Project

General

Profile

Actions

Bug #5127

closed

OpenSSH Technique tries to set invalid parameters on Redhat3, 4 and Debian 3 and 4 (branch 2.9)

Added by Nicolas CHARLES over 10 years ago. Updated almost 9 years ago.

Status:
Released
Priority:
N/A
Assignee:
Jonathan CLARKE
Category:
Techniques
Target version:
Severity:
UX impact:
User visibility:
Effort required:
Priority:
Name check:
Fix check:
Regression:

Description

On Debian 3, the following parameters are invalid for OpenSSH

/etc/ssh/sshd_config: line 75: Bad configuration option: MaxAuthTries
/etc/ssh/sshd_config: line 76: Bad configuration option: AllowAgentForwarding
/etc/ssh/sshd_config: line 78: Bad configuration option: MaxSessions
/etc/ssh/sshd_config: line 80: Bad configuration option: PermitTunnel
/etc/ssh/sshd_config: line 82: Bad configuration option: AddressFamily
/etc/ssh/sshd_config: terminating, 5 bad configuration options

On Debian 4, it is the following that are invalid

/etc/ssh/sshd_config: line 80: Bad configuration option: AllowAgentForwarding
/etc/ssh/sshd_config: line 82: Bad configuration option: MaxSessions
/etc/ssh/sshd_config: terminating, 2 bad configuration options

On RedHat3, it is

/etc/ssh/sshd_config: line 98: Bad configuration option: MaxAuthTries
/etc/ssh/sshd_config: line 100: Bad configuration option: TCPKeepAlive
/etc/ssh/sshd_config: line 101: Bad configuration option: PermitTunnel
/etc/ssh/sshd_config: line 102: Bad configuration option: AddressFamily

and on Redhat4 it is
/etc/ssh/sshd_config: line 113: Bad configuration option: PermitTunnel
/etc/ssh/sshd_config: line 114: Bad configuration option: AddressFamily

Since we don't have the same versions on branches 2.6 and 2.9, we need to fix on both


Related issues 2 (0 open2 closed)

Related to Rudder - Bug #5126: OpenSSH Technique tries to set invalid parameters on Redhat3, 4 and Debian 3 and 4 (branch 2.6)ReleasedJonathan CLARKE2014-06-24Actions
Related to Rudder - User story #5133: OpenSSH Technique should enable/disable feature based on installed OpenSSH version, not based on OS versionRejectedActions
Actions #1

Updated by Nicolas CHARLES over 10 years ago

  • Status changed from 8 to Pending technical review
  • Assignee changed from Nicolas CHARLES to Jonathan CLARKE
  • Pull Request set to https://github.com/Normation/rudder-techniques/pull/427
Actions #2

Updated by Nicolas CHARLES over 10 years ago

  • Status changed from Pending technical review to Pending release
  • % Done changed from 0 to 100

Applied in changeset policy-templates:commit:d3c9f1f928859a2a31b6bdb71e0568a28cc3f1d4.

Actions #3

Updated by Nicolas CHARLES over 10 years ago

Applied in changeset policy-templates:commit:04c1e9d4d9c3b389a4109890ed3a12f07e85c165.

Actions #4

Updated by Vincent MEMBRÉ over 10 years ago

  • Target version changed from 2.9.7 to 2.10.3
Actions #5

Updated by Vincent MEMBRÉ over 10 years ago

  • Status changed from Pending release to Released

This bug has been fixed in Rudder 2.10.3 (announcement , changelog) and 2.11.0~beta2 (announcement , changelog), which were released today.

Actions #6

Updated by Benoît PECCATTE almost 9 years ago

  • Target version changed from 2.10.3 to 2.9.7
Actions

Also available in: Atom PDF