Debian Bug report logs - #246774
ssh: scp hangs forever on named pipes.

version graph

Package: ssh; Maintainer for ssh is Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>; Source for ssh is src:openssh (PTS, buildd, popcon).

Reported by: Wolfgang Rohdewald <wolfgang@rohdewald.de>

Date: Sat, 1 May 2004 01:03:01 UTC

Severity: important

Tags: fixed-upstream, upstream

Found in version 1:3.8p1-3

Fixed in version openssh/1:4.7p1-1

Done: Colin Watson <cjwatson@debian.org>

Bug is archived. No further changes may be made.

Forwarded to http://bugzilla.mindrot.org/show_bug.cgi?id=856

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#246774; Package ssh. (full text, mbox, link).


Acknowledgement sent to Wolfgang Rohdewald <wolfgang@rohdewald.de>:
New Bug report received and forwarded. Copy sent to Matthew Vernon <matthew@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Wolfgang Rohdewald <wolfgang@rohdewald.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ssh: scp hangs forever on named pipes.
Date: Sat, 01 May 2004 02:51:06 +0200
Package: ssh
Version: 1:3.8p1-3
Severity: important

This renders scp -r rather unuseful, it stops when
reaching the first named pipe without giving any 
indication for the reason.

-- System Information:
Debian Release: testing/unstable
Architecture: i386 (i686)
Kernel: Linux 2.4.26
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (ignored: LC_ALL set to C)

Versions of packages ssh depends on:
ii  adduser                     3.52         Add and remove users and groups
ii  debconf                     1.4.25       Debian configuration management sy
ii  dpkg                        1.10.21      Package maintenance system for Deb
ii  libc6                       2.3.2.ds1-12 GNU C Library: Shared libraries an
ii  libpam-modules              0.76-20      Pluggable Authentication Modules f
ii  libpam-runtime              0.76-20      Runtime support for the PAM librar
ii  libpam0g                    0.76-20      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7d-1     SSL shared libraries
ii  libwrap0                    7.6.dbs-2    Wietse Venema's TCP wrappers libra
ii  zlib1g                      1:1.2.1-5    compression library - runtime

-- debconf information:
  ssh/insecure_rshd: 
* ssh/user_environment_tell: 
* ssh/forward_warning: 
  ssh/rootlogin_warning: 
* ssh/upgrade_to_openssh: true
  ssh/encrypted_host_key_but_no_keygen: 
* ssh/run_sshd: true
  ssh/privsep_ask: true
* ssh/insecure_telnetd: 
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/SUID_client: true
* ssh/protocol2_default: 
* ssh/privsep_tell: 
* ssh/ssh2_keys_merged: 
  ssh/ancient_version: 
  ssh/protocol2_only: true



Information forwarded to debian-bugs-dist@lists.debian.org, Matthew Vernon <matthew@debian.org>:
Bug#246774; Package ssh. (full text, mbox, link).


Acknowledgement sent to Colin Watson <cjwatson@debian.org>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <matthew@debian.org>. (full text, mbox, link).


Message #10 received at 246774@bugs.debian.org (full text, mbox, reply):

From: Colin Watson <cjwatson@debian.org>
To: Wolfgang Rohdewald <wolfgang@rohdewald.de>, 246774@bugs.debian.org
Cc: control@bugs.debian.org
Subject: Re: Bug#246774: ssh: scp hangs forever on named pipes.
Date: Sat, 1 May 2004 10:33:19 +0100
forwarded 246774 http://bugzilla.mindrot.org/show_bug.cgi?id=856
thanks

On Sat, May 01, 2004 at 02:51:06AM +0200, Wolfgang Rohdewald wrote:
> Package: ssh
> Version: 1:3.8p1-3
> Severity: important
> 
> This renders scp -r rather unuseful, it stops when
> reaching the first named pipe without giving any 
> indication for the reason.

Forwarded upstream as bug #856, thanks.

-- 
Colin Watson                                  [cjwatson@flatline.org.uk]



Noted your statement that Bug has been forwarded to http://bugzilla.mindrot.org/show_bug.cgi?id=856. Request was from Colin Watson <cjwatson@debian.org> to control@bugs.debian.org. (full text, mbox, link).


Tags added: upstream Request was from bts-link-upstream@lists.alioth.debian.org to control@bugs.debian.org. (full text, mbox, link).


Tags added: fixed-upstream Request was from bts-link-upstream@lists.alioth.debian.org to control@bugs.debian.org. (Thu, 14 Jun 2007 21:45:05 GMT) (full text, mbox, link).


Reply sent to Colin Watson <cjwatson@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Wolfgang Rohdewald <wolfgang@rohdewald.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #21 received at 246774-close@bugs.debian.org (full text, mbox, reply):

From: Colin Watson <cjwatson@debian.org>
To: 246774-close@bugs.debian.org
Subject: Bug#246774: fixed in openssh 1:4.7p1-1
Date: Mon, 24 Dec 2007 17:17:03 +0000
Source: openssh
Source-Version: 1:4.7p1-1

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.7p1-1_i386.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.7p1-1_i386.udeb
openssh-client_4.7p1-1_i386.deb
  to pool/main/o/openssh/openssh-client_4.7p1-1_i386.deb
openssh-server-udeb_4.7p1-1_i386.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.7p1-1_i386.udeb
openssh-server_4.7p1-1_i386.deb
  to pool/main/o/openssh/openssh-server_4.7p1-1_i386.deb
openssh_4.7p1-1.diff.gz
  to pool/main/o/openssh/openssh_4.7p1-1.diff.gz
openssh_4.7p1-1.dsc
  to pool/main/o/openssh/openssh_4.7p1-1.dsc
openssh_4.7p1.orig.tar.gz
  to pool/main/o/openssh/openssh_4.7p1.orig.tar.gz
ssh-askpass-gnome_4.7p1-1_i386.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.7p1-1_i386.deb
ssh-krb5_4.7p1-1_all.deb
  to pool/main/o/openssh/ssh-krb5_4.7p1-1_all.deb
ssh_4.7p1-1_all.deb
  to pool/main/o/openssh/ssh_4.7p1-1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 246774@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 24 Dec 2007 16:43:02 +0000
Source: openssh
Binary: ssh-askpass-gnome ssh-krb5 openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source i386 all
Version: 1:4.7p1-1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell server, an rshd replacement
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 123013 246774 303453 327886 345628 365541 390699 405041 433181 444738 453285 453367
Changes: 
 openssh (1:4.7p1-1) unstable; urgency=low
 .
   * New upstream release (closes: #453367).
     - CVE-2007-4752: Prevent ssh(1) from using a trusted X11 cookie if
       creation of an untrusted cookie fails; found and fixed by Jan Pechanec
       (closes: #444738).
     - sshd(8) in new installations defaults to SSH Protocol 2 only. Existing
       installations are unchanged.
     - The SSH channel window size has been increased, and both ssh(1)
       sshd(8) now send window updates more aggressively. These improves
       performance on high-BDP (Bandwidth Delay Product) networks.
     - ssh(1) and sshd(8) now preserve MAC contexts between packets, which
       saves 2 hash calls per packet and results in 12-16% speedup for
       arcfour256/hmac-md5.
     - A new MAC algorithm has been added, UMAC-64 (RFC4418) as
       "umac-64@openssh.com". UMAC-64 has been measured to be approximately
       20% faster than HMAC-MD5.
     - Failure to establish a ssh(1) TunnelForward is now treated as a fatal
       error when the ExitOnForwardFailure option is set.
     - ssh(1) returns a sensible exit status if the control master goes away
       without passing the full exit status.
     - When using a ProxyCommand in ssh(1), set the outgoing hostname with
       gethostname(2), allowing hostbased authentication to work.
     - Make scp(1) skip FIFOs rather than hanging (closes: #246774).
     - Encode non-printing characters in scp(1) filenames. These could cause
       copies to be aborted with a "protocol error".
     - Handle SIGINT in sshd(8) privilege separation child process to ensure
       that wtmp and lastlog records are correctly updated.
     - Report GSSAPI mechanism in errors, for libraries that support multiple
       mechanisms.
     - Improve documentation for ssh-add(1)'s -d option.
     - Rearrange and tidy GSSAPI code, removing server-only code being linked
       into the client.
     - Delay execution of ssh(1)'s LocalCommand until after all forwardings
       have been established.
     - In scp(1), do not truncate non-regular files.
     - Improve exit message from ControlMaster clients.
     - Prevent sftp-server(8) from reading until it runs out of buffer space,
       whereupon it would exit with a fatal error (closes: #365541).
     - pam_end() was not being called if authentication failed
       (closes: #405041).
     - Manual page datestamps updated (closes: #433181).
   * Install the OpenSSH FAQ in /usr/share/doc/openssh-client.
     - Includes documentation on copying files with colons using scp
       (closes: #303453).
   * Create /var/run/sshd on start even if /etc/ssh/sshd_not_to_be_run exists
     (closes: #453285).
   * Fix "overriden" typo in ssh(1) (thanks, A. Costa; closes: #390699).
   * Refactor debian/rules configure and make invocations to make development
     easier.
   * Remove the hideously old /etc/ssh/primes on upgrade (closes: #123013).
   * Update moduli(5) to revision 1.11 from OpenBSD CVS.
   * Document the non-default options we set as standard in ssh_config(5) and
     sshd_config(5) (closes: #327886, #345628).
   * Recode LICENCE to UTF-8 when concatenating it to debian/copyright.
   * Override desktop-file-but-no-dh_desktop-call lintian warning; the
     .desktop file is intentionally not installed (see 1:3.8.1p1-10).
   * Update copyright dates for Kerberos patch in debian/copyright.head.
   * Policy version 3.7.3: no changes required.
Files: 
 e4be8bf0d8eeb50aced09e83b971ee1b 1132 net standard openssh_4.7p1-1.dsc
 bea83d2e0f9ac7b3d4393d693e68b5c1 1009361 net standard openssh_4.7p1.orig.tar.gz
 8dbea4ef533097fe69f373be3391884e 201822 net standard openssh_4.7p1-1.diff.gz
 05d181f3d6ded8352216fd2c5334f5a1 1044 net extra ssh_4.7p1-1_all.deb
 c0b77420c1144e9c546b89522dbad3a7 86892 net extra ssh-krb5_4.7p1-1_all.deb
 9681446b5860a92b931f48b33c2bde09 661682 net standard openssh-client_4.7p1-1_i386.deb
 04c0b2d9d2c6658fa91ba5cc2208f1fe 244302 net optional openssh-server_4.7p1-1_i386.deb
 150374216e2494558e6657bf11474e4e 94468 gnome optional ssh-askpass-gnome_4.7p1-1_i386.deb
 2ddb6b74912130c019f6874d9fda20e6 158566 debian-installer optional openssh-client-udeb_4.7p1-1_i386.udeb
 56e6ed3cdd943b9dac92830004a82d8f 169090 debian-installer optional openssh-server-udeb_4.7p1-1_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQFHb+Vx9t0zAhD6TNERAvdSAJ9pCqLCB8vG2v0gIO/PClsJWlJp/QCdGs4U
IKqTDQgKydVQv435xVHnYD8=
=k6Bk
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 23 Jan 2008 07:29:55 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Mar 25 19:12:55 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.