[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#797964: marked as done (openssh-client: ssh client with enabled compression wrong debug output)



Your message dated Sat, 24 Jun 2017 14:51:38 +0000
with message-id <E1dOmPS-000H1d-D5@fasolo.debian.org>
and subject line Bug#797964: fixed in openssh 1:7.4p1-10+deb9u1
has caused the Debian Bug report #797964,
regarding openssh-client: ssh client with enabled compression wrong debug output
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
797964: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797964
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-client
Version: 1:6.9p1-1
Severity: minor
Tags: upstream

Dear Maintainer,

When running ssh with verbose output and enabled compression
(ssh -v -C foo@bar.example) after the exit of the remote program the ssh client
is supposed to output the number of transferred bytes.

Connection to bar.example closed.
Transferred: sent 232132, received 843904 bytes, in 7006.0 seconds
Bytes per second: sent 33.1, received 120.5
debug1: Exit status 0
debug1: compress outgoing: raw data 132597, compressed 53344, factor 0.40
debug1: compress incoming: raw data 53344, compressed 132597, factor 2.49

At the bottom the compress incoming line just repeats the values of the
previous outgoing line in different order, instead of displaying the real
values.

Greetings
Haegar



-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (101, 'experimental')
Architecture: i386 (x86_64)
Foreign Architectures: amd64

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: sysvinit (via /sbin/init)

Versions of packages openssh-client depends on:
ii  adduser           3.113+nmu3
ii  dpkg              1.18.2
ii  libc6             2.19-19
ii  libedit2          3.1-20150325-1
ii  libgssapi-krb5-2  1.13.2+dfsg-2
ii  libselinux1       2.3-2+b1
ii  libssl1.0.0       1.0.2d-1
ii  passwd            1:4.2-3
ii  zlib1g            1:1.2.8.dfsg-2+b1

Versions of packages openssh-client recommends:
ii  xauth  1:1.0.9-1

Versions of packages openssh-client suggests:
pn  keychain      <none>
pn  libpam-ssh    <none>
pn  monkeysphere  <none>
ii  ssh-askpass   1:1.2.4.1-9

-- Configuration Files:
/etc/ssh/ssh_config changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:7.4p1-10+deb9u1

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 797964@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 18 Jun 2017 01:11:26 +0100
Source: openssh
Binary: openssh-client openssh-client-ssh1 openssh-server openssh-sftp-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source
Version: 1:7.4p1-10+deb9u1
Distribution: stretch
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
 openssh-client - secure shell (SSH) client, for secure access to remote machines
 openssh-client-ssh1 - secure shell (SSH) client for legacy SSH1 protocol
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell (SSH) server, for secure access from remote machines
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 openssh-sftp-server - secure shell (SSH) sftp server module, for SFTP access from remot
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 797964
Changes:
 openssh (1:7.4p1-10+deb9u1) stretch; urgency=medium
 .
   * Fix incoming compression statistics (thanks, Russell Coker; closes:
     #797964).
Checksums-Sha1:
 26cc728b055374dbe3ea52201b1e4800d43341b2 2924 openssh_7.4p1-10+deb9u1.dsc
 a44cc5f01c6ae29e0c139216f9b531e486f3df76 161232 openssh_7.4p1-10+deb9u1.debian.tar.xz
 b8e8bcaa3df6fef91381d2d253bb5b71c8ee3e58 13824 openssh_7.4p1-10+deb9u1_source.buildinfo
Checksums-Sha256:
 f9e868b52dec07d978670e079e66e0c40fcb35d7da3eb78e4120918600fea990 2924 openssh_7.4p1-10+deb9u1.dsc
 57732801db296491b5628a59473c0a302e3b7afc736047d522487f9f6b279ba2 161232 openssh_7.4p1-10+deb9u1.debian.tar.xz
 f96cf0027adfa196532ac888d39e0c55eae78e38e8df17121145326dff5d5ade 13824 openssh_7.4p1-10+deb9u1_source.buildinfo
Files:
 5187edcfda70abd3ace77c91490412d7 2924 net standard openssh_7.4p1-10+deb9u1.dsc
 d5038d5e1c6977bf149ccb1109b65e29 161232 net standard openssh_7.4p1-10+deb9u1.debian.tar.xz
 7a7804f1ed8de4e1d6b8c13729e9b5d0 13824 net standard openssh_7.4p1-10+deb9u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=LKG4
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: