[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#310489: marked as done (ssh: need to binNMU - requires next MU version)



Your message dated Wed, 07 Sep 2005 09:17:13 -0700
with message-id <E1ED2bp-0001UG-00@spohr.debian.org>
and subject line Bug#310489: fixed in openssl 0.9.7g-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 May 2005 07:08:27 +0000
>From dannf@hp.com Mon May 16 00:08:27 2005
Return-path: <dannf@hp.com>
Received: from atlrel9.hp.com [156.153.255.214] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DXZSC-0008LQ-00; Sun, 15 May 2005 23:51:52 -0700
Received: from smtp2.fc.hp.com (smtp.fc.hp.com [15.15.136.253])
	by atlrel9.hp.com (Postfix) with ESMTP id 4839A11DE1
	for <submit@bugs.debian.org>; Mon, 16 May 2005 02:51:51 -0400 (EDT)
Received: from ldl.fc.hp.com (ldl.fc.hp.com [15.11.146.30])
	by smtp2.fc.hp.com (Postfix) with ESMTP
	id B4FC041E4AC; Mon, 16 May 2005 00:51:50 -0600 (MDT)
Received: from localhost (localhost [127.0.0.1])
	by ldl.fc.hp.com (Postfix) with ESMTP id 777DD1340F2;
	Mon, 16 May 2005 00:51:50 -0600 (MDT)
Received: from ldl.fc.hp.com ([127.0.0.1])
	by localhost (ldl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP
	id 21563-02; Mon, 16 May 2005 00:51:49 -0600 (MDT)
Received: from krebs (krebs.dannf [10.8.0.7])
	by ldl.fc.hp.com (Postfix) with ESMTP id 453731340D4;
	Mon, 16 May 2005 00:51:49 -0600 (MDT)
Received: by krebs (Postfix, from userid 20800)
	id 0CB553B64EF; Mon, 16 May 2005 00:53:50 -0600 (MDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: dann frazier <dannf@hp.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libssl0.9.7: upgrade breaks ssh on ia64
X-Mailer: reportbug 3.12
Date: Mon, 16 May 2005 00:53:50 -0600
Message-Id: <20050516065350.0CB553B64EF@krebs>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at ldl.fc.hp.com
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: libssl0.9.7
Version: 0.9.7g-1
Severity: important
Tags: sid

I upgraded a couple sid/ia64 systems, and the ssh client became non-functional.
Reverting to the previous libssl0.9.7 package fixes it.

dannf@biglpk:/var/cache/apt/archives$ ssh lart.lart
check_host_key: getnameinfo failed
dannf@biglpk:/var/cache/apt/archives$ ssh -v lart.lart
OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7g 11 Apr 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to lart.lart [10.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/dannf/.ssh/identity type -1
debug1: identity file /home/dannf/.ssh/id_rsa type 1
debug1: identity file /home/dannf/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
check_host_key: getnameinfo failed
dannf@biglpk:/var/cache/apt/archives$ sudo dpkg -i libssl0.9.7_0.9.7e-3_ia64.deb
dpkg - warning: downgrading libssl0.9.7 from 0.9.7g-1 to 0.9.7e-3.
(Reading database ... 121963 files and directories currently installed.)
Preparing to replace libssl0.9.7 0.9.7g-1 (using libssl0.9.7_0.9.7e-3_ia64.deb) ...
Unpacking replacement libssl0.9.7 ...
Setting up libssl0.9.7 (0.9.7e-3) ...

dannf@biglpk:/var/cache/apt/archives$ ssh -v lart.lart OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7e 25 Oct 2004
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to lart.lart [10.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/dannf/.ssh/identity type -1
debug1: identity file /home/dannf/.ssh/id_rsa type 1
debug1: identity file /home/dannf/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'lart.lart' is known and matches the RSA host key.
debug1: Found key in /home/dannf/.ssh/known_hosts:7
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /home/dannf/.ssh/identity
debug1: Offering public key: /home/dannf/.ssh/id_rsa
debug1: Server accepts key: pkalg ssh-rsa blen 149
debug1: PEM_read_PrivateKey failed
debug1: read PEM private key done: type <unknown>
Enter passphrase for key '/home/dannf/.ssh/id_rsa':



