Your message dated Tue, 08 Feb 2011 11:18:29 +0000 with message-id <E1PmlaX-00024i-3Q@franck.debian.org> and subject line Bug#550262: fixed in openssh 1:5.8p1-2 has caused the Debian Bug report #550262, regarding all sessions should be slaves of a backgrounded master to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 550262: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550262 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: all sessions should be slaves of a backgrounded master
- From: martin f krafft <madduck@debian.org>
- Date: Thu, 8 Oct 2009 20:16:51 +0200
- Message-id: <20091008181651.GA4943@piper.oerlikon.madduck.net>
Package: openssh-client Version: 1:5.1p1-8 Severity: wishlist I think it would make a lot of sense if all sessions were slaves with ControlMaster auto, and ssh would just start a backgrounded master when necessary (and shut it down after a timeout when no longer needed (#500573)). This would fix #350898 and #550260, and kinda make #505657 obsolete. Thanks, -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.31-rc6-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages openssh-client depends on: ii adduser 3.111 add and remove users and groups ii debconf [debconf-2.0] 1.5.27 Debian configuration management sy ii dpkg 1.15.4 Debian package management system ii libc6 2.9-27 GNU C Library: Shared libraries ii libcomerr2 1.41.9-1 common error description library ii libedit2 2.11-20080614-1 BSD editline and history libraries ii libgssapi-krb5-2 1.7dfsg~beta3-1 MIT Kerberos runtime libraries - k ii libk5crypto3 1.7dfsg~beta3-1 MIT Kerberos runtime libraries - C ii libkrb5-3 1.7dfsg~beta3-1 MIT Kerberos runtime libraries ii libncurses5 5.7+20090803-2 shared libraries for terminal hand ii libssl0.9.8 0.9.8k-5 SSL shared libraries ii passwd 1:4.1.4.2-1 change and administer password and ii zlib1g 1:1.2.3.3.dfsg-15 compression library - runtime Versions of packages openssh-client recommends: ii openssh-blacklist 0.4.1 list of default blacklisted OpenSS ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op ii xauth 1:1.0.3-2 X authentication utility Versions of packages openssh-client suggests: ii gtk-led-askpass [ssh-askpass] 0.10-2 GTK+ password dialog suitable for pn keychain <none> (no description available) pn libpam-ssh <none> (no description available) -- debconf-show failed -- .''`. martin f. krafft <madduck@d.o> Related projects: : :' : proud Debian developer http://debiansystem.info `. `'` http://people.debian.org/~madduck http://vcs-pkg.org `- Debian - when you have better things to do than fixing systemsAttachment: digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)
--- End Message ---
--- Begin Message ---
- To: 550262-close@bugs.debian.org
- Subject: Bug#550262: fixed in openssh 1:5.8p1-2
- From: Colin Watson <cjwatson@debian.org>
- Date: Tue, 08 Feb 2011 11:18:29 +0000
- Message-id: <E1PmlaX-00024i-3Q@franck.debian.org>
Source: openssh Source-Version: 1:5.8p1-2 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive: openssh-client-udeb_5.8p1-2_i386.udeb to main/o/openssh/openssh-client-udeb_5.8p1-2_i386.udeb openssh-client_5.8p1-2_i386.deb to main/o/openssh/openssh-client_5.8p1-2_i386.deb openssh-server-udeb_5.8p1-2_i386.udeb to main/o/openssh/openssh-server-udeb_5.8p1-2_i386.udeb openssh-server_5.8p1-2_i386.deb to main/o/openssh/openssh-server_5.8p1-2_i386.deb openssh_5.8p1-2.debian.tar.gz to main/o/openssh/openssh_5.8p1-2.debian.tar.gz openssh_5.8p1-2.dsc to main/o/openssh/openssh_5.8p1-2.dsc ssh-askpass-gnome_5.8p1-2_i386.deb to main/o/openssh/ssh-askpass-gnome_5.8p1-2_i386.deb ssh-krb5_5.8p1-2_all.deb to main/o/openssh/ssh-krb5_5.8p1-2_all.deb ssh_5.8p1-2_all.deb to main/o/openssh/ssh_5.8p1-2_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 550262@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 08 Feb 2011 10:59:17 +0000 Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source i386 all Version: 1:5.8p1-2 Distribution: unstable Urgency: low Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 335697 350898 357469 454784 454787 500573 508613 523250 549858 550262 594687 Changes: openssh (1:5.8p1-2) unstable; urgency=low . * Upload to unstable. . openssh (1:5.8p1-1) experimental; urgency=low . * New upstream release (http://www.openssh.org/txt/release-5.8): - Fix stack information leak in legacy certificate signing (http://www.openssh.com/txt/legacy-cert.adv). . openssh (1:5.7p1-2) experimental; urgency=low . * Fix crash in ssh_selinux_setfscreatecon when SELinux is disabled (LP: #708571). . openssh (1:5.7p1-1) experimental; urgency=low . * New upstream release (http://www.openssh.org/txt/release-5.7): - Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. - sftp(1)/sftp-server(8): add a protocol extension to support a hard link operation. It is available through the "ln" command in the client. The old "ln" behaviour of creating a symlink is available using its "-s" option or through the preexisting "symlink" command. - scp(1): Add a new -3 option to scp: Copies between two remote hosts are transferred through the local host (closes: #508613). - ssh(1): "atomically" create the listening mux socket by binding it on a temporary name and then linking it into position after listen() has succeeded. This allows the mux clients to determine that the server socket is either ready or stale without races (closes: #454784). Stale server sockets are now automatically removed (closes: #523250). - ssh(1): install a SIGCHLD handler to reap expired child process (closes: #594687). - ssh(1)/ssh-agent(1): honour $TMPDIR for client xauth and ssh-agent temporary directories (closes: #357469, although only if you arrange for ssh-agent to actually see $TMPDIR since the setgid bit will cause it to be stripped off). * Update to current GSSAPI patch from http://www.sxw.org.uk/computing/patches/openssh-5.7p1-gsskex-all-20110125.patch: - Add GSSAPIServerIdentity option. * Generate ECDSA host keys on fresh installations. Upgraders who wish to add such host keys should manually add 'HostKey /etc/ssh/ssh_host_ecdsa_key' to /etc/ssh/sshd_config and run 'ssh-keygen -q -f /etc/ssh/sshd_config -N "" -t ecdsa'. * Build-depend on libssl-dev (>= 0.9.8g) to ensure sufficient ECC support. * Backport SELinux build fix from CVS. * Rearrange selinux-role.patch so that it links properly given this SELinux build fix. . openssh (1:5.6p1-3) experimental; urgency=low . * Drop override for desktop-file-but-no-dh_desktop-call, which Lintian no longer issues. * Merge 1:5.5p1-6. . openssh (1:5.6p1-2) experimental; urgency=low . * Backport upstream patch to install a SIGCHLD handler to reap expired ssh child processes, preventing lots of zombies when using ControlPersist (closes: #594687). . openssh (1:5.6p1-1) experimental; urgency=low . * New upstream release (http://www.openssh.com/txt/release-5.6): - Added a ControlPersist option to ssh_config(5) that automatically starts a background ssh(1) multiplex master when connecting. This connection can stay alive indefinitely, or can be set to automatically close after a user-specified duration of inactivity (closes: #335697, #350898, #454787, #500573, #550262). - Support AuthorizedKeysFile, AuthorizedPrincipalsFile, HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5) Match blocks (closes: #549858). - sftp(1): fix ls in working directories that contain globbing characters in their pathnames (LP: #530714). Checksums-Sha1: 243ba35ad64b66a099570d91915f41d25ebe36f1 2250 openssh_5.8p1-2.dsc 18f9499475c194eb40716f73ea3b8a7905097488 238036 openssh_5.8p1-2.debian.tar.gz eb1f36cf29c6859bb9830a34b88975100b68e10f 941674 openssh-client_5.8p1-2_i386.deb e0bd15ff844a541b03afa83da6a4582cf964cf5e 313454 openssh-server_5.8p1-2_i386.deb 303ed53962bf92b7b55a55f215825327699af38a 1246 ssh_5.8p1-2_all.deb fe333412406800307c9c0c6ffcbda6dbaaa8265f 74774 ssh-krb5_5.8p1-2_all.deb f8ee5dc3d5476878a3bae6c04bcd4a8d1c84183e 83148 ssh-askpass-gnome_5.8p1-2_i386.deb 8a89644c27601c81f21cfc61303f89dc16d070a8 211546 openssh-client-udeb_5.8p1-2_i386.udeb bec11600520c556af62fcf68fe796c5d173a1d60 238892 openssh-server-udeb_5.8p1-2_i386.udeb Checksums-Sha256: 67e4dee26382d40322ee513d1a754ad68cc6048f690922a324039e7abb990ad2 2250 openssh_5.8p1-2.dsc 206f49adec0b67fff7499e3453819d0b04934c7af71838aff5a03f31a365e860 238036 openssh_5.8p1-2.debian.tar.gz e0a4cb05a27590fcb02f01a17834fa9d69562f4d9452d47bc148d9b3d26ffe05 941674 openssh-client_5.8p1-2_i386.deb 82dd1ceeb6e454bd1f7044961d567b6fc1c2f2e104d74572d7f86a67558d6f6f 313454 openssh-server_5.8p1-2_i386.deb 18f1c866dd22f73a70f4e338c7aeb13c6815f2c45f8ae4cf501c395b1dfe7d50 1246 ssh_5.8p1-2_all.deb c721dbbac9dafd8593f20f6d86f5ebff9672972b792b028fc38a31066a4b2aeb 74774 ssh-krb5_5.8p1-2_all.deb d253e3ae1f770d18b876a0565d528164d50b704ee181b1e917441eaaccf15953 83148 ssh-askpass-gnome_5.8p1-2_i386.deb f0cfcc4b7be7a94f29578adccf656270d401effc98507f96476810a0dbd156e5 211546 openssh-client-udeb_5.8p1-2_i386.udeb d7264a665a8797a263c25cc830c5be58361e5843966bd81a1c980b97de9f29f9 238892 openssh-server-udeb_5.8p1-2_i386.udeb Files: a6a0ea7cc142d83954a6f1d4c797dac6 2250 net standard openssh_5.8p1-2.dsc 88944ccc0633544f8f853529b5424a0f 238036 net standard openssh_5.8p1-2.debian.tar.gz d561ef9b1f9be0755d07733607cea7b1 941674 net standard openssh-client_5.8p1-2_i386.deb 9e80fb08b6b286492bf97c59dd70d772 313454 net optional openssh-server_5.8p1-2_i386.deb 15c31538e493f1f0871c2c1cbc587407 1246 net extra ssh_5.8p1-2_all.deb d780bae5b9925e4f6839bf91e72d357b 74774 net extra ssh-krb5_5.8p1-2_all.deb ae3d144e3830236ec416a43585d776cb 83148 gnome optional ssh-askpass-gnome_5.8p1-2_i386.deb 806a9e44d723592a5a004c42f8a8afc0 211546 debian-installer optional openssh-client-udeb_5.8p1-2_i386.udeb 7ab03f7ffa65c3d13af4fa130b70bfe6 238892 debian-installer optional openssh-server-udeb_5.8p1-2_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iQIVAwUBTVEiyzk1h9l9hlALAQhAMw//fuqdekgw7L8hh0IWd6Fh1koKyX4dRPxL zCYzDsrUb15lU88EU1iktEUV3VCLL0iBuEj4kFtPS1YCaS4x9b6Jdxn9MJ3vQs9e 76IV9KiOpi/aXzJNa/p59HeW3bd4m8IWVdwZz3PiF5czepwu8o/SNCaufAFHxY3O 8QSLFszpfuO1Bi5/qNKAHfg8yqFK4Zo1U7VIcWuNfUQvvHug/4RgbXKml5DwHAtZ 46fCAIFfk4Wt541Zok+ZS0R3sDwyhvBa6gh1jtIR9pRCW/b7TNZk5Mej95AF4BiY CI5bchbZkU0G61PfWdDVcfquwF72OntP+MazXTbtxCrp/aV2W7AVyTgX2pmVuz32 ZxJY9BjYsiXMXPOq0v85wQp2T46lWJgoFtvlAzGL6jAjbu5PCSGQZV+ZLZmoRbbe bcJMNhMq0YqsD79pk/nEfJK2fYx0UykBkaSp0sP/Y7qI8Z0GW4e5KuZcPPtdrm5M 2pBwhSFcRsUSn1IWpOJXdIyfG3hoRyZl+scPREsj8eDFASnx1X6RmC237SsOd3Om uWOp/A64CrkpEi0XDAsjmVLwTpvU5IlukvOolWpmIehWZVPujvoHZPAY5EjziYE5 8YBJGJsR5nX6iM9FNRroRl+PSnjjtI/lc2LuQEizDu6snfLo5ecSRdzPcJK0Svzt MjE/121pqp4= =V6SG -----END PGP SIGNATURE-----
--- End Message ---