[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#153154: marked as done (ssh: X11 display forwarding is broken when ipV6 is enabled)



Your message dated Thu, 20 May 2004 14:16:55 +0100
with message-id <20040520131655.GF2427@riva.ucam.org>
and subject line Bug#153154: Debian bug  #153154: ssh: X11 display forwarding is broken when ipV6 is enabled
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Jul 2002 12:18:09 +0000
>From heanet@keyhole.heanet.ie Tue Jul 16 07:18:08 2002
Return-path: <heanet@keyhole.heanet.ie>
Received: from keyhole.heanet.ie [193.1.31.82] 
	by master.debian.org with esmtp (Exim 3.12 1 (Debian))
	id 17URHM-0007Ff-00; Tue, 16 Jul 2002 07:18:08 -0500
Received: by keyhole.heanet.ie (Postfix, from userid 1002)
	id B9E147F5A; Tue, 16 Jul 2002 13:17:35 +0100 (IST)
From: Heanet Admin Role Account <heanet@keyhole.heanet.ie>
Subject: ssh: X11 display forwarding is broken when ipV6 is enabled
To: submit@bugs.debian.org
X-Mailer: bug 3.3.10.1
Message-Id: <20020716121735.B9E147F5A@keyhole.heanet.ie>
Date: Tue, 16 Jul 2002 13:17:35 +0100 (IST)
Delivered-To: submit@bugs.debian.org

Package: ssh
Version: 1:3.4p1-2
Severity: important

when you ssh into a v6 enabled host, whose sshd is listening in both v4 and v6 
ports. It will create ::1 6010 as the X server port but it set's DISPLAY to be
"localhost:10.0" which resolves to 127.0.0.1.

This happens even if you are connecting to the v4 socket.

Since Xlibs does not support v6 address at the minute, maybe it could always
create the X11 port on 127.0.0.1



-- System Information
Debian Release: 3.0
Kernel Version: Linux keyhole 2.4.18-0.1 #1 Mon Jul 8 10:15:52 IST 2002 i686 unknown unknown GNU/Linux

Versions of the packages ssh depends on:
ii  adduser        3.47           Add and remove users and groups
ii  debconf        1.1.17         Debian configuration management system
ii  libc6          2.2.5-10.0     GNU C Library: Shared libraries and Timezone
ii  libpam-modules 0.72-35        Pluggable Authentication Modules for PAM
ii  libpam0g       0.72-35        Pluggable Authentication Modules library
ii  libssl0.9.6    0.9.6d-1       SSL shared libraries
ii  libwrap0       7.6-9          Wietse Venema's TCP wrappers library
ii  zlib1g         1.1.4-1        compression library - runtime

--- Begin /etc/ssh/ssh_config (modified conffile)
 Host *
   ForwardAgent no
   ForwardX11 no
   RhostsAuthentication no
   RhostsRSAAuthentication no
   RSAAuthentication yes
   PasswordAuthentication yes
   BatchMode no
   CheckHostIP yes
   StrictHostKeyChecking ask
   IdentityFile ~/.ssh/identity
   IdentityFile ~/.ssh/id_rsa
   IdentityFile ~/.ssh/id_dsa
   Port 22
   Protocol 2
   Cipher 3des
   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
   EscapeChar ~

--- End /etc/ssh/ssh_config

--- Begin /etc/init.d/ssh (modified conffile)
#! /bin/sh
test -x /usr/sbin/sshd || exit 0
( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0
if [ -e /etc/ssh/sshd_not_to_be_run ]; then 
    echo "OpenBSD Secure Shell server not in use (/etc/ssh/sshd_not_to_be_run)"
    exit 0
fi
check_config() {
	/usr/sbin/sshd -t || exit 1
}
case "$1" in
  start)
	test -f /etc/ssh/sshd_not_to_be_run && exit 0
	if [ ! -d /var/run/sshd ]; then
	    mkdir /var/run/sshd; chmod 0755 /var/run/sshd
	fi
        echo -n "Starting OpenBSD Secure Shell server: sshd"
	start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -6
        echo "."
	;;
  stop)
        echo -n "Stopping OpenBSD Secure Shell server: sshd"
	start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid
        echo "."
	;;
  reload|force-reload)
  	test -f /etc/ssh/sshd_not_to_be_run && exit 0
	check_config
        echo -n "Reloading OpenBSD Secure Shell server's configuration"
	start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd
	echo "."
	;;
  restart)
  	test -f /etc/ssh/sshd_not_to_be_run && exit 0
	check_config
        echo -n "Restarting OpenBSD Secure Shell server: sshd"
	start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid
	sleep 2
	start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd
	echo "."
	;;
  *)
	echo "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart}"
	exit 1
esac
exit 0

--- End /etc/init.d/ssh

---------------------------------------
Received: (at 153154-done) by bugs.debian.org; 20 May 2004 13:17:08 +0000
>From cjwatson@flatline.org.uk Thu May 20 06:17:07 2004
Return-path: <cjwatson@flatline.org.uk>
Received: from chiark.greenend.org.uk [193.201.200.170] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BQnQ3-000229-00; Thu, 20 May 2004 06:17:07 -0700
Received: from [192.168.124.112] (helo=riva.lab.dotat.at)
	by chiark.greenend.org.uk (Debian Exim 3.35 #1) with esmtp
	id 1BQnQ1-0001nE-00; Thu, 20 May 2004 14:17:05 +0100
Received: from cjwatson by riva.lab.dotat.at with local (Exim 3.35 #1 (Debian))
	id 1BQnPr-0003qd-00; Thu, 20 May 2004 14:16:55 +0100
Date: Thu, 20 May 2004 14:16:55 +0100
From: Colin Watson <cjwatson@debian.org>
To: Darren Tucker <dtucker@zip.com.au>, 153154-done@bugs.debian.org
Subject: Re: Bug#153154: Debian bug  #153154: ssh: X11 display forwarding is broken when ipV6 is enabled
Message-ID: <20040520131655.GF2427@riva.ucam.org>
References: <[🔎] 409F23D0.7010609@zip.com.au>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[🔎] 409F23D0.7010609@zip.com.au>
User-Agent: Mutt/1.3.28i
Delivered-To: 153154-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

On Mon, May 10, 2004 at 04:40:16PM +1000, Darren Tucker wrote:
> 	This bug is believed fixed (some time ago) and the upstream bug is 
> 	now closed.

Yes, that's my belief too from my own systems. Closing, thanks.

-- 
Colin Watson                                  [cjwatson@flatline.org.uk]



Reply to: