Your message dated Fri, 17 Jun 2005 10:17:28 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#312891: fixed in openssh 1:4.1p1-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 Jun 2005 16:02:22 +0000
>From [EMAIL PROTECTED] Fri Jun 10 09:02:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from host197-82.pool81119.interbusiness.it (relay.ageco.it) 
[81.119.82.197] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Dglxd-00023C-00; Fri, 10 Jun 2005 09:02:22 -0700
Received: (from [EMAIL PROTECTED])
        by relay.ageco.it (8.12.10/8.12.10) id j5AG0ceV022251;
        Fri, 10 Jun 2005 18:00:38 +0200
Received: from fullgw1.full.it (ip-pub.fastwebnet.it [81.208.84.53] (may be 
forged))
        by relay.ageco.it (8.12.10/8.12.10) with ESMTP id j5AG0ZRv022169;
        Fri, 10 Jun 2005 18:00:36 +0200
Received: from localhost (localhost [127.0.0.1])
        by fullgw1.full.it (Postfix) with ESMTP
        id 8F8D822BC5; Fri, 10 Jun 2005 18:02:11 +0200 (CEST)
Received: from fullgw1.full.it ([127.0.0.1])
        by localhost (fullgw1 [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 20289-10; Fri, 10 Jun 2005 18:02:11 +0200 (CEST)
Received: from tpgpost.it (unknown [192.168.0.81])
        by fullgw1.full.it (Postfix) with ESMTP
        id 3988321CD8; Fri, 10 Jun 2005 18:02:11 +0200 (CEST)
Received: by tpgpost.it (Postfix, from userid 1000)
        id 142B26F5B; Fri, 10 Jun 2005 18:02:11 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Alessandro Praduroux <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: openssh-server: incompatible sftp-server location between openssh and 
rssh
X-Mailer: reportbug 3.12
Date: Fri, 10 Jun 2005 18:02:11 +0200
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at full.it
X-scanner: powered by TPGPostItalia
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: openssh-server
Version: 1:4.1p1-3
Severity: important


upgdadig to openssh-server moved the executable sftp-server from
/usr/lib to /usr/lib/openssh. 
This location however conflicts with the expected location in the rssh
package, so restricted users cannot use sftp after the update.

I temporarly solved the problem making a symling to sftp-server in
/usr/lib and modifying the sshd_config file under /etc/ssh, so normal
operation is possible.

Package rssh detail:
ii  rssh                        2.2.3-1      Restricted shell allowing only 
scp, 

Not quite sure if this bug belongs to openssh or to rssh, sending to
openssh since this is the package with the more recent update.



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.9-1-686-smp
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages openssh-server depends on:
ii  adduser                     3.63         Add and remove users and groups
ii  debconf [debconf-2.0]       1.4.51       Debian configuration management sy
ii  dpkg                        1.10.28      Package maintenance system for Deb
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libpam-modules              0.76-22      Pluggable Authentication Modules f
ii  libpam-runtime              0.76-22      Runtime support for the PAM librar
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7g-1     SSL shared libraries
ii  libwrap0                    7.6.dbs-8    Wietse Venema's TCP wrappers libra
ii  openssh-client              1:4.1p1-3    Secure shell client, an rlogin/rsh
ii  zlib1g                      1:1.2.2-4    compression library - runtime

-- debconf information:
  ssh/insecure_rshd:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
  ssh/encrypted_host_key_but_no_keygen:
* ssh/disable_cr_auth: false

---------------------------------------
Received: (at 312891-close) by bugs.debian.org; 17 Jun 2005 14:22:35 +0000
>From [EMAIL PROTECTED] Fri Jun 17 07:22:34 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DjHju-0005zc-00; Fri, 17 Jun 2005 07:22:34 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DjHey-0005Pb-00; Fri, 17 Jun 2005 10:17:28 -0400
From: Colin Watson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#312891: fixed in openssh 1:4.1p1-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 17 Jun 2005 10:17:28 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 3

Source: openssh
Source-Version: 1:4.1p1-4

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.1p1-4_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.1p1-4_powerpc.udeb
openssh-client_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/openssh-client_4.1p1-4_powerpc.deb
openssh-server-udeb_4.1p1-4_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.1p1-4_powerpc.udeb
openssh-server_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/openssh-server_4.1p1-4_powerpc.deb
openssh_4.1p1-4.diff.gz
  to pool/main/o/openssh/openssh_4.1p1-4.diff.gz
openssh_4.1p1-4.dsc
  to pool/main/o/openssh/openssh_4.1p1-4.dsc
ssh-askpass-gnome_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.1p1-4_powerpc.deb
ssh_4.1p1-4_all.deb
  to pool/main/o/openssh/ssh_4.1p1-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <[EMAIL PROTECTED]> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 17 Jun 2005 14:20:20 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client 
openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.1p1-4
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <[EMAIL PROTECTED]>
Changed-By: Colin Watson <[EMAIL PROTECTED]>
Description: 
 openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server - Secure shell server, an rshd replacement
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure shell client and server (transitional package)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 308555 312475 312891 313949
Changes: 
 openssh (1:4.1p1-4) unstable; urgency=low
 .
   * openssh-client and openssh-server conflict with ssh-krb5, as ssh-krb5
     only conflicts with ssh (closes: #312475).
   * SELinux support (thanks, Manoj Srivastava; closes: #308555):
     - Added SELinux capability, and turned it on be default. Added
       restorecon calls in preinst and postinst (should not matter if the
       machine is not SELinux aware). By and large, the changes made should
       have no effect unless the rules file calls --with-selinux; and even
       then there should be no performance hit for machines not actively
       running SELinux.
     - Modified the preinst and postinst to call restorecon to set the
       security context for the generated public key files.
     - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system
       may want to also include pam_selinux.so.
   * Re-enable ssh-askpass-gnome on the Hurd, now that its build-dependencies
     are available.
   * Restore /usr/lib/sftp-server temporarily, as a symlink to
     /usr/lib/openssh/sftp-server (closes: #312891).
   * Switch to debhelper compatibility level 3, since 2 is deprecated.
   * debconf template translations:
     - Update German (thanks, Jens Seidel; closes: #313949).
Files: 
 a369e52cf5460a9db06cc484c3a16da8 947 net standard openssh_4.1p1-4.dsc
 b3a51a2b2452d609adaf568b1875ff08 147352 net standard openssh_4.1p1-4.diff.gz
 9e6e023d08181749ea9aab19812c05dd 32322 net optional ssh_4.1p1-4_all.deb
 bd9b85cb03e9a0e48673e8cc358367a4 571380 net standard 
openssh-client_4.1p1-4_powerpc.deb
 0cc097ab22172793a09d9b6663167fab 286010 net optional 
openssh-server_4.1p1-4_powerpc.deb
 dee6d2fac6ae3ec3f4e6350a106fec57 77362 gnome optional 
ssh-askpass-gnome_4.1p1-4_powerpc.deb
 66f4c6cf187b758dd8ebbbb9027a4bae 163158 debian-installer optional 
openssh-client-udeb_4.1p1-4_powerpc.udeb
 694aaf52fd413cb5f484b8dd959e66c5 171998 debian-installer optional 
openssh-server-udeb_4.1p1-4_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCstFL9t0zAhD6TNERAgXsAJ4kfqn0HIqWWffgFUaMLSeV1ZjmFQCcDkN5
6QiwfWkbF0me6rFSYNYv3ak=
=N1rn
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to