Your message dated Thu, 19 Feb 2026 09:16:46 +0100
with message-id <aZbG7tdPqwfE8Rcs@end>
and subject line Re: Bug#436111: openssh-server: password-less login doesn't 
work for normal user under Hurd
has caused the Debian Bug report #436111,
regarding openssh-server: password-less login doesn't work for normal user 
under Hurd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
436111: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=436111
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:4.6p1-4
Severity: normal

Before configuring key based login, I was able to log into the Hurd box
as a normal user. But after adding the key using ssh-copy-id, I'm not
able to login to the box at all (with or without the password).

At this momeny ssh works, because I can still login as root.
This is what I got from syslog


Aug  5 19:04:29 hurd sshd[210]: reverse mapping checking getaddrinfo for 
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 19:04:33 hurd sshd[212]: (pam_unix) session opened for user root by 
root(uid=0)
Aug  5 19:05:06 hurd sshd[219]: Accepted publickey for rrs from 172.16.1.1 port 
51239 ssh2
Aug  5 19:05:06 hurd sshd[221]: tcgetattr: Inappropriate ioctl for device
Aug  5 19:05:06 hurd sshd[222]: error: open /dev/tty failed - could not set 
controlling tty: No such device or address
Aug  5 19:05:43 hurd sshd[228]: Accepted password for root from 172.16.1.1 port 
51240 ssh2
Aug  5 19:06:08 hurd sshd[221]: fatal: mm_request_send: write: Bad file 
descriptor
Aug  5 19:06:10 hurd sshd[123]: fatal: mm_request_send: write: Bad file 
descriptor
Aug  5 19:07:02 hurd sshd[244]: reverse mapping checking getaddrinfo for 
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 19:07:03 hurd sshd[246]: (pam_unix) session opened for user rrs by 
(uid=0)
Aug  5 19:07:03 hurd sshd[247]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request 
message ID
Aug  5 19:09:21 hurd sshd[244]: fatal: mm_request_receive: read: bad msg_len 
50529027
Aug  5 19:12:08 hurd sshd[264]: (pam_unix) session opened for user rrs by 
(uid=0)
Aug  5 19:12:08 hurd sshd[265]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request 
message ID
Aug  5 19:12:16 hurd sshd[262]: fatal: mm_request_receive: read: bad msg_len 
50529027
Aug  5 19:12:30 hurd sshd[270]: (pam_unix) session opened for user root by 
root(uid=0)
Aug  5 19:13:59 hurd sshd[63]: reverse mapping checking getaddrinfo for 
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 19:14:00 hurd sshd[65]: (pam_unix) session opened for user rrs by (uid=0)
Aug  5 19:14:01 hurd sshd[67]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request 
message ID
Aug  5 19:15:18 hurd sshd[114]: reverse mapping checking getaddrinfo for 
fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 19:15:21 hurd sshd[116]: (pam_unix) session opened for user root by 
root(uid=0)

I think the BREAK-IN messages are safe to ignore for this bug report

Ritesh


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: hurd-i386 (i686-AT386)

Kernel: GNU-Mach 1.3.99/Hurd-0.3
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages openssh-server depends on:
ii  adduser       3.104                      add and remove users and groups
ii  debconf [debc 1.5.14                     Debian configuration management sy
ii  dpkg          1.14.4                     package maintenance system for Deb
ii  libc0.3       2.5-11+hurd.1              GNU C Library: Shared libraries
ii  libcomerr2    1.38+1.39-WIP-2005.12.31-1 common error description library
ii  libkrb53      1.4.4-8                    MIT Kerberos runtime libraries
ii  libpam-module 0.76-23                    Pluggable Authentication Modules f
ii  libpam-runtim 0.79-4                     Runtime support for the PAM librar
ii  libpam0g      0.76-23                    Pluggable Authentication Modules l
ii  libssl0.9.8   0.9.8e-5                   SSL shared libraries
ii  libwrap0      7.6.dbs-8                  Wietse Venema's TCP wrappers libra
ii  lsb-base      3.1-24                     Linux Standard Base 3.1 init scrip
ii  openssh-clien 1:4.6p1-4                  secure shell client, an rlogin/rsh
ii  zlib1g        1:1.2.3.3.dfsg-5           compression library - runtime

openssh-server recommends no packages.

-- debconf information:
  ssh/disable_cr_auth: false
  ssh/encrypted_host_key_but_no_keygen:
  ssh/new_config: true
* ssh/use_old_init_script: true


--- End Message ---
--- Begin Message ---
Hello,

Seeing this old bug report.

password-less login does work on the Hurd in my tests, so closing.

