Bug#153154: marked as done (ssh: X11 display forwarding is broken when ipV6 is enabled)
Your message dated Thu, 20 May 2004 14:16:55 +0100
with message-id <20040520131655.GF2427@riva.ucam.org>
and subject line Bug#153154: Debian bug #153154: ssh: X11 display forwarding is broken when ipV6 is enabled
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Jul 2002 12:18:09 +0000
>From heanet@keyhole.heanet.ie Tue Jul 16 07:18:08 2002
Return-path: <heanet@keyhole.heanet.ie>
Received: from keyhole.heanet.ie [193.1.31.82]
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 17URHM-0007Ff-00; Tue, 16 Jul 2002 07:18:08 -0500
Received: by keyhole.heanet.ie (Postfix, from userid 1002)
id B9E147F5A; Tue, 16 Jul 2002 13:17:35 +0100 (IST)
From: Heanet Admin Role Account <heanet@keyhole.heanet.ie>
Subject: ssh: X11 display forwarding is broken when ipV6 is enabled
To: submit@bugs.debian.org
X-Mailer: bug 3.3.10.1
Message-Id: <20020716121735.B9E147F5A@keyhole.heanet.ie>
Date: Tue, 16 Jul 2002 13:17:35 +0100 (IST)
Delivered-To: submit@bugs.debian.org
Package: ssh
Version: 1:3.4p1-2
Severity: important
when you ssh into a v6 enabled host, whose sshd is listening in both v4 and v6
ports. It will create ::1 6010 as the X server port but it set's DISPLAY to be
"localhost:10.0" which resolves to 127.0.0.1.
This happens even if you are connecting to the v4 socket.
Since Xlibs does not support v6 address at the minute, maybe it could always
create the X11 port on 127.0.0.1
-- System Information
Debian Release: 3.0
Kernel Version: Linux keyhole 2.4.18-0.1 #1 Mon Jul 8 10:15:52 IST 2002 i686 unknown unknown GNU/Linux
Versions of the packages ssh depends on:
ii adduser 3.47 Add and remove users and groups
ii debconf 1.1.17 Debian configuration management system
ii libc6 2.2.5-10.0 GNU C Library: Shared libraries and Timezone
ii libpam-modules 0.72-35 Pluggable Authentication Modules for PAM
ii libpam0g 0.72-35 Pluggable Authentication Modules library
ii libssl0.9.6 0.9.6d-1 SSL shared libraries
ii libwrap0 7.6-9 Wietse Venema's TCP wrappers library
ii zlib1g 1.1.4-1 compression library - runtime
--- Begin /etc/ssh/ssh_config (modified conffile)
Host *
ForwardAgent no
ForwardX11 no
RhostsAuthentication no
RhostsRSAAuthentication no
RSAAuthentication yes
PasswordAuthentication yes
BatchMode no
CheckHostIP yes
StrictHostKeyChecking ask
IdentityFile ~/.ssh/identity
IdentityFile ~/.ssh/id_rsa
IdentityFile ~/.ssh/id_dsa
Port 22
Protocol 2
Cipher 3des
Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
EscapeChar ~
--- End /etc/ssh/ssh_config
--- Begin /etc/init.d/ssh (modified conffile)
#! /bin/sh
test -x /usr/sbin/sshd || exit 0
( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0
if [ -e /etc/ssh/sshd_not_to_be_run ]; then
echo "OpenBSD Secure Shell server not in use (/etc/ssh/sshd_not_to_be_run)"
exit 0
fi
check_config() {
/usr/sbin/sshd -t || exit 1
}
case "$1" in
start)
test -f /etc/ssh/sshd_not_to_be_run && exit 0
if [ ! -d /var/run/sshd ]; then
mkdir /var/run/sshd; chmod 0755 /var/run/sshd
fi
echo -n "Starting OpenBSD Secure Shell server: sshd"
start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -6
echo "."
;;
stop)
echo -n "Stopping OpenBSD Secure Shell server: sshd"
start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid
echo "."
;;
reload|force-reload)
test -f /etc/ssh/sshd_not_to_be_run && exit 0
check_config
echo -n "Reloading OpenBSD Secure Shell server's configuration"
start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd
echo "."
;;
restart)
test -f /etc/ssh/sshd_not_to_be_run && exit 0
check_config
echo -n "Restarting OpenBSD Secure Shell server: sshd"
start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid
sleep 2
start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd
echo "."
;;
*)
echo "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart}"
exit 1
esac
exit 0
--- End /etc/init.d/ssh
---------------------------------------
Received: (at 153154-done) by bugs.debian.org; 20 May 2004 13:17:08 +0000
>From cjwatson@flatline.org.uk Thu May 20 06:17:07 2004
Return-path: <cjwatson@flatline.org.uk>
Received: from chiark.greenend.org.uk [193.201.200.170] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BQnQ3-000229-00; Thu, 20 May 2004 06:17:07 -0700
Received: from [192.168.124.112] (helo=riva.lab.dotat.at)
by chiark.greenend.org.uk (Debian Exim 3.35 #1) with esmtp
id 1BQnQ1-0001nE-00; Thu, 20 May 2004 14:17:05 +0100
Received: from cjwatson by riva.lab.dotat.at with local (Exim 3.35 #1 (Debian))
id 1BQnPr-0003qd-00; Thu, 20 May 2004 14:16:55 +0100
Date: Thu, 20 May 2004 14:16:55 +0100
From: Colin Watson <cjwatson@debian.org>
To: Darren Tucker <dtucker@zip.com.au>, 153154-done@bugs.debian.org
Subject: Re: Bug#153154: Debian bug #153154: ssh: X11 display forwarding is broken when ipV6 is enabled
Message-ID: <20040520131655.GF2427@riva.ucam.org>
References: <[🔎] 409F23D0.7010609@zip.com.au>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[🔎] 409F23D0.7010609@zip.com.au>
User-Agent: Mutt/1.3.28i
Delivered-To: 153154-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
On Mon, May 10, 2004 at 04:40:16PM +1000, Darren Tucker wrote:
> This bug is believed fixed (some time ago) and the upstream bug is
> now closed.
Yes, that's my belief too from my own systems. Closing, thanks.
--
Colin Watson [cjwatson@flatline.org.uk]
Reply to: