[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#738619: marked as done (Upper-case Host specification in .ssh/config doesn't work anymore in 6.5p1)



Your message dated Tue, 11 Feb 2014 12:33:48 +0000
with message-id <E1WDCX6-0004Mw-Lh@franck.debian.org>
and subject line Bug#738619: fixed in openssh 1:6.5p1-2
has caused the Debian Bug report #738619,
regarding Upper-case Host specification in .ssh/config doesn't work anymore in 6.5p1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
738619: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738619
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-client
Version: 1:6.5p1-1
Severity: important
Tags: upstream

Hi Colin,

Since the 6.5p1 update, uppercase "Host" specifications in .ssh/config
"don't work" anymore:

I had the following in my .ssh/config that allowed me to correctly
connect with 6.4p1:

	Host Icterus
	        HostName odyx.homelinux.org

With 6.5p1, this fails as follows:
$ ssh -vvvv Icterus
OpenSSH_6.5, OpenSSL 1.0.1f 6 Jan 2014
debug1: Reading configuration data /home/didier/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
ssh: Could not resolve hostname icterus: Name or service not known

While it worked with 6.4p1-2:
$ ssh -vvvv Icterus
OpenSSH_6.4, OpenSSL 1.0.1f 6 Jan 2014
debug1: Reading configuration data /home/didier/.ssh/config
debug1: /home/didier/.ssh/config line 1: Applying options for Icterus
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to odyx.homelinux.org

That's IMHO a regression, hence the "important" severity.

Cheers, 

OdyX

-- System Information:
Debian Release: jessie/sid
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'proposed-updates'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.12-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_CH.UTF-8, LC_CTYPE=fr_CH.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssh-client depends on:
ii  adduser           3.113+nmu3
ii  dpkg              1.17.6
ii  libc6             2.17-97
ii  libedit2          3.1-20130712-2
ii  libgssapi-krb5-2  1.12+dfsg-2
ii  libselinux1       2.2.2-1
ii  libssl1.0.0       1.0.1f-1
ii  passwd            1:4.1.5.1-1
ii  zlib1g            1:1.2.8.dfsg-1

Versions of packages openssh-client recommends:
ii  xauth  1:1.0.7-1

Versions of packages openssh-client suggests:
pn  keychain      <none>
pn  libpam-ssh    <none>
pn  monkeysphere  <none>
ii  ssh-askpass   1:1.2.4.1-9

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:6.5p1-2

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 738619@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 11 Feb 2014 11:28:35 +0000
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source i386 all
Version: 1:6.5p1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - secure shell (SSH) client, for secure access to remote machines
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell (SSH) server, for secure access from remote machines
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 738619
Changes: 
 openssh (1:6.5p1-2) unstable; urgency=medium
 .
   * Only enable ssh.service for systemd, not both ssh.service and
     ssh.socket.  Thanks to Michael Biebl for spotting this.
   * Backport upstream patch to unbreak case-sensitive matching of ssh_config
     (closes: #738619).
Checksums-Sha1: 
 6eade7785fbe4f39fc43bb6ef22b6631161f78a2 2580 openssh_6.5p1-2.dsc
 95b6b9cf224187bfc8fa8c940cdd04bf7476ed08 134772 openssh_6.5p1-2.debian.tar.xz
 2f4919830045948268c1dfe828f2ce9eec575cc1 661514 openssh-client_6.5p1-2_i386.deb
 f746b6a957aed159d60653040f9274ab3e0d6429 328662 openssh-server_6.5p1-2_i386.deb
 6a5b936203149205a188f33c5dc4af064fde5a59 1108 ssh_6.5p1-2_all.deb
 651e64fc047a52db109a44d69bb3a8b9dad107f1 100516 ssh-krb5_6.5p1-2_all.deb
 d9afec1599b017bf723db4aa48c96d65a78c92d8 108324 ssh-askpass-gnome_6.5p1-2_i386.deb
 1fa4bebad31822ee6a8966fd713557e9db9d6ed3 252040 openssh-client-udeb_6.5p1-2_i386.udeb
 93ef63cab0848b1d4818076a3787f7510d352a78 280446 openssh-server-udeb_6.5p1-2_i386.udeb
Checksums-Sha256: 
 9600d3b7e6184cec2b456b32fdacfd9ecc1628a9ccf316bf6e569f24e7c5790c 2580 openssh_6.5p1-2.dsc
 be1af083dad03d80c3a547c646c8b946ecfaac554f9cf9a43033f57067db1c45 134772 openssh_6.5p1-2.debian.tar.xz
 91111f31e5221863c3d76b75c0104b09044031000fb1c676a95ecf10948a64b2 661514 openssh-client_6.5p1-2_i386.deb
 599b45caceb05fa5980fa0ebe194a83644c9d7e1bb61e243a703562649f6bc49 328662 openssh-server_6.5p1-2_i386.deb
 8cfe3dd30be47089e2918b1c48dc3d0f6a861ea53424f03fc79cda892f8fb891 1108 ssh_6.5p1-2_all.deb
 cc01f299ef7ee528de23fb5b6134abfbe9476707b73d5dd2f2321e2d9748d1a1 100516 ssh-krb5_6.5p1-2_all.deb
 b92b460e01d6cfda2af1d1b7633f02df4aa4a4ce3d3af16d2dd9ec90d72f7072 108324 ssh-askpass-gnome_6.5p1-2_i386.deb
 2f6df9b36770dac360c00a2596144891e96593915b6e703cefb59fdca833547c 252040 openssh-client-udeb_6.5p1-2_i386.udeb
 01454b0cbbec3224e7562cb262e21cc7d85668bce86b194986f27b18ecc2bf09 280446 openssh-server-udeb_6.5p1-2_i386.udeb
Files: 
 fd42496baa24ca66c908a9f670aeb07f 2580 net standard openssh_6.5p1-2.dsc
 ac1e10930b76ae7d788e716863568fbd 134772 net standard openssh_6.5p1-2.debian.tar.xz
 25358a4812b52adef131f823bb120c76 661514 net standard openssh-client_6.5p1-2_i386.deb
 65134ebb2f1f3e38c15c701ec34377f5 328662 net optional openssh-server_6.5p1-2_i386.deb
 c4895b2270ae348a0fe013ee31536552 1108 net extra ssh_6.5p1-2_all.deb
 215e33b26e55c9c2ac212f1f9b438471 100516 oldlibs extra ssh-krb5_6.5p1-2_all.deb
 b2433d93987660926550afd24600dd1f 108324 gnome optional ssh-askpass-gnome_6.5p1-2_i386.deb
 cbe172ed898af8e41f3ddbcff0232046 252040 debian-installer optional openssh-client-udeb_6.5p1-2_i386.udeb
 bfef0fc0af4778ef042c26701363c05b 280446 debian-installer optional openssh-server-udeb_6.5p1-2_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer
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=NVKM
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: