[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#208648: marked as done (HOME does not work as advertised)



Your message dated Wed, 14 Sep 2005 08:02:06 -0700
with message-id <E1EFYly-0005J8-00@spohr.debian.org>
and subject line Bug#208648: fixed in openssh 1:4.2p1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Sep 2003 08:58:49 +0000
>From root@khms.westfalen.de Thu Sep 04 03:58:39 2003
Return-path: <root@khms.westfalen.de>
Received: from khms.westfalen.de [62.153.201.243] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 19upws-0002bN-00; Thu, 04 Sep 2003 03:58:39 -0500
Received: from root by khms.westfalen.de with local (Exim 4.22)
	id 19upwp-00048G-U4; Thu, 04 Sep 2003 10:58:35 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Kai Henningsen <kai-bugs@khms.westfalen.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: HOME does not work as advertised
X-Mailer: reportbug 2.26.1
Date: Thu, 04 Sep 2003 10:58:35 +0200
Message-Id: <E19upwp-00048G-U4@khms.westfalen.de>
Delivered-To: submit@bugs.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0
	tests=BAYES_20,HAS_PACKAGE
	version=2.53-bugs.debian.org_2003_8_27
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_8_27 (1.174.2.15-2003-03-30-exp)

Package: ssh
Version: 1:3.6.1p2-3
Severity: normal

The manpages claim ssh and utils use files under $HOME/..., but they all ignore
$HOME. It is not possible to get ssh&friends to use an alternate .ssh directory
by setting HOME.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux khms.westfalen.de 2.4.20+kai.59 #1 Son Jun 29 12:14:42 CEST 2003 i686
Locale: LANG=de_DE, LC_CTYPE=de_DE

Versions of packages ssh depends on:
ii  adduser                     3.50         Add and remove users and groups
ii  debconf                     1.3.8        Debian configuration management sy
ii  libc6                       2.3.2-5      GNU C Library: Shared libraries an
ii  libpam-modules              0.76-13      Pluggable Authentication Modules f
ii  libpam0g                    0.76-13      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7b-2     SSL shared libraries
ii  libwrap0                    7.6-ipv6.1-3 Wietse Venema's TCP wrappers libra
ii  zlib1g                      1:1.1.4-14   compression library - runtime

-- debconf information:
  ssh/insecure_rshd: 
* ssh/user_environment_tell: 
* ssh/forward_warning: 
* ssh/rootlogin_warning: 
* ssh/upgrade_to_openssh: true
* ssh/1023_bug_alert: 
* ssh/x11forward_warning: 
  ssh/encrypted_host_key_but_no_keygen: 
* ssh/run_sshd: true
  ssh/privsep_ask: true
  ssh/insecure_telnetd: 
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/keylength_bug_info: 
* ssh/SUID_client: true
* ssh/protocol2_default: 
* ssh/privsep_tell: 
* ssh/ssh2_keys_merged: 
  ssh/ancient_version: 
  ssh/protocol2_only: true


---------------------------------------
Received: (at 208648-close) by bugs.debian.org; 14 Sep 2005 15:08:12 +0000
>From katie@spohr.debian.org Wed Sep 14 08:08:12 2005
Return-path: <katie@spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1EFYly-0005J8-00; Wed, 14 Sep 2005 08:02:06 -0700
From: Colin Watson <cjwatson@debian.org>
To: 208648-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#208648: fixed in openssh 1:4.2p1-1
Message-Id: <E1EFYly-0005J8-00@spohr.debian.org>
Sender: Archive Administrator <katie@spohr.debian.org>
Date: Wed, 14 Sep 2005 08:02:06 -0700
Delivered-To: 208648-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: openssh
Source-Version: 1:4.2p1-1

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.2p1-1_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.2p1-1_powerpc.udeb
openssh-client_4.2p1-1_powerpc.deb
  to pool/main/o/openssh/openssh-client_4.2p1-1_powerpc.deb
openssh-server-udeb_4.2p1-1_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.2p1-1_powerpc.udeb
openssh-server_4.2p1-1_powerpc.deb
  to pool/main/o/openssh/openssh-server_4.2p1-1_powerpc.deb
openssh_4.2p1-1.diff.gz
  to pool/main/o/openssh/openssh_4.2p1-1.diff.gz
openssh_4.2p1-1.dsc
  to pool/main/o/openssh/openssh_4.2p1-1.dsc
openssh_4.2p1.orig.tar.gz
  to pool/main/o/openssh/openssh_4.2p1.orig.tar.gz
ssh-askpass-gnome_4.2p1-1_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.2p1-1_powerpc.deb
ssh_4.2p1-1_all.deb
  to pool/main/o/openssh/ssh_4.2p1-1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 208648@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 14 Sep 2005 15:16:14 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.2p1-1
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server - Secure shell server, an rshd replacement
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure shell client and server (transitional package)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 181162 208648 320104 324695 326065
Changes: 
 openssh (1:4.2p1-1) unstable; urgency=low
 .
   * New upstream release.
     - SECURITY: Fix a bug introduced in OpenSSH 4.0 that caused GatewayPorts
       to be incorrectly activated for dynamic ("-D") port forwardings when
       no listen address was explicitly specified (closes: #326065).
     - Add a new compression method ("Compression delayed") that delays zlib
       compression until after authentication, eliminating the risk of zlib
       vulnerabilities being exploited by unauthenticated users. Note that
       users of OpenSSH versions earlier than 3.5 will need to disable
       compression on the client or set "Compression yes" (losing this
       security benefit) on the server.
     - Increase the default size of new RSA/DSA keys generated by ssh-keygen
       from 1024 to 2048 bits (closes: #181162).
     - Many bugfixes and improvements to connection multiplexing.
     - Don't pretend to accept $HOME (closes: #208648).
   * debian/rules: Resynchronise CFLAGS with that generated by configure.
   * openssh-client and openssh-server conflict with pre-split ssh to avoid
     problems when ssh is left un-upgraded (closes: #324695).
   * Set X11Forwarding to yes in the default sshd_config (new installs only).
     At least when X11UseLocalhost is turned on, which is the default, the
     security risks of using X11 forwarding are risks to the client, not to
     the server (closes: #320104).
Files: 
 178047b053c1ccd0c09b5aa42c663da2 953 net standard openssh_4.2p1-1.dsc
 93295701e6bcd76fabd6a271654ed15c 928420 net standard openssh_4.2p1.orig.tar.gz
 de8b13991036a157fb89a1277c36ed70 153306 net standard openssh_4.2p1-1.diff.gz
 359f8fed6358af698de006f923175263 1052 net extra ssh_4.2p1-1_all.deb
 8d7e3e8de54516bfb1db71fa13049378 582104 net standard openssh-client_4.2p1-1_powerpc.deb
 dfd29170f38c83a123da23a0164c4f57 215660 net optional openssh-server_4.2p1-1_powerpc.deb
 f25a5d4fc687897338e15e6e40853eca 85428 gnome optional ssh-askpass-gnome_4.2p1-1_powerpc.deb
 243723651a92cd52e1f43a1d03155c4f 157496 debian-installer optional openssh-client-udeb_4.2p1-1_powerpc.udeb
 51bade95482a43d7e69a5a95c3400677 165090 debian-installer optional openssh-server-udeb_4.2p1-1_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDKDam9t0zAhD6TNERAuvRAJ4lO0peam3SlphI+YRp9ifRD3mhQQCfZsh1
dWajDTamDn77FM5FLgtTUd8=
=q11C
-----END PGP SIGNATURE-----




Reply to: