Debian Bug report logs - #498297
openssh: Please set traffic class on IPv6 packets

version graph

Package: openssh; Maintainer for openssh is Debian OpenSSH Maintainers <>;

Reported by: Lionel Elie Mamane <>

Date: Mon, 8 Sep 2008 20:12:02 UTC

Severity: wishlist

Tags: fixed-upstream, ipv6, patch, sid, squeeze, wheezy

Found in version 1:5.1p1

Fixed in version openssh/1:5.9p1-1

Done: Colin Watson <>

Bug is archived. No further changes may be made.

Forwarded to

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox

Report forwarded to, Debian OpenSSH Maintainers <>:
Bug#498297; Package openssh. Full text and rfc822 format available.

Acknowledgement sent to Lionel Elie Mamane <>:
New Bug report received and forwarded. Copy sent to Debian OpenSSH Maintainers <>. Full text and rfc822 format available.

Message #5 received at (full text, mbox):

From: Lionel Elie Mamane <>
To: Debian Bug Tracking System <>
Subject: openssh: Please set traffic class on IPv6 packets
Date: Mon, 8 Sep 2008 22:09:44 +0200
[Message part 1 (text/plain, inline)]
Package: openssh
Version: 1:5.1p1
Severity: wishlist
Tags: patch

OpenSSH sets the IPv4 ToS (Type of Service) byte to "low delay" or
"max throughput" depending on the situation, but does not set the
equivalent IPv6 Traffic Class byte. As far as I understand, these two
bytes are supposed to be used the same way, so here's a patch to set
the said traffic class byte on IPv6 packets.

[openssh_set_ipv6_traffic_class.patch (text/x-diff, attachment)]

Added tag(s) ipv6. Request was from Simon Paillard <> to (Sat, 16 Jan 2010 19:48:24 GMT) Full text and rfc822 format available.

Severity set to 'serious' from 'wishlist' Request was from Clint Adams <> to (Tue, 23 Mar 2010 01:03:42 GMT) Full text and rfc822 format available.

Added tag(s) sid and squeeze. Request was from Gerfried Fuchs <> to (Tue, 23 Mar 2010 07:51:50 GMT) Full text and rfc822 format available.

Severity set to 'wishlist' from 'serious' Request was from Gerfried Fuchs <> to (Tue, 23 Mar 2010 08:30:44 GMT) Full text and rfc822 format available.

Set Bug forwarded-to-address to ''. Request was from Colin Watson <> to (Tue, 08 Feb 2011 14:57:10 GMT) Full text and rfc822 format available.

Added tag(s) wheezy. Request was from Kurt Roeckx <> to (Wed, 16 Feb 2011 19:03:17 GMT) Full text and rfc822 format available.

Added tag(s) fixed-upstream. Request was from to (Mon, 16 May 2011 16:42:12 GMT) Full text and rfc822 format available.

Reply sent to Colin Watson <>:
You have taken responsibility. (Thu, 08 Sep 2011 00:06:12 GMT) Full text and rfc822 format available.

Notification sent to Lionel Elie Mamane <>:
Bug acknowledged by developer. (Thu, 08 Sep 2011 00:06:12 GMT) Full text and rfc822 format available.

Message #24 received at (full text, mbox):

From: Colin Watson <>
Subject: Bug#498297: fixed in openssh 1:5.9p1-1
Date: Thu, 08 Sep 2011 00:03:23 +0000
Source: openssh
Source-Version: 1:5.9p1-1

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

  to main/o/openssh/openssh-client-udeb_5.9p1-1_i386.udeb
  to main/o/openssh/openssh-client_5.9p1-1_i386.deb
  to main/o/openssh/openssh-server-udeb_5.9p1-1_i386.udeb
  to main/o/openssh/openssh-server_5.9p1-1_i386.deb
  to main/o/openssh/openssh_5.9p1-1.debian.tar.gz
  to main/o/openssh/openssh_5.9p1-1.dsc
  to main/o/openssh/openssh_5.9p1.orig.tar.gz
  to main/o/openssh/ssh-askpass-gnome_5.9p1-1_i386.deb
  to main/o/openssh/ssh-krb5_5.9p1-1_all.deb
  to main/o/openssh/ssh_5.9p1-1_all.deb

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Colin Watson <> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA256

Format: 1.8
Date: Wed, 07 Sep 2011 23:46:00 +0100
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source i386 all
Version: 1:5.9p1-1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <>
Changed-By: Colin Watson <>
 openssh-client - secure shell (SSH) client, for secure access to remote machines
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell (SSH) server, for secure access from remote machines
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 75043 76312 229124 429243 444691 498297 504757 560156 599240
 openssh (1:5.9p1-1) unstable; urgency=low
   * New upstream release (
     - Introduce sandboxing of the pre-auth privsep child using an optional
       sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables
       mandatory restrictions on the syscalls the privsep child can perform.
     - Add new SHA256-based HMAC transport integrity modes from
     - The pre-authentication sshd(8) privilege separation slave process now
       logs via a socket shared with the master process, avoiding the need to
       maintain /dev/log inside the chroot (closes: #75043, #429243,
     - ssh(1) now warns when a server refuses X11 forwarding (closes:
     - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
       separated by whitespace (closes: #76312).  The authorized_keys2
       fallback is deprecated but documented (closes: #560156).
     - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4
       ToS/DSCP (closes: #498297).
     - ssh-add(1) now accepts keys piped from standard input.  E.g. "ssh-add
       - < /path/to/key" (closes: #229124).
     - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691).
     - Say "required" rather than "recommended" in unprotected-private-key
       warning (LP: #663455).
   * Update OpenSSH FAQ to revision 1.112.
 0ba9f1a9edfa3382d0bb8d46662171d3d69f3899 2262 openssh_5.9p1-1.dsc
 ac4e0055421e9543f0af5da607a72cf5922dcc56 1110014 openssh_5.9p1.orig.tar.gz
 97168246fc1a9b3377de171f14909bd6d78a672d 237065 openssh_5.9p1-1.debian.tar.gz
 fc55a383f87b5c4d8340424516e6cd32c50eeb7e 1037764 openssh-client_5.9p1-1_i386.deb
 a2c769a195a70fefb281d5f8499d83e641f0603d 339636 openssh-server_5.9p1-1_i386.deb
 55337e28e302f6a20f77ff2b9dadc906a26d84d4 1248 ssh_5.9p1-1_all.deb
 5f1c19ea1c8c4d87f33a28ffd1d550ddc48d6723 83452 ssh-krb5_5.9p1-1_all.deb
 dfda1d639fd38b0a2034c0edeef722196f0e1e4d 90930 ssh-askpass-gnome_5.9p1-1_i386.deb
 3f518a8c2e8170cbb05095427f361dfbe21b22fa 258686 openssh-client-udeb_5.9p1-1_i386.udeb
 9cb16057d691947ec282ad7590d56da6eaa12ca2 291406 openssh-server-udeb_5.9p1-1_i386.udeb
 ea680e24ff1dd762b6cbfb5435a8a72516dd7723aecd1d88c8de5a1d4461847b 2262 openssh_5.9p1-1.dsc
 8d3e8b6b6ff04b525a6dfa6fdeb6a99043ccf6c3310cc32eba84c939b07777d5 1110014 openssh_5.9p1.orig.tar.gz
 b49c3539c20815557338dc4a20d44b4aa3a2b2c6a1c84af4fcae6670ed24d753 237065 openssh_5.9p1-1.debian.tar.gz
 453af7f76ad8e7ab72b2dac158cab923513c061fad0cac6342f11d894bdc20f3 1037764 openssh-client_5.9p1-1_i386.deb
 401a3d25c0611763bf43cefee2eaa52cfe56ef3093b4287eb40097e6f8a532d7 339636 openssh-server_5.9p1-1_i386.deb
 1d421348d13e33abe2f0a1a8cbd5056ffc198ca513429334295fc6cd4e4dc09d 1248 ssh_5.9p1-1_all.deb
 4d43ef9be6b94af2c2b79939d5d0e69b0486442790cc4e71781479b47d009141 83452 ssh-krb5_5.9p1-1_all.deb
 0483699f810a8f75ab5aca6e12cf1de45ed5d6cc4a27bc079fb14607f0ec84b0 90930 ssh-askpass-gnome_5.9p1-1_i386.deb
 6253bdc1f1311292eb8189733b2c2549ffe3748b40935c00bb9d8c3a55c3d6e2 258686 openssh-client-udeb_5.9p1-1_i386.udeb
 612bc799c4bf8d5110c3ab38ad944a95209a72528b2334ecedcdf4c41d0d9102 291406 openssh-server-udeb_5.9p1-1_i386.udeb
 1eeb747651ca43d84013d4ed19fa6673 2262 net standard openssh_5.9p1-1.dsc
 afe17eee7e98d3b8550cc349834a85d0 1110014 net standard openssh_5.9p1.orig.tar.gz
 ae82efba18958ccd27ae0cb176291360 237065 net standard openssh_5.9p1-1.debian.tar.gz
 d901c07e5a89146b229503d4e2a7ecd9 1037764 net standard openssh-client_5.9p1-1_i386.deb
 f483c10831cc6ad016f328d2d9bbfdfb 339636 net optional openssh-server_5.9p1-1_i386.deb
 b83d4d08aebef3f4d4893dff49e1f6b4 1248 net extra ssh_5.9p1-1_all.deb
 16a6817cc68764309d961e54dda85b31 83452 net extra ssh-krb5_5.9p1-1_all.deb
 71d5db3e60bb2c5909b2951908d26f73 90930 gnome optional ssh-askpass-gnome_5.9p1-1_i386.deb
 a7a4fa8017a653f710179e404d082bf6 258686 debian-installer optional openssh-client-udeb_5.9p1-1_i386.udeb
 7a3384769372b751843da6843d8f82d6 291406 debian-installer optional openssh-server-udeb_5.9p1-1_i386.udeb
Package-Type: udeb

Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Colin Watson <> -- Debian developer


Bug archived. Request was from Debbugs Internal Request <> to (Sun, 16 Oct 2011 07:38:49 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.

Debian bug tracking system administrator <>. Last modified: Wed Apr 16 05:14:30 2014; Machine Name:

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.