https://bugzilla.mindrot.org/show_bug.cgi?id=1963 --- Comment #5 from martin f. krafft <bugzilla.mindrot.org at pobox.madduck.net> --- With reference to http://bugs.debian.org/650512, which I just reopened, I am sorry to say that the bug persists in OpenSSH 6.0. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 martin f. krafft <bugzilla.mindrot.org at pobox.madduck.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED |--- -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution|--- |WORKSFORME --- Comment #6 from Damien Miller <djm at mindrot.org> --- Debian OpenSSH 6.0 does indeed seem broken: attempting a connection with IPQoS=EF yields "tos 0x0" in tcpdumps. However, stock OpenSSH 6.0 compiled from source works just fine. I see "tos 0xb8" as expected in my tcpdumps. I suggest you search the patches applied downstream to see what broke it. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 --- Comment #7 from martin f. krafft <bugzilla.mindrot.org at pobox.madduck.net> --- I will of course take this up with the Debian maintainer, but from a cursory look, I cannot find anything in the downstream patches: % grep -ri qos openssh-6.0p1/debian/patches #10018 openssh-6.0p1/debian/patches/keepalive-extensions.patch: oKexAlgorithms, oIPQoS, oRequestTTY, openssh-6.0p1/debian/patches/keepalive-extensions.patch: { "ipqos", oIPQoS }, openssh-6.0p1/debian/patches/debian-banner.patch: options->ip_qos_interactive = -1; openssh-6.0p1/debian/patches/debian-banner.patch: options->ip_qos_bulk = -1; openssh-6.0p1/debian/patches/debian-banner.patch: options->ip_qos_interactive = IPTOS_LOWDELAY; openssh-6.0p1/debian/patches/debian-banner.patch: if (options->ip_qos_bulk == -1) openssh-6.0p1/debian/patches/debian-banner.patch: options->ip_qos_bulk = IPTOS_THROUGHPUT; openssh-6.0p1/debian/patches/debian-banner.patch: sKexAlgorithms, sIPQoS, openssh-6.0p1/debian/patches/debian-banner.patch: { "ipqos", sIPQoS, SSHCFG_ALL }, (note that these are all context lines of the diffs, so no changes are being made?) -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 Gary T. Giesen <giesen at snickers.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |giesen at snickers.org --- Comment #8 from Gary T. Giesen <giesen at snickers.org> --- I also see that a ~/.ssh/config file overrides any options specified on the command line. I would suspect that this should be the opposite (command-line always overrides config file) -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 --- Comment #9 from Gary T. Giesen <giesen at snickers.org> --- Forgot to include that my platform is OpenSSH_6.1p1, OpenSSL 1.0.1c 10 May 2012, MacPorts version of openssh on Mac OS X 10.7 Lion. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
https://bugzilla.mindrot.org/show_bug.cgi?id=1963 --- Comment #10 from Damien Miller <djm at mindrot.org> --- (In reply to comment #8)> I also see that a ~/.ssh/config file overrides any options specified > on the command line.No, it doesn't. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.