[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#141703: marked as done (ssh: Generate host key information missing from README.Debian)



Your message dated Tue, 16 Sep 2003 14:47:25 -0400
with message-id <E19zKrF-0003jJ-00@auric.debian.org>
and subject line Bug#141703: fixed in openssh 1:3.6.1p2-7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at maintonly) by bugs.debian.org; 7 Apr 2002 23:55:16 +0000
>From pawal@vic20.blipp.com Sun Apr 07 18:55:16 2002
Return-path: <pawal@vic20.blipp.com>
Received: from vic20.blipp.com [212.214.21.196] 
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 16uMV9-0002Mp-00; Sun, 07 Apr 2002 18:55:15 -0500
Received: by vic20.blipp.com (Postfix, from userid 1000)
	id 2C3F3B2491; Mon,  8 Apr 2002 01:55:11 +0200 (CEST)
From: Patrik Wallstrom <pawal@blipp.com>
To: Debian Bug Tracking System <maintonly@bugs.debian.org>
Subject: ssh: Generate host key information missing from README.Debian
X-Mailer: reportbug 1.50
Date: Mon, 08 Apr 2002 01:55:11 +0200
Message-Id: <20020407235511.2C3F3B2491@vic20.blipp.com>
Delivered-To: maintonly@bugs.debian.org

Package: ssh
Version: 1:3.0.2p1-9
Severity: wishlist

Below the headline "SSH now uses protocol 2 by default" in README.Debian
there is information on how to add the ssh protocol 1 to the sshd
configuration. There is no information on how to generate a version 1
ssh_host_key in there, nor any pointer to instructions on how to do it.
This information should prove useful. It should also include a statement
on the security issues with protocol 1.


---------------------------------------
Received: (at 141703-close) by bugs.debian.org; 16 Sep 2003 18:54:12 +0000
>From katie@auric.debian.org Tue Sep 16 13:54:11 2003
Return-path: <katie@auric.debian.org>
Received: from auric.debian.org [206.246.226.45] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 19zKxn-00058x-00; Tue, 16 Sep 2003 13:54:11 -0500
Received: from katie by auric.debian.org with local (Exim 3.35 1 (Debian))
	id 19zKrF-0003jJ-00; Tue, 16 Sep 2003 14:47:25 -0400
From: Colin Watson <cjwatson@debian.org>
To: 141703-close@bugs.debian.org
X-Katie: $Revision: 1.35 $
Subject: Bug#141703: fixed in openssh 1:3.6.1p2-7
Message-Id: <E19zKrF-0003jJ-00@auric.debian.org>
Sender: Archive Administrator <katie@auric.debian.org>
Date: Tue, 16 Sep 2003 14:47:25 -0400
Delivered-To: 141703-close@bugs.debian.org

Source: openssh
Source-Version: 1:3.6.1p2-7

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh_3.6.1p2-7.diff.gz
  to pool/main/o/openssh/openssh_3.6.1p2-7.diff.gz
openssh_3.6.1p2-7.dsc
  to pool/main/o/openssh/openssh_3.6.1p2-7.dsc
ssh-askpass-gnome_3.6.1p2-7_i386.deb
  to pool/main/o/openssh/ssh-askpass-gnome_3.6.1p2-7_i386.deb
ssh_3.6.1p2-7_i386.deb
  to pool/main/o/openssh/ssh_3.6.1p2-7_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 141703@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 16 Sep 2003 14:32:28 +0100
Source: openssh
Binary: ssh-askpass-gnome ssh
Architecture: source i386
Version: 1:3.6.1p2-7
Distribution: unstable
Urgency: high
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 ssh        - Secure rlogin/rsh/rcp replacement (OpenSSH)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 141703 208801 210380 211205
Changes: 
 openssh (1:3.6.1p2-7) unstable; urgency=high
 .
   * Update debconf template translations:
     - French (thanks, Christian Perrier; closes: #208801).
     - Japanese (thanks, Kenshi Muto; closes: #210380).
   * Some small improvements to the English templates courtesy of Christian
     Perrier. I've manually unfuzzied a few translations where it was
     obvious, on Christian's advice, but the others will have to be updated.
   * Document how to generate an RSA1 host key (closes: #141703).
   * Incorporate NMU fix for early buffer expansion vulnerability,
     CAN-2003-0693 (closes: #211205). Thanks to Michael Stone.
 .
 openssh (1:3.6.1p2-6.0) unstable; urgency=high
 .
   * SECURITY: fix for CAN-2003-0693, buffer allocation error
Files: 
 17322a60098f50af98ffb7cea49594c7 847 net standard openssh_3.6.1p2-7.dsc
 75457bebb3297b5709d60a102af66cdc 80371 net standard openssh_3.6.1p2-7.diff.gz
 d22568a62331c8ed9ac31f22ca344320 650286 net standard ssh_3.6.1p2-7_i386.deb
 b3405ac4a4e75643b47b60cc92256f79 43026 gnome optional ssh-askpass-gnome_3.6.1p2-7_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQE/Z1bl9t0zAhD6TNERAnpnAJ9oj55MvBbb79aAk9BBlRTbl1oG8ACfURRj
ITiihsZRgOLjuBi6u18xYXI=
=8qOA
-----END PGP SIGNATURE-----




Reply to: