[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#317241: marked as done (openssh-server: unable to login after upgrade to 4.1p1-5)



Your message dated Thu, 07 Jul 2005 06:32:11 -0400
with message-id <E1DqTfv-0006jn-00@newraff.debian.org>
and subject line Bug#317088: fixed in openssh 1:4.1p1-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 6 Jul 2005 23:09:32 +0000
>From cowboy@debian.org Wed Jul 06 16:09:32 2005
Return-path: <cowboy@debian.org>
Received: from e3.ny.us.ibm.com [32.97.182.143] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DqJ1I-0005Ng-00; Wed, 06 Jul 2005 16:09:32 -0700
Received: from d01relay02.pok.ibm.com (d01relay02.pok.ibm.com [9.56.227.234])
	by e3.ny.us.ibm.com (8.12.11/8.12.11) with ESMTP id j66N90Ml026347
	for <submit@bugs.debian.org>; Wed, 6 Jul 2005 19:09:01 -0400
Received: from d01av01.pok.ibm.com (d01av01.pok.ibm.com [9.56.224.215])
	by d01relay02.pok.ibm.com (8.12.10/NCO/VERS6.7) with ESMTP id j66N90Lq249480
	for <submit@bugs.debian.org>; Wed, 6 Jul 2005 19:09:00 -0400
Received: from d01av01.pok.ibm.com (loopback [127.0.0.1])
	by d01av01.pok.ibm.com (8.12.11/8.13.3) with ESMTP id j66N90pv013066
	for <submit@bugs.debian.org>; Wed, 6 Jul 2005 19:09:00 -0400
Received: from bandit-hall.svl.ibm.com (bandit-hall.svl.ibm.com [9.30.58.23])
	by d01av01.pok.ibm.com (8.12.11/8.12.11) with ESMTP id j66N906j013030
	for <submit@bugs.debian.org>; Wed, 6 Jul 2005 19:09:00 -0400
Received: from bandit-hall.svl.ibm.com (localhost [127.0.0.1])
	(authenticated bits=128)
	by bandit-hall.svl.ibm.com (8.13.4/8.13.4/Debian-3) with ESMTP id j66N8nrl028347;
	Wed, 6 Jul 2005 16:08:49 -0700
Received: (from cowboy@localhost)
	by bandit-hall.svl.ibm.com (8.13.4/8.13.4/Submit) id j66N8nDL028346;
	Wed, 6 Jul 2005 16:08:49 -0700
Message-Id: <[🔎] 200507062308.j66N8nDL028346@bandit-hall.svl.ibm.com>
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Richard A Nelson <cowboy@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: openssh-server: unable to login after upgrade to 4.1p1-5
X-Mailer: reportbug 3.15
Date: Wed, 06 Jul 2005 16:08:49 -0700
X-Scanned-By: MIMEDefang 2.51 on 127.0.0.2
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: openssh-server
Version: 1:4.1p1-5
Severity: important

Apparently, I'm the only, if not one of the few who was just bitten
after an upgrade of openssh-server from 4.1p1-4 to 4.1.p1-5.

After the upgrade, no users can login to the box, and there is no
logging of errors.

running sshd by hand, I found it was declaring every user to be expired
by PAM - but not logging that fact to syslog or auth.log !

I reset a few passwords, and obtained the same results...

Downgrading the server to 4.1p1-4 allows login again.

By the way, why does the client package depend upon the server (and at
the same level)?  Seems rather pointless, doesn't it ?


-- System Information:
Debian Release: testing/unstable
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'proposed-updates'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages openssh-server depends on:
ii  adduser                       3.64       Add and remove users and groups
ii  debconf [debconf-2.0]         1.4.51     Debian configuration management sy
ii  dpkg                          1.13.10    Package maintenance system for Deb
ii  libc6                         2.3.5-1    GNU C Library: Shared libraries an
ii  libpam-modules                0.76-22    Pluggable Authentication Modules f
ii  libpam-runtime                0.76-22    Runtime support for the PAM librar
ii  libpam0g                      0.76-22    Pluggable Authentication Modules l
ii  libselinux1                   1.24-1     SELinux shared libraries
ii  libssl0.9.7                   0.9.7g-1   SSL shared libraries
ii  libwrap0                      7.6.dbs-8  Wietse Venema's TCP wrappers libra
ii  openssh-client                1:4.1p1-4  Secure shell client, an rlogin/rsh
ii  zlib1g                        1:1.2.2-6  compression library - runtime

openssh-server recommends no packages.

-- debconf information:
  ssh/insecure_rshd:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
  ssh/disable_cr_auth: false
* ssh/protocol2_only: true
  ssh/encrypted_host_key_but_no_keygen:

---------------------------------------
Received: (at 317088-close) by bugs.debian.org; 7 Jul 2005 10:39:25 +0000
>From katie@ftp-master.debian.org Thu Jul 07 03:39:25 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DqTmv-0002OT-00; Thu, 07 Jul 2005 03:39:25 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DqTfv-0006jn-00; Thu, 07 Jul 2005 06:32:11 -0400
From: Colin Watson <cjwatson@debian.org>
To: 317088-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#317088: fixed in openssh 1:4.1p1-6
Message-Id: <E1DqTfv-0006jn-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Thu, 07 Jul 2005 06:32:11 -0400
Delivered-To: 317088-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: openssh
Source-Version: 1:4.1p1-6

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.1p1-6_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.1p1-6_powerpc.udeb
openssh-client_4.1p1-6_powerpc.deb
  to pool/main/o/openssh/openssh-client_4.1p1-6_powerpc.deb
openssh-server-udeb_4.1p1-6_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.1p1-6_powerpc.udeb
openssh-server_4.1p1-6_powerpc.deb
  to pool/main/o/openssh/openssh-server_4.1p1-6_powerpc.deb
openssh_4.1p1-6.diff.gz
  to pool/main/o/openssh/openssh_4.1p1-6.diff.gz
openssh_4.1p1-6.dsc
  to pool/main/o/openssh/openssh_4.1p1-6.dsc
ssh-askpass-gnome_4.1p1-6_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.1p1-6_powerpc.deb
ssh_4.1p1-6_all.deb
  to pool/main/o/openssh/ssh_4.1p1-6_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 317088@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu,  7 Jul 2005 10:56:16 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.1p1-6
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server - Secure shell server, an rshd replacement
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure shell client and server (transitional package)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 317088 317238 317241
Changes: 
 openssh (1:4.1p1-6) unstable; urgency=low
 .
   * Fix one-character typo that meant the binaries in openssh-client and
     openssh-server got recompiled with the wrong options during
     'debian/rules install' (closes: #317088, #317238, #317241).
Files: 
 5f61d461103a01892b7b635b83948ab9 953 net standard openssh_4.1p1-6.dsc
 0d9fe699a5462cde7ac9392b01466f9d 152965 net standard openssh_4.1p1-6.diff.gz
 7d3e70f1a29fe1e000cd67a271c0901e 1052 net extra ssh_4.1p1-6_all.deb
 9e7fd7c9275b4cab9c66aa6365bb6db9 572994 net standard openssh-client_4.1p1-6_powerpc.deb
 58ea726759997cab4f9ad9c0567098d1 216482 net optional openssh-server_4.1p1-6_powerpc.deb
 96a79cf4deed11b52831660eab6e9329 77582 gnome optional ssh-askpass-gnome_4.1p1-6_powerpc.deb
 630915dd4ac741fe15735fa72dbb0d83 163184 debian-installer optional openssh-client-udeb_4.1p1-6_powerpc.udeb
 e443af606eb6a7de513bd5854a5b8b28 171992 debian-installer optional openssh-server-udeb_4.1p1-6_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCzP7t9t0zAhD6TNERAroNAJ4/D5v3/3twJL0I5eKHPcUe9RhkygCcC4eK
gWPmObyA+DroWAdvq+ZmIpQ=
=MbBb
-----END PGP SIGNATURE-----




Reply to: