[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#990069: marked as done (openssh-server: Not accepting new connections during Debian 10 -> 11 upgrade)



Your message dated Fri, 01 Oct 2021 12:02:07 +0000
with message-id <E1mWHEt-0006YT-I5@fasolo.debian.org>
and subject line Bug#990069: fixed in glibc 2.31-13+deb11u1
has caused the Debian Bug report #990069,
regarding openssh-server: Not accepting new connections during Debian 10 -> 11 upgrade
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
990069: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990069
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 1:8.4p1-5
Severity: normal

Dear Maintainer,

During a Debian 10 -> 11 upgrade, the SSH server doesn't appear to be accepting new connections. IMO this is less than optimal, and not sure if this was always the case.
Would it be possible to keep accepting connections, or at least to make the time window in which SSH is down as short as possible?

Greetings,

Olaf

-- System Information:
Debian Release: 11.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-16-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openssh-server depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.71
ii  dpkg                   1.19.7
ii  libaudit1              1:2.8.4-3
iu  libc6                  2.31-12
ii  libcom-err2            1.44.5-1+deb10u3
ii  libcrypt1              1:4.4.18-4
ii  libgssapi-krb5-2       1.17-3+deb10u1
ii  libkrb5-3              1.17-3+deb10u1
ii  libpam-modules         1.3.1-5
ii  libpam-runtime         1.3.1-5
ii  libpam0g               1.3.1-5
ii  libselinux1            3.1-3
ii  libssl1.1              1.1.1d-0+deb10u6
ii  libsystemd0            241-7~deb10u7
ii  libwrap0               7.6.q-28
ii  lsb-base               10.2019051400
iu  openssh-client         1:8.4p1-5
iu  openssh-sftp-server    1:8.4p1-5
ii  procps                 2:3.3.15-2
iu  runit-helper           2.10.3
ii  ucf                    3.0038+nmu1
ii  zlib1g                 1:1.2.11.dfsg-1

Versions of packages openssh-server recommends:
ii  libpam-systemd [logind]  241-7~deb10u7
ii  ncurses-term             6.1+20181013-2+deb10u2
ii  xauth                    1:1.0.10-1

Versions of packages openssh-server suggests:
pn  molly-guard   <none>
pn  monkeysphere  <none>
pn  ssh-askpass   <none>
pn  ufw           <none>

-- debconf information:
  openssh-server/permit-root-login: true
  openssh-server/password-authentication: true

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.31-13+deb11u1
Done: Aurelien Jarno <aurel32@debian.org>

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 990069@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 30 Sep 2021 22:47:49 +0200
Source: glibc
Architecture: source
Version: 2.31-13+deb11u1
Distribution: bullseye
Urgency: medium
Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Closes: 990069 994042
Changes:
 glibc (2.31-13+deb11u1) bullseye; urgency=medium
 .
   [ Aurelien Jarno ]
   * debian/script.in/nsscheck.sh: restart openssh-server even if it has been
     deconfigured during the upgrade.  Closes: #990069.
   * debian/debhelper.in/libc.preinst: fix text fallback when debconf is
     unusable, the current debconf configuration should be queried without
     first sourcing the confmodule to avoid losing control of the tty. Big
     thanks to Colin Watson for the help diagnosing the issue and for providing
     an easy reproducer.  Closes: #994042.
Checksums-Sha1:
 ac8313b8a3ec16fb55b1dba1ef66075d6143d093 8347 glibc_2.31-13+deb11u1.dsc
 ea695731aa16c723d6d873a5e5104036fd787886 911796 glibc_2.31-13+deb11u1.debian.tar.xz
 d747aae74973b1e28a6053f30ca6af3533ef25c2 8674 glibc_2.31-13+deb11u1_source.buildinfo
Checksums-Sha256:
 6cc9d5ff699d6c58f02999aa79c1ab3a2bc91c05ad6f158bc406afbf970fbca1 8347 glibc_2.31-13+deb11u1.dsc
 83fb709e78a1793c229e442cac5dc3b2dbf5f109ea7fa240bbacd965f1a966e1 911796 glibc_2.31-13+deb11u1.debian.tar.xz
 ae6e9a214bd56fd29556b0bfa072223fb16efa6c0b300f950f0b56cf14249e04 8674 glibc_2.31-13+deb11u1_source.buildinfo
Files:
 9f178f3039ae25d28408d7862ad8b70f 8347 libs required glibc_2.31-13+deb11u1.dsc
 386bd1514374e6f586c34d3a227df136 911796 libs required glibc_2.31-13+deb11u1.debian.tar.xz
 8b81656c9148c9b0b037da8ace23ec87 8674 libs required glibc_2.31-13+deb11u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=D87B
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: