Debian Bug report logs -
#242119
ssh - password authentication never uses pam
Reported by: Bastian Blank <waldi@debian.org>
Date: Sun, 4 Apr 2004 21:33:03 UTC
Severity: important
Tags: fixed-in-experimental, moreinfo
Found in versions 1:3.8p1-2, 1:3.8p1-3
Fixed in version openssh/1:4.1p1-3
Done: Colin Watson <cjwatson@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Bastian Blank <waldi@debian.org>:
New Bug report received and forwarded. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: ssh
Version: 1:3.8p1-2
Severity: grave
password authentication always tries to read /etc/shadow and fails with
| error: Could not get shadow information for $user
This breaks logins on system which uses pam for authentication.
Bastian
--
Death, when unnecessary, is a tragic thing.
-- Flint, "Requiem for Methuselah", stardate 5843.7
[signature.asc (application/pgp-signature, inline)]
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #10 received at 242119@bugs.debian.org (full text, mbox, reply):
severity 242119 normal
tags 242119 moreinfo
thanks
On Sun, Apr 04, 2004 at 11:21:08PM +0200, Bastian Blank wrote:
> Package: ssh
> Version: 1:3.8p1-2
> Severity: grave
>
> password authentication always tries to read /etc/shadow and fails with
> | error: Could not get shadow information for $user
> This breaks logins on system which uses pam for authentication.
Clearly not, since I use the default configuration and it works here, so
it's not broken for everyone. Please provide more information,
especially when trying to file grave bugs: relevant lines from
/var/log/auth.log and 'sshd -ddd' would be a good start.
Cheers,
--
Colin Watson [cjwatson@flatline.org.uk]
Severity set to `normal'.
Request was from Colin Watson <cjwatson@debian.org>
to control@bugs.debian.org.
(full text, mbox, link).
Tags added: moreinfo
Request was from Colin Watson <cjwatson@debian.org>
to control@bugs.debian.org.
(full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Chaskiel M Grundman <cg2v@andrew.cmu.edu>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #19 received at 242119@bugs.debian.org (full text, mbox, reply):
I'm having the same problem.
there's no output from this process in auth.log (since I'm using -ddd, I
guess)
debug1: PAM: initializing for "cg2v"
debug3: Trying to reverse map address 205.201.7.143.
debug1: PAM: setting PAM_RHOST to "dhcp-7-143.dsl.telerama.com"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: input_userauth_request: try method none
Failed none for cg2v from 205.201.7.143 port 54343 ssh2
debug1: userauth-request for user cg2v service ssh-connection method
password
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method password
debug3: auth_shadow_pwexpired: today 12516 sp_lstchg 11439 sp_max 99999
Failed password for cg2v from 205.201.7.143 port 54343 ssh2
debug1: userauth-request for user cg2v service ssh-connection method
password
debug1: attempt 2 failures 2
debug2: input_userauth_request: try method password
Failed password for cg2v from 205.201.7.143 port 54343 ssh2
debug1: userauth-request for user cg2v service ssh-connection method
password
debug1: attempt 3 failures 3
debug2: input_userauth_request: try method password
Failed password for cg2v from 205.201.7.143 port 54343 ssh2
Connection closed by 205.201.7.143
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
Here's strace output from one password verification attempt (this is a
sparc, so some of the syscall names are wrong...):
Process 6897 attached - interrupt to quit
select(5, [4], NULL, NULL, NULL) = 1 (in [4])
read(4, "\327\2102\363\303F\202\342\37\344\375\266\1771\0Q\222\206"...,
8192) = 144
write(2, "debug1: userauth-request for use"..., 79) = 79
write(2, "debug1: attempt 1 failures 1\r\n", 30) = 30
write(2, "debug2: input_userauth_request: "..., 53) = 53
open("/etc/shadow", O_RDONLY) = 3
nfssvc(0x3) = 0
nfssvc(0x3) = 0
_llseek(3, 0, [0], SEEK_CUR) = 0
fstat64(3, {st_mode=S_IFREG|0640, st_size=4621, ...}) = 0
SYS_56(0, 0x120d, 0x1) = 1879162880
_llseek(3, 4621, [4621], SEEK_SET) = 0
munmap(0x7001c000, 4621) = 0
close(3) = 0
time(NULL) = 1081396889
write(2, "debug3: auth_shadow_pwexpired: t"..., 73) = 73
open("/etc/shadow", O_RDONLY) = 3
nfssvc(0x3) = 0
nfssvc(0x3) = 0
_llseek(3, 0, [0], SEEK_CUR) = 0
fstat64(3, {st_mode=S_IFREG|0640, st_size=4621, ...}) = 0
SYS_56(0, 0x120d, 0x1) = 1879162880
_llseek(3, 4621, [4621], SEEK_SET) = 0
munmap(0x7001c000, 4621) = 0
close(3) = 0
getpeername(4, {sa_family=AF_INET, sin_port=htons(54343),
sin_addr=inet_addr("205.201.7.143")}, [16]) = 0
write(2, "Failed password for cg2v from 20"..., 61) = 61
write(4, "\216\3764i`\17{\306,i~\1\322\344\357\3725\245\n\n\t\364"..., 80)
= 80
select(5, [4], NULL, NULL, NULL
I do have UsePAM turned on, and lsof does indicate that the modules that
are specified by /etc/pam.d/ssh are being loaded. This configuration does
work with the sshd in ssh-krb5. (I only installed this version because I
encountered a variant of bug 240953 and didn't remember if 3.6 had the bug
or if it had been fixed upstream in time for 3.8. since 3.6 (and thus
ssh-krb5) isn't supposed to have that problem, I guess I'm going to switch
back before this machine goes back into production)
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Zed Pobre <zed@debian.org>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #24 received at 242119@bugs.debian.org (full text, mbox, reply):
Package: ssh
Version: 1:3.8p1-3
Followup-For: Bug #242119
I'm also having the same problems. Authentication is handled through
LDAP, which makes me wonder if there's something related to 240506.
I'll try to get you a debug log shortly, but I wanted to note this
relationship first.
-- System Information:
Debian Release: 3.0
Architecture: i386
Kernel: Linux julia 2.4.25.julia #1 SMP Tue Feb 24 14:48:31 CST 2004 i686
Locale: LANG=en_US, LC_CTYPE=en_US (ignored: LC_ALL set to en_US)
Versions of packages ssh depends on:
ii adduser 3.47 Add and remove users and groups
ii debconf 1.3.14 Debian configuration management sy
ii dpkg 1.10.15 Package maintenance system for Deb
ii libc6 2.3.2.ds1-11 GNU C Library: Shared libraries an
ii libpam-modules 0.76-14 Pluggable Authentication Modules f
ii libpam-runtime 0.76-19 Runtime support for the PAM librar
ii libpam0g 0.76-14 Pluggable Authentication Modules l
ii libssl0.9.7 0.9.7c-1 SSL shared libraries
ii libwrap0 7.6-9 Wietse Venema's TCP wrappers libra
ii zlib1g 1:1.2.1-3 compression library - runtime
-- debconf information excluded
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to "Nikita V. Youshchenko" <yoush@cs.msu.su>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #29 received at 242119@bugs.debian.org (full text, mbox, reply):
severity 242119 important
thanks
Hello,
I've spent two hours trying to find out why ssh 3.8 breaks logins to our
terminal that use ldap auth. This is what I found.
In ssh 3.6, "password" auth method used PAM.
In ssh 3.8, "password" auth method does not use PAM, regardless of "UsePAM"
setting. "man sshd_config" states the following about "UsePAM":
UsePAM Enables PAM authentication (via challenge-response) and session
set up. If you enable this, you should probably disable
PasswordAuthentication.
UsaPAM affects another auth method, namely "keyboard-interactive"
When logging using openssh client, after "password" method fails for LDAP
user, "keyboard-interactive" method is also tried, and succeeds.
This is logged:
May 13 14:08:33 pride sshd[9502]: debug1: Client protocol version 2.0;
client software version OpenSSH_3.6.1p2 Debian 1:3.6.1p2-12
May 13 14:08:33 pride sshd[9502]: debug1: match: OpenSSH_3.6.1p2 Debian
1:3.6.1p2-12 pat OpenSSH*
May 13 14:08:33 pride sshd[9502]: debug1: Enabling compatibility mode for
protocol 2.0
May 13 14:08:33 pride sshd[9502]: debug1: Local version string
SSH-1.99-OpenSSH_3.8p1 Debian 1:3.8p1-3
May 13 14:08:33 pride sshd[9502]: debug1: PAM: initializing for "test"
May 13 14:08:33 pride sshd[9502]: debug1: PAM: setting PAM_RHOST to
"zigzag.lvk.cs.msu.su"
May 13 14:08:33 pride sshd[9502]: debug1: PAM: setting PAM_TTY to "ssh"
May 13 14:08:33 pride sshd[9502]: Failed none for test from 158.250.17.23
port 43327 ssh2
At this point, "password" auth failed, and other methods are being tried.
May 13 14:08:33 pride sshd[9502]: debug1: temporarily_use_uid: 3801/100
(e=0/0)
May 13 14:08:33 pride sshd[9502]: debug1: trying public key
file /home/test/.ssh/authorized_keys
May 13 14:08:33 pride sshd[9502]: debug1: restore_uid: 0/0
May 13 14:08:33 pride sshd[9502]: debug1: temporarily_use_uid: 3801/100
(e=0/0)
May 13 14:08:33 pride sshd[9502]: debug1: trying public key
file /home/test/.ssh/authorized_keys2
May 13 14:08:33 pride sshd[9502]: debug1: restore_uid: 0/0
May 13 14:08:35 pride sshd[9504]: (pam_unix) check pass; user unknown
May 13 14:08:35 pride sshd[9504]: (pam_unix) authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=zigzag.lvk.c
s.msu.su
May 13 14:08:35 pride sshd[9502]: debug1: PAM: num PAM env strings 0
May 13 14:08:35 pride sshd[9502]: Accepted keyboard-interactive/pam for
test from 158.250.17.23 port 43327 ssh2
At this point, "keyboard-interactive" method succeeds.
However, other ssh clients don't know anything about "keyboard-interactive"
method. E.g. when trying to ssh from a Solaris box with ssh2, "password"
method failes and login is disallowed.
Similar problems happens with different ssh clients running under Windows.
So the breaking change is that PAM is no longer used for "password" auth.
This really breaks networks where different operating systems are used.
That's why I am upgrading this bug's severity to "important".
Severity set to `important'.
Request was from "Nikita V. Youshchenko" <yoush@cs.msu.su>
to control@bugs.debian.org.
(full text, mbox, link).
Message sent on to Bastian Blank <waldi@debian.org>:
Bug#242119.
(full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Darren Tucker <dtucker@zip.com.au>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #39 received at 242119@bugs.debian.org (full text, mbox, reply):
Hi.
This Debian bug ("ssh - password authentication never uses pam") has a
corresponding upstream enhancement request (with patch):
http://bugzilla.mindrot.org/show_bug.cgi?id=874
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#242119; Package ssh.
(full text, mbox, link).
Acknowledgement sent to Darren Tucker <dtucker@zip.com.au>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>.
(full text, mbox, link).
Message #44 received at 242119@bugs.debian.org (full text, mbox, reply):
Hi.
Please excuse the multi-update, these bugs are somewhat related.
The upstream bug [1] for Debian bugs #242119, #238699, #247521, #250369
is now fixed in upstream's CVS.
The patch attached to the bug re-adds PasswordAuthentication via PAM.
Note that this uses a "blind" conversation that will fail if you have
anything beyond simple password authentication; however this is the best
that can be done within SSH's password authentication method. If you
need more comprehensive PAM support, set PasswordAuthentication=no and
use ChallengeResponse/keyboard-interactive.
[1] http://bugzilla.mindrot.org/show_bug.cgi?id=874
(If you're going to backport the patch, there's a couple of other
related patches in CVS that are not attached to the bug).
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
Tags added: fixed-in-experimental
Request was from Colin Watson <cjwatson@debian.org>
to control@bugs.debian.org.
(full text, mbox, link).
Reply sent to Colin Watson <cjwatson@debian.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Bastian Blank <waldi@debian.org>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #51 received at 242119-close@bugs.debian.org (full text, mbox, reply):
Source: openssh
Source-Version: 1:4.1p1-3
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:
openssh-client-udeb_4.1p1-3_powerpc.udeb
to pool/main/o/openssh/openssh-client-udeb_4.1p1-3_powerpc.udeb
openssh-client_4.1p1-3_powerpc.deb
to pool/main/o/openssh/openssh-client_4.1p1-3_powerpc.deb
openssh-server-udeb_4.1p1-3_powerpc.udeb
to pool/main/o/openssh/openssh-server-udeb_4.1p1-3_powerpc.udeb
openssh-server_4.1p1-3_powerpc.deb
to pool/main/o/openssh/openssh-server_4.1p1-3_powerpc.deb
openssh_4.1p1-3.diff.gz
to pool/main/o/openssh/openssh_4.1p1-3.diff.gz
openssh_4.1p1-3.dsc
to pool/main/o/openssh/openssh_4.1p1-3.dsc
ssh-askpass-gnome_4.1p1-3_powerpc.deb
to pool/main/o/openssh/ssh-askpass-gnome_4.1p1-3_powerpc.deb
ssh_4.1p1-3_all.deb
to pool/main/o/openssh/ssh_4.1p1-3_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 242119@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 6 Jun 2005 22:28:33 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.1p1-3
Distribution: unstable
Urgency: high
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server - Secure shell server, an rshd replacement
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh - Secure shell client and server (transitional package)
ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 39741 87253 87900 141979 147212 147360 151321 162996 163933 192206 192234 220726 228828 233012 238699 242119 242462 247521 248747 250369 257130 264024 265339 265627 273831 275731 275895 276703 276754 277438 278394 278715 280190 281595 287013 289573 295757 296487 298536 298744 301852 303452 303787 307069 308868
Changes:
openssh (1:4.1p1-3) unstable; urgency=low
.
* Upload to unstable.
.
openssh (1:4.1p1-2) experimental; urgency=low
.
* Drop debconf support for allowing SSH protocol 1, which is discouraged
and has not been the default since openssh 1:3.0.1p1-1. Users who need
this should edit sshd_config instead (closes: #147212).
* Since ssh-keysign isn't used by default (you need to set
EnableSSHKeysign to "yes" in /etc/ssh/ssh_config), having a debconf
question to ask whether it should be setuid is overkill, and the
question text had got out of date anyway. Remove this question, ship
ssh-keysign setuid in openssh-client.deb, and set a statoverride if the
debconf question was previously set to false.
* Add lintian overrides for the above (setuid-binary,
no-debconf-templates).
* Fix picky lintian errors about slogin symlinks.
* Fix DEB_HOST_ARCH_OS/DEB_HOST_GNU_SYSTEM compatibility handling.
* Apply Linux 2.2 workaround (see #239999) only on Linux.
.
openssh (1:4.1p1-1) experimental; urgency=low
.
* New upstream release.
- Normalise socket addresses returned by get_remote_hostname(), fixing
4-in-6 mapping issues with AllowUsers et al (closes: #192234).
* Take upstream's hint and disable the unsupported USE_POSIX_THREADS
(closes: #295757, #308868, and possibly others; may open other bugs).
Use PAM password authentication to avoid #278394. In future I may
provide two sets of binaries built with and without this option, since
it seems I can't win.
* Disable ChallengeResponseAuthentication in new installations, returning
to PasswordAuthentication by default, since it now supports PAM and
apparently works better with a non-threaded sshd (closes: #247521).
* openssh-server Suggests: rssh (closes: #233012).
* Change libexecdir to /usr/lib/openssh, and fix up various alternatives
and configuration files to match (closes: #87900, #151321).
* Fix up very old sshd_config files that refer to /usr/libexec/sftp-server
(closes: #141979).
.
openssh (1:4.0p1-1) experimental; urgency=low
.
* New upstream release.
- Port-forwarding specifications now take optional bind addresses, and
the server allows client-specified bind addresses for remote port
forwardings when configured with "GatewayPorts clientspecified"
(closes: #87253, #192206).
- ssh and ssh-keyscan now support hashing of known_hosts files for
improved privacy. ssh-keygen has new options for managing known_hosts
files, which understand hashing.
- sftp supports command history and editing support using libedit
(closes: #287013).
- Have scp and sftp wait for the spawned ssh to exit before they exit
themselves, allowing ssh to restore terminal modes (closes: #257130).
- Improved the handling of bad data in authorized_keys files,
eliminating fatal errors on corrupt or very large keys; e.g. linefeeds
in keys only produce errors in auth.log now (closes: #220726).
- Add "command mode" to ssh connection multiplexing (closes: #303452).
- Mention $HOME/.hushlogin in sshd(8) FILES section (closes: #163933).
* Make gnome-ssh-askpass stay above other windows (thanks, Liyang HU;
closes: #296487).
* Remove obsolete and unnecessary ssh/forward_warning debconf note.
* Hurd build fixes (although sshd still doesn't work):
- Restore X forwarding fix from #102991, lost somewhere along the way.
- Link with -lcrypt.
- Link with -lpthread rather than -pthread.
- Don't build ssh-askpass-gnome on the Hurd, until GNOME is available to
satisfy build-dependencies.
* Drop workaround for #242462 on amd64; it's been fixed properly upstream.
* Enable HashKnownHosts by default. This only affects new entries; use
'ssh-keygen -H' to convert an entire known_hosts file to hashed format.
* Note in ssh_config(5) that the SetupTimeOut option is Debian-specific
(closes: #307069).
* debconf template translations:
- Update Czech (thanks, Miroslav Kure; closes: #298744).
- Update Finnish (thanks, Matti Pöllä; closes: #303787).
- Synchronise Spanish with sarge branch (thanks, Javier
Fernández-Sanguino Peña; closes: #298536).
- Add Ukrainian (thanks, Eugeniy Meshcheryakov; closes: #301852).
.
openssh (1:3.9p1-3) experimental; urgency=low
.
* Explain how to run sshd from inittab in README.Debian (closes: #147360).
* Add debian/watch file.
.
openssh (1:3.9p1-2) experimental; urgency=low
.
* Remove pam_nologin from /etc/pam.d/ssh, as sshd's built-in support
appears to be sufficient and more useful (closes: #162996).
* Depend on debconf | debconf-2.0.
* Drop LoginGraceTime back to the upstream default of two minutes on new
installs (closes: #289573).
* debconf template translations from Ubuntu bug #1232:
- Update Greek (thanks, Logiotatidis George).
- Update Spanish (thanks, Santiago Erquicia).
.
openssh (1:3.9p1-1) experimental; urgency=low
.
* New upstream release.
- PAM password authentication implemented again (closes: #238699,
#242119).
- Implemented the ability to pass selected environment variables between
the client and the server.
- Fix ssh-keyscan breakage when remote server doesn't speak SSH protocol
(closes: #228828).
- Fix res_query detection (closes: #242462).
- 'ssh -c' documentation improved (closes: #265627).
* Pass LANG and LC_* environment variables from the client by default, and
accept them to the server by default in new installs, although not on
upgrade (closes: #264024).
* Build ssh in binary-indep, not binary-arch (thanks, LaMont Jones).
* Expand on openssh-client package description (closes: #273831).
.
openssh (1:3.8.1p1-14) experimental; urgency=low
.
* We use DH_COMPAT=2, so build-depend on debhelper (>= 2).
* Fix timing information leak allowing discovery of invalid usernames in
PAM keyboard-interactive authentication (backported from a patch by
Darren Tucker; closes: #281595).
* Make sure that there's a delay in PAM keyboard-interactive
authentication when PermitRootLogin is not set to yes and the correct
root password is entered (closes: #248747).
.
openssh (1:3.8.1p1-13) experimental; urgency=low
.
* Enable threading for PAM, on Sam Hartman's advice (closes: #278394).
* debconf template translations:
- Update Dutch (thanks, cobaco; closes: #278715).
* Correct README.Debian's ForwardX11Trusted description (closes: #280190).
.
openssh (1:3.8.1p1-12) experimental; urgency=low
.
* Preserve /etc/ssh/sshd_config ownership/permissions (closes: #276754).
* Shorten the version string from the form "OpenSSH_3.8.1p1 Debian
1:3.8.1p1-8.sarge.1" to "OpenSSH_3.8.1p1 Debian-8.sarge.1", as some SSH
implementations apparently have problems with the long version string.
This is of course a bug in those implementations, but since the extent
of the problem is unknown it's best to play safe (closes: #275731).
* debconf template translations:
- Add Finnish (thanks, Matti Pöllä; closes: #265339).
- Update Danish (thanks, Morten Brix Pedersen; closes: #275895).
- Update French (thanks, Denis Barbier; closes: #276703).
- Update Japanese (thanks, Kenshi Muto; closes: #277438).
.
openssh (1:3.8.1p1-11) experimental; urgency=high
.
* Move sshd_config(5) to openssh-server, where it belongs.
* If PasswordAuthentication is disabled, then offer to disable
ChallengeResponseAuthentication too. The current PAM code will attempt
password-style authentication if ChallengeResponseAuthentication is
enabled (closes: #250369).
* This will ask a question of anyone who installed fresh with 1:3.8p1-2 or
later and then upgraded. Sorry about that ... for this reason, the
default answer is to leave ChallengeResponseAuthentication enabled.
.
openssh (1:3.8.1p1-10) experimental; urgency=low
.
* Don't install the ssh-askpass-gnome .desktop file by default; I've had
too many GNOME people tell me it's the wrong thing to be doing. I've
left it in /usr/share/doc/ssh-askpass-gnome/examples/ for now.
.
openssh (1:3.8.1p1-9) experimental; urgency=low
.
* Split the ssh binary package into openssh-client and openssh-server
(closes: #39741). openssh-server depends on openssh-client for some
common functionality; it didn't seem worth creating yet another package
for this. openssh-client is priority standard, openssh-server optional.
* New transitional ssh package, priority optional, depending on
openssh-client and openssh-server. May be removed once nothing depends
on it.
* When upgrading from ssh to openssh-{client,server}, it's very difficult
for the maintainer scripts to find out what version we're upgrading from
without dodgy dpkg hackery. I've therefore taken the opportunity to move
a couple of debconf notes into NEWS files, namely ssh/ssh2_keys_merged
and ssh/user_environment_tell.
* Add a heuristic to try to make sure the sshd_config upgrade to >= 3.7
happens even though we don't know what version we're upgrading from.
* Remove /etc/ssh/sshd_not_to_be_run on purge of openssh-server. For now
(until sarge+2) it's still honoured to avoid breaking existing
configurations, but the right approach is now to remove the
openssh-server package if you don't want to run the server. Add a NEWS
item to that effect.
Files:
84f2dff9c56e901f345d56fc61df0d0b 900 net standard openssh_4.1p1-3.dsc
7ab61ab3f06d6f82054c1abe06c07d06 138002 net standard openssh_4.1p1-3.diff.gz
02c181ac3c4d6a0548d111c59e74db82 31940 net optional ssh_4.1p1-3_all.deb
fded10b71291844267bf4582d67e1f49 570468 net standard openssh-client_4.1p1-3_powerpc.deb
b5d53eb227d444b63861dc93266b06d3 284250 net optional openssh-server_4.1p1-3_powerpc.deb
712214657225f22add427e6e8af78d8e 76508 gnome optional ssh-askpass-gnome_4.1p1-3_powerpc.deb
8a08610010a9b18697df9dcaad793d47 163160 debian-installer optional openssh-client-udeb_4.1p1-3_powerpc.udeb
c3e34795848cfa1ddf1be4365c9450cd 171832 debian-installer optional openssh-server-udeb_4.1p1-3_powerpc.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCpMU09t0zAhD6TNERAkGpAKCDpLdoo2ILdb02EPN28FV4HuSsgQCcD7K2
QlEr7wrH8P5uw4bssmCGNzU=
=mvqt
-----END PGP SIGNATURE-----
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Fri Jan 5 17:55:27 2018;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.