Your message dated Thu, 20 Oct 2016 15:50:49 +0100 with message-id <79e45696-9a3c-46af-589e-825de156f79f@debian.org> and subject line Bug#562593: openssh-server fails to install - hangs at generating DSA2 key (Debian MIPS on SGI Indy R5000) has caused the Debian Bug report #562593, regarding openssh-server fails to install - hangs at generating DSA2 key (Debian MIPS on SGI Indy R5000) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 562593: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562593 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: openssh-server fails to install - hangs at generating DSA2 key (Debian MIPS on SGI Indy R5000)
- From: tom <bviking@gmail.com>
- Date: Sat, 26 Dec 2009 22:59:12 +1100
- Message-id: <20091226115912.14642.7522.reportbug@indyr5000.eccles.org>
Package: openssh-server Version: 1:5.1p1-5 Severity: grave Justification: renders package unusable The .postinst script successfully generates an RSA host_key, but the system then hangs at: "Creating SSH2 DSA key: This may take some time ..." The system is not completely unresponsive: I can switch to another tty. top shows ssh-keygen running and CPU usage at 99%. I have left the ssh-keygen process running for more than 24 hours but it never completes. If I ^C and break the script, logins from other boxes intermittently fail due to missing DSA2 host_key. *** /tmp/reportbug-openssh-server-20091226-14585-Ez_8mj Subject: openssh-server fails to install (will not generate DSA2 key) [running Debain MIPS on SGI Indy R5000] Package: openssh-server Version: 1:5.1p1-5 Severity: normal -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: mips (mips64) Kernel: Linux 2.6.26-2-r4k-ip22 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages openssh-server depends on: ii adduser 3.110 add and remove users and groups ii debconf [debcon 1.5.24 Debian configuration management sy ii dpkg 1.14.25 Debian package management system ii libc6 2.7-18 GNU C Library: Shared libraries ii libcomerr2 1.41.3-1 common error description library ii libkrb53 1.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries ii libpam-modules 1.0.1-5+lenny1 Pluggable Authentication Modules f ii libpam-runtime 1.0.1-5+lenny1 Runtime support for the PAM librar ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l ii libselinux1 2.0.65-5 SELinux shared libraries ii libssl0.9.8 0.9.8g-15+lenny5 SSL shared libraries ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip ii openssh-blackli 0.4.1 list of default blacklisted OpenSS ii openssh-client 1:5.1p1-5 secure shell client, an rlogin/rsh ii procps 1:3.2.7-11 /proc file system utilities ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime Versions of packages openssh-server recommends: pn openssh-blacklist-extra <none> (no description available) pn xauth <none> (no description available) Versions of packages openssh-server suggests: pn molly-guard <none> (no description available) pn rssh <none> (no description available) pn ssh-askpass <none> (no description available) -- debconf information: ssh/new_config: true * ssh/use_old_init_script: true ssh/vulnerable_host_keys: ssh/encrypted_host_key_but_no_keygen: ssh/disable_cr_auth: false -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: mips (mips64) Kernel: Linux 2.6.26-2-r4k-ip22 Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages openssh-server depends on: ii adduser 3.110 add and remove users and groups ii debconf [debcon 1.5.24 Debian configuration management sy ii dpkg 1.14.25 Debian package management system ii libc6 2.7-18 GNU C Library: Shared libraries ii libcomerr2 1.41.3-1 common error description library ii libkrb53 1.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries ii libpam-modules 1.0.1-5+lenny1 Pluggable Authentication Modules f ii libpam-runtime 1.0.1-5+lenny1 Runtime support for the PAM librar ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l ii libselinux1 2.0.65-5 SELinux shared libraries ii libssl0.9.8 0.9.8g-15+lenny5 SSL shared libraries ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip ii openssh-blackli 0.4.1 list of default blacklisted OpenSS ii openssh-client 1:5.1p1-5 secure shell client, an rlogin/rsh ii procps 1:3.2.7-11 /proc file system utilities ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime Versions of packages openssh-server recommends: pn openssh-blacklist-extra <none> (no description available) pn xauth <none> (no description available) Versions of packages openssh-server suggests: pn molly-guard <none> (no description available) pn rssh <none> (no description available) pn ssh-askpass <none> (no description available) -- debconf information: ssh/new_config: true * ssh/use_old_init_script: true ssh/vulnerable_host_keys: ssh/encrypted_host_key_but_no_keygen: ssh/disable_cr_auth: false
--- End Message ---
--- Begin Message ---
- To: 562593-done@bugs.debian.org
- Subject: Bug#562593: openssh-server fails to install - hangs at generating DSA2 key (Debian MIPS on SGI Indy R5000)
- From: James Cowgill <jcowgill@debian.org>
- Date: Thu, 20 Oct 2016 15:50:49 +0100
- Message-id: <79e45696-9a3c-46af-589e-825de156f79f@debian.org>
Hi, As you've indicated in the bugreport, this appears to be (or was) a kernel bug relating to the r4k-ip22 kernel. Since support for all pre-r2 processors (including the ip22) are being dropped for stretch, it no longer applies and I am now closing it. Sorry the bug wasn't fixed properly! Thanks, JamesAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---