Package: openssh-server Version: 1:4.1p1-4 Severity: normal When the sshd is started with '-6', however the kernel doesn't have support for IPv6, sshd silently fails to start. Also, the start-stop-daemon does not report failure.
This could surprise administrators who have been running sshd with the -6 flag with a kernel that does support IPv6 - because even if IPv6 is merely enabled in the kernel (but not working or even configured), sshd will work. When changing to a kernel with IPv6 support (which wasn't used anyway), "sshd -6" would *silently* stop working. It should give an error message, and start-stop-daemon shouldn't act as if sshd was correctly started when it wasn't. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12.1 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages openssh-server depends on: ii adduser 3.63 Add and remove users and groups ii debconf [debconf-2.0] 1.4.51 Debian configuration management sy ii dpkg 1.13.9 Package maintenance system for Deb ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libpam-modules 0.76-22 Pluggable Authentication Modules f ii libpam-runtime 0.76-22 Runtime support for the PAM librar ii libpam0g 0.76-22 Pluggable Authentication Modules l ii libselinux1 1.22-1 SELinux shared libraries ii libssl0.9.7 0.9.7g-1 SSL shared libraries ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra ii openssh-client 1:4.1p1-4 Secure shell client, an rlogin/rsh ii zlib1g 1:1.2.2-4 compression library - runtime -- debconf information: ssh/insecure_rshd: * ssh/insecure_telnetd: ssh/new_config: true * ssh/use_old_init_script: true ssh/disable_cr_auth: false ssh/encrypted_host_key_but_no_keygen: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]