[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#165185: marked as done (Feature Request: idle-timeout)



Your message dated Thu, 14 Mar 2024 11:06:41 +0000
with message-id <E1rkiv3-00Bdhm-3D@fasolo.debian.org>
and subject line Bug#165185: fixed in openssh 1:9.7p1-1
has caused the Debian Bug report #165185,
regarding Feature Request: idle-timeout
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
165185: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=165185
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: ssh
Severity: wishlist
Version: 1:3.4p1-1

Since ssh-nonfree was removed from archive, there is no ssh which
supports the idle-timeout feature especially for non-interactive
sessions. So please include the patch which was discussed on debian-ssh
a while ago. See the thread beginning with:

http://lists.debian.org/debian-ssh/2002/debian-ssh-200204/msg00000.html

and the patches:

http://lists.debian.org/debian-ssh/2002/debian-ssh-200204/msg00010.html
http://lists.debian.org/debian-ssh/2002/debian-ssh-200204/msg00012.html

Christoph

Attachment: signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:9.7p1-1
Done: Colin Watson <cjwatson@debian.org>

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 165185@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 14 Mar 2024 10:47:58 +0000
Source: openssh
Architecture: source
Version: 1:9.7p1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 165185
Changes:
 openssh (1:9.7p1-1) unstable; urgency=medium
 .
   * Add the isolation-container restriction to the "regress" autopkgtest.
     Our setup code wants to ensure that the haveged service is running, and
     furthermore at least the agent-subprocess test assumes that there's an
     init to reap zombie processes and doesn't work in (e.g.)
     autopkgtest-virt-unshare.
   * New upstream release (https://www.openssh.com/releasenotes.html#9.7p1):
     - ssh(1), sshd(8): add a "global" ChannelTimeout type that watches all
       open channels and will close all open channels if there is no traffic
       on any of them for the specified interval. This is in addition to the
       existing per-channel timeouts added recently.
       This supports situations like having both session and x11 forwarding
       channels open where one may be idle for an extended period but the
       other is actively used. The global timeout could close both channels
       when both have been idle for too long (closes: #165185).
     - All: make DSA key support compile-time optional, defaulting to on.
     - sshd(8): don't append an unnecessary space to the end of subsystem
       arguments (bz3667)
     - ssh(1): fix the multiplexing "channel proxy" mode, broken when
       keystroke timing obfuscation was added. (GHPR#463)
     - ssh(1), sshd(8): fix spurious configuration parsing errors when
       options that accept array arguments are overridden (bz3657).
     - ssh-agent(1): fix potential spin in signal handler (bz3670)
     - Many fixes to manual pages and other documentation.
     - Greatly improve interop testing against PuTTY.
   * Skip utimensat test on ZFS, since it seems to leave the atime set to 0.
   * Allow passing extra options to debian/tests/regress, for debugging.
   * Fix gssapi-keyex declaration, broken when rebasing onto 8.9p1
     (LP: #2053146).
Checksums-Sha1:
 912777d7f3046a5e4c7a38a1c1dd1c0c53f2b150 3341 openssh_9.7p1-1.dsc
 ce8985ea0ea2f16a5917fd982ade0972848373cc 1848766 openssh_9.7p1.orig.tar.gz
 6848845450c5d5776afd10f8217f870d320cc4d5 833 openssh_9.7p1.orig.tar.gz.asc
 a6ffc7b07bb10dd9ccf2a3bf51d8624dab7a567a 189172 openssh_9.7p1-1.debian.tar.xz
Checksums-Sha256:
 bf4210730fa33dda0d252065149c55a15af22b5fe88a3f32e9cbcc2c101f41e1 3341 openssh_9.7p1-1.dsc
 490426f766d82a2763fcacd8d83ea3d70798750c7bd2aff2e57dc5660f773ffd 1848766 openssh_9.7p1.orig.tar.gz
 9cee21fd45be07747fa82cd799e4cd8d14203165834d6fc7ccbcf60718901489 833 openssh_9.7p1.orig.tar.gz.asc
 06eb60929833f523e19469ab78d68adab27867f76bdecb2e2e6212e3551c44ec 189172 openssh_9.7p1-1.debian.tar.xz
Files:
 3e94c7e4f9081c6d68e9c4270660b314 3341 net standard openssh_9.7p1-1.dsc
 1100f170ca1bc669038ca3743e074094 1848766 net standard openssh_9.7p1.orig.tar.gz
 d741ad3a505e35f9bb4ae0a8208cf5d9 833 net standard openssh_9.7p1.orig.tar.gz.asc
 dca2d48cfe52563e0490fed5997c95c4 189172 net standard openssh_9.7p1-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Rrlo
-----END PGP SIGNATURE-----

Attachment: pgp1QHM6Pwfah.pgp
Description: PGP signature


--- End Message ---

Reply to: