Your message dated Sun, 06 Apr 2025 22:19:39 +0000
with message-id <[email protected]>
and subject line Bug#1081196: fixed in crowdsec 1.4.6-10
has caused the Debian Bug report #1081196,
regarding crowdsec ssh log monitoring broken by latest "openssh-server" package
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1081196: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081196
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: crowdsec
Version: all
Severity: critical
In the latest openssh-server package (testing & unstable),
"sshd-session" is used for many log messages, which breaks
crowdsec/hub/parsers/s01-parse/crowdsecurity/sshd-logs.yaml
filter: "evt.Parsed.program == 'sshd'"
As to the above snippet, the filter is explicitly set to use "sshd" only.
Crowdsec silently stops working after new openssh-server package is
installed. In my case, I found out the issue weeks later.
This affects all crowdsec versions, including 1.4.6-9+b1 and previous 1.4.6-8.
--- End Message ---
--- Begin Message ---
Source: crowdsec
Source-Version: 1.4.6-10
Done: Cyril Brulebois <[email protected]>
We believe that the bug you reported is fixed in the latest version of
crowdsec, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Cyril Brulebois <[email protected]> (supplier of updated crowdsec package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 06 Apr 2025 23:52:07 +0200
Source: crowdsec
Architecture: source
Version: 1.4.6-10
Distribution: unstable
Urgency: medium
Maintainer: Cyril Brulebois <[email protected]>
Changed-By: Cyril Brulebois <[email protected]>
Closes: 1081196
Changes:
crowdsec (1.4.6-10) unstable; urgency=medium
.
* Backport support for sshd-session (Closes: #1081196), with a focus
on the code (leaving the tests behind), and with thanks to Wang Jian
for the report, and Martin Dosch for tracking down the bugfix:
- 0021-backport-sshd-session-support.patch
Checksums-Sha1:
670b2cb4d5140933a582a50fdca63503ec652cc6 4956 crowdsec_1.4.6-10.dsc
52bca0429a410f2300cf15a7c7628c30d7516b23 35708 crowdsec_1.4.6-10.debian.tar.xz
3299067fafc4f85f2d1e57a1219087d683f50562 27941
crowdsec_1.4.6-10_source.buildinfo
Checksums-Sha256:
035803525109b33f42134639879975aa87aeaf269b0e2559b63adc411e21df8f 4956
crowdsec_1.4.6-10.dsc
0279a7c3cf6e7a53b5158dd2f96370e1877ca56c5292d1054aa82a4647d01ec7 35708
crowdsec_1.4.6-10.debian.tar.xz
0a9869f3ac0adf553085a0606e75dd06850dddc4f6614a1790cdff08cc05fd7a 27941
crowdsec_1.4.6-10_source.buildinfo
Files:
abef70c52a9d049229a664b7cd1aa38d 4956 golang optional crowdsec_1.4.6-10.dsc
f3d81d499be868e3096421100dafedb1 35708 golang optional
crowdsec_1.4.6-10.debian.tar.xz
1471c3196c31b2d395be991887ad8ff0 27941 golang optional
crowdsec_1.4.6-10_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=B2Fy
-----END PGP SIGNATURE-----
pgpW78L68UmAU.pgp
Description: PGP signature
--- End Message ---