-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: ia64
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-3-mckinley
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libssl0.9.7 depends on:
ii  debconf [debconf-2.0]       1.4.49       Debian configuration management sy
ii  libc6.1                     2.3.2.ds1-22 GNU C Library: Shared libraries an

-- debconf information:
* libssl0.9.7/restart-services: ssh

---------------------------------------
Received: (at 310489-close) by bugs.debian.org; 7 Sep 2005 16:24:44 +0000
>From katie@spohr.debian.org Wed Sep 07 09:24:44 2005
Return-path: <katie@spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1ED2bp-0001UG-00; Wed, 07 Sep 2005 09:17:13 -0700
From: Christoph Martin <christoph.martin@uni-mainz.de>
To: 310489-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#310489: fixed in openssl 0.9.7g-2
Message-Id: <E1ED2bp-0001UG-00@spohr.debian.org>
Sender: Archive Administrator <katie@spohr.debian.org>
Date: Wed, 07 Sep 2005 09:17:13 -0700
Delivered-To: 310489-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 4

Source: openssl
Source-Version: 0.9.7g-2

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.7-udeb_0.9.7g-2_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.7-udeb_0.9.7g-2_i386.udeb
libssl-dev_0.9.7g-2_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.7g-2_i386.deb
libssl0.9.7_0.9.7g-2_i386.deb
  to pool/main/o/openssl/libssl0.9.7_0.9.7g-2_i386.deb
openssl_0.9.7g-2.diff.gz
  to pool/main/o/openssl/openssl_0.9.7g-2.diff.gz
openssl_0.9.7g-2.dsc
  to pool/main/o/openssl/openssl_0.9.7g-2.dsc
openssl_0.9.7g-2_i386.deb
  to pool/main/o/openssl/openssl_0.9.7g-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 310489@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Martin <christoph.martin@uni-mainz.de> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  7 Sep 2005 15:32:54 +0200
Source: openssl
Binary: libssl-dev openssl libcrypto0.9.7-udeb libssl0.9.7
Architecture: source i386
Version: 0.9.7g-2
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>
Changed-By: Christoph Martin <christoph.martin@uni-mainz.de>
Description: 
 libcrypto0.9.7-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.7 - SSL shared libraries
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 239956 309274 310184 310489 316689 318750 321721
Changes: 
 openssl (0.9.7g-2) unstable; urgency=low
 .
   * really include nl translation
   * remove special ia64 code from rc4 code to make the abi compatible to
     older 0.9.7 versions (closes: #310489, #309274)
   * fix compile flag for debian-ppc64 (closes: #318750)
   * small fix in libssl0.9.7.postinst (closes: #239956)
   * fix pk7_mime.c to prevent garbled messages because of to early memory
     free (closes: #310184)
   * include vietnamese debconf translation (closes: #316689)
   * make optimized i386 libraries have non executable stack (closes:
     #321721)
   * remove leftover files from ssleay
   * move from dh_installmanpages to dh_installman
   * change Maintainer to pkg-openssl-devel@lists.alioth.debian.org
Files: 
 4efa686485ac94f65ebdfdcc1184b69f 714 utils optional openssl_0.9.7g-2.dsc
 b59f4086f4dca850f7a0a1e86f654a38 29026 utils optional openssl_0.9.7g-2.diff.gz
 1536ad0806b8d8162cc0479b3189877c 916774 utils optional openssl_0.9.7g-2_i386.deb
 38b964c2bfb987edfc33d6d6065d3c7a 2284028 libs standard libssl0.9.7_0.9.7g-2_i386.deb
 4b827dbcd9cb663d35b9e269620f5679 457138 debian-installer optional libcrypto0.9.7-udeb_0.9.7g-2_i386.udeb
 c2e71be1fdfded36e744b6df3148430b 2572166 libdevel optional libssl-dev_0.9.7g-2_i386.deb
package-type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDHvgUgeVih7XOVJcRAj+pAKCZ74plvBNpE+s6rGH++muIO8lLsgCghDGQ
Sf0Fc6p6rbJ42W/NDJC4Z7A=
=Ejgt
-----END PGP SIGNATURE-----




Reply to: