[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1100948: marked as done (dropbear 2025.87 changes break OpenSSH's regression test suite)



Your message dated Thu, 20 Mar 2025 23:36:44 +0000
with message-id <E1tvPRM-00FSdE-VN@fasolo.debian.org>
and subject line Bug#1100948: fixed in openssh 1:9.9p2-2
has caused the Debian Bug report #1100948,
regarding dropbear 2025.87 changes break OpenSSH's regression test suite
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1100948: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100948
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: openssh
Version: 1:9.9p2-1
Severity: important
Tags: patch fixed-upstream

Hi,

Since 2025.87-1 dropbear(8) and dbclient(1) are now built without
support for the ‘hmac-sha1’ integrity algorithm, ‘ssh-rsa’ key
algorithm, and ‘diffie-hellman-group14-sha1’ key exchange algorithm.

That change broke OpenSSH's regression test suite (regress/dropbear-*.sh),
hence its autopkgtests.  OpenSSH upstream has a patch available at:

    https://github.com/openssh/openssh-portable/commit/97e10c0005a784622c61cb4e8bb7858b410bbcc6

Indeed, applying this change fixes OpenSSH's autopkgtest.

I (dropbear maintainer) didn't foresee breakage in other packages,
apologies for that.

-- 
Guilhem.

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:9.9p2-2
Done: Colin Watson <cjwatson@debian.org>

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1100948@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 20 Mar 2025 23:12:58 +0000
Source: openssh
Architecture: source
Version: 1:9.9p2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 1098760 1100948
Changes:
 openssh (1:9.9p2-2) unstable; urgency=medium
 .
   * Simplify most autopkgtests using needs-sudo restriction.
   * Remove obsolete slogin symlink (closes: #1098760).
   * Check if dbclient supports SHA1 before trying SHA1-based KEX (closes:
     #1100948).
Checksums-Sha1:
 ce62b9c9a0e0ebbc2c13b37ea30bd12d1a1708c0 3466 openssh_9.9p2-2.dsc
 98070027d1cc2f0db269862632da8b47a2f1a4e6 196324 openssh_9.9p2-2.debian.tar.xz
Checksums-Sha256:
 07c25a5189faa05dbacede72c48d017616f94223799a21618a781341e41cf1fb 3466 openssh_9.9p2-2.dsc
 b39f0d09d9b1fbddcc4f8326a3f913de0b71d5f10973c06d7750ce1970aa5d8e 196324 openssh_9.9p2-2.debian.tar.xz
Files:
 291c5adb7d12df9026699b417d1870c8 3466 net standard openssh_9.9p2-2.dsc
 33c3f620f5363b60fe597e9e76cacf8d 196324 net standard openssh_9.9p2-2.debian.tar.xz


-----BEGIN PGP SIGNATURE-----
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=iBv7
-----END PGP SIGNATURE-----

Attachment: pgpLYYn2q5caf.pgp
Description: PGP signature


--- End Message ---

Reply to: