[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#402497: openssh-server: Upgrade from Sarge erases host keypairs

Package: openssh-server
Version: 1:4.3p2-6
Severity: grave
Justification: causes non-serious data loss


Replacing Sarge "ssh" package with Etch "openssh-server" and
"openssh-client" package causes the host keypairs to be unduely
regenerated, and the old keys are permanently erased and lost.
This is very annoying for SSH users.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages openssh-server depends on:
ii  adduser                3.63              Add and remove users and groups
ii  debconf [debconf-2.0]         Debian configuration management sy
ii  dpkg                   1.13.24           package maintenance system for Deb
ii  libc6                  2.3.6.ds1-8       GNU C Library: Shared libraries
ii  libcomerr2             1.37-2sarge1      common error description library
ii  libkrb53               1.4.4-4           MIT Kerberos runtime libraries
ii  libpam-modules         0.76-22           Pluggable Authentication Modules f
ii  libpam-runtime         0.76-22           Runtime support for the PAM librar
ii  libpam0g               0.76-22           Pluggable Authentication Modules l
ii  libselinux1            1.32-3            SELinux shared libraries
ii  libssl0.9.8            0.9.8c-4          SSL shared libraries
ii  libwrap0               7.6.dbs-8         Wietse Venema's TCP wrappers libra
ii  openssh-client         1:4.3p2-6         Secure shell client, an rlogin/rsh
ii  zlib1g                 1:1.2.2-4.sarge.2 compression library - runtime

-- debconf information:
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/disable_cr_auth: false

Reply to: