Launchpad has imported 22 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1026430.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://he
** Changed in: openssh (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1287222
Title:
openssh-client 6.5 regression bug with cer
This bug was fixed in the package openssh - 1:6.9p1-1
---
openssh (1:6.9p1-1) unstable; urgency=medium
* New upstream release (http://www.openssh.com/txt/release-6.8):
- sshd(8): UseDNS now defaults to 'no'. Configurations that match
against the client host name (via sshd
This was fixed upstream according to the changelog.
http://www.openssh.com/txt/release-6.9:
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
implementations as some would fail when attempting to use group
sizes >4K; bz#2209
HTH,
Simon
** Bug watch added: OpenSSH Portable Bugz
Looks like there's a patch for openssh available the RH bug which
detects broken server implementations and sends options that they can
accept (by matching "Cisco-*" in the banner).
We probably don't want to have to maintain this patch in Ubuntu
indefinitely though. But we could cherry-pick it if
The workaround is fine, but if you want more detailed description about the
underlying issues (there are more than one) see the Red Hat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1026430
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
** Changed in: openssh (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1287222
Title:
openssh-client 6.5 regression bug with certain
Last Modified:
Jul 31,2014
Status:
Fixed
Severity:
3 Moderate
Product:
Cisco IOS
Support Cases:
2
Known Affected Releases:
(1)
n/a
Known Fixed Releases:
(6)
15.5(0.6)T
15.4(1)T1.3
15.3(3)S3.4
15.5(0.12)S
15.1(2)SY3.8
15.4(1)T2
--
You received this bug notification because you are a mem
Bug was fixed https://tools.cisco.com/bugsearch/bug/CSCuo76464
(sorry, you need Cisco account). So, I think that this is not a bug, but a
configuration incompatibility.
Simple explanation: openSSH require more security and external ssh server is
not using this level of security.
--
You received
** Bug watch added: Debian Bug tracker #740307
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740307
** Also affects: openssh (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740307
Importance: Unknown
Status: Unknown
** Also affects: openssh (Fedora) via
https:/
10 matches
Mail list logo