Your message dated Fri, 22 Jul 2016 17:26:14 +0000 with message-id <E1bQeDG-0007NI-8t@franck.debian.org> and subject line Bug#822997: fixed in openssh 1:7.2p2-6 has caused the Debian Bug report #822997, regarding Fix debian/watch for openssh to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 822997: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822997 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: Fix debian/watch for openssh
- From: Nicholas Luedtke <nicholas.luedtke@hpe.com>
- Date: Fri, 29 Apr 2016 13:39:01 -0600
- Message-id: <5723B855.3060709@hpe.com>
Package: openssh Version: 1:7.2p2-4 Tags: patch The watch file for openssh has recently stop working possibly due to a change in the upstream site. Switching from ftp to http solves this issue. Output from uscan is below and patch is attached. Uscan with current watchfile: /openssh-7.2p2$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=pgpsigurlmangle=s/$/.asc/ ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz uscan warning: In watchfile debian/watch, reading FTP directory ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ failed: 503 Service Unavailable -- Scan finished Uscan with change: /openssh-7.2p2$ uscan --report --verbose -- Scanning for watchfiles in . -- Found watchfile in ./debian -- In debian/watch, processing watchfile line: opts=pgpsigurlmangle=s/$/.asc/ http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz -- Found the following matching hrefs: openssh-2.1.1p4.tar.gz (2.1.1p4) openssh-2.2.0p1.tar.gz (2.2.0p1) openssh-2.3.0p1.tar.gz (2.3.0p1) openssh-2.5.1p1.tar.gz (2.5.1p1) openssh-2.5.1p2.tar.gz (2.5.1p2) openssh-2.5.2p1.tar.gz (2.5.2p1) openssh-2.5.2p2.tar.gz (2.5.2p2) openssh-2.9.9p1.tar.gz (2.9.9p1) ... openssh-7.0p1.tar.gz (7.0p1) openssh-7.1p1.tar.gz (7.1p1) openssh-7.1p2.tar.gz (7.1p2) openssh-7.2p1.tar.gz (7.2p1) openssh-7.2p2.tar.gz (7.2p2) Newest version on remote site is 7.2p2, local version is 7.2p2 => Package is up to date -- Scan finished -- Nicholas Luedtke HPE Linux, Hewlett-Packard Enterprisediff -urN openssh-7.2p2/debian/watch openssh-7.2p2/debian/watch --- openssh-7.2p2/debian/watch 2016-04-29 13:29:14.907535336 -0600 +++ openssh-7.2p2/debian/watch 2016-04-29 13:29:48.131535091 -0600 @@ -1,3 +1,3 @@ version=3 opts=pgpsigurlmangle=s/$/.asc/ \ -ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gz +http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-(.*)\.tar\.gzAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 822997-close@bugs.debian.org
- Subject: Bug#822997: fixed in openssh 1:7.2p2-6
- From: Colin Watson <cjwatson@debian.org>
- Date: Fri, 22 Jul 2016 17:26:14 +0000
- Message-id: <E1bQeDG-0007NI-8t@franck.debian.org>
Source: openssh Source-Version: 1:7.2p2-6 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 822997@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 22 Jul 2016 17:06:19 +0100 Source: openssh Binary: openssh-client openssh-client-ssh1 openssh-server openssh-sftp-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source Version: 1:7.2p2-6 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-ssh1 - secure shell (SSH) client for legacy SSH1 protocol openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) openssh-sftp-server - secure shell (SSH) sftp server module, for SFTP access from remot ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 714526 751636 766887 822997 823827 831902 Changes: openssh (1:7.2p2-6) unstable; urgency=medium . * debian/watch: Switch to HTTP (thanks, Nicholas Luedtke; closes: #822997). * Copy summary of supported SFTP protocol versions from upstream's PROTOCOL file into the openssh-sftp-server package description (closes: #766887). * Set SSH_PROGRAM=/usr/bin/ssh1 when building openssh-client-ssh1 so that scp1 works (reported by Olivier MATZ). * Retroactively add a NEWS.Debian entry for the UseDNS change in 6.9 (see LP #1588457). * CVE-2016-6210: Mitigate user enumeration via covert timing channel (closes: #831902). * Backport upstream patch to close ControlPersist background process stderr when not in debug mode or when logging to a file or syslog (closes: #714526). * Add a session cleanup script and a systemd unit file to trigger it, which serves to terminate SSH sessions cleanly if systemd doesn't do that itself, often because libpam-systemd is not installed (thanks, Vivek Das Mohapatra, Tom Hutter, and others; closes: #751636). * Stop generating DSA host keys by default (thanks, Santiago Vila; closes: #823827). Checksums-Sha1: 2170a722d423c610aebff6c7d46851fb88316348 2837 openssh_7.2p2-6.dsc 74c23afda7155665754613e32106434aa5ae105f 154028 openssh_7.2p2-6.debian.tar.xz Checksums-Sha256: 2e071288cb930a73414d8cd2c4050b8db583970df13ec7ee47a0150c87b8382e 2837 openssh_7.2p2-6.dsc d02a0ad674537b470348807e522496f3c06f7893bfd11b5de809a9cfa5b1176f 154028 openssh_7.2p2-6.debian.tar.xz Files: 6b199afe03c15f81d0e758383fee1200 2837 net standard openssh_7.2p2-6.dsc 15f3b542b8e3378a329acd5eb86ac9a8 154028 net standard openssh_7.2p2-6.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iQIVAwUBV5JHkDk1h9l9hlALAQj+hQ/+PBz3IIxgy7hxdy/H+j3nIBIk6nhRV3By gVQIkNo7t0mnSlfQmQtyVrdzuPuiwItLgYzhNOODIyAqNBxuQVLbv3bNH1Y9n3Do 2SB+KTAxHoKIqF2323r1n0OjIlpot7aI8uX6jZ+Cv5BMQwwtZMqgmlwJll1PUeSL LVbGVOwy3iOZcNpSAWi7LRcoRMdsNi5myqFB03exOq3026zDmjGEUgrpJC6Dhjyi lQ64vS/neB97Ww8XtWRclmdnTA0d2VuTS5uvzTGVihV2VZtaRi6WTl4kbiABYRES YnYFcKQnV4rI7yXTGLXzBeSmWowanzeGW8ppFg3HYQx43rR9pJ/UYX/g2PVVqVvx Y+W9t10AMX7Fn9PnbY905nAig4kp3GgOWqV5tTaaupVzWXlPIlOmKNvvfnuCJJDk P3U5vIMueTt+7FOapcbj6MnMktLeoqwrij0alD4CiLF0KTo1PCLM/mkQY76tBwEP UcbSMBlFhsy4OBLq3qOR017NSo1TXdfSF7CpA/VB9bzbJkHULuVs17G/oHhBV4X/ 6QH1AiH0bLReuTxCqbD/uoIjMbOkCjvUHCUbXGdXSMctyv1zYiw7uZJwpB6XU0Do vmuKMn2IoDtow5OlSD0akLRaXTaNCH2N8Kg5pgPVzIG5XUiJZWoS4U6b8lzuzctz /2yteQ0fDcQ= =33BL -----END PGP SIGNATURE-----
--- End Message ---