Your message dated Sat, 22 Aug 2015 17:19:40 -0700
with message-id <[email protected]>
has caused the   report #796599,
regarding openssh-client: ssh -G no longer returns "illegal option" (6.0) or 
"unknown option" (6.7)
to be marked as having been forwarded to the upstream software
author(s) [email protected], [email protected]

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
796599: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796599
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Hi Nelson, Klaus,

The test for Linux/Ebury now returns false positives on OpenSSH 6.8 and
later due to the introduction of the "-G" command:

 * ssh(1): Add a -G option to ssh that causes it to parse its
   configuration and dump the result to stdout, similar to "sshd -T".

(source: http://www.openssh.com/txt/release-6.8)

I would suggest that the check be changed to skip version 6.8 and later or
to find a different way to test for infected binaries.

Cheers,
Francois

P.S. Also filed on the Debian bug tracker: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796599

--- End Message ---

Reply via email to