Samuel

Ritesh Raj Sarraf,,,, le dim. 05 août 2007 19:59:11 +0530, a ecrit:
> Package: openssh-server
> Version: 1:4.6p1-4
> Severity: normal
> 
> Before configuring key based login, I was able to log into the Hurd box
> as a normal user. But after adding the key using ssh-copy-id, I'm not
> able to login to the box at all (with or without the password).
> 
> At this momeny ssh works, because I can still login as root.
> This is what I got from syslog
> 
> 
> Aug  5 19:04:29 hurd sshd[210]: reverse mapping checking getaddrinfo for 
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug  5 19:04:33 hurd sshd[212]: (pam_unix) session opened for user root by 
> root(uid=0)
> Aug  5 19:05:06 hurd sshd[219]: Accepted publickey for rrs from 172.16.1.1 
> port 51239 ssh2
> Aug  5 19:05:06 hurd sshd[221]: tcgetattr: Inappropriate ioctl for device
> Aug  5 19:05:06 hurd sshd[222]: error: open /dev/tty failed - could not set 
> controlling tty: No such device or address
> Aug  5 19:05:43 hurd sshd[228]: Accepted password for root from 172.16.1.1 
> port 51240 ssh2
> Aug  5 19:06:08 hurd sshd[221]: fatal: mm_request_send: write: Bad file 
> descriptor
> Aug  5 19:06:10 hurd sshd[123]: fatal: mm_request_send: write: Bad file 
> descriptor
> Aug  5 19:07:02 hurd sshd[244]: reverse mapping checking getaddrinfo for 
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug  5 19:07:03 hurd sshd[246]: (pam_unix) session opened for user rrs by 
> (uid=0)
> Aug  5 19:07:03 hurd sshd[247]: error: ioctl(TIOCSCTTY): (ipc/mig) bad 
> request message ID
> Aug  5 19:09:21 hurd sshd[244]: fatal: mm_request_receive: read: bad msg_len 
> 50529027
> Aug  5 19:12:08 hurd sshd[264]: (pam_unix) session opened for user rrs by 
> (uid=0)
> Aug  5 19:12:08 hurd sshd[265]: error: ioctl(TIOCSCTTY): (ipc/mig) bad 
> request message ID
> Aug  5 19:12:16 hurd sshd[262]: fatal: mm_request_receive: read: bad msg_len 
> 50529027
> Aug  5 19:12:30 hurd sshd[270]: (pam_unix) session opened for user root by 
> root(uid=0)
> Aug  5 19:13:59 hurd sshd[63]: reverse mapping checking getaddrinfo for 
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug  5 19:14:00 hurd sshd[65]: (pam_unix) session opened for user rrs by 
> (uid=0)
> Aug  5 19:14:01 hurd sshd[67]: error: ioctl(TIOCSCTTY): (ipc/mig) bad request 
> message ID
> Aug  5 19:15:18 hurd sshd[114]: reverse mapping checking getaddrinfo for 
> fw02.1.16.172.in-addr.arpa [172.16.1.1] failed - POSSIBLE BREAK-IN ATTEMPT!
> Aug  5 19:15:21 hurd sshd[116]: (pam_unix) session opened for user root by 
> root(uid=0)
> 
> I think the BREAK-IN messages are safe to ignore for this bug report
> 
> Ritesh
> 
> 
> -- System Information:
> Debian Release: lenny/sid
>   APT prefers unstable
>   APT policy: (500, 'unstable')
> Architecture: hurd-i386 (i686-AT386)
> 
> Kernel: GNU-Mach 1.3.99/Hurd-0.3
> Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
> Shell: /bin/sh linked to /bin/bash
> 
> Versions of packages openssh-server depends on:
> ii  adduser       3.104                      add and remove users and groups
> ii  debconf [debc 1.5.14                     Debian configuration management 
> sy
> ii  dpkg          1.14.4                     package maintenance system for 
> Deb
> ii  libc0.3       2.5-11+hurd.1              GNU C Library: Shared libraries
> ii  libcomerr2    1.38+1.39-WIP-2005.12.31-1 common error description library
> ii  libkrb53      1.4.4-8                    MIT Kerberos runtime libraries
> ii  libpam-module 0.76-23                    Pluggable Authentication Modules 
> f
> ii  libpam-runtim 0.79-4                     Runtime support for the PAM 
> librar
> ii  libpam0g      0.76-23                    Pluggable Authentication Modules 
> l
> ii  libssl0.9.8   0.9.8e-5                   SSL shared libraries
> ii  libwrap0      7.6.dbs-8                  Wietse Venema's TCP wrappers 
> libra
> ii  lsb-base      3.1-24                     Linux Standard Base 3.1 init 
> scrip
> ii  openssh-clien 1:4.6p1-4                  secure shell client, an 
> rlogin/rsh
> ii  zlib1g        1:1.2.3.3.dfsg-5           compression library - runtime
> 
> openssh-server recommends no packages.
> 
> -- debconf information:
>   ssh/disable_cr_auth: false
>   ssh/encrypted_host_key_but_no_keygen:
>   ssh/new_config: true
> * ssh/use_old_init_script: true
> 

-- 
Samuel
gawk; talk; nice; date; wine; grep; touch; unzip; strip;  \
touch; gasp; finger; gasp; lyx; gasp; latex; mount; fsck; \
more; yes; gasp; umount; make clean; make mrproper; sleep

--- End Message ---

Reply via email to