This is an automatic notification regarding your Bug report
#261771: ssh: breaks debian rules by hacking files in /etc/pam.d,
which was filed against the ssh package.
It has been closed by one of the developers, namely
Colin Watson <cjwatson@debian.org>.
Their explanation is attached below. If this explanation is
unsatisfactory and you have not received a better one in a separate
message then please contact the developer, by replying to this email.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
Received: (at 261771-done) by bugs.debian.org; 28 Jul 2004 11:48:59 +0000
From cjwatson@flatline.org.uk Wed Jul 28 04:48:59 2004
Return-path: <cjwatson@flatline.org.uk>
Received: from chiark.greenend.org.uk [193.201.200.170] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Bpmvb-0006qs-00; Wed, 28 Jul 2004 04:48:59 -0700
Received: from [192.168.124.112] (helo=riva.lab.dotat.at)
by chiark.greenend.org.uk (Debian Exim 3.35 #1) with esmtp
for 261771-done@bugs.debian.org
id 1BpmvY-0006lV-00; Wed, 28 Jul 2004 12:48:56 +0100
Received: from cjwatson by riva.lab.dotat.at with local (Exim 3.35 #1 (Debian))
for 261771-done@bugs.debian.org
id 1BpmvY-0002Ea-00; Wed, 28 Jul 2004 12:48:56 +0100
Date: Wed, 28 Jul 2004 12:48:56 +0100
From: Colin Watson <cjwatson@debian.org>
To: 261771-done@bugs.debian.org
Subject: Re: Bug#261771: ssh: breaks debian rules by hacking files in /etc/pam.d
Message-ID: <20040728114856.GA8542@riva.ucam.org>
References: <200407280349.i6S3nrtw000412@hend.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <200407280349.i6S3nrtw000412@hend.net>
User-Agent: Mutt/1.3.28i
Delivered-To: 261771-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
On Tue, Jul 27, 2004 at 11:49:53PM -0400, John D. Hendrickson wrote:
I couldn't use rlogin / rsh after dist-upgrade becuase ssh had improperly
place himself in the /etc/pam.d/common-* files.
The ssh package does not touch /etc/pam.d/common-*.
It has in the past told users it was offering a secure shell when infact it
did no such thing without hours of backwards configurations. The most recent
version looks as if it has keys configured. I'm not at all supprised to see
users are saying it is not using any security for logins. Not at all.
It isn't compatible with telnet. It breaks X - though it has found its way
into GNOME projects files anyway.
Its not transport compatible, not secure, hard to configure, pulls wool over
users eyes by calling itself a secure shell in its manpage. It's hardly
an openvpn or kerberos. It's practically inadvisable to install.
It has no place being "standard" or "base" at all - if you check the all too
lengthy bug logs.
Rants are not appropriate in the bug tracking system. Please take them
elsewhere. If you have a concise and accurate report about ssh's
behaviour, please file it, rather than yourself adding to the lengthy
list of bugs with a rant.