[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#402497: marked as done (openssh-server: Upgrade from Sarge erases host keypairs)



Your message dated Mon, 11 Dec 2006 10:03:24 +0000
with message-id <20061211100324.GV28442@riva.ucam.org>
and subject line Bug#402497: openssh-server: Upgrade from Sarge erases host keypairs
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: openssh-server
Version: 1:4.3p2-6
Severity: grave
Justification: causes non-serious data loss

	Hello,

Replacing Sarge "ssh" package with Etch "openssh-server" and
"openssh-client" package causes the host keypairs to be unduely
regenerated, and the old keys are permanently erased and lost.
This is very annoying for SSH users.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.17.13
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages openssh-server depends on:
ii  adduser                3.63              Add and remove users and groups
ii  debconf [debconf-2.0]  1.4.30.13         Debian configuration management sy
ii  dpkg                   1.13.24           package maintenance system for Deb
ii  libc6                  2.3.6.ds1-8       GNU C Library: Shared libraries
ii  libcomerr2             1.37-2sarge1      common error description library
ii  libkrb53               1.4.4-4           MIT Kerberos runtime libraries
ii  libpam-modules         0.76-22           Pluggable Authentication Modules f
ii  libpam-runtime         0.76-22           Runtime support for the PAM librar
ii  libpam0g               0.76-22           Pluggable Authentication Modules l
ii  libselinux1            1.32-3            SELinux shared libraries
ii  libssl0.9.8            0.9.8c-4          SSL shared libraries
ii  libwrap0               7.6.dbs-8         Wietse Venema's TCP wrappers libra
ii  openssh-client         1:4.3p2-6         Secure shell client, an rlogin/rsh
ii  zlib1g                 1:1.2.2-4.sarge.2 compression library - runtime

-- debconf information:
  ssh/new_config: true
* ssh/use_old_init_script: true
  ssh/encrypted_host_key_but_no_keygen:
* ssh/disable_cr_auth: false


--- End Message ---
--- Begin Message ---
On Sun, Dec 10, 2006 at 09:46:29PM +0100, Rémi Denis-Courmont wrote:
> Package: openssh-server
> Version: 1:4.3p2-6
> Severity: grave
> Justification: causes non-serious data loss
> 
> 	Hello,
> 
> Replacing Sarge "ssh" package with Etch "openssh-server" and
> "openssh-client" package causes the host keypairs to be unduely
> regenerated, and the old keys are permanently erased and lost.
> This is very annoying for SSH users.

Only if you --purge ssh during the upgrade, which will get done before
installing the new split packages, thereby unavoidably removing the old
configuration files. Don't do that. See bug #397439 for further details.

Cheers,

-- 
Colin Watson                                       [cjwatson@debian.org]

--- End Message ---

Reply to: