[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#819213: marked as done (Wrong homepage for OpenSSH packages)



Your message dated Wed, 13 Apr 2016 16:39:37 +0000
with message-id <E1aqNpJ-0008U5-Aa@franck.debian.org>
and subject line Bug#819213: fixed in openssh 1:7.2p2-3
has caused the Debian Bug report #819213,
regarding Wrong homepage for OpenSSH packages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
819213: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819213
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 7.2p2-2

I recently noticed that the Debian OpenSSH packages list the homepage
as http://www.openssh.org/; this is owned by a third party, it does
currently return an HTTP 302 redirect to the real homepage, but it
would be safer not to rely on this.

Please replace it with the correct homepage, http://www.openssh.com/.
Thanks!


$ whois openssh.org
Domain Name: OPENSSH.ORG
Domain ID: D11370632-LROR
WHOIS Server:
Referral URL: http://www.mijninternetoplossing.nl
Updated Date: 2016-03-24T18:24:54Z
Creation Date: 1999-10-16T00:38:18Z
Registry Expiry Date: 2017-10-16T00:38:18Z
Sponsoring Registrar: Mijn InternetOplossing B.V.
Sponsoring Registrar IANA ID: 1587
Domain Status: clientTransferProhibited
https://www.icann.org/epp#clientTransferProhibited
Domain Status: serverTransferProhibited
https://www.icann.org/epp#serverTransferProhibited
Domain Status: transferPeriod https://www.icann.org/epp#transferPeriod
Registrant ID: MIO_52707295
Registrant Name: domains at sabotage.org
Registrant Organization: Societe Anonyme Botage
Registrant Street: Funenpark 441
Registrant City: Amsterdam
Registrant State/Province: Noord-Holland
Registrant Postal Code: 1018 AK
Registrant Country: NL
Registrant Phone: +31.651108221
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: domains@sabotage.org
Admin ID: MIO_52707385
Admin Name: domains at sabotage.org
Admin Organization: Societe Anonyme Botage
Admin Street: Funenpark 441
Admin City: Amsterdam
Admin State/Province: Noord-Holland
Admin Postal Code: 1018 AK
Admin Country: NL
Admin Phone: +31.651108221
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: domains@sabotage.org
Tech ID: MIO_52707385
Tech Name: domains at sabotage.org
Tech Organization: Societe Anonyme Botage
Tech Street: Funenpark 441
Tech City: Amsterdam
Tech State/Province: Noord-Holland
Tech Postal Code: 1018 AK
Tech Country: NL
Tech Phone: +31.651108221
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: domains@sabotage.org
Name Server: DNS.SABOTAGE.ORG
Name Server: DNS.ZEDZ.NET
DNSSEC: unsigned

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:7.2p2-3

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 819213@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 13 Apr 2016 16:42:28 +0100
Source: openssh
Binary: openssh-client openssh-client-ssh1 openssh-server openssh-sftp-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source
Version: 1:7.2p2-3
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
 openssh-client - secure shell (SSH) client, for secure access to remote machines
 openssh-client-ssh1 - secure shell (SSH) client for legacy SSH1 protocol
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell (SSH) server, for secure access from remote machines
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 openssh-sftp-server - secure shell (SSH) sftp server module, for SFTP access from remot
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 819213
Changes:
 openssh (1:7.2p2-3) unstable; urgency=high
 .
   * Change all openssh.org references to openssh.com (closes: #819213).
   * CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes.
Checksums-Sha1:
 1783fd0a3b423b0961999747abbadd86e655f8ab 2837 openssh_7.2p2-3.dsc
 b7602945685018026eec0a2b58216d7251e665f0 149620 openssh_7.2p2-3.debian.tar.xz
Checksums-Sha256:
 179eafc3082dc16f1b11b9a7de20dcc29216c51e30433c5c886fc093d21890a9 2837 openssh_7.2p2-3.dsc
 3576a2f75550738376a9f971bbd47e0f9fb6887fadbbe5e2bfa8814fe3edc28f 149620 openssh_7.2p2-3.debian.tar.xz
Files:
 09dbbd857ae900e19129c5bcdfbe5344 2837 net standard openssh_7.2p2-3.dsc
 d6e81950c2c29fe8b660612fab7c0f7c 149620 net standard openssh_7.2p2-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer
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=zt+B
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: