Your message dated Thu, 09 Oct 2025 00:20:07 +0000 with message-id <E1v6eO7-00E0nF-0p@fasolo.debian.org> and subject line Bug#1117574: fixed in openssh 1:10.1p1-2 has caused the Debian Bug report #1117574, regarding openssh-client: interactive session traffic slow and erratic to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1117574: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117574 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: openssh-client: interactive session traffic slow and erratic
- From: Francesc Zacarias <fzacarias3k@gmail.com>
- Date: Wed, 08 Oct 2025 11:45:02 +0200
- Message-id: <[🔎] 175991670298.8090.13401191249125922759.reportbug@baal>
Package: openssh-client Version: 1:10.1p1-1 Severity: grave Justification: renders package unusable X-Debbugs-Cc: fzacarias3k@gmail.com Dear Maintainer, * What led up to the situation? Installing the latest openssh-client package in unstable (1:10.1p1-1). all * What exactly did you do (or not do) that was effective (or ineffective)? My interactive connections to SSH servers are not working well. All keys and commands are being displayed with a very long delay. The connection seems to freeze, but if I type a lot of keys, my previous commands are eventually displayed. I suspect this is related to the IP QoS changes introduced in openssh 10.1. Sending many keys/commands causes a local buffer to fill and the packet eventually gets sent. But this is not a sustainable way to use SSH interactively. Tried different settings for the IPQoS option, but it did not make a difference. Reverting to a previous version of the package (openssh-client 1:10.0p1-8 from testing/forky) fixed the issue. -- System Information: Debian Release: forky/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.16.10+deb14-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages openssh-client depends on: ii adduser 3.153 ii init-system-helpers 1.69 ii libc6 2.41-12 ii libedit2 3.1-20250104-1 ii libfido2-1 1.16.0-2 ii libgssapi-krb5-2 1.21.3-5 ii libselinux1 3.8.1-1 ii libssl3t64 3.5.4-1 ii passwd 1:4.18.0-1 ii zlib1g 1:1.3.dfsg+really1.3.1-1+b1 Versions of packages openssh-client recommends: ii xauth 1:1.1.2-1.1 Versions of packages openssh-client suggests: pn keychain <none> pn libpam-ssh <none> pn monkeysphere <none> pn ssh-askpass <none> -- no debconf information
--- End Message ---
--- Begin Message ---
- To: 1117574-close@bugs.debian.org
- Subject: Bug#1117574: fixed in openssh 1:10.1p1-2
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Thu, 09 Oct 2025 00:20:07 +0000
- Message-id: <E1v6eO7-00E0nF-0p@fasolo.debian.org>
- Reply-to: Colin Watson <cjwatson@debian.org>
Source: openssh Source-Version: 1:10.1p1-2 Done: Colin Watson <cjwatson@debian.org> We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1117574@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 09 Oct 2025 00:54:25 +0100 Source: openssh Architecture: source Version: 1:10.1p1-2 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Closes: 1117574 1117594 Changes: openssh (1:10.1p1-2) unstable; urgency=medium . * Don't reuse c->isatty for signalling that the remote channel has a tty attached (closes: #1117574, #1117594). * Link ssh-keygen directly against ssh-pkcs11.c. Checksums-Sha1: 578bd4007e3505334ff4a1572784702492f9a13b 3654 openssh_10.1p1-2.dsc 1741da614d417ad096cec66edfc0d0315800737f 200372 openssh_10.1p1-2.debian.tar.xz 44f3697d2b951e029cb67c8bcb70af06d72fd84f 5903300 openssh_10.1p1-2.git.tar.xz 5186b6565a192df2d6782800ae0ed457794db173 18224 openssh_10.1p1-2_source.buildinfo Checksums-Sha256: 892d67278ff329be90166a13d7082aa7cd0ea0b5d262461865fc27e1aa062ad6 3654 openssh_10.1p1-2.dsc e7bee9a63c6f7ce70a41c314344aa52ca05cbcda987d63cd6559152f155a0bed 200372 openssh_10.1p1-2.debian.tar.xz fae51dfd4492bef7e0aa9cdfce520de01e308fe7948a6109cc061e82231f4f49 5903300 openssh_10.1p1-2.git.tar.xz f9763565d0d05b3a72d2efe058427428442a80691eeb022e188400cec0e6da20 18224 openssh_10.1p1-2_source.buildinfo Files: a921d1a0abbbd69a5516e78f879296a1 3654 net standard openssh_10.1p1-2.dsc fc4386189d04b63ae58408ce5b98c82d 200372 net standard openssh_10.1p1-2.debian.tar.xz aea5e42775033de86baf6e4968650304 5903300 net standard openssh_10.1p1-2.git.tar.xz 91022a018b275c11144ede90b77d15e9 18224 net standard openssh_10.1p1-2_source.buildinfo Git-Tag-Info: tag=33c021362ac506111e178e031e13add40122ca97 fp=ac0a4ff12611b6fccf01c111393587d97d86500b Git-Tag-Tagger: Colin Watson <cjwatson@debian.org> -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEN02M5NuW6cvUwJcqYG0ITkaDwHkFAmjm+iQACgkQYG0ITkaD wHmKuhAAiQ11CWujqQIbb21NzHDztRKDLYEmxt+jXvsDbqTuqybtU0J7qATaIrMZ kK/Thf2dFqoZpZbVY0AoVEn3G050pgLsg6oukGXqktoYhkM0yeb1mqXR3oYOhjSk wLlDrFfnQEFyWQkKkQYn+GkvSu4QSwrKIzUM98QsMz6CasLakQNXfOx5J+a/rRU6 VTn5wkDgE1X6hPMwzNwYgVCOjtAYLEbn58liNh5770qXLKWpX3Jqolos/UbwVaCy a2uR2zU8J3y32Nsn9iwHSkjgqVFkNyV9gn9QxHyezg+cSuC7TbsmpEQqaqO4zpZc VRsLD73LSfCHAmwDfcYjmKyU1pqmBTTCz5j6uMNDbc+JW+ZWTVUIaI73Ojkkcml7 bklLWNKCAuSXJGz3CpHkYjrZSQ9ZObi+qyt5WEb6e7tSvYvOXeW50tVmCEhRqkfT fAmOUholuTcGdlXW+PP2oMvNbm+Bs/mR/rMqH+ooaC9XXT7QyQZZN3ueFlQSLqsG IUURAujFAJ4zgBKJnzsvbDp4wSEmsgWf1H5VPRZVgKA++a6rCGN7kArhpmk145Ub qtJQB4uvTePmAo+vdrOHaEeSMxmpoFylpN7Vx9Nf4AzL1aX+9ZhDgUrqdl42/OKx 5GMzL56k712nJ9dHx5/kT68K0fnzU8DdKSc8bJP7jPQPDvy38gQ= =JI8D -----END PGP SIGNATURE-----Attachment: pgp5iMsEJcZ5u.pgp
Description: PGP signature
--- End Message ---