server Version: 1:6.0p1-4 Severity: grave Installed openssh-server on debian stable. As soon as i update the package to latest version (it is reported for the other version as i cannot login if the package is not at that version) login becomes impossible with the error Oct 17 20:11:34 nl-01 sshd[25206]: Accepted password for root from IP port 44676 ssh2 Oct 17 20:11:34 nl-01 sshd[25206]: pam_loginuid(sshd:session): set_loginuid failed Oct 17 20:11:34 nl-01 sshd[25206]: pam_unix(sshd:session): session opened for user root by (uid=0) Oct 17 20:11:34 nl-01 sshd[25206]: error: PAM: pam_open_session(): Cannot make/remove an entry for the specified session Oct 17 20:11:34 nl-01 sshd[25206]: Received disconnect from IP: 11: disconnected by user -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: i386 (x86_64) Kernel: Linux 2.6.32-5-vserver-amd64 (SMP w/24 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages openssh-server depends on: ii adduser 3.113+nmu3 ii debconf [debconf-2.0] 1.5.51 ii dpkg 1.17.1 ii libc6 2.17-93 ii libcomerr2 1.42.8-1 ii libgssapi-krb5-2 1.11.3+dfsg-3 ii libkrb5-3 1.11.3+dfsg-3 ii libpam-modules 1.1.3-7.1 ii libpam-runtime 1.1.3-7.1 ii libpam0g 1.1.3-7.1 ii libselinux1 2.1.13-3 ii libssl1.0.0 1.0.1e-3 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian12 ii openssh-client 1:6.0p1-4 ii procps 1:3.3.8-2 ii zlib1g 1:1.2.8.dfsg-1 Versions of packages openssh-server recommends: ii ncurses-term 5.9+20130608-1 ii openssh-blacklist 0.4.1+nmu1 ii openssh-blacklist-extra 0.4.1+nmu1 ii xauth 1:1.0.7-1 Versions of packages openssh-server suggests: pn molly-guard <none> pn monkeysphere <none> pn rssh <none> pn ssh-askpass <none> pn ufw <none> -- debconf information: ssh/vulnerable_host_keys: ssh/encrypted_host_key_but_no_keygen: * ssh/use_old_init_script: true ssh/disable_cr_auth: false
--- End Message ---
--- Begin Message ---
- To: 706610-done@bugs.debian.org, 762026-done@bugs.debian.org, 783232-done@bugs.debian.org, 783235-done@bugs.debian.org, 803356-done@bugs.debian.org, 683698-done@bugs.debian.org, 699754-done@bugs.debian.org, 706217-done@bugs.debian.org, 769388-done@bugs.debian.org, 774563-done@bugs.debian.org, 706131-done@bugs.debian.org, 617982-done@bugs.debian.org, 708135-done@bugs.debian.org, 610194-done@bugs.debian.org, 713914-done@bugs.debian.org, 770533-done@bugs.debian.org
- Subject: close release-notes bugs for releases before stretch
- From: Paul Gevers <elbrus@debian.org>
- Date: Sun, 3 Mar 2019 20:35:55 +0100
- Message-id: <7b603213-96c5-8056-b6d3-7b2c7a62a7f6@debian.org>
Hi, We are sorry that we were not able to handle your contribution or suggestion for changes to the release-notes. I am going over old bugs and I am closing all the items that were suggested for the release-notes of Debian releases before stretch. On the good side, some even appear to have been applied, without the bug being closed. Please don't hesitate to open a new bug if you think your suggestion is still valuable for the release-notes of buster. If you do that, we'd appreciate it when you try to summarize the issue properly when the closed bug was more than a couple of messages. PaulAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---