Debian Bug report logs - #111341
ssh: ssh symlink support removed

version graph

Package: ssh; Maintainer for ssh is Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>; Source for ssh is src:openssh (PTS, buildd, popcon).

Reported by: Jonathan Amery <jdamery@pick.ucam.org>

Date: Wed, 5 Sep 2001 17:33:02 UTC

Severity: normal

Tags: patch

Found in version 1:2.9p2-5

Fixed in version openssh/1:3.5p1-3

Done: Colin Watson <cjwatson@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#111341; Package ssh. (full text, mbox, link).


Acknowledgement sent to Jonathan Amery <jdamery@pick.ucam.org>:
New Bug report received and forwarded. Copy sent to Matthew Vernon <matthew@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Jonathan Amery <jdamery@pick.ucam.org>
To: submit@bugs.debian.org
Subject: ssh: ssh symlink support removed
Date: Wed, 05 Sep 2001 18:24:52 +0100
Package: ssh
Version: 1:2.9p2-5
Severity: normal
Tags: patch

 ssh has historically (until about openssh version 2.5) had a mode of operation 
whereby you arrange for it's argv[0] to be the name of the host you want to 
connect to and it connects to that rather than needing an argument (this is 
usually done with simlinks).

 This patch restores the feature.

--- ssh.c.orig  Wed Sep  5 18:14:42 2001
+++ ssh.c       Wed Sep  5 18:12:43 2001
@@ -307,6 +307,27 @@
        /* Parse command-line arguments. */
        host = NULL;
 
+#ifdef HAVE_CYGWIN
+        if (strcasecmp(__progname, "rsh") && 
+            strcasecmp(__progname, "ssh") &&
+            strcasecmp(__progname, "rlogin") && 
+            strcasecmp(__progname, "slogin") &&
+            strcasecmp(__progname, "remsh") &&
+            strcasecmp(__progname, "rsh.exe") && 
+            strcasecmp(__progname, "ssh.exe") &&
+            strcasecmp(__progname, "rlogin.exe") && 
+            strcasecmp(__progname, "slogin.exe") &&
+            strcasecmp(__progname, "remsh.exe")) {
+#else
+         if (strcmp(__progname, "rsh") && 
+             strcmp(__progname, "ssh") && 
+             strcmp(__progname, "rlogin") &&
+             strcmp(__progname, "slogin") && 
+             strcmp(__progname, "remsh")) {
+#endif
+           host = __progname;
+         }
+
        for (optind = 1; optind < ac; optind++) {
                if (av[optind][0] != '-') {
                        if (host)

-- System Information
Debian Release: testing/unstable
Kernel Version: Linux ming 2.2.19 #7 Fri Aug 10 19:43:09 BST 2001 i686 unknown

Versions of the packages ssh depends on:
ii  debconf        0.9.95         Debian configuration management system
ii  libc6          2.2.3-9        GNU C Library: Shared libraries and Timezone
ii  libpam-modules 0.72-30        Pluggable Authentication Modules for PAM
ii  libpam0g       0.72-30        Pluggable Authentication Modules library
ii  libssl0.9.6    0.9.6a-3       SSL shared libraries
ii  libwrap0       7.6-8.2        Wietse Venema's TCP wrappers library
ii  zlib1g         1.1.3-15       compression library - runtime

--- Begin /etc/ssh/ssh_config (modified conffile)
Host localhost
  ForwardAgent yes
  ForwardX11 yes
Host rapun.empire.pick.ucam.org
  ForwardX11 yes

--- End /etc/ssh/ssh_config

--- Begin /etc/init.d/ssh (modified conffile)
#! /bin/sh
test -x /usr/sbin/sshd || exit 0
( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0
if expr "$1" : '.*start$' >/dev/null && [ -e /etc/ssh/NOSERVER ]; then 
    echo "Not starting OpenBSD Secure Shell server (/etc/ssh/NOSERVER)"
    exit 0
fi
case "$1" in
  start)
	test -f /etc/ssh/sshd_not_to_be_run && exit 0
        echo -n "Starting OpenBSD Secure Shell server: sshd"
	start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -4
        echo "."
	;;
  stop)
        echo -n "Stopping OpenBSD Secure Shell server: sshd"
	start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -4
        echo "."
	;;
  reload|force-reload)
  	test -f /etc/ssh/sshd_not_to_be_run && exit 0
        echo -n "Reloading OpenBSD Secure Shell server's configuration"
	start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -4
	echo "."
	;;
  restart)
  	test -f /etc/ssh/sshd_not_to_be_run && exit 0
        echo -n "Restarting OpenBSD Secure Shell server: sshd"
	start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -4
	sleep 10
	start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- -4
		echo "."
	;;
  *)
	echo "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart}"
	exit 1
esac
exit 0

--- End /etc/init.d/ssh



Message sent on to Jonathan Amery <jdamery@pick.ucam.org>:
Bug#111341. (full text, mbox, link).


Message #8 received at 111341-submitter@bugs.debian.org (full text, mbox, reply):

From: Matthew Vernon <matthewv@davenant.greenend.org.uk>
To: 111341-submitter@bugs.debian.org
Subject: Do this with a shell script
Date: Fri, 7 Sep 2001 01:01:12 +0100 (BST)
Hi,

   The correct solution is to write a shell script called, say,
ssh-argv0 which does the obvious thing, and then document that you
want to make symlinks to that now.

Write that, and I'll include it ;)

Thanks,

Matthew



Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#111341; Package ssh. (full text, mbox, link).


Acknowledgement sent to "Jonathan D. Amery" <jdamery@chiark.greenend.org.uk>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.

Your message did not contain a Subject field. This is broken, I am afraid - the Subject: line is a Required Header according to RFC822. Please remember to include a Subject field in your messages in future. If you did so the fact that it got lost probably indicates a poorly configured mail system at your site or an intervening one.

(full text, mbox, link).


Message #13 received at 111341@bugs.debian.org (full text, mbox, reply):

From: "Jonathan D. Amery" <jdamery@chiark.greenend.org.uk>
To: 111341@bugs.debian.org
Date: Fri, 7 Sep 2001 21:06:14 +0100 (BST)
 OK - here's the new stuff...

--- ssh-argv0 ---
#! /bin/sh -e
if [ "${0##*/}" == "ssh-argv0" ]
then
  echo 'ssh-argv0: This script should not be run like this, see ssh-argv0(1) for details' 1>&2;
  exit 1;
fi
ssh "${0##*/}" "$@"
------ end ------
-- ssh-argv0.1 --
.Dd September 7, 2001 
.Dt SSH-ARGV0 1
.Os Debian Project
.Sh NAME
.Nm ssh-argv0
.Nd replaces the old ssh command-name as hostname handling
.Sh SYNOPSIS
.Ar hostname | user@hostname
.Op Fl l Ar login_name
.Op Ar command
.Pp
.Ar hostname | user@hostname
.Op Fl afgknqstvxACNPTX1246
.Op Fl c Ar cipher_spec
.Op Fl e Ar escape_char
.Op Fl i Ar identity_file
.Op Fl l Ar login_name
.Op Fl m Ar mac_spec
.Op Fl o Ar option
.Op Fl p Ar port
.Oo Fl L Xo
.Sm off
.Ar port :
.Ar host :
.Ar hostport
.Sm on
.Xc
.Oc
.Oo Fl R Xo
.Sm off
.Ar port :
.Ar host :
.Ar hostport
.Sm on
.Xc
.Oc
.Op Ar command
.Sh DESCRIPTION
.Nm
replaces the old ssh command-name as hostname handling.
If you link to this script with a hostname then executing the link is
equivalent to having executed ssh with that hostname as an argument.
All other arguments are passed to ssh and will be processed normally
.Sh OPTIONS
See
.Xr ssh 1
.Sh FILES
See
.Xr ssh 1
.Sh AUTHORS
OpenSSH is a derivative of the original and free
ssh 1.2.12 release by Tatu Ylonen.
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos,
Theo de Raadt and Dug Song
removed many bugs, re-added newer features and
created OpenSSH.
Markus Friedl contributed the support for SSH
protocol versions 1.5 and 2.0.
Jonathan Amery wrote this ssh-argv0 script and the associated documentation.
.Sh SEE ALSO
.Xr ssh 1
------ end ------
---- patches ----

--- README.Debian.orig  Fri Sep  7 20:57:26 2001
+++ README.Debian       Fri Sep  7 20:58:59 2001
@@ -101,6 +101,12 @@
 no current plans to support this.  Thus the KerberosAuthentication and 
 KerberosTgtPassing options will not be recognised.
 
+Symlink Hostname invocation:
+----------------------------
+This version of ssh no longer includes support for invoking ssh with the 
+hostname as the name of the file run.  People wanting this support should
+use the ssh-argv0 script.
+
 --
 Matthew Vernon
 <matthew@debian.org>

--- ssh.1.orig  Fri Sep  7 20:03:05 2001
+++ ssh.1       Fri Sep  7 20:17:29 2001
@@ -1404,6 +1404,7 @@
 .Xr scp 1 ,
 .Xr sftp 1 ,
 .Xr ssh-add 1 ,
+.Xr ssh-argv0 1 ,
 .Xr ssh-agent 1 ,
 .Xr ssh-keygen 1 ,
 .Xr telnet 1 ,





Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#111341; Package ssh. (full text, mbox, link).


Acknowledgement sent to "Jonathan D. Amery" <jdamery@chiark.greenend.org.uk>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>. (full text, mbox, link).


Message #18 received at 111341@bugs.debian.org (full text, mbox, reply):

From: "Jonathan D. Amery" <jdamery@chiark.greenend.org.uk>
To: 111341@bugs.debian.org
Subject: Re: Bug#111341: Info received (was (no subject))
Date: Fri, 7 Sep 2001 21:42:15 +0100 (BST)
 Oops - forgot this:

 Copyright of new code/documentation is maintained in the author, however
the author grants the right to the ssh maintainer to license said
code/documentation as he or she sees fit.

-- 
Jonathan Amery.      Now there's a light at the end of the tunnel,
   #####                Someone's lit a campfire in my cave.
  #######__o         The first rays of dawn are breaking through the clouds,
  #######'/             And somehow I know I can be brave.      - Steve Kitson




Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>, openssh@packages.qa.debian.org:
Bug#111341; Package ssh. (full text, mbox, link).


Acknowledgement sent to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>, openssh@packages.qa.debian.org. (full text, mbox, link).


Message #23 received at 111341@bugs.debian.org (full text, mbox, reply):

From: Colin Watson <cjwatson@debian.org>
To: "Jonathan D. Amery" <jdamery@chiark.greenend.org.uk>
Cc: 111341@bugs.debian.org
Subject: Re: your mail
Date: Mon, 30 Dec 2002 03:14:18 +0000
On Fri, Sep 07, 2001 at 09:06:14PM +0100, Jonathan D. Amery wrote:
>  OK - here's the new stuff...

Matthew didn't object, so I see no reason not to include this ... I've
applied the following copyright notice, along the lines of the rest of
OpenSSH:

# Copyright (c) 2001 Jonathan Amery.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

> --- ssh-argv0 ---
> #! /bin/sh -e
> if [ "${0##*/}" == "ssh-argv0" ]

'==' as a test(1) operator isn't portable, so I've changed this to '='.

> .Sh SYNOPSIS
> .Ar hostname | user@hostname
> .Op Fl l Ar login_name
> .Op Ar command
[...]

I also updated the options here to match what ssh(1) currently
documents.

-- 
Colin Watson                                  [cjwatson@flatline.org.uk]



Reply sent to Colin Watson <cjwatson@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Jonathan Amery <jdamery@pick.ucam.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #28 received at 111341-close@bugs.debian.org (full text, mbox, reply):

From: Colin Watson <cjwatson@debian.org>
To: 111341-close@bugs.debian.org
Subject: Bug#111341: fixed in openssh 1:3.5p1-3
Date: Wed, 01 Jan 2003 10:47:41 -0500
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh_3.5p1-3.diff.gz
  to pool/main/o/openssh/openssh_3.5p1-3.diff.gz
openssh_3.5p1-3.dsc
  to pool/main/o/openssh/openssh_3.5p1-3.dsc
ssh-askpass-gnome_3.5p1-3_i386.deb
  to pool/main/o/openssh/ssh-askpass-gnome_3.5p1-3_i386.deb
ssh_3.5p1-3_i386.deb
  to pool/main/o/openssh/ssh_3.5p1-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 111341@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  1 Jan 2003 14:18:30 +0000
Source: openssh
Binary: ssh-askpass-gnome ssh
Architecture: source i386
Version: 1:3.5p1-3
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 ssh        - Secure rlogin/rsh/rcp replacement (OpenSSH)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 68341 111341 150974 167895 167974 171554 174449 174662 174757
Changes: 
 openssh (1:3.5p1-3) unstable; urgency=low
 .
   * Happy new year!
   * Use getent rather than id to find out whether the sshd user exists
     (closes: #150974).
   * Remove some duplication from the postinst's ssh-keysign setuid code.
   * Replace db_text with db_input throughout debian/config. (db_text has
     been a compatibility wrapper since debconf 0.1.5.)
   * Warn about PermitUserEnvironment on upgrade (closes: #167895).
   * Use 'make install-nokeys', and disable unused debhelper commands,
     thereby forward-porting the last pieces of Zack Weinberg's patch
     (closes: #68341).
   * Move the man page for gnome-ssh-askpass from the ssh package to
     ssh-askpass-gnome (closes: #174449).
   * Build with -DLOGIN_NO_ENDOPT, since Debian's /bin/login doesn't accept
     '--' to terminate the list of options (closes: #171554).
   * Add Jonathan Amery's ssh-argv0 script (closes: #111341).
   * Update Danish debconf template (thanks, Morten Brix Pedersen;
     closes: #174757).
   * Document setgid ssh-agent's effect on certain environment variables in
     README.Debian (closes: #167974).
   * Document interoperability problems between scp and ssh.com's server in
     README.Debian, and suggest some workarounds (closes: #174662).
Files: 
 f12eac365fe028c25a131aed643531df 813 net standard openssh_3.5p1-3.dsc
 88a08ec22afea04a3ceddfdd7266dee0 60068 net standard openssh_3.5p1-3.diff.gz
 8a3498b76fce30408589e35993230ab0 665334 net standard ssh_3.5p1-3_i386.deb
 4eac5d0d56e947a69aa26a4565d20920 32496 x11 optional ssh-askpass-gnome_3.5p1-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQE+Ewjh9t0zAhD6TNERAkVkAJ9M7Su4zAsiZpUuXcGUQNSDeNC2owCeNB0D
REcxR061xVJEVOeIo+xq5dI=
=jf1L
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Sep 19 15:37:32 2022; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.