[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#310489: marked as done (ssh: need to binNMU - requires next MU version)



Your message dated Mon, 27 Jun 2005 13:55:56 -0600
with message-id <1119902156.30720.40.camel@krebs.dannf>
and subject line fyi, discussion upstream
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 May 2005 07:08:27 +0000
>From dannf@hp.com Mon May 16 00:08:27 2005
Return-path: <dannf@hp.com>
Received: from atlrel9.hp.com [156.153.255.214] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DXZSC-0008LQ-00; Sun, 15 May 2005 23:51:52 -0700
Received: from smtp2.fc.hp.com (smtp.fc.hp.com [15.15.136.253])
	by atlrel9.hp.com (Postfix) with ESMTP id 4839A11DE1
	for <submit@bugs.debian.org>; Mon, 16 May 2005 02:51:51 -0400 (EDT)
Received: from ldl.fc.hp.com (ldl.fc.hp.com [15.11.146.30])
	by smtp2.fc.hp.com (Postfix) with ESMTP
	id B4FC041E4AC; Mon, 16 May 2005 00:51:50 -0600 (MDT)
Received: from localhost (localhost [127.0.0.1])
	by ldl.fc.hp.com (Postfix) with ESMTP id 777DD1340F2;
	Mon, 16 May 2005 00:51:50 -0600 (MDT)
Received: from ldl.fc.hp.com ([127.0.0.1])
	by localhost (ldl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP
	id 21563-02; Mon, 16 May 2005 00:51:49 -0600 (MDT)
Received: from krebs (krebs.dannf [10.8.0.7])
	by ldl.fc.hp.com (Postfix) with ESMTP id 453731340D4;
	Mon, 16 May 2005 00:51:49 -0600 (MDT)
Received: by krebs (Postfix, from userid 20800)
	id 0CB553B64EF; Mon, 16 May 2005 00:53:50 -0600 (MDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: dann frazier <dannf@hp.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libssl0.9.7: upgrade breaks ssh on ia64
X-Mailer: reportbug 3.12
Date: Mon, 16 May 2005 00:53:50 -0600
Message-Id: <20050516065350.0CB553B64EF@krebs>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at ldl.fc.hp.com
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: libssl0.9.7
Version: 0.9.7g-1
Severity: important
Tags: sid

I upgraded a couple sid/ia64 systems, and the ssh client became non-functional.
Reverting to the previous libssl0.9.7 package fixes it.

dannf@biglpk:/var/cache/apt/archives$ ssh lart.lart
check_host_key: getnameinfo failed
dannf@biglpk:/var/cache/apt/archives$ ssh -v lart.lart
OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7g 11 Apr 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to lart.lart [10.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/dannf/.ssh/identity type -1
debug1: identity file /home/dannf/.ssh/id_rsa type 1
debug1: identity file /home/dannf/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
check_host_key: getnameinfo failed
dannf@biglpk:/var/cache/apt/archives$ sudo dpkg -i libssl0.9.7_0.9.7e-3_ia64.deb
dpkg - warning: downgrading libssl0.9.7 from 0.9.7g-1 to 0.9.7e-3.
(Reading database ... 121963 files and directories currently installed.)
Preparing to replace libssl0.9.7 0.9.7g-1 (using libssl0.9.7_0.9.7e-3_ia64.deb) ...
Unpacking replacement libssl0.9.7 ...
Setting up libssl0.9.7 (0.9.7e-3) ...

dannf@biglpk:/var/cache/apt/archives$ ssh -v lart.lart OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7e 25 Oct 2004
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to lart.lart [10.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/dannf/.ssh/identity type -1
debug1: identity file /home/dannf/.ssh/id_rsa type 1
debug1: identity file /home/dannf/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'lart.lart' is known and matches the RSA host key.
debug1: Found key in /home/dannf/.ssh/known_hosts:7
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /home/dannf/.ssh/identity
debug1: Offering public key: /home/dannf/.ssh/id_rsa
debug1: Server accepts key: pkalg ssh-rsa blen 149
debug1: PEM_read_PrivateKey failed
debug1: read PEM private key done: type <unknown>
Enter passphrase for key '/home/dannf/.ssh/id_rsa':



-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: ia64
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-3-mckinley
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libssl0.9.7 depends on:
ii  debconf [debconf-2.0]       1.4.49       Debian configuration management sy
ii  libc6.1                     2.3.2.ds1-22 GNU C Library: Shared libraries an

-- debconf information:
* libssl0.9.7/restart-services: ssh

---------------------------------------
Received: (at 310489-done) by bugs.debian.org; 27 Jun 2005 19:53:50 +0000
>From dannf@hp.com Mon Jun 27 12:53:50 2005
Return-path: <dannf@hp.com>
Received: from atlrel8.hp.com [156.153.255.206] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Dmzfy-0003kP-00; Mon, 27 Jun 2005 12:53:50 -0700
Received: from smtp1.fc.hp.com (smtp.fc.hp.com [15.11.136.119])
	by atlrel8.hp.com (Postfix) with ESMTP id C847D3024;
	Mon, 27 Jun 2005 15:53:49 -0400 (EDT)
Received: from ldl.fc.hp.com (ldl.fc.hp.com [15.11.146.30])
	by smtp1.fc.hp.com (Postfix) with ESMTP
	id 5F4D03BF34; Mon, 27 Jun 2005 19:53:49 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
	by ldl.fc.hp.com (Postfix) with ESMTP id 3B4A51341D9;
	Mon, 27 Jun 2005 13:53:49 -0600 (MDT)
Received: from ldl.fc.hp.com ([127.0.0.1])
	by localhost (ldl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP
	id 06305-01; Mon, 27 Jun 2005 13:53:48 -0600 (MDT)
Received: from krebs.dannf (lart.fc.hp.com [15.11.146.31])
	by ldl.fc.hp.com (Postfix) with ESMTP id 16D571340D4;
	Mon, 27 Jun 2005 13:53:48 -0600 (MDT)
Subject: fyi, discussion upstream
From: dann frazier <dannf@hp.com>
To: 309274@bugs.debian.org
Cc: 310489-done@bugs.debian.org
Content-Type: text/plain
Date: Mon, 27 Jun 2005 13:55:56 -0600
Message-Id: <1119902156.30720.40.camel@krebs.dannf>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.2 
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at ldl.fc.hp.com
Delivered-To: 310489-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
	version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Since this doesn't look like an ssh bug, I'm closing the bug against ssh
(but leaving the openssl one open).

some upstream discussion:
  http://groups-beta.google.com/group/mailing.openssl.dev/browse_frm/thread/16ac0cabe6567a37/ad624b3b254a7a93?q=rc4+ia64&rnum=9#ad624b3b254a7a93
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=310489




Reply to: