Bug#252676: marked as done (sshd failure)
Your message dated Sat, 10 Jul 2004 09:32:03 -0400
with message-id <E1BjHxT-0004qi-00@newraff.debian.org>
and subject line Bug#252676: fixed in openssh 1:3.8.1p1-5
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Jun 2004 17:22:16 +0000
>From joey@kitenet.net Fri Jun 04 10:22:16 2004
Return-path: <joey@kitenet.net>
Received: from kitenet.net [64.62.161.42] (postfix)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BWIOW-0006Jq-00; Fri, 04 Jun 2004 10:22:16 -0700
Received: by kitenet.net (Postfix, from userid 500)
id 7F63E184EE; Fri, 4 Jun 2004 17:20:54 +0000 (GMT)
Date: Fri, 4 Jun 2004 13:20:54 -0400
From: Joey Hess <joeyh@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: sshd failure
Message-ID: <20040604172054.GA12082@kitenet.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
X-Reportbug-Version: 2.61
User-Agent: Mutt/1.5.6i
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Package: ssh
Version: 1:3.8.1p1-4
Severity: serious
Note: I'm not 100% sure I was running ssh -4, and not -3, when I
experienced this bug, because the first thing I tried to do to fix it
was upgrade. Bug #248125 looks similar, and that was -3? My status-old
is dated June second, and has version -4 in it though, so I do think I
was running -4.
My colocated server was refusing both ssh and ssl telnet connections.
It looked like this:
joey:~>ssh -v kite
OpenSSH_3.8.1p1 Debian 1:3.8.1p1-4, OpenSSL 0.9.7d 17 Mar 2004
debug1: Reading configuration data /home/joey/.ssh/config
debug1: Applying options for kite
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to kite [64.62.161.42] port 22.
debug1: Connection established.
debug1: identity file /home/joey/.ssh/identity type -1
debug1: identity file /home/joey/.ssh/id_rsa type -1
debug1: identity file /home/joey/.ssh/id_dsa type 2
ssh_exchange_identification: Connection closed by remote host
Telnet also hung up before I got to a login prompt. The rest of the serivces
seemed ok. I got a root shell via other means, and tried restarting ssh. No
luck. Tried upgrading the whole system to current unstable, again, no luck.
Then I noticed something strange in ps:
14515 ? S 0:00 sshd: joey [pam]
32215 ? S 0:00 sshd: bdragon [pam]
8978 ? S 0:00 sshd: joeyh [pam]
There were a few more that I've elided because they may contain preveligded
information. I don't have a "bdragon" or "joeyh" user, and there were some
other weird users listed. None of these users were really logged in,
that I could tell.
I also found this in the log:
Jun 2 10:33:06 kitenet sshd[26977]: error: Bind to port 22 on 0.0.0.0 fail=
ed: Address already in use.
Jun 2 10:33:06 kitenet sshd[26977]: fatal: Cannot bind any address.
I killed all of these processes, and restarted ssh again. Now it worked, and
so did telnet.
I have to catch a plane, so I can't investigate further right now.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.26
Locale: LANG=3Den_US, LC_CTYPE=3Den_US
Versions of packages ssh depends on:
ii adduser 3.56 Add and remove users and groups
ii debconf 1.4.25 Debian configuration managemen=
t sy
ii dpkg 1.10.22 Package maintenance system for=
Deb
ii libc6 2.3.2.ds1-13 GNU C Library: Shared librarie=
s an
ii libpam-modules 0.76-21 Pluggable Authentication Modul=
es f
ii libpam-runtime 0.76-21 Runtime support for the PAM li=
brar
ii libpam0g 0.76-21 Pluggable Authentication Modul=
es l
ii libssl0.9.7 0.9.7d-3 SSL shared libraries
ii libwrap0 7.6.dbs-4 Wietse Venema's TCP wrappers l=
ibra
ii zlib1g 1:1.2.1.1-3 compression library - runtime
-- debconf information excluded
--=20
see shy jo
---------------------------------------
Received: (at 252676-close) by bugs.debian.org; 10 Jul 2004 13:38:02 +0000
>From katie@ftp-master.debian.org Sat Jul 10 06:38:02 2004
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BjI3G-0007HH-00; Sat, 10 Jul 2004 06:38:02 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1BjHxT-0004qi-00; Sat, 10 Jul 2004 09:32:03 -0400
From: Colin Watson <cjwatson@debian.org>
To: 252676-close@bugs.debian.org
X-Katie: $Revision: 1.51 $
Subject: Bug#252676: fixed in openssh 1:3.8.1p1-5
Message-Id: <E1BjHxT-0004qi-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Sat, 10 Jul 2004 09:32:03 -0400
Delivered-To: 252676-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
X-CrossAssassin-Score: 2
Source: openssh
Source-Version: 1:3.8.1p1-5
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:
openssh-client-udeb_3.8.1p1-5_powerpc.udeb
to pool/main/o/openssh/openssh-client-udeb_3.8.1p1-5_powerpc.udeb
openssh-server-udeb_3.8.1p1-5_powerpc.udeb
to pool/main/o/openssh/openssh-server-udeb_3.8.1p1-5_powerpc.udeb
openssh_3.8.1p1-5.diff.gz
to pool/main/o/openssh/openssh_3.8.1p1-5.diff.gz
openssh_3.8.1p1-5.dsc
to pool/main/o/openssh/openssh_3.8.1p1-5.dsc
ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
to pool/main/o/openssh/ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
ssh_3.8.1p1-5_powerpc.deb
to pool/main/o/openssh/ssh_3.8.1p1-5_powerpc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 252676@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sat, 10 Jul 2004 13:57:27 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server-udeb
Architecture: source powerpc
Version: 1:3.8.1p1-5
Distribution: unstable
Urgency: medium
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh - Secure rlogin/rsh/rcp replacement (OpenSSH)
ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 252226 252676 258517
Changes:
openssh (1:3.8.1p1-5) unstable; urgency=medium
.
* Update German debconf template translation (thanks, Helge Kreutzmann;
closes: #252226).
* Remove Suggests: dnsutils, as it was only needed for
make-ssh-known-hosts (#93265), which has been replaced by ssh-keyscan.
* Disable shadow password support in openssh-server-udeb.
* Fix non-portable shell constructs in maintainer scripts, Makefile, and
ssh-copy-id (thanks, David Weinehall; closes: #258517).
* Apply patch from Darren Tucker to make the PAM authentication SIGCHLD
handler kill the PAM thread if its waitpid() call returns 0, as well as
the previous check for -1 (closes: #252676).
* Add scp and sftp to openssh-client-udeb. It might not be very 'u' any
more; oh well.
Files:
3202977c5bb0f8ad90f054490c897ee8 890 net standard openssh_3.8.1p1-5.dsc
c1607db15c5c218a105ebeb283987c16 148208 net standard openssh_3.8.1p1-5.diff.gz
7fd850f6eaa00a94bc20bd08bd47365f 732184 net standard ssh_3.8.1p1-5_powerpc.deb
bcccadd0ae2ccdf5e392fdc0857c6440 51878 gnome optional ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
e7f35854be7a14906d2c003a881a979e 150892 debian-installer optional openssh-client-udeb_3.8.1p1-5_powerpc.udeb
afbc62f360b4ea7fea4586cc4b46e369 159546 debian-installer optional openssh-server-udeb_3.8.1p1-5_powerpc.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer
iD8DBQFA7+vC9t0zAhD6TNERAhpDAJ9MSjipj7CkcZ9KklG7dONVYCSvIwCfRijl
MuXejNOZ9aZhR/N5QWQL4Fg=
=V8cq
-----END PGP SIGNATURE-----
Reply to: