Project

General

Profile

Bug #20044

SFTP backup from CUCM 10.5.2.12900-14 fails with FreeNAS-9.10.2 (a476f16)

Added by Ryan Snyder over 2 years ago. Updated over 1 year ago.

Status:
Resolved
Priority:
Nice to have
Assignee:
William Grzybowski
Category:
OS
Target version:
Seen in:
Severity:
New
Reason for Closing:
Reason for Blocked:
Needs QA:
Yes
Needs Doc:
Yes
Needs Merging:
Yes
Needs Automation:
No
Support Suite Ticket:
n/a
Hardware Configuration:

Intel(R) Atom(TM) CPU C2750 @ 2.40GHz
16327MB

ChangeLog Required:
No

Description

We have been running Freenas on the XI systems for quite some time. I recently upgraded to 9.10.2 from 9.10.1-U4 (ec9a7d3). Everything seemed like it was working just fine. But sometime after the upgrade our Cisco Call Manager stopped backing up. I didn't put things together until now.

When running the 9.10.2 CUCM says that it is unable to login to the SFTP server. I used Cyberduck from my machine to connect using the credentials and everything seems correct. I also was able SSH to CUCM from the Freenas box and that worked. I deleted the connections and tried to setup again same problem.

At one our other sites we have one that is running the 9.10.1. So I set the backup to run to that for the time being. That works like a champ.

The accounts used for the SFTP backup are local to the freenas.

When i do the login I see a bunch of

Jan 4 13:05:03 DO-Freenas sshd690: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd692: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd694: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd696: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd698: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd700: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd702: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd704: fatal: Pre-authentication none cipher requests are not allowed. [preauth]
Jan 4 13:05:03 DO-Freenas sshd707: fatal: Pre-authentication none cipher requests are not allowed. [preauth]

CUCM shows
Reason : Unable to access SFTP server. Please ensure the username and password are correct.
AppID : Cisco DRF Master

I did find this bug for CUCM. I think this might be related. CSCur98596


Related issues

Related to FreeNAS - Bug #25645: Fix sshd config generationResolved2017-08-22
Related to FreeNAS - Bug #26613: SSH Closed: Not To Be Fixed2017-11-11

Associated revisions

Revision d092075f (diff)
Added by William Grzybowski over 2 years ago

fix(rc.d): add aes128-cbc by default

Ticket: #20044

History

#1 Updated by Bonnie Follweiler over 2 years ago

  • Assignee set to Erin Clark

#2 Avatar?id=14398&size=24x24 Updated by Kris Moore over 2 years ago

  • Assignee changed from Erin Clark to Suraj Ravichandran
  • Seen in changed from 9.10-RELEASE to 9.10.2

Over to Suraj for investigation. Couple of possibles though:

Can you send us your /usr/local/etc/ssh/sshd_config file? In particular looking to see if you have "NoneEnabled yes" in there.

Also, as a work-around you can try to disable using the none cipher on the Cisco

#3 Updated by Ryan Snyder over 2 years ago

cat /usr/local/etc/ssh/sshd_config
Subsystem sftp /usr/libexec/sftp-server -l INFO -f AUTH
Protocol 2
UseDNS no
ChallengeResponseAuthentication no
ClientAliveCountMax 3
ClientAliveInterval 15
NoneEnabled yes
Port 22
PermitRootLogin yes
AllowTcpForwarding no
Compression no
PasswordAuthentication yes
PubkeyAuthentication yes
Ciphers +arcfour256 *Found this on that bug page from Cisco. I added and didn't make a difference

#4 Updated by Vaibhav Chauhan over 2 years ago

  • Priority changed from No priority to Nice to have
  • Target version set to 49

to the bug posterI we don't think we have any QA cisco call manager hardware to work with so as second option can you please post debug from your 9.10.1(working system) and 9.10.2 (non-working) system.

#5 Updated by Steve Creel over 2 years ago

I was seeing the same behavior. I added to the "Extra Options" on the SSH service:
ciphers +aes128-cbc # Support CUCM backups

CUCM backups were then able to connect.

I'm working with CUCM v10.5.2.11900-3 on FreeNAS v9.10.2-U1

#6 Updated by Yury Ambrosov over 2 years ago

I got the same error on last FreeNAS-9.10.2-STABLE while connecting to sshd from ruby.
From putty(win), remote shell(debian8) - OK.

Problem with encryption detection:

  • encryption_server: none
  • encryption_client: none

Output examples

NOT_OK: FreeNAS-9.10-RELEASE.iso, virtual machine, clean install, sshd enables.

FreeBSD freenas.local 10.3-STABLE FreeBSD 10.3-STABLE #0 r295946+1805185(9.10.2-STABLE): Wed Jan 11 17:12:42 UTC 2017 root@gauntlet:/freenas-9.10-releng/_BE/objs/freenas-9.10-releng/_BE/os/sys/FreeNAS.amd64 amd64
Client: ruby net-ssh-4.1.0 gems

Result:
D, [2017-03-05T21:45:05.387829 #5192] DEBUG -- net.ssh.transport.session[24bf120]: establishing connection to 192.168.5.30:22
D, [2017-03-05T21:45:05.389831 #5192] DEBUG -- net.ssh.transport.session[24bf120]: connection established
I, [2017-03-05T21:45:05.389831 #5192] INFO -- net.ssh.transport.server_version[24be694]: negotiating protocol version
D, [2017-03-05T21:45:05.389831 #5192] DEBUG -- net.ssh.transport.server_version[24be694]: local is `SSH-2.0-Ruby/Net::SSH_4.1.0 x64-mingw32'
D, [2017-03-05T21:45:05.397337 #5192] DEBUG -- net.ssh.transport.server_version[24be694]: remote is `SSH-2.0-OpenSSH_7.3-hpn14v5 FreeBSD-openssh-portable-7.3.p1_1,1'
I, [2017-03-05T21:45:05.398839 #5192] INFO -- net.ssh.transport.algorithms[24b91bc]: sending KEXINIT
D, [2017-03-05T21:45:05.399337 #5192] DEBUG -- socket[24bedb0]: queueing packet nr 0 type 20 len 1156
D, [2017-03-05T21:45:05.399337 #5192] DEBUG -- socket[24bedb0]: sent 1160 bytes
D, [2017-03-05T21:45:05.399838 #5192] DEBUG -- socket[24bedb0]: read 1040 bytes
D, [2017-03-05T21:45:05.399838 #5192] DEBUG -- socket[24bedb0]: received packet nr 0 type 20 len 1036
I, [2017-03-05T21:45:05.399838 #5192] INFO -- net.ssh.transport.algorithms[24b91bc]: got KEXINIT from server
I, [2017-03-05T21:45:05.400340 #5192] INFO -- net.ssh.transport.algorithms[24b91bc]: negotiating algorithms
D, [2017-03-05T21:45:05.400340 #5192] DEBUG -- net.ssh.transport.algorithms[24b91bc]: negotiated:
  • kex: diffie-hellman-group14-sha1
  • host_key: ssh-rsa
  • encryption_server: none
  • encryption_client: none
  • hmac_client: hmac-sha1
  • hmac_server: hmac-sha1
  • compression_client: none
  • compression_server: none
  • language_client:
  • language_server:
    D, [2017-03-05T21:45:05.400340 #5192] DEBUG -- net.ssh.transport.algorithms[24b91bc]: exchanging keys
    D, [2017-03-05T21:45:05.408894 #5192] DEBUG -- socket[24bedb0]: queueing packet nr 1 type 30 len 268
    D, [2017-03-05T21:45:05.408894 #5192] DEBUG -- socket[24bedb0]: sent 272 bytes
    cap aborted!
    Errno::ECONNABORTED: An established connection was aborted by the software in your host machine. - recvfrom(2)
    d:/app/ruby/ruby-2.2.3-x64-mingw32/lib/ruby/gems/2.2.0/gems/net-ssh-4.1.0/lib/net/ssh/buffered_io.rb:65:in `recv'
    d:/app/ruby/ruby-2.2.3-x64-mingw32/lib/ruby/gems/2.2.0/gems/net-ssh-4.1.0/lib/net/ssh/buffered_io.rb:65:in `fill'
    d:/app/ruby/ruby-2.2.3-x64-mingw32/lib/ruby/gems/2.2.0/gems/net-ssh-4.1.0/lib/net/ssh/transport/packet_stream.rb:112:in `block in next_packet'
    d:/app/ruby/ruby-2.2.3-x64-mingw32/lib/ruby/gems/2.2.0/gems/net-ssh-4.1.0/lib/net/ssh/transport/packet_stream.rb:103:in `loop'

Log on server (/var/log/auth.log)
freenas sshd4147: fatal: Pre-authentication none cipher requests are not allowed. [preauth]

OK: FreeNAS-9.3-RELEASE.iso, virtual machine, clean install, sshd enables.

FreeBSD freenas.local 9.3-RELEASE-p5 FreeBSD 9.3-RELEASE-p5 #0 3b4abc3: Mon Dec 8 15:09:41 PST 2014 :/tank/home/jkh/build/M/FN/objs/os-base/amd64/fusion/jkh/M/FN/FreeBSD/src/sys/FREENAS.amd64 amd64
Client: ruby net-ssh-4.1.0 gems

Result:
D, [2017-03-05T21:47:15.824608 #10308] DEBUG -- net.ssh.transport.session[17a9ef4]: establishing connection to 192.168.5.32:22
D, [2017-03-05T21:47:15.826608 #10308] DEBUG -- net.ssh.transport.session[17a9ef4]: connection established
I, [2017-03-05T21:47:15.826608 #10308] INFO -- net.ssh.transport.server_version[17a91ac]: negotiating protocol version
D, [2017-03-05T21:47:15.827108 #10308] DEBUG -- net.ssh.transport.server_version[17a91ac]: local is `SSH-2.0-Ruby/Net::SSH_4.1.0 x64-mingw32'
D, [2017-03-05T21:47:15.833614 #10308] DEBUG -- net.ssh.transport.server_version[17a91ac]: remote is `SSH-2.0-OpenSSH_6.6.1_hpn13v11 FreeBSD-20140420'
I, [2017-03-05T21:47:15.835115 #10308] INFO -- net.ssh.transport.algorithms[17a3414]: sending KEXINIT
D, [2017-03-05T21:47:15.835115 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 0 type 20 len 1156
D, [2017-03-05T21:47:15.835115 #10308] DEBUG -- socket[17a99b8]: sent 1160 bytes
D, [2017-03-05T21:47:15.835614 #10308] DEBUG -- socket[17a99b8]: read 1528 bytes
D, [2017-03-05T21:47:15.835614 #10308] DEBUG -- socket[17a99b8]: received packet nr 0 type 20 len 1524
I, [2017-03-05T21:47:15.835614 #10308] INFO -- net.ssh.transport.algorithms[17a3414]: got KEXINIT from server
I, [2017-03-05T21:47:15.836116 #10308] INFO -- net.ssh.transport.algorithms[17a3414]: negotiating algorithms
D, [2017-03-05T21:47:15.836116 #10308] DEBUG -- net.ssh.transport.algorithms[17a3414]: negotiated:
  • kex: diffie-hellman-group-exchange-sha1
  • host_key: ssh-rsa
  • encryption_server: aes128-cbc
  • encryption_client: aes128-cbc
  • hmac_client: hmac-sha1
  • hmac_server: hmac-sha1
  • compression_client: none
  • compression_server: none
  • language_client:
  • language_server:
    D, [2017-03-05T21:47:15.836116 #10308] DEBUG -- net.ssh.transport.algorithms[17a3414]: exchanging keys
    D, [2017-03-05T21:47:15.836616 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 1 type 34 len 20
    D, [2017-03-05T21:47:15.837116 #10308] DEBUG -- socket[17a99b8]: sent 24 bytes
    D, [2017-03-05T21:47:15.848358 #10308] DEBUG -- socket[17a99b8]: read 152 bytes
    D, [2017-03-05T21:47:15.848358 #10308] DEBUG -- socket[17a99b8]: received packet nr 1 type 31 len 148
    D, [2017-03-05T21:47:15.850309 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 2 type 32 len 140
    D, [2017-03-05T21:47:15.850309 #10308] DEBUG -- socket[17a99b8]: sent 144 bytes
    D, [2017-03-05T21:47:15.863071 #10308] DEBUG -- socket[17a99b8]: read 720 bytes
    D, [2017-03-05T21:47:15.863071 #10308] DEBUG -- socket[17a99b8]: received packet nr 2 type 33 len 700
    D, [2017-03-05T21:47:15.867008 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 3 type 21 len 20
    D, [2017-03-05T21:47:15.867968 #10308] DEBUG -- socket[17a99b8]: sent 24 bytes
    D, [2017-03-05T21:47:15.868944 #10308] DEBUG -- socket[17a99b8]: received packet nr 3 type 21 len 12
    D, [2017-03-05T21:47:15.870900 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: beginning authentication of `root'
    D, [2017-03-05T21:47:15.873829 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 4 type 5 len 28
    D, [2017-03-05T21:47:15.875787 #10308] DEBUG -- socket[17a99b8]: sent 52 bytes
    D, [2017-03-05T21:47:15.876766 #10308] DEBUG -- socket[17a99b8]: read 52 bytes
    D, [2017-03-05T21:47:15.878721 #10308] DEBUG -- socket[17a99b8]: received packet nr 4 type 6 len 28
    D, [2017-03-05T21:47:15.880676 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: trying none
    D, [2017-03-05T21:47:15.880676 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 5 type 50 len 44
    D, [2017-03-05T21:47:15.882631 #10308] DEBUG -- socket[17a99b8]: sent 68 bytes
    D, [2017-03-05T21:47:15.897327 #10308] DEBUG -- socket[17a99b8]: read 68 bytes
    D, [2017-03-05T21:47:15.897327 #10308] DEBUG -- socket[17a99b8]: received packet nr 5 type 51 len 44
    D, [2017-03-05T21:47:15.899308 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: allowed methods: publickey,password
    D, [2017-03-05T21:47:15.901257 #10308] DEBUG -- net.ssh.authentication.methods.none[159f0b4]: none failed
    D, [2017-03-05T21:47:15.902230 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: trying publickey
    D, [2017-03-05T21:47:15.905161 #10308] DEBUG -- net.ssh.authentication.agent[13038a0]: connecting to ssh-agent
    E, [2017-03-05T21:47:15.908086 #10308] ERROR -- net.ssh.authentication.agent[13038a0]: could not connect to ssh-agent: pageant process not running
    D, [2017-03-05T21:47:15.909059 #10308] DEBUG -- net.ssh.authentication.methods.publickey[1306e60]: trying publickey (ca:86:57:f7:99:85:d3:0a:16:aa:0f:4a:c4:8c:ea:cc)
    D, [2017-03-05T21:47:15.911026 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 6 type 50 len 348
    D, [2017-03-05T21:47:15.912004 #10308] DEBUG -- socket[17a99b8]: sent 372 bytes
    D, [2017-03-05T21:47:15.923732 #10308] DEBUG -- socket[17a99b8]: read 68 bytes
    D, [2017-03-05T21:47:15.923732 #10308] DEBUG -- socket[17a99b8]: received packet nr 6 type 51 len 44
    D, [2017-03-05T21:47:15.926188 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: allowed methods: publickey,password
    D, [2017-03-05T21:47:15.929193 #10308] DEBUG -- net.ssh.authentication.session[15c5458]: trying password
    D, [2017-03-05T21:47:15.930691 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 7 type 50 len 60
    D, [2017-03-05T21:47:15.932202 #10308] DEBUG -- socket[17a99b8]: sent 84 bytes
    D, [2017-03-05T21:47:15.955049 #10308] DEBUG -- socket[17a99b8]: read 36 bytes
    D, [2017-03-05T21:47:15.955049 #10308] DEBUG -- socket[17a99b8]: received packet nr 7 type 52 len 12
    D, [2017-03-05T21:47:15.957965 #10308] DEBUG -- net.ssh.authentication.methods.password[12f3388]: password succeeded
    D, [2017-03-05T21:47:15.958960 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 8 type 90 len 44
    D, [2017-03-05T21:47:15.959923 #10308] DEBUG -- socket[17a99b8]: sent 68 bytes
    D, [2017-03-05T21:47:15.960909 #10308] DEBUG -- socket[17a99b8]: read 52 bytes
    D, [2017-03-05T21:47:15.961875 #10308] DEBUG -- socket[17a99b8]: received packet nr 8 type 91 len 28
    I, [2017-03-05T21:47:15.961875 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_open_confirmation: 0 0 0 32768
    I, [2017-03-05T21:47:15.962852 #10308] INFO -- net.ssh.connection.channel[12eb4a8]: sending channel request ""
    D, [2017-03-05T21:47:15.963831 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 9 type 98 len 44
    I, [2017-03-05T21:47:15.966764 #10308] INFO -- net.ssh.connection.channel[12eb4a8]: sending channel request "exec"
    D, [2017-03-05T21:47:15.967742 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 10 type 98 len 28
    D, [2017-03-05T21:47:15.968720 #10308] DEBUG -- socket[17a99b8]: sent 120 bytes
    D, [2017-03-05T21:47:15.980450 #10308] DEBUG -- socket[17a99b8]: read 124 bytes
    D, [2017-03-05T21:47:15.980450 #10308] DEBUG -- socket[17a99b8]: received packet nr 9 type 99 len 12
    I, [2017-03-05T21:47:15.981429 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_success: 0
    D, [2017-03-05T21:47:15.981429 #10308] DEBUG -- net.ssh.service.forward[12e6520]: authentication agent forwarding is active
    D, [2017-03-05T21:47:15.982420 #10308] DEBUG -- socket[17a99b8]: received packet nr 10 type 93 len 28
    I, [2017-03-05T21:47:15.982420 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_window_adjust: 0 +65536
    D, [2017-03-05T21:47:15.983399 #10308] DEBUG -- socket[17a99b8]: received packet nr 11 type 99 len 12
    I, [2017-03-05T21:47:15.983399 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_success: 0
    D, [2017-03-05T21:47:15.984364 #10308] DEBUG -- socket[17a99b8]: read 656 bytes
    D, [2017-03-05T21:47:15.984364 #10308] DEBUG -- socket[17a99b8]: received packet nr 12 type 94 len 492
    I, [2017-03-05T21:47:15.984364 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_data: 0 464b
    01 Filesystem Size Used Avail Capacity Mounted on
    01 freenas-boot/ROOT/default 19G 930M 18G 5% /
    01 devfs 1.0k 1.0k 0B 100% /dev
    01 tmpfs 32M 5.3M 26M 17% /etc
    01 tmpfs 4.0M 8.0k 4M 0% /mnt
    01 tmpfs 332M 28M 304M 9% /var
    01 freenas-boot/grub 18G 7.8M 18G 0% /boot/grub
    D, [2017-03-05T21:47:15.992181 #10308] DEBUG -- socket[17a99b8]: received packet nr 13 type 98 len 44
    I, [2017-03-05T21:47:15.992181 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_request: 0 exit-status false
    D, [2017-03-05T21:47:15.993159 #10308] DEBUG -- socket[17a99b8]: received packet nr 14 type 96 len 12
    I, [2017-03-05T21:47:15.993159 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_eof: 0
    D, [2017-03-05T21:47:15.993159 #10308] DEBUG -- socket[17a99b8]: received packet nr 15 type 97 len 12
    I, [2017-03-05T21:47:15.994136 #10308] INFO -- net.ssh.connection.session[12eb764]: channel_close: 0
    D, [2017-03-05T21:47:15.994136 #10308] DEBUG -- socket[17a99b8]: queueing packet nr 11 type 97 len 28
    I, [2017-03-05T21:47:15.996092 #10308] INFO -- net.ssh.connection.session[12eb764]: 192.168.5.32 delete channel 0 which closed locally and remotely
    ? 01 0.173s
    I, [2017-03-05T21:47:15.997071 #10308] INFO -- net.ssh.connection.session[12eb764]: closing remaining channels (0 open)

Log on server (/var/log/auth.log)
freenas sshd4777: Accepted password for root from 192.168.5.1 port 25201 ssh2

#7 Updated by Suraj Ravichandran over 2 years ago

  • Assignee changed from Suraj Ravichandran to William Grzybowski

My apologies for neglecting this so far I am going to send this to my senior who will triage and fix.

Thanks for your patience on this

#8 Updated by William Grzybowski over 2 years ago

  • Status changed from Unscreened to 15
  • Target version changed from 49 to 9.10.3

@Yuri, does adding "ciphers +aes128-cbc" to Extra Options in SSH also solve your issue?

#9 Updated by Yury Ambrosov over 2 years ago

William Grzybowski wrote:

@Yuri, does adding "ciphers +aes128-cbc" to Extra Options in SSH also solve your issue?

@William, yes, with this option on UI connection is ok, thank you.

  • kex: diffie-hellman-group14-sha1
  • host_key: ssh-rsa
  • encryption_server: aes128-cbc
  • encryption_client: aes128-cbc
  • hmac_client: hmac-sha1
  • hmac_server: hmac-sha1
  • compression_client: none
  • compression_server: none
  • language_client:
  • language_server:

#10 Updated by William Grzybowski over 2 years ago

  • Status changed from 15 to Ready For Release

#11 Avatar?id=14398&size=24x24 Updated by Kris Moore over 2 years ago

  • Target version changed from 9.10.3 to 11.0

#13 Updated by Vaibhav Chauhan about 2 years ago

  • Target version changed from 11.0 to 11.0-RC

#14 Updated by Vaibhav Chauhan about 2 years ago

  • Status changed from Ready For Release to Resolved

#15 Updated by Vladimir Vinogradenko almost 2 years ago

Should aes128-cbc really be enabled everywhere? I think it is disabled by default for a reason.

Also, fix above applies only for users who have specified any «Extra options» (see #25645) which means aes128-cbc is needed only by very small amount of power users, who can enable it themselves if necessary.

The practical question is: should aes128-cbc be enabled for everybody (instead of enabling it for random users) while fixing #25645 ?

#16 Updated by Ryan Snyder almost 2 years ago

I just updated to latest FreeNAS-11.0-U3 (c5dcf4416) and the problem still exists.

sshd17727: fatal: Pre-authentication none cipher requests are not allowed. [preauth]

I am still unable to have CUCM do backups to the FreeNAS like before. Do I need to do another Bug?

#17 Updated by William Grzybowski almost 2 years ago

Ryan Snyder wrote:

I just updated to latest FreeNAS-11.0-U3 (c5dcf4416) and the problem still exists.

sshd17727: fatal: Pre-authentication none cipher requests are not allowed. [preauth]

I am still unable to have CUCM do backups to the FreeNAS like before. Do I need to do another Bug?

As a workaround you can add and Extra Options and it should work, otherwise you can wait for 11.1 (#25645)

#18 Updated by William Grzybowski almost 2 years ago

  • Related to Bug #25645: Fix sshd config generation added

#19 Updated by Alexander Motin over 1 year ago

#20 Updated by Ryan Snyder over 1 year ago

I see this update keeps getting pushed back. Why? I need this patch.

#21 Updated by Dru Lavigne over 1 year ago

Ryan: the related ticket was resolved in 11.1-BETA1.

Also available in: Atom PDF