Debian Bug report logs -
#650512
IPQoS not honoured
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#650512; Package openssh-client.
(Wed, 30 Nov 2011 12:54:05 GMT) (full text, mbox, link).
Acknowledgement sent
to martin f krafft <madduck@debian.org>:
New Bug report received and forwarded. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Wed, 30 Nov 2011 12:54:13 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: openssh-client
Version: 1:5.8p1-4
Severity: normal
While openssh-client seems to properly switch between the
lowdelay/throughput QoS classes depending on whether the session is
interactive or not, the new IPQoS option seems to have absolutely no
effect:
% ssh -vvvo 'IPQoS ef' -4 -Snone vera 2>&1 >/dev/null | egrep tos || echo no match
debug3: packet_set_tos: set IP_TOS 0x10
^D
% ssh -vvvo 'IPQoS ef' -4 -Snone vera true 2>&1 >/dev/null | egrep tos || echo no match
debug3: packet_set_tos: set IP_TOS 0x08
In both cases, the TOS value should be 0x2e (class ef). Using the
hex number does not work either:
% ssh -vvvo 'IPQoS 0x2e' -4 -Snone vera 2>&1 >/dev/null | egrep tos || echo no match
debug3: packet_set_tos: set IP_TOS 0x10
^D
% ssh -vvvo 'IPQoS 0x2e' -4 -Snone vera true 2>&1 >/dev/null | egrep tos || echo no match
debug3: packet_set_tos: set IP_TOS 0x08
I have also verified the actual packets emitted using tcpdump on the
next hop.
Exactly the same behaviour can be observed with IPv6 after upgrading to
1:5.9p1-7 (see #643312).
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 3.1.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_NZ, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages openssh-client depends on:
ii adduser 3.113
ii debconf [debconf-2.0] 1.5.41
ii dpkg 1.16.1.1
ii libc6 2.13-21
ii libedit2 2.11-20080614-3
ii libgssapi-krb5-2 1.9.1+dfsg-3
ii libselinux1 2.1.0-4
ii libssl1.0.0 1.0.0e-2.1
ii passwd 1:4.1.4.2+svn3283-3
ii zlib1g 1:1.2.3.4.dfsg-3
Versions of packages openssh-client recommends:
ii openssh-blacklist 0.4.1
ii openssh-blacklist-extra <none>
ii xauth 1:1.0.6-1
Versions of packages openssh-client suggests:
ii gtk-led-askpass [ssh-askpass] 0.11-1
ii keychain <none>
ii libpam-ssh <none>
ii monkeysphere 0.35-2
-- Configuration Files:
/etc/ssh/ssh_config changed [not included]
-- no debconf information
--
.''`. martin f. krafft <madduck@d.o> Related projects:
: :' : proud Debian developer http://debiansystem.info
`. `'` http://people.debian.org/~madduck http://vcs-pkg.org
`- Debian - when you have better things to do than fixing systems
[digital_signature_gpg.asc (application/pgp-signature, inline)]
Added tag(s) upstream.
Request was from martin f. krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 18 Dec 2011 11:12:51 GMT) (full text, mbox, link).
Added tag(s) fixed-upstream.
Request was from bts-link-upstream@lists.alioth.debian.org
to control@bugs.debian.org.
(Mon, 12 Mar 2012 16:39:29 GMT) (full text, mbox, link).
Reply sent
to Colin Watson <cjwatson@debian.org>:
You have taken responsibility.
(Sat, 26 May 2012 23:15:11 GMT) (full text, mbox, link).
Notification sent
to martin f krafft <madduck@debian.org>:
Bug acknowledged by developer.
(Sat, 26 May 2012 23:15:11 GMT) (full text, mbox, link).
Message #16 received at 650512-close@bugs.debian.org (full text, mbox, reply):
Source: openssh
Source-Version: 1:6.0p1-1
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:
openssh-client-udeb_6.0p1-1_i386.udeb
to main/o/openssh/openssh-client-udeb_6.0p1-1_i386.udeb
openssh-client_6.0p1-1_i386.deb
to main/o/openssh/openssh-client_6.0p1-1_i386.deb
openssh-server-udeb_6.0p1-1_i386.udeb
to main/o/openssh/openssh-server-udeb_6.0p1-1_i386.udeb
openssh-server_6.0p1-1_i386.deb
to main/o/openssh/openssh-server_6.0p1-1_i386.deb
openssh_6.0p1-1.debian.tar.gz
to main/o/openssh/openssh_6.0p1-1.debian.tar.gz
openssh_6.0p1-1.dsc
to main/o/openssh/openssh_6.0p1-1.dsc
openssh_6.0p1.orig.tar.gz
to main/o/openssh/openssh_6.0p1.orig.tar.gz
ssh-askpass-gnome_6.0p1-1_i386.deb
to main/o/openssh/ssh-askpass-gnome_6.0p1-1_i386.deb
ssh-krb5_6.0p1-1_all.deb
to main/o/openssh/ssh-krb5_6.0p1-1_all.deb
ssh_6.0p1-1_all.deb
to main/o/openssh/ssh_6.0p1-1_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 650512@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 26 May 2012 13:48:14 +0100
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source i386 all
Version: 1:6.0p1-1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
openssh-client - secure shell (SSH) client, for secure access to remote machines
openssh-client-udeb - secure shell client for the Debian installer (udeb)
openssh-server - secure shell (SSH) server, for secure access from remote machines
openssh-server-udeb - secure shell server for the Debian installer (udeb)
ssh - secure shell client and server (metapackage)
ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
ssh-krb5 - secure shell client and server (transitional package)
Closes: 643312 650512 669667 669699 671010 671075
Changes:
openssh (1:6.0p1-1) unstable; urgency=low
.
[ Roger Leigh ]
* Display dynamic part of MOTD from /run/motd.dynamic, if it exists
(closes: #669699).
.
[ Colin Watson ]
* Update OpenSSH FAQ to revision 1.113, fixing missing line break (closes:
#669667).
* New upstream release (closes: #671010,
http://www.openssh.org/txt/release-6.0).
- Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections
(closes: #643312, #650512, #671075).
- Add a new privilege separation sandbox implementation for Linux's new
seccomp sandbox, automatically enabled on platforms that support it.
(Note: privilege separation sandboxing is still experimental.)
* Fix a bashism in configure's seccomp_filter check.
* Add a sandbox fallback mechanism, so that behaviour on Linux depends on
whether the running system's kernel has seccomp_filter support, not the
build system's kernel (forwarded upstream as
https://bugzilla.mindrot.org/show_bug.cgi?id=2011).
Checksums-Sha1:
713f6ea84273a3d10aae59fe170f6e13f8222b11 2535 openssh_6.0p1-1.dsc
f691e53ef83417031a2854b8b1b661c9c08e4422 1126034 openssh_6.0p1.orig.tar.gz
0d7cfc8b2be51d79225e536bc55b17119dee7747 245085 openssh_6.0p1-1.debian.tar.gz
6b98e4210e9d32a0b0f8d6be8d328de802c9a7fa 1045028 openssh-client_6.0p1-1_i386.deb
8d06d2a8439c9bd4853cb7839d6279a72e2a0716 341484 openssh-server_6.0p1-1_i386.deb
49a0e4492a7da4add87fa1a39fac3f8e36d674c7 1246 ssh_6.0p1-1_all.deb
69aff554a4fa4a93f7131b208e937d71af4dad4e 88382 ssh-krb5_6.0p1-1_all.deb
f5739ffe6c550bd8730f561c03b5e274ee60aa77 96478 ssh-askpass-gnome_6.0p1-1_i386.deb
869cdcfc0e4cb0264be0a89937c79f3f3a338605 181002 openssh-client-udeb_6.0p1-1_i386.udeb
d11fdbedda23e7662896ee8cf5318e6c5d19bab3 193962 openssh-server-udeb_6.0p1-1_i386.udeb
Checksums-Sha256:
34421fd57463f72980eee7db2b2b4d3f5b5144856075a5a3a25c8d533e621850 2535 openssh_6.0p1-1.dsc
589d48e952d6c017e667873486b5df63222f9133d417d0002bd6429d9bd882de 1126034 openssh_6.0p1.orig.tar.gz
64979a504f2cc1c6a0f17ce04b74e11b73a4d204e81f6803b6630a7fd5955a5f 245085 openssh_6.0p1-1.debian.tar.gz
3cc6da79d3ac2102b49c268ed8114343a00e1386a7f102ed00825516446be2e5 1045028 openssh-client_6.0p1-1_i386.deb
49b2f7ce378d6e8a8001fa83a769b19e27ac29b49e9c33706d8fde7d597eabd4 341484 openssh-server_6.0p1-1_i386.deb
1e8642f3ffc24ee238a538b66820a59a6e8fbfe921f95b2a987c59e5f5979d54 1246 ssh_6.0p1-1_all.deb
ba50fdbf029c4fb418eaaa2297be7319bc9690593af25db048161546d96b74a8 88382 ssh-krb5_6.0p1-1_all.deb
b9daf62704f09f3dd855cd3426fd8f6473dad42ae3441e3e0c1f34762f686af4 96478 ssh-askpass-gnome_6.0p1-1_i386.deb
610ce905d03f24535833950b5f8712e8a79c0d347103ad02b39716742b470521 181002 openssh-client-udeb_6.0p1-1_i386.udeb
2e821d368477a26c56f7d6910147097b80be989c20aa42f2c3f45380f38f529c 193962 openssh-server-udeb_6.0p1-1_i386.udeb
Files:
c9363937ab3b7e81ed4a295c14924bb6 2535 net standard openssh_6.0p1-1.dsc
3c9347aa67862881c5da3f3b1c08da7b 1126034 net standard openssh_6.0p1.orig.tar.gz
da666358d83b7e57175e0a2b41163508 245085 net standard openssh_6.0p1-1.debian.tar.gz
a15232aa5ffd78ca120548b76bfbeac3 1045028 net standard openssh-client_6.0p1-1_i386.deb
1c5c1f1b7a8d8a5c85c5a580a673cb08 341484 net optional openssh-server_6.0p1-1_i386.deb
6bbf690dcefbc288ec71867622cf16c2 1246 net extra ssh_6.0p1-1_all.deb
4cd2b8d3f3bd27c3b33572f0ca6d9e70 88382 oldlibs extra ssh-krb5_6.0p1-1_all.deb
d46d11ef4a83561cdf630b235d41f20c 96478 gnome optional ssh-askpass-gnome_6.0p1-1_i386.deb
5e98e473c0bb456f40c79b0b4d240fe0 181002 debian-installer optional openssh-client-udeb_6.0p1-1_i386.udeb
7c8844e24a63ce2a66d42884a13da79d 193962 debian-installer optional openssh-server-udeb_6.0p1-1_i386.udeb
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer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=OyFo
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Wed, 04 Jul 2012 07:35:07 GMT) (full text, mbox, link).
Bug unarchived.
Request was from martin f. krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 14 Oct 2012 06:00:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#650512; Package openssh-client.
(Sun, 14 Oct 2012 06:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Sun, 14 Oct 2012 06:03:03 GMT) (full text, mbox, link).
Message #25 received at 650512@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
reopen 650512
tags 650512 - fixed-upstream
notfixed 650512 1:6.0p1-1
found 650512 1:6.0p1-1
thanks
> openssh (1:6.0p1-1) unstable; urgency=low
> […]
> [ Colin Watson ]
> * New upstream release (closes: #671010,
> http://www.openssh.org/txt/release-6.0).
> - Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections
> (closes: #643312, #650512, #671075).
With 6.0, I get exactly the same behaviour as before, so #650512 is
not fixed, sorry…
--
.''`. martin f. krafft <madduck@d.o> Related projects:
: :' : proud Debian developer http://debiansystem.info
`. `'` http://people.debian.org/~madduck http://vcs-pkg.org
`- Debian - when you have better things to do than fixing systems
[digital_signature_gpg.asc (application/pgp-signature, inline)]
Bug reopened
Request was from martin f krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 14 Oct 2012 06:03:04 GMT) (full text, mbox, link).
No longer marked as fixed in versions openssh/1:6.0p1-1.
Request was from martin f krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 14 Oct 2012 06:03:05 GMT) (full text, mbox, link).
Removed tag(s) fixed-upstream.
Request was from martin f krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 14 Oct 2012 06:03:05 GMT) (full text, mbox, link).
Marked as found in versions openssh/1:6.0p1-1.
Request was from martin f krafft <madduck@debian.org>
to control@bugs.debian.org.
(Sun, 14 Oct 2012 06:03:05 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#650512; Package openssh-client.
(Mon, 15 Oct 2012 07:57:06 GMT) (full text, mbox, link).
Acknowledgement sent
to martin f krafft <madduck@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Mon, 15 Oct 2012 07:57:06 GMT) (full text, mbox, link).
Message #38 received at 650512@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
tags 650512 - upstream
thanks
According to https://bugzilla.mindrot.org/show_bug.cgi?id=1963#c6,
the bug is in Debian only, not in upstream…
However, I cannot find anything in debian/patches that would explain
this…
--
.''`. martin f. krafft <madduck@d.o> Related projects:
: :' : proud Debian developer http://debiansystem.info
`. `'` http://people.debian.org/~madduck http://vcs-pkg.org
`- Debian - when you have better things to do than fixing systems
[digital_signature_gpg.asc (application/pgp-signature, inline)]
Removed tag(s) upstream.
Request was from martin f krafft <madduck@debian.org>
to control@bugs.debian.org.
(Mon, 15 Oct 2012 07:57:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>:
Bug#650512; Package openssh-client.
(Fri, 13 Sep 2013 18:00:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Sean Alexandre <sean@alexan.org>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>.
(Fri, 13 Sep 2013 18:00:13 GMT) (full text, mbox, link).
Message #45 received at 650512@bugs.debian.org (full text, mbox, reply):
I just built the latest upstream and see the problem, so I don't think this is Debian
specific.
I built both openssh-6.0p1 (the version that comes with wheezy) and openssh-6.3p1 (latest
official release).
Here's a post to debian-ssh that describes what I'm doing to see the problem:
IPQoS not affecting TCP_NODELAY
http://lists.debian.org/debian-ssh/2013/09/msg00010.html
I'm also seeing the original problem that was reported:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650512#5
Added tag(s) fixed-upstream.
Request was from debian-bts-link@lists.debian.org
to control@bugs.debian.org.
(Fri, 13 Apr 2018 22:19:41 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sat Mar 25 18:43:03 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.