Debian Bug report logs - #542680
ldm: ssh warnings force repetition of password entry

version graph

Package: ldm; Maintainer for ldm is Debian LTSP Maintainers <team+ltsp@tracker.debian.org>; Source for ldm is src:ldm (PTS, buildd, popcon).

Reported by: Martin Chase <outofculture@gmail.com>

Date: Thu, 20 Aug 2009 19:27:01 UTC

Severity: normal

Found in version ldm/2:2.0.42-2

Fixed in version ldm/2:2.2.10-1

Done: Vagrant Cascadian <vagrant@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>:
Bug#542680; Package ldm. (Thu, 20 Aug 2009 19:27:06 GMT) (full text, mbox, link).


Acknowledgement sent to Martin Chase <outofculture@gmail.com>:
New Bug report received and forwarded. Copy sent to LTSP Debian/Ubuntu Maintainers <pkg-ltsp-devel@lists.alioth.debian.org>. (Thu, 20 Aug 2009 19:27:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Martin Chase <outofculture@gmail.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ldm: ssh warnings force repetition of password entry
Date: Thu, 20 Aug 2009 12:22:05 -0700
Package: ldm
Version: 2:2.0.42-2
Severity: normal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


the warning happens on our systems when ssh "adds rsa key for 10.2.2...",
as we only have our hosts' keys listed by name.
the problem with ldm is that this warning leads to ldm seeming to forget
that the user typed in their password,
prompting for it again after a brief pause.

note that the cursor also does not start within the second password prompt,
and the user is forced to tab or click into it.
this is not unimportant,
as the root problem being fixed will obviate any need to address this.

please note that the dependencies listed below are for version 2:2.0.6-4,
but i couldn't get reportbug to run in the chroot (which uses squeeze).

- -- System Information:
Debian Release: 5.0.2
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages ldm depends on:
ii  gtk2-engines [gtk2-eng 1:2.14.3-2        theme engines for GTK+ 2.x
ii  libatk1.0-0            1.22.0-1          The ATK accessibility toolkit
ii  libc6                  2.7-18            GNU C Library: Shared libraries
ii  libcairo2              1.6.4-7           The Cairo 2D vector graphics libra
ii  libglib2.0-0           2.16.6-2          The GLib library of C routines
ii  libgtk2.0-0            2.12.12-1~lenny1  The GTK+ graphical user interface
ii  libpango1.0-0          1.20.5-5          Layout and rendering of internatio
ii  openssh-client         1:5.1p1-5         secure shell client, an rlogin/rsh
ii  ssh                    1:5.1p1-5         secure shell client and server (me
ii  xserver-xorg           1:7.3+19          the X.Org X server
ii  xserver-xorg-core [xse 2:1.4.2-10.lenny2 Xorg X server - core server

Versions of packages ldm recommends:
ii  netcat                        1.10-38    TCP/IP swiss army knife -- transit
ii  netcat-traditional [netcat]   1.10-38    TCP/IP swiss army knife

ldm suggests no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
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=Jstq
-----END PGP SIGNATURE-----




Reply sent to Vagrant Cascadian <vagrant@debian.org>:
You have taken responsibility. (Thu, 07 Jun 2012 23:12:03 GMT) (full text, mbox, link).


Notification sent to Martin Chase <outofculture@gmail.com>:
Bug acknowledged by developer. (Thu, 07 Jun 2012 23:12:03 GMT) (full text, mbox, link).


Message #10 received at 542680-done@bugs.debian.org (full text, mbox, reply):

From: Vagrant Cascadian <vagrant@debian.org>
To: 542680-done@bugs.debian.org
Subject: Re: Bug#542680: ldm: ssh warnings force repetition of password entry
Date: Thu, 7 Jun 2012 16:08:53 -0700
Version: 2.2.10-1

On Thu, Aug 20, 2009 at 12:22:05PM -0700, Martin Chase wrote:
> the warning happens on our systems when ssh "adds rsa key for 10.2.2...",
> as we only have our hosts' keys listed by name.
> the problem with ldm is that this warning leads to ldm seeming to forget
> that the user typed in their password,
> prompting for it again after a brief pause.

I verified that this was fixed in recent versions of LDM.

Thanks for the bug report!

live well,
  vagrant




Marked as fixed in versions ldm/2:2.2.10-1. Request was from Petter Reinholdtsen <pere@hungry.com> to control@bugs.debian.org. (Sun, 23 Jun 2013 20:30:14 GMT) (full text, mbox, link).


No longer marked as fixed in versions 2.2.10-1. Request was from Petter Reinholdtsen <pere@hungry.com> to control@bugs.debian.org. (Sun, 23 Jun 2013 20:30:15 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 22 Jul 2013 07:34:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Jul 1 13:28:45 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.