Your message dated Fri, 02 Aug 2024 16:43:16 +0000 with message-id <E1sZvN6-004npm-ER@fasolo.debian.org> and subject line Bug#1077799: fixed in openssh 1:9.8p1-2 has caused the Debian Bug report #1077799, regarding openssh-server: cannot login anymore: error "kex_exchange_identification: read: Connection reset by peer" to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1077799: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077799 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: openssh-server: cannot login anymore: error "kex_exchange_identification: read: Connection reset by peer"
- From: Andrea Zagli <azagli@libero.it>
- Date: Fri, 02 Aug 2024 15:47:02 +0200
- Message-id: <[🔎] 87bk2bavft.fsf@deimos.saetta.homelinux.org>
Package: openssh-server Version: 1:9.8p1-1 Severity: important Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.9.12-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_FIRMWARE_WORKAROUND Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages openssh-server depends on: ii adduser 3.137 ii debconf [debconf-2.0] 1.5.87 ii init-system-helpers 1.66 ii libaudit1 1:3.1.2-4+b1 ii libc6 2.39-6 ii libcom-err2t64 [libcom-err2] 1.47.0-2.3+b1 ii libcrypt1 1:4.4.36-4 ii libgssapi-krb5-2 1.21.3-3 ii libkrb5-3 1.21.3-3 ii libpam-modules 1.5.3-7 ii libpam-runtime 1.5.3-7 ii libpam0g 1.5.3-7 ii libselinux1 3.5-2+b3 ii libssl3t64 3.2.2-1 ii libwrap0 7.6.q-33 ii lsb-base 11.6 ii openssh-client 1:9.8p1-1 ii openssh-sftp-server 1:9.8p1-1 ii procps 2:4.0.4-5 ii runit-helper 2.16.3 ii sysvinit-utils [lsb-base] 3.09-2 ii ucf 3.0043+nmu1 ii zlib1g 1:1.3.dfsg+really1.3.1-1 Versions of packages openssh-server recommends: ii libpam-systemd [logind] 256.4-2 ii ncurses-term 6.5-2 ii xauth 1:1.1.2-1 Versions of packages openssh-server suggests: pn molly-guard <none> pn monkeysphere <none> pn ssh-askpass <none> pn ufw <none> -- debconf information excluded
--- End Message ---
--- Begin Message ---
- To: 1077799-close@bugs.debian.org
- Subject: Bug#1077799: fixed in openssh 1:9.8p1-2
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 02 Aug 2024 16:43:16 +0000
- Message-id: <E1sZvN6-004npm-ER@fasolo.debian.org>
- Reply-to: Colin Watson <cjwatson@debian.org>
Source: openssh Source-Version: 1:9.8p1-2 Done: Colin Watson <cjwatson@debian.org> We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1077799@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 02 Aug 2024 17:08:58 +0100 Source: openssh Architecture: source Version: 1:9.8p1-2 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Closes: 1077765 1077799 Changes: openssh (1:9.8p1-2) unstable; urgency=medium . * Don't close sockets passed by systemd socket activation (closes: #1077765). * Add an autopkgtest for socket activation. * Consult /etc/hosts.{allow,deny} as "sshd", not "sshd-session" (closes: #1077799). Checksums-Sha1: c2bcdd65941ff9a32df77a0fa3b7848dbb20a07a 3313 openssh_9.8p1-2.dsc 5848eda296777a316c4816e2e21e3401340ba964 193024 openssh_9.8p1-2.debian.tar.xz Checksums-Sha256: 4f1c305da97adb31c01de4a754c550aad50d83863f93044921f774e708cb0adb 3313 openssh_9.8p1-2.dsc 2e1d130228e3b1696dc1e8482daba720f387207a2e910ef539ed4e00d158a013 193024 openssh_9.8p1-2.debian.tar.xz Files: 0af20577e237ae7c9a47c6055a00a5aa 3313 net standard openssh_9.8p1-2.dsc 09829f4309f7716ff7e507f02e1eb2fe 193024 net standard openssh_9.8p1-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmatBrwACgkQOTWH2X2G UAtUahAAg4xqwLI+AOA9G58b5aUGFFBD6m9ypwl9TMUL3ZoEtj/1aO8XUj5U7uFs vtnqzHO13rTJrFioG1sCDK9Bbr04jRg8LPzuh9vmbA4QCnHEvRE69QUrMSmluAuF UIaCnClVFAQQEEeOMJFOi+OVr62vPGh6VOU44ShGAFoJrVUMghn0mT9qNjRHidug TuW5Z+c/Wh94CgYiAaPlC5Pz2tU19iEgXBydm1uloOWYOBwh5FFkQ9B4JeUIexT/ 2nBF9Wz0RBYzlvgCJoOTI979tIQ0DmDfWTECZhVgGO5q4MNj1MiWPHeSQteJk7Mr HHV2e34JpZZ4o4E66MOR/SCjLD5G+vMiEZk9vMCcrJJBsllpwYXyBdwFnA8hWdT/ 0NZwP0x7bo7pOmZuGd7o0z+YG60EGomzttvOA6zLedK/cNQM6Q3WSZXSQYF+cj2c D/YoDSm9OOrLjX3slokCqcPpxPCNgKheOp8G7OwcJEDBjtOScK8ZwbKpzx0Yr+HG YJzHuQZ975YpgcWDKIyc1bIHYBocCyerB88KyWQpZ381MwR+Un0m7YGm+95SQjfV 15BWFqTm/A/46Tu3f4CvUc6cuUzxOt7XmU1VpbuMvcgkIBsLziFRWk6CjckOkrQc eNKwHU1A/pPtO1ycPs6dYMgQgFL2GOP3HzuPoNh7+oKZgv8jMzg= =4MVi -----END PGP SIGNATURE-----Attachment: pgpxoDH8sL22v.pgp
Description: PGP signature
--- End Message ---