Bug#865972: marked as done (rkhunter: SSH Protocol is now deprecated, but rkhunter demands that it is set)
Your message dated Wed, 09 Aug 2017 18:22:01 + with message-idand subject line Bug#865972: fixed in rkhunter 1.4.4-3 has caused the Debian Bug report #865972, regarding rkhunter: SSH Protocol is now deprecated, but rkhunter demands that it is set to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 865972: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865972 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: rkhunter Version: 1.4.2-6 Severity: normal Dear Maintainer, the openssh-server version that is now in Debian testing no longer uses the Protocol configuration directive. It is absent from the default /etc/ssh/sshd_config file as well as the man page. Currently, you can still include `Protocol 2` in the config without getting an error from sshd. Which is what I had to do in order to appease rkhunter which insists that this must be set. Can rkhunter skip this test if the OpenSSH server version is >= 7.5? Otherwise, maybe it's time to stop testing for Protocol in general. Cheers, C: -- System Information: Debian Release: 9.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-3-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages rkhunter depends on: ii binutils 2.28-6 ii debconf [debconf-2.0] 1.5.61 ii file 1:5.30-1 ii lsof 4.89+dfsg-0.1 ii net-tools 1.60+git20161116.90da8a0-1 ii perl 5.24.1-4 ii ucf3.0036 Versions of packages rkhunter recommends: ii bsd-mailx [mailx] 8.1.2-0.20160123cvs-4 ii curl7.52.1-5 ii dma [mail-transport-agent] 0.11-1+b1 ii iproute24.9.0-1 ii unhide 20130526-1 ii unhide.rb 22-2 ii wget1.19.1-3 Versions of packages rkhunter suggests: ii liburi-perl 1.71-1 ii libwww-perl 6.15-1 ii powermgmt-base 1.31+nmu1 -- Configuration Files: /etc/rkhunter.conf changed [not included] -- debconf information excluded --- End Message --- --- Begin Message --- Source: rkhunter Source-Version: 1.4.4-3 We believe that the bug you reported is fixed in the latest version of rkhunter, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 865...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Francois Marier (supplier of updated rkhunter package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 09 Aug 2017 10:59:24 -0700 Source: rkhunter Binary: rkhunter Architecture: source all Version: 1.4.4-3 Distribution: unstable Urgency: medium Maintainer: Debian Forensics Changed-By: Francois Marier Description: rkhunter - rootkit, backdoor, sniffer and exploit scanner Closes: 865972 Changes: rkhunter (1.4.4-3) unstable; urgency=medium . * Update logcheck rules for 1.4.4. * Disable the ssh protocol test (closes: #865972) * Bump debhelper compatibility to 10 Checksums-Sha1: f33f661f20b2c8c1caf2c3c9881cd86f39a79b18 2055 rkhunter_1.4.4-3.dsc de76f31296e343abe23b89e6e57c68d66d4b0c4d 26440 rkhunter_1.4.4-3.debian.tar.xz bb6b1717b0f51c71af5953d9e509552333c5fa19 251540 rkhunter_1.4.4-3_all.deb e28bed758b325861cdafa7a3b64c8d26532b4ada 5486 rkhunter_1.4.4-3_amd64.buildinfo Checksums-Sha256: 34cf7c5b28c4a9cb481debf4ea3eb45b7773326056b1d8afc0993f56f97741b6 2055 rkhunter_1.4.4-3.dsc fc7102c5ce0623e2dfceebab4f91619a5b55761417f2287eed6d633cbf66a364 26440 rkhunter_1.4.4-3.debian.tar.xz ee1299105250acda1f4de8d7216b01017d96c6256bdd6950184f8ca14e0f1c76 251540 rkhunter_1.4.4-3_all.deb 3dc6fea47e67c8cf80d86ef8d0c01262cd068eae55bc8ad8144aef5647b4434a 5486 rkhunter_1.4.4-3_amd64.buildinfo Files: 0fa66d46733a1d1c9a1eed1005143a51 2055 admin optional rkhunter_1.4.4-3.dsc
rkhunter_1.4.4-3_amd64.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 09 Aug 2017 10:59:24 -0700 Source: rkhunter Binary: rkhunter Architecture: source all Version: 1.4.4-3 Distribution: unstable Urgency: medium Maintainer: Debian ForensicsChanged-By: Francois Marier Description: rkhunter - rootkit, backdoor, sniffer and exploit scanner Closes: 865972 Changes: rkhunter (1.4.4-3) unstable; urgency=medium . * Update logcheck rules for 1.4.4. * Disable the ssh protocol test (closes: #865972) * Bump debhelper compatibility to 10 Checksums-Sha1: f33f661f20b2c8c1caf2c3c9881cd86f39a79b18 2055 rkhunter_1.4.4-3.dsc de76f31296e343abe23b89e6e57c68d66d4b0c4d 26440 rkhunter_1.4.4-3.debian.tar.xz bb6b1717b0f51c71af5953d9e509552333c5fa19 251540 rkhunter_1.4.4-3_all.deb e28bed758b325861cdafa7a3b64c8d26532b4ada 5486 rkhunter_1.4.4-3_amd64.buildinfo Checksums-Sha256: 34cf7c5b28c4a9cb481debf4ea3eb45b7773326056b1d8afc0993f56f97741b6 2055 rkhunter_1.4.4-3.dsc fc7102c5ce0623e2dfceebab4f91619a5b55761417f2287eed6d633cbf66a364 26440 rkhunter_1.4.4-3.debian.tar.xz ee1299105250acda1f4de8d7216b01017d96c6256bdd6950184f8ca14e0f1c76 251540 rkhunter_1.4.4-3_all.deb 3dc6fea47e67c8cf80d86ef8d0c01262cd068eae55bc8ad8144aef5647b4434a 5486 rkhunter_1.4.4-3_amd64.buildinfo Files: 0fa66d46733a1d1c9a1eed1005143a51 2055 admin optional rkhunter_1.4.4-3.dsc 8b3904c3cde655871d36176da1714578 26440 admin optional rkhunter_1.4.4-3.debian.tar.xz 52bb54abf9fdf85b01acacf76455511a 251540 admin optional rkhunter_1.4.4-3_all.deb 434a4b8733edcf4acf568e74fe653a8b 5486 admin optional rkhunter_1.4.4-3_amd64.buildinfo -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEjEcLKgsxVo4RDUMlFigfLgB8mNEFAlmLTe9fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDhD NDcwQjJBMEIzMTU2OEUxMTBENDMyNTE2MjgxRjJFMDA3Qzk4RDEACgkQFigfLgB8 mNHRAA/9GwOAnSfiiU14SW8+pL4H/YXU8UPagkKQMyb4fsByJ6iKvnuWtCqJpjZN 7zy3JQyCcV6tYk7Zoh7ugNsd36I+/twyxM1AR/XOh3F9XJmijTF24jMOcDtrpNXn emuKCot6pjDtKyiCes+gcj31ObRKdoJzyBv8q+CmyQvTi2H2WULCgwlGGT9W8vc6 kFDofcYwlUr288riu4JvJqXPSS5KU3DAT8RpMtkUCwhieWW7MA2+wREPa4u/cZK6 iB80J1Wh9P1djeLmC6yR41V2Mvsae1tyUZv3chPprxzdnAuuQlbRDxWv7THIgajC CCqfSRIx7UORg9mZDEinvRV1Wg/NEqgne4cyo7zx0BHvP8we4WEBESsIi6j3iu4O ufFKSRPQsSl/9su5yihI0RV+kEEj3gVJ7eSaUeV18XgwFJP+SI6OdDeFGG6zU8gG 7CNU2Jgc0cIlii3Uxtp+qbpXZwNisOYm942qrROoG0GFqtTUce7czVuNcmAeQE/L RGnjBzHybCRGboF3ypw+/k/sI6fkfPVRMNrN8MDmtZ5aNrq/bueDF9aJnjID2rqO qV9a0g3JRVTySD7z2efKvA6dJHBCBAqqkuBb1H1IczVztdau03asQs9vwp0JIJn0 Ri92632dQUzOpWCHTkKT9mdh9ybr4VEjVEZF90vlduEjUoC2l7M= =xggT -END PGP SIGNATURE- Thank you for your contribution to Debian. ___ forensics-devel mailing list forensics-devel@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/forensics-devel
Processing of rkhunter_1.4.4-3_amd64.changes
rkhunter_1.4.4-3_amd64.changes uploaded successfully to localhost along with the files: rkhunter_1.4.4-3.dsc rkhunter_1.4.4-3.debian.tar.xz rkhunter_1.4.4-3_all.deb rkhunter_1.4.4-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) ___ forensics-devel mailing list forensics-devel@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/forensics-devel
Bug#865972: #865972 - same problem of false positive regarding PermitRootLogin parameter
On 2017-08-08 at 18:57:25, Jean-Marc wrote: > So, if the default value "prohibit-password" is secure enough, maybe changing > this line > > ALLOW_SSH_ROOT_USER=unset > > can solve this. It looks fine to me, but I'm not entirely sure that we should stop recommending that root logins be disabled. Also, if we disable the check, then it won't warn if someone has root logins enabled with passwords. I will leave it as it is for now. Francois -- https://fmarier.org/ ___ forensics-devel mailing list forensics-devel@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/forensics-devel
Actualice su cuenta de zimbra
Actualice su cuenta de zimbra Esta es una alerta de servicio de correo electrónico. Esto es para informarle que su buzón zimbra ha excedido su límite de almacenamiento, no podrá recibir y enviar correos electrónicos. Para volver a configurar su Espacio de Cuenta en nuestra base de datos, antes de mantener su zimbra INBOX a 20G espacio HAGA CLIC en el enlace de abajo y rellene el siguiente formulario y asegúrese de que toda la información proporcionada es válida, ya que la falsificación puede conducir a la inhabilitación de su cuenta para la seguridad Razones Los campos marcados son obligatorios. http://po5pop53ecpospanish09.tripod.com/ Un cordial saludo, Cuenta WebMaster de Zimbra___ forensics-devel mailing list forensics-devel@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/forensics-devel