[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#280190: marked as done (ssh: typo in README.Debian wrt. ForwardX11Trusted)



Your message dated Fri, 12 Nov 2004 06:32:17 -0500
with message-id <E1CSZf7-0005lt-00@newraff.debian.org>
and subject line Bug#280190: fixed in openssh 1:3.8.1p1-8.sarge.3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 7 Nov 2004 22:22:46 +0000
>From faheem@email.unc.edu Sun Nov 07 14:22:46 2004
Return-path: <faheem@email.unc.edu>
Received: from smtpauth05.mail.atl.earthlink.net [209.86.89.65] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CQvQs-0001Ic-00; Sun, 07 Nov 2004 14:22:46 -0800
Received: from [24.225.83.15] (helo=Chrestomanci)
	by smtpauth05.mail.atl.earthlink.net with asmtp (Exim 4.34)
	id 1CQvQp-0007As-Jk; Sun, 07 Nov 2004 17:22:43 -0500
Received: from faheem by Chrestomanci with local (Exim 3.36 #1 (Debian))
	id 1CQvQp-0003T3-00; Sun, 07 Nov 2004 17:22:43 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Faheem Mitha <faheem@email.unc.edu>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ssh: typo in README.Debian wrt. ForwardX11Trusted
X-Mailer: reportbug 2.63
Date: Sun, 07 Nov 2004 17:22:43 -0500
Message-Id: <[🔎] E1CQvQp-0003T3-00@Chrestomanci>
Sender: Faheem Mitha <faheem@email.unc.edu>
X-ELNK-Trace: 5a2d53df64875d3b94f5150ab1c16ac08f4233f47979de26f443f3cd4a533bdb4c4a5e4bffc2f092350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 24.225.83.15
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: ssh
Version: 1:3.8.1p1-8.sarge.2
Severity: minor

/usr/share/doc/ssh/README.Debian says

**********************************************************************
OpenSSH 3.8 invented ForwardX11Trusted, which when set to no causes the
ssh client to create an untrusted X cookie so that attacks on the
forwarded X11 connection can't become attacks on X clients on the remote
machine. However, this has some problems in implementation - notably a
very short timeout of the untrusted cookie - breaks large numbers of
existing setups, and generally seems immature. The Debian package
therefore sets the default for this option to "no" (in ssh itself,
rather than in ssh_config).
***********************************************************************

I think the "no" in the second to last line of that para should be "yes",
since in fact "ForwardX11Trusted yes" is the default, and otherwise the para
does not make sense.

                                                             Faheem.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (50, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.4.27.040914
Locale: LANG=en_US, LC_CTYPE=en_US

Versions of packages ssh depends on:
ii  adduser                     3.59         Add and remove users and groups
ii  debconf                     1.4.30.8     Debian configuration management sy
ii  dpkg                        1.10.23      Package maintenance system for Deb
ii  libc6                       2.3.2.ds1-18 GNU C Library: Shared libraries an
ii  libpam-modules              0.76-22      Pluggable Authentication Modules f
ii  libpam-runtime              0.76-22      Runtime support for the PAM librar
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7d-5     SSL shared libraries
ii  libwrap0                    7.6.dbs-6    Wietse Venema's TCP wrappers libra
ii  zlib1g                      1:1.2.2-1    compression library - runtime

-- debconf information:
  ssh/insecure_rshd:
  ssh/privsep_ask: true
* ssh/user_environment_tell:
* ssh/forward_warning:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/SUID_client: true
  ssh/disable_cr_auth: false
* ssh/privsep_tell:
  ssh/ssh2_keys_merged:
* ssh/protocol2_only: true
  ssh/encrypted_host_key_but_no_keygen:
* ssh/run_sshd: true

---------------------------------------
Received: (at 280190-close) by bugs.debian.org; 12 Nov 2004 11:38:13 +0000
>From katie@ftp-master.debian.org Fri Nov 12 03:38:13 2004
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CSZkr-0008EJ-00; Fri, 12 Nov 2004 03:38:13 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CSZf7-0005lt-00; Fri, 12 Nov 2004 06:32:17 -0500
From: Colin Watson <cjwatson@debian.org>
To: 280190-close@bugs.debian.org
X-Katie: $Revision: 1.51 $
Subject: Bug#280190: fixed in openssh 1:3.8.1p1-8.sarge.3
Message-Id: <E1CSZf7-0005lt-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Fri, 12 Nov 2004 06:32:17 -0500
Delivered-To: 280190-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 3

Source: openssh
Source-Version: 1:3.8.1p1-8.sarge.3

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_3.8.1p1-8.sarge.3_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_3.8.1p1-8.sarge.3_powerpc.udeb
openssh-server-udeb_3.8.1p1-8.sarge.3_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_3.8.1p1-8.sarge.3_powerpc.udeb
openssh_3.8.1p1-8.sarge.3.diff.gz
  to pool/main/o/openssh/openssh_3.8.1p1-8.sarge.3.diff.gz
openssh_3.8.1p1-8.sarge.3.dsc
  to pool/main/o/openssh/openssh_3.8.1p1-8.sarge.3.dsc
ssh-askpass-gnome_3.8.1p1-8.sarge.3_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_3.8.1p1-8.sarge.3_powerpc.deb
ssh_3.8.1p1-8.sarge.3_powerpc.deb
  to pool/main/o/openssh/ssh_3.8.1p1-8.sarge.3_powerpc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 280190@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 12 Nov 2004 10:31:12 +0000
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server-udeb
Architecture: source powerpc
Version: 1:3.8.1p1-8.sarge.3
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure rlogin/rsh/rcp replacement (OpenSSH)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 278394 278715 280190
Changes: 
 openssh (1:3.8.1p1-8.sarge.3) unstable; urgency=low
 .
   * Enable threading for PAM, on Sam Hartman's advice (closes: #278394).
   * debconf template translations:
     - Update Dutch (thanks, cobaco; closes: #278715).
   * Correct README.Debian's ForwardX11Trusted description (closes: #280190).
Files: 
 623fbfd12873e27ba874ca02a6f64bab 906 net standard openssh_3.8.1p1-8.sarge.3.dsc
 22fa5b7b3232bd7f583be97a54aaf4f6 156186 net standard openssh_3.8.1p1-8.sarge.3.diff.gz
 5aa5c9399f90758219e623f3788ba16c 737112 net standard ssh_3.8.1p1-8.sarge.3_powerpc.deb
 38b147f7447e86bceafb4af4c759fdea 52588 gnome optional ssh-askpass-gnome_3.8.1p1-8.sarge.3_powerpc.deb
 8045bed8de34e0596061b5c1b6835acd 151070 debian-installer optional openssh-client-udeb_3.8.1p1-8.sarge.3_powerpc.udeb
 93eadd0ce5c675889492d618573f2fd5 160042 debian-installer optional openssh-server-udeb_3.8.1p1-8.sarge.3_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQFBlJdR9t0zAhD6TNERAg7MAJ9QWFg+63F4CR+PplXNyqKZ7fkO+wCdF4Q5
+GAUnHdXboZNK3qpHO0gq+I=
=ljgh
-----END PGP SIGNATURE-----




Reply to: