Bug#402497: openssh-server: Upgrade from Sarge erases host keypairs
Package: openssh-server
Version: 1:4.3p2-6
Severity: grave
Justification: causes non-serious data loss
Hello,
Replacing Sarge "ssh" package with Etch "openssh-server" and
"openssh-client" package causes the host keypairs to be unduely
regenerated, and the old keys are permanently erased and lost.
This is very annoying for SSH users.
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.17.13
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Versions of packages openssh-server depends on:
ii adduser 3.63 Add and remove users and groups
ii debconf [debconf-2.0] 1.4.30.13 Debian configuration management sy
ii dpkg 1.13.24 package maintenance system for Deb
ii libc6 2.3.6.ds1-8 GNU C Library: Shared libraries
ii libcomerr2 1.37-2sarge1 common error description library
ii libkrb53 1.4.4-4 MIT Kerberos runtime libraries
ii libpam-modules 0.76-22 Pluggable Authentication Modules f
ii libpam-runtime 0.76-22 Runtime support for the PAM librar
ii libpam0g 0.76-22 Pluggable Authentication Modules l
ii libselinux1 1.32-3 SELinux shared libraries
ii libssl0.9.8 0.9.8c-4 SSL shared libraries
ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra
ii openssh-client 1:4.3p2-6 Secure shell client, an rlogin/rsh
ii zlib1g 1:1.2.2-4.sarge.2 compression library - runtime
-- debconf information:
ssh/new_config: true
* ssh/use_old_init_script: true
ssh/encrypted_host_key_but_no_keygen:
* ssh/disable_cr_auth: false
Reply to: