Bug#620428: marked as done (ssh-copy-id: Fails if the -i argument contains a space)
Your message dated Tue, 07 May 2013 12:55:34 +0000
with message-id <E1UZhQc-0003dz-MR@franck.debian.org>
and subject line Bug#620428: fixed in openssh 1:6.2p1-1
has caused the Debian Bug report #620428,
regarding ssh-copy-id: Fails if the -i argument contains a space
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
620428: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620428
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ssh-copy-id: Fails if the -i argument contains a space
- From: Conrad Irwin <conrad.irwin@gmail.com>
- Date: Fri, 01 Apr 2011 13:50:42 -0700
- Message-id: <20110401205042.31619.97913.reportbug@rapportive.jelzo.com>
Package: openssh-client
Version: 1:5.5p1-6
Severity: normal
If the path to the desired identity file contains a space, ssh-copy-id fails.
This is due to lack of escaping combined with the eval command on line 28:
I've worked around this by changing:
- GET_ID="cat ${ID_FILE}"
+ GET_ID="cat \"${ID_FILE}\""
(though I think that will break still if the filename is particularly obnoxious).
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (650, 'testing'), (600, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages openssh-client depends on:
ii adduser 3.112+nmu2 add and remove users and groups
ii debconf [debconf-2.0 1.5.38 Debian configuration management sy
ii dpkg 1.15.8.10 Debian package management system
ii libc6 2.11.2-11 Embedded GNU C Library: Shared lib
ii libedit2 2.11-20080614-2 BSD editline and history libraries
ii libgssapi-krb5-2 1.8.3+dfsg-4 MIT Kerberos runtime libraries - k
ii libssl0.9.8 0.9.8o-5 SSL shared libraries
ii passwd 1:4.1.4.2+svn3283-3 change and administer password and
ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime
Versions of packages openssh-client recommends:
ii openssh-blacklist 0.4.1 list of default blacklisted OpenSS
ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op
ii xauth 1:1.0.5-1 X authentication utility
Versions of packages openssh-client suggests:
pn keychain <none> (no description available)
pn libpam-ssh <none> (no description available)
pn ssh-askpass <none> (no description available)
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:6.2p1-1
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 620428@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 07 May 2013 11:48:16 +0100
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source i386 all
Version: 1:6.2p1-1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
openssh-client - secure shell (SSH) client, for secure access to remote machines
openssh-client-udeb - secure shell client for the Debian installer (udeb)
openssh-server - secure shell (SSH) server, for secure access from remote machines
openssh-server-udeb - secure shell server for the Debian installer (udeb)
ssh - secure shell client and server (metapackage)
ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
ssh-krb5 - secure shell client and server (transitional package)
Closes: 99785 195716 322228 543683 620428 694282 698612 700102 703906
Changes:
openssh (1:6.2p1-1) unstable; urgency=low
.
* New upstream release (http://www.openssh.com/txt/release-6.2).
- Add support for multiple required authentication in SSH protocol 2 via
an AuthenticationMethods option (closes: #195716).
- Fix Sophie Germain formula in moduli(5) (closes: #698612).
- Update ssh-copy-id to Phil Hands' greatly revised version (closes:
#99785, #322228, #620428; LP: #518883, #835901, #1074798).
* Use dh-autoreconf.
.
openssh (1:6.1p1-4) experimental; urgency=low
.
[ Gunnar Hjalmarsson ]
* debian/openssh-server.sshd.pam: Explicitly state that ~/.pam_environment
should be read, and move the pam_env calls from "auth" to "session" so
that it's also read when $HOME is encrypted (LP: #952185).
.
[ Stéphane Graber ]
* Add ssh-agent upstart user job. This implements something similar to
the 90x11-common_ssh-agent Xsession script. That is, start ssh-agent
and set the appropriate environment variables (closes: #703906).
.
openssh (1:6.1p1-3) experimental; urgency=low
.
* Give ssh and ssh-krb5 versioned dependencies on openssh-client and
openssh-server, to try to reduce confusion when people run 'apt-get
install ssh' or similar and expect that to upgrade everything relevant.
* CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups
to 10:30:100 (closes: #700102).
.
openssh (1:6.1p1-2) experimental; urgency=low
.
* Use xz compression for binary packages.
* Merge from Ubuntu:
- Add support for registering ConsoleKit sessions on login. (This is
currently enabled only when building for Ubuntu.)
- Drop openssh-blacklist and openssh-blacklist-extra to Suggests. It's
been long enough since the relevant vulnerability that we shouldn't
need these installed by default nowadays.
- Add an Upstart job (not currently used by default in Debian).
- Add mention of ssh-keygen in ssh connect warning (Scott Moser).
- Install apport hooks.
* Only build with -j if DEB_BUILD_OPTIONS=parallel=* is used (closes:
#694282).
.
openssh (1:6.1p1-1) experimental; urgency=low
.
* New upstream release (http://www.openssh.com/txt/release-6.1).
- Enable pre-auth sandboxing by default for new installs.
- Allow "PermitOpen none" to refuse all port-forwarding requests
(closes: #543683).
Checksums-Sha1:
fa861bfb805fdfd14c4d93d524abf7bd56f6f291 2571 openssh_6.2p1-1.dsc
8824708c617cc781b2bb29fa20bd905fd3d2a43d 1182181 openssh_6.2p1.orig.tar.gz
1716b29f18e418910eb45850a6bc97b79d07f708 253160 openssh_6.2p1-1.debian.tar.gz
7539a09daa8375089b7a08d2124ad32e6c57b829 1086718 openssh-client_6.2p1-1_i386.deb
4308c9f20a51fcab882273cae0d8d8ecbf16285a 362284 openssh-server_6.2p1-1_i386.deb
84d879ab5ae464ae12c2b5c5334ea95ca7684763 1254 ssh_6.2p1-1_all.deb
8b2ec2b991fff57a0c3a48fabd76c0eb9942cc5e 101876 ssh-krb5_6.2p1-1_all.deb
0752b7533ed37ad335b76d84eb3db89b420477ff 109810 ssh-askpass-gnome_6.2p1-1_i386.deb
69db2b682845d901d044aea876a0e53d7e09599a 183294 openssh-client-udeb_6.2p1-1_i386.udeb
e652c1a1ac7e027f8c03e7e0977418dfce38a72f 208760 openssh-server-udeb_6.2p1-1_i386.udeb
Checksums-Sha256:
910abdd79783349f54a83205d3233b5ccb3b08e5bf99180a3b1cf8ef8bbcfa16 2571 openssh_6.2p1-1.dsc
58690267d7455f444e87c2f8cd9be91fc686ffc0c02d1ebd0be2ab68149f7160 1182181 openssh_6.2p1.orig.tar.gz
858f20d3b10bb1f64a574d5c0641b001526994a2c5f1a2707c3825b51a3334a7 253160 openssh_6.2p1-1.debian.tar.gz
ab1cdd11f86a17f8bd0fff079a7cf67dee2a615611d0d9ce34b5c9995117ceb0 1086718 openssh-client_6.2p1-1_i386.deb
93ceedd92401e5d928c7d9f1d5f55df7147f38d3af62717ec2291f9e5dba1810 362284 openssh-server_6.2p1-1_i386.deb
8042151502df487ea65c89fa3826e5972d78be8e17ca11e6f4ca5b2fe1e73d21 1254 ssh_6.2p1-1_all.deb
e244b416d77b4afd03298a97bfbb0a4958a9aa415fafc24e56e24ef741b7a105 101876 ssh-krb5_6.2p1-1_all.deb
2ec6983294aeda09c0a12feea306aa145367e989d5e9b434bb6d05bca1efc005 109810 ssh-askpass-gnome_6.2p1-1_i386.deb
e3a0ae7d9638e264bd72a6f0cae0cb64291b17e796c3b866be0f76f1e6b84551 183294 openssh-client-udeb_6.2p1-1_i386.udeb
e18ddbba2db08553e853990c18e223ec3d36269a4ea00f539e44d83d3861c187 208760 openssh-server-udeb_6.2p1-1_i386.udeb
Files:
165e43b1f52c115f70274d030d4f28b1 2571 net standard openssh_6.2p1-1.dsc
7b2d9dd75b5cf267ea1737ec75500316 1182181 net standard openssh_6.2p1.orig.tar.gz
06e274652f701c0af1ddeceebd323f33 253160 net standard openssh_6.2p1-1.debian.tar.gz
e1165d97fdef5abb0ab7ab473047164e 1086718 net standard openssh-client_6.2p1-1_i386.deb
b237a9c4d53be3fb23cd1a955078b2b3 362284 net optional openssh-server_6.2p1-1_i386.deb
4afdb945f5405655192cecd80c08f5f8 1254 net extra ssh_6.2p1-1_all.deb
5d766d9ed36265bc0488c2fdae730d42 101876 oldlibs extra ssh-krb5_6.2p1-1_all.deb
f3aab7545b3d803772ec933d0c9bbbfa 109810 gnome optional ssh-askpass-gnome_6.2p1-1_i386.deb
355c20e7de2737837e5aea07d2dd5c98 183294 debian-installer optional openssh-client-udeb_6.2p1-1_i386.udeb
024ac709abec738ad59d541544a3e51e 208760 debian-installer optional openssh-server-udeb_6.2p1-1_i386.udeb
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer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=hUBq
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: