[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1117594: marked as done (openssh-client: interactive session traffic slow and erratic)



Your message dated Thu, 09 Oct 2025 00:20:07 +0000
with message-id <E1v6eO7-00E0nK-0v@fasolo.debian.org>
and subject line Bug#1117594: fixed in openssh 1:10.1p1-2
has caused the Debian Bug report #1117594,
regarding openssh-client: interactive session traffic slow and erratic
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1117594: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117594
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-client
Version: 1:10.1p1-1
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: fzacarias3k@gmail.com

Dear Maintainer,

   * What led up to the situation?
     Installing the latest openssh-client package in unstable
     (1:10.1p1-1). all
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
     My interactive connections to SSH servers are not working well. All
     keys and commands are being displayed with a very long delay.
     The connection seems to freeze, but if I type a lot of keys, my
     previous commands are eventually displayed.
     I suspect this is related to the IP QoS changes introduced in openssh 10.1.
     Sending many keys/commands causes a local buffer to fill and the
     packet eventually gets sent. But this is not a sustainable way to
     use SSH interactively.

     Tried different settings for the IPQoS option, but it did not make a
     difference.

     Reverting to a previous version of the package
     (openssh-client 1:10.0p1-8 from testing/forky) fixed the issue.

-- System Information:
Debian Release: forky/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.16.10+deb14-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openssh-client depends on:
ii  adduser              3.153
ii  init-system-helpers  1.69
ii  libc6                2.41-12
ii  libedit2             3.1-20250104-1
ii  libfido2-1           1.16.0-2
ii  libgssapi-krb5-2     1.21.3-5
ii  libselinux1          3.8.1-1
ii  libssl3t64           3.5.4-1
ii  passwd               1:4.18.0-1
ii  zlib1g               1:1.3.dfsg+really1.3.1-1+b1

Versions of packages openssh-client recommends:
ii  xauth  1:1.1.2-1.1

Versions of packages openssh-client suggests:
pn  keychain      <none>
pn  libpam-ssh    <none>
pn  monkeysphere  <none>
pn  ssh-askpass   <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:10.1p1-2
Done: Colin Watson <cjwatson@debian.org>

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1117594@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Oct 2025 00:54:25 +0100
Source: openssh
Architecture: source
Version: 1:10.1p1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 1117574 1117594
Changes:
 openssh (1:10.1p1-2) unstable; urgency=medium
 .
   * Don't reuse c->isatty for signalling that the remote channel has a tty
     attached (closes: #1117574, #1117594).
   * Link ssh-keygen directly against ssh-pkcs11.c.
Checksums-Sha1:
 578bd4007e3505334ff4a1572784702492f9a13b 3654 openssh_10.1p1-2.dsc
 1741da614d417ad096cec66edfc0d0315800737f 200372 openssh_10.1p1-2.debian.tar.xz
 44f3697d2b951e029cb67c8bcb70af06d72fd84f 5903300 openssh_10.1p1-2.git.tar.xz
 5186b6565a192df2d6782800ae0ed457794db173 18224 openssh_10.1p1-2_source.buildinfo
Checksums-Sha256:
 892d67278ff329be90166a13d7082aa7cd0ea0b5d262461865fc27e1aa062ad6 3654 openssh_10.1p1-2.dsc
 e7bee9a63c6f7ce70a41c314344aa52ca05cbcda987d63cd6559152f155a0bed 200372 openssh_10.1p1-2.debian.tar.xz
 fae51dfd4492bef7e0aa9cdfce520de01e308fe7948a6109cc061e82231f4f49 5903300 openssh_10.1p1-2.git.tar.xz
 f9763565d0d05b3a72d2efe058427428442a80691eeb022e188400cec0e6da20 18224 openssh_10.1p1-2_source.buildinfo
Files:
 a921d1a0abbbd69a5516e78f879296a1 3654 net standard openssh_10.1p1-2.dsc
 fc4386189d04b63ae58408ce5b98c82d 200372 net standard openssh_10.1p1-2.debian.tar.xz
 aea5e42775033de86baf6e4968650304 5903300 net standard openssh_10.1p1-2.git.tar.xz
 91022a018b275c11144ede90b77d15e9 18224 net standard openssh_10.1p1-2_source.buildinfo
Git-Tag-Info: tag=33c021362ac506111e178e031e13add40122ca97 fp=ac0a4ff12611b6fccf01c111393587d97d86500b
Git-Tag-Tagger: Colin Watson <cjwatson@debian.org>

-----BEGIN PGP SIGNATURE-----
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=JI8D
-----END PGP SIGNATURE-----

Attachment: pgpJEGThjfURF.pgp
Description: PGP signature


--- End Message ---

Reply to: