Your message dated Sun, 08 Jan 2006 16:17:10 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#109899: fixed in lsh-utils 2.0.1cdbs-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 24 Aug 2001 14:30:18 +0000
>From [email protected] Fri Aug 24 09:30:18 2001
Return-path: <[email protected]>
Received: from arroz.onshored.com [216.220.101.2] (postfix)
        by master.debian.org with esmtp (Exim 3.12 1 (Debian))
        id 15aHyU-000141-00; Fri, 24 Aug 2001 09:30:18 -0500
Received: by arroz.onshored.com (Postfix, from userid 421)
        id 07A5093817; Fri, 24 Aug 2001 10:30:26 -0400 (EDT)
From: Adam Di Carlo <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: no way to make an untrusted hostkey trusted
X-Reportbug-Version: 1.23
X-Mailer: reportbug 1.23
Date: Fri, 24 Aug 2001 10:30:25 -0400
Reply-To: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]

Package: lsh-client
Version: 1.2.3-1
Severity: normal

This may just be a documentation problem, but I can't seem to get
a server hostkey to be trusted.  I've tried this:

<[EMAIL PROTECTED]:adam> lshc --sloppy-host-authentication <host>
Received unauthenticated key for host du.edu
Fingerprint: 5af94742974c64ea648a7f695119a255920f6a35
Do you trust this key? (y/n) y
[...]

But then I just get this:

<[EMAIL PROTECTED]:adam> lshc -l hansolo du.edu
lsh: Server's hostkey is not trusted. Disconnecting.

Is there some other command I'm supposed to run?


Versions of packages lsh-client depends on:
ii  libc6                         2.2.3-9    GNU C Library: Shared libraries an
ii  libgmp3                       3.1.1-9    Multiprecision arithmetic library
ii  lsh-utils                     1.2.3-1    Secure Shell v2 (SSH2) protocol im
ii  zlib1g                        1:1.1.3-15 compression library - runtime


---------------------------------------
Received: (at 109899-close) by bugs.debian.org; 9 Jan 2006 00:20:38 +0000
>From [EMAIL PROTECTED] Sun Jan 08 16:20:38 2006
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1Evkik-0006AN-33; Sun, 08 Jan 2006 16:17:10 -0800
From: Stefan Pfetzing <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#109899: fixed in lsh-utils 2.0.1cdbs-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 08 Jan 2006 16:17:10 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: lsh-utils
Source-Version: 2.0.1cdbs-1

We believe that the bug you reported is fixed in the latest version of
lsh-utils, which is due to be installed in the Debian FTP archive:

lsh-client_2.0.1cdbs-1_i386.deb
  to pool/main/l/lsh-utils/lsh-client_2.0.1cdbs-1_i386.deb
lsh-server_2.0.1cdbs-1_i386.deb
  to pool/main/l/lsh-utils/lsh-server_2.0.1cdbs-1_i386.deb
lsh-utils-doc_2.0.1cdbs-1_all.deb
  to pool/main/l/lsh-utils/lsh-utils-doc_2.0.1cdbs-1_all.deb
lsh-utils_2.0.1cdbs-1.diff.gz
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-1.diff.gz
lsh-utils_2.0.1cdbs-1.dsc
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-1.dsc
lsh-utils_2.0.1cdbs-1_i386.deb
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-1_i386.deb
lsh-utils_2.0.1cdbs.orig.tar.gz
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefan Pfetzing <[EMAIL PROTECTED]> (supplier of updated lsh-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  9 Jan 2006 00:36:44 +0100
Source: lsh-utils
Binary: lsh-utils lsh-client lsh-utils-doc lsh-server
Architecture: source all i386
Version: 2.0.1cdbs-1
Distribution: unstable
Urgency: low
Maintainer: Simon Law <[EMAIL PROTECTED]>
Changed-By: Stefan Pfetzing <[EMAIL PROTECTED]>
Description: 
 lsh-client - Secure Shell v2 (SSH2) protocol client
 lsh-server - Secure Shell v2 (SSH2) protocol server
 lsh-utils  - Secure Shell v2 (SSH2) protocol utilities
 lsh-utils-doc - Secure Shell v2 (SSH2) client / server / utilities 
documentation
Closes: 109899 344747 345141
Changes: 
 lsh-utils (2.0.1cdbs-1) unstable; urgency=low
 .
   * Change the build system to cdbs.
     (And hopefully don't introduce any new bugs.)
   * Make lintian happy with the odieresis in the manpages.
   * Fix debian/control, so it can be autogenerated by cdbs.
   * Conflict lsh, and rename lshc to lsh.
   * Include a small shell script to notify users.
   * Make stop act the same way graceful-stop was doing already.
     This helps not to accidently kill your own lsh connection.
   * Update debconf po files.
   * Update the German debconf translation.
   * Remove the SSH1 notice from lsh-server's package description.
   * Make the lsh-server package suggest lsh-client or openssh-client.
   * Add a small note on how to use the lsh client. (Closes: Bug#109899)
   * No longer FTBFS because of wrong debian/rules. (Closes: Bug#344747)
   * Update Czech translation. (Closes: Bug#345141)
Files: 
 a12db827ca32e037aa558f00550a5383 950 net extra lsh-utils_2.0.1cdbs-1.dsc
 e56f8e55c67995957363d419f01f86ab 1846393 net extra 
lsh-utils_2.0.1cdbs.orig.tar.gz
 6cb4bef37e838f636d9f296d2cda5842 45781 net extra lsh-utils_2.0.1cdbs-1.diff.gz
 e3e1a95b34825230710166896250b4a4 104960 doc extra 
lsh-utils-doc_2.0.1cdbs-1_all.deb
 c8a419bc720720c98c1d2e04e90aaedc 725788 net extra 
lsh-utils_2.0.1cdbs-1_i386.deb
 69e347a5795838803cdaed37e107d7d8 208728 net extra 
lsh-server_2.0.1cdbs-1_i386.deb
 4976601165a53ad715ce10bbd2063a81 244034 net extra 
lsh-client_2.0.1cdbs-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDwarOi50xCpfDmMsRApqiAKDHwZbd0Vxtx+xYhHMNHqB0gxSQjACgmZJm
9EP8R7w8H8CTUGPPeCWfrgk=
=xacW
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to