Your message dated Wed, 26 Nov 2008 19:10:27 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Closing bug...as instructed by the bug submitter....
has caused the Debian Bug report #506938,
regarding openssh-server: Can't connect to sshd on vserver since the latest 
update in lenny (only on vservers)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506938: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506938
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:5.1p1-3
Severity: grave
Justification: renders package unusable

Since the last update the ssh-server won't accept connection if it runs on a
vserver. The ssh-server on non vservers runs normal. The ListenAddress is set
correctly and everythings worked fine before the update. No other options in
the sshd_config have been touched.
Debug output follows:

---Debug output from auth.log---
Nov 25 11:39:25 web sshd[13098]: debug1: rexec start in 4 out 4 newsock 4 pipe 
6 sock 7
Nov 25 11:39:25 web sshd[13091]: debug1: Forked child 13098.
Nov 25 11:39:25 web sshd[13098]: error writing /proc/self/oom_adj: Permission 
denied
Nov 25 11:39:25 web sshd[13098]: debug1: inetd sockets after dupping: 3, 3
Nov 25 11:39:25 web sshd[13098]: Connection from 192.168.0.140 port 52076
Nov 25 11:39:25 web sshd[13098]: debug1: Client protocol version 2.0; client 
software version OpenSSH_5.1p1 Debian-3
Nov 25 11:39:25 web sshd[13098]: debug1: match: OpenSSH_5.1p1 Debian-3 pat 
OpenSSH*
Nov 25 11:39:25 web sshd[13098]: debug1: Enabling compatibility mode for 
protocol 2.0
Nov 25 11:39:25 web sshd[13098]: debug1: Local version string 
SSH-2.0-OpenSSH_5.1p1 Debian-3
Nov 25 11:39:25 web sshd[13099]: fatal: chroot("/var/run/sshd"): Operation not 
permitted
Nov 25 11:39:25 web sshd[13099]: debug1: do_cleanup
Nov 25 11:39:25 web sshd[13098]: debug1: do_cleanup
------End of debug output------

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-vserver-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages openssh-server depends on:
ii  adduser               3.110              add and remove users and groups
ii  debconf [debconf-2.0] 1.5.24             Debian configuration management sy
ii  dpkg                  1.14.22            Debian package management system
ii  libc6                 2.7-16             GNU C Library: Shared libraries
ii  libcomerr2            1.41.3-1           common error description library
ii  libkrb53              1.6.dfsg.4~beta1-4 MIT Kerberos runtime libraries
ii  libpam-modules        1.0.1-4            Pluggable Authentication Modules f
ii  libpam-runtime        1.0.1-4            Runtime support for the PAM librar
ii  libpam0g              1.0.1-4            Pluggable Authentication Modules l
ii  libselinux1           2.0.65-5           SELinux shared libraries
ii  libssl0.9.8           0.9.8g-14          SSL shared libraries
ii  libwrap0              7.6.q-16           Wietse Venema's TCP wrappers libra
ii  lsb-base              3.2-20             Linux Standard Base 3.2 init scrip
ii  openssh-blacklist     0.4.1              list of default blacklisted OpenSS
ii  openssh-client        1:5.1p1-3          secure shell client, an rlogin/rsh
ii  zlib1g                1:1.2.3.3.dfsg-12  compression library - runtime

Versions of packages openssh-server recommends:
ii  openssh-blacklist-extra       0.4.1      list of non-default blacklisted Op
ii  xauth                         1:1.0.3-2  X authentication utility

Versions of packages openssh-server suggests:
pn  molly-guard                   <none>     (no description available)
pn  rssh                          <none>     (no description available)
pn  ssh-askpass                   <none>     (no description available)

-- debconf information:
  ssh/new_config: true
* ssh/use_old_init_script: true
  ssh/vulnerable_host_keys:
  ssh/disable_cr_auth: false
  ssh/encrypted_host_key_but_no_keygen:



--- End Message ---
--- Begin Message ---
As the bug submitter said, this bug report has nothing to do with
openssh-server.

Hence, closing seems to be the right action here...

Just kill me virtually if I'm wrong.

-- 



Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to