Your message dated Tue, 24 Aug 2010 00:02:21 +0000 with message-id <E1Ongy5-0001Ku-Ss@franck.debian.org> and subject line Bug#350898: fixed in openssh 1:5.6p1-1 has caused the Debian Bug report #350898, regarding background the control socket connection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 350898: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350898 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: background the control socket connection
- From: martin f krafft <madduck@debian.org>
- Date: Wed, 1 Feb 2006 14:39:34 +0100
- Message-id: <20060201133934.GA21962@lapse.madduck.net>
Package: ssh Version: 1:4.2p1-5 Severity: wishlist if I use control sockets and exit the first connection, the ssh process does not return until all other connections using the same control socket have been closed. of course, this makes sense. I wish that the master connection would either background itself when the user chooses to close the connection, or better yet: the first connection to any peer, which thus creates a control socket, should background the ssh process handling the control socket and spawn another ssh process that then uses the control socket. am i making any sense? if my suggestion is implemented, the following should not happen: lapse:~> (ssh dorian sleep 4 && echo "master returned: `date`") &; sleep 2; (ssh dorian sleep 4 && echo "second returned: `date`"); read second returned: Wed Feb 1 14:39:03 CET 2006 master returned: Wed Feb 1 14:39:03 CET 2006 instead, the second should return 2 seconds after the master. -- System Information: Debian Release: testing/unstable APT prefers stable APT policy: (700, 'stable'), (600, 'testing'), (98, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages ssh depends on: ii openssh-client 1:4.2p1-5 Secure shell client, an rlogin/rsh ii openssh-server 1:4.2p1-5 Secure shell server, an rshd repla ssh recommends no packages. -- debconf-show failed -- .''`. martin f. krafft <madduck@debian.org> : :' : proud Debian developer and author: http://debiansystem.info `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver! fashions have done more harm than revolutions. -- victor hugoAttachment: signature.asc
Description: Digital signature (GPG/PGP)
--- End Message ---
--- Begin Message ---
- To: 350898-close@bugs.debian.org
- Subject: Bug#350898: fixed in openssh 1:5.6p1-1
- From: Colin Watson <cjwatson@debian.org>
- Date: Tue, 24 Aug 2010 00:02:21 +0000
- Message-id: <E1Ongy5-0001Ku-Ss@franck.debian.org>
Source: openssh Source-Version: 1:5.6p1-1 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive: openssh-client-udeb_5.6p1-1_i386.udeb to main/o/openssh/openssh-client-udeb_5.6p1-1_i386.udeb openssh-client_5.6p1-1_i386.deb to main/o/openssh/openssh-client_5.6p1-1_i386.deb openssh-server-udeb_5.6p1-1_i386.udeb to main/o/openssh/openssh-server-udeb_5.6p1-1_i386.udeb openssh-server_5.6p1-1_i386.deb to main/o/openssh/openssh-server_5.6p1-1_i386.deb openssh_5.6p1-1.debian.tar.gz to main/o/openssh/openssh_5.6p1-1.debian.tar.gz openssh_5.6p1-1.dsc to main/o/openssh/openssh_5.6p1-1.dsc openssh_5.6p1.orig.tar.gz to main/o/openssh/openssh_5.6p1.orig.tar.gz ssh-askpass-gnome_5.6p1-1_i386.deb to main/o/openssh/ssh-askpass-gnome_5.6p1-1_i386.deb ssh-krb5_5.6p1-1_all.deb to main/o/openssh/ssh-krb5_5.6p1-1_all.deb ssh_5.6p1-1_all.deb to main/o/openssh/ssh_5.6p1-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 350898@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 24 Aug 2010 00:37:54 +0100 Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source i386 all Version: 1:5.6p1-1 Distribution: experimental Urgency: low Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 335697 350898 454787 500573 549858 550262 Changes: openssh (1:5.6p1-1) experimental; urgency=low . * New upstream release (http://www.openssh.com/txt/release-5.6): - Added a ControlPersist option to ssh_config(5) that automatically starts a background ssh(1) multiplex master when connecting. This connection can stay alive indefinitely, or can be set to automatically close after a user-specified duration of inactivity (closes: #335697, #350898, #454787, #500573, #550262). - Support AuthorizedKeysFile, AuthorizedPrincipalsFile, HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5) Match blocks (closes: #549858). - sftp(1): fix ls in working directories that contain globbing characters in their pathnames (LP: #530714). Checksums-Sha1: e18304779a8c7ae8ece0c4e4174cbadbaab95444 2251 openssh_5.6p1-1.dsc 347dd39c91c3529f41dae63714d452fb95efea1e 1117952 openssh_5.6p1.orig.tar.gz e5684e1362853302e70edcb834af87db48a497f2 235299 openssh_5.6p1-1.debian.tar.gz 0933f291e40fff6ecae7fde592aa19b94aefe499 899528 openssh-client_5.6p1-1_i386.deb 1453ef41f9cf7d6d3b0aa8d5ef558683065689ae 301116 openssh-server_5.6p1-1_i386.deb a32f400d23195ff9bd16498502ebcc014a623b9b 1242 ssh_5.6p1-1_all.deb ca943245abf59d51e260e7a3c82fa42a427df84d 102954 ssh-krb5_5.6p1-1_all.deb 74868b9f6edd455361852724882075aa4f63c184 110366 ssh-askpass-gnome_5.6p1-1_i386.deb f6abe6d20bfde446629e65757ffdd31f6349c7a2 198770 openssh-client-udeb_5.6p1-1_i386.udeb 9a5beb5c08fe0ffe7aa7c285ba60f426d3cb06a8 222878 openssh-server-udeb_5.6p1-1_i386.udeb Checksums-Sha256: 12fab1bd9edf33bbcd3a2808e7443fa040c4d8e17f589ba9613d817bf121e487 2251 openssh_5.6p1-1.dsc 538af53b2b8162c21a293bb004ae2bdb141abd250f61b4cea55244749f3c6c2b 1117952 openssh_5.6p1.orig.tar.gz 5af0105c72eee38af8619b906eddc428e3a9e86cd9916ee6139a8c59f3314191 235299 openssh_5.6p1-1.debian.tar.gz 187227671bdfcc3d4ffcebf95bb9eac51016d6aeb6053454aeeaa1bba1027b3d 899528 openssh-client_5.6p1-1_i386.deb 95c735254b22cf0e0caabaafd2e424520177aca7596ef05112af1ce2bbe4c52b 301116 openssh-server_5.6p1-1_i386.deb 8c25adb78c7dbc2ce62bb205772a0f1e30cca824a3f38a171ddd8815ddc7430e 1242 ssh_5.6p1-1_all.deb 5ced1c48c722771742dd260cf61d912c0c41ca53d0694f9b78dead14bf4c5f4b 102954 ssh-krb5_5.6p1-1_all.deb 4817b4503ca0f1e96e4b25f046cf65f708f513238fde57340dcb0ece96300b5b 110366 ssh-askpass-gnome_5.6p1-1_i386.deb 9156bb6d4388043826b61ffb7975f027c608d40ae5bfd744020f180c1cf83d85 198770 openssh-client-udeb_5.6p1-1_i386.udeb 0a2511d14af758ef8c77c6047262a548cc1cc0db3570d065e3a75bc3a269d9f3 222878 openssh-server-udeb_5.6p1-1_i386.udeb Files: 567aa4098adb222a220c13bb89f01e0f 2251 net standard openssh_5.6p1-1.dsc e6ee52e47c768bf0ec42a232b5d18fb0 1117952 net standard openssh_5.6p1.orig.tar.gz a0d941d78aad7839cb0c84805dff0b9a 235299 net standard openssh_5.6p1-1.debian.tar.gz 8aa7996bace06dad849fdafd01dcb97a 899528 net standard openssh-client_5.6p1-1_i386.deb d0ab84c1e4fdd1b02556397679fd485c 301116 net optional openssh-server_5.6p1-1_i386.deb 9bb3230a149c9000f1bb3135e52ab529 1242 net extra ssh_5.6p1-1_all.deb e1e38e99a481362c2c8887dc6b22789a 102954 net extra ssh-krb5_5.6p1-1_all.deb d4a2d2867f7815ca389fe02d3bc94300 110366 gnome optional ssh-askpass-gnome_5.6p1-1_i386.deb 172863fa89b4c2071354df7c1dada0d6 198770 debian-installer optional openssh-client-udeb_5.6p1-1_i386.udeb 451568610ad7a6ac4002e24df826cd28 222878 debian-installer optional openssh-server-udeb_5.6p1-1_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iQIVAwUBTHMIHzk1h9l9hlALAQgcmA/+KlY0zwd2tLaWjc+JDHD2siPz2S02EH0d E4GkH8Pm0xn7iUrlRcYyWY6xUMZW/CfwPAPcSfgvIBnB1O75tNSqnpXhjkyHThIY MywS8j/GtWSU62Vb/MJWstHYA/SV9xPM6b65/Ib7C2p6Nuj/s19iVTU35acg5rzX UbXtG/CDK8NScB+Q1GMj76pdoROF49PnQ2v9tFD3KSUgL+aLd5Xbr9HGa/me0Teo 0SgTfl4Pb0PNwOZWp13/9EaBL60Jov3evjsxGABSTmLDO8lUDEA3ARGRbVFFLNBG nOXlMqla/pTBuX3TAfm9HqeHT12nfUW/Xak8s/OVyw51Imf8OgeGeHbX/4j28Epm N1OQbvrImO30Frf5jgRnBbD6OQjYRxdwjUdXe5Ptqf51R4DT3NCEo1dl22HmWO29 fKLYRLfrAUfq4lOC9TT22YNCMh8g8V335XZ0Lfok/BBSpunDelDyO25918231pG/ tljdTn2KOM5qSNysE7MyQSJqf5L1WFpwQYfoj6pb2R15c4gSV3hQqbh+5EQbeKwA y8O88NQYfg+wu10MLHC5DR0S33p3+NznW3q3IvbfSOZd6CF54qk8No69QhsA0bnA JihC7HPBtwAWaPF3v+Hzl6B0XX6KnTHlQviLrE/TpQ0lhoaSbd5TcN5D0NE9kSaH HuzDM/bKu0c= =DX+3 -----END PGP SIGNATURE-----
--- End Message ---