Mailing List Archive

Call for testing: OpenSSH 8.4
Hi,

OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.

Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/

The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html

Portable OpenSSH is also available via git using the
instructions at http://www.openssh.com/portable.html#cvs
At https://anongit.mindrot.org/openssh.git/ or via a mirror at Github:
https://github.com/openssh/openssh-portable

Running the regression tests supplied with Portable OpenSSH does not
require installation and is a simply:

$ ./configure && make tests

Live testing on suitable non-production systems is also appreciated.
Please send reports of success or failure to
openssh-unix-dev@mindrot.org. Security bugs should be reported
directly to openssh@openssh.com.

Below is a summary of changes. More detail may be found in the ChangeLog
in the portable OpenSSH tarballs.

Thanks to the many people who contributed to this release.

Security
========

* ssh-agent(1): restrict ssh-agent from signing web challenges for
FIDO/U2F keys.

When signing messages in ssh-agent using a FIDO key that has an
application string that does not start with "ssh:", ensure that the
message being signed is one of the forms expected for the SSH protocol
(currently public key authentication and sshsig signatures).

This prevents ssh-agent forwarding on a host that has FIDO keys
attached granting the ability for the remote side to sign challenges
for web authentication using those keys too.

Note that the converse case of web browsers signing SSH challenges is
already precluded because no web RP can have the "ssh:" prefix in the
application string that we require.

* ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating
a FIDO resident key.

The recent FIDO 2.1 Client to Authenticator Protocol introduced a
"credProtect" feature to better protect resident keys. We use this
option to require a PIN prior to all operations that may retrieve
a resident key from a FIDO token.

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

* For FIDO/U2F support, OpenSSH recommends the use of libfido2 1.5.0
or greater. Older libraries have limited support at the expense of
disabling particular features. These include resident keys, PIN-
required keys and multiple attached tokens.

* ssh-keygen(1): the format of the attestation information optionally
recorded when a FIDO key is generated has changed. It now includes
the authenticator data needed to validate attestation signatures.

* The API between OpenSSH and the FIDO token middleware has changed
and the SSH_SK_VERSION_MAJOR version has been incremented as a
result. Third-party middleware libraries must support the current
API version (7) to work with OpenSSH 8.4.

* The portable OpenSSH distribution now requires automake to rebuild
the configure script and supporting files. This is not required when
simply building portable OpenSSH from a release tar file.

Changes since OpenSSH 8.3
=========================

New features
------------

* ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for
each use. These keys may be generated using ssh-keygen using a new
"verify-required" option. When a PIN-required key is used, the user
will be prompted for a PIN to complete the signature operation.

* sshd(8): authorized_keys now supports a new "verify-required"
option to require FIDO signatures assert that the token verified
that the user was present before making the signature. The FIDO
protocol supports multiple methods for user-verification, but
currently OpenSSH only supports PIN verification.

* sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn
signatures. Webauthn is a standard for using FIDO keys in web
browsers. These signatures are a slightly different format to plain
FIDO signatures and thus require explicit support.

* ssh(1): allow some keywords to expand shell-style ${ENV}
environment variables. The supported keywords are CertificateFile,
ControlPath, IdentityAgent and IdentityFile, plus LocalForward and
RemoteForward when used for Unix domain socket paths. bz#3140

* ssh(1), ssh-agent(1): allow some additional control over the use of
ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable,
including forcibly enabling and disabling its use. bz#69

* ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time
limit for keys in addition to its current flag options. Time-
limited keys will automatically be removed from ssh-agent after
their expiry time has passed.

* scp(1), sftp(1): allow the -A flag to explicitly enable agent
forwarding in scp and sftp. The default remains to not forward an
agent, even when ssh_config enables it.

* ssh(1): add a '%k' TOKEN that expands to the effective HostKey of
the destination. This allows, e.g., keeping host keys in individual
files using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654

* ssh(1): add %-TOKEN, environment variable and tilde expansion to
the UserKnownHostsFile directive, allowing the path to be
completed by the configuration (e.g. bz#1654)

* ssh-keygen(1): allow "ssh-add -d -" to read keys to be deleted
from stdin. bz#3180

* sshd(8): improve logging for MaxStartups connection throttling.
sshd will now log when it starts and stops throttling and periodically
while in this state. bz#3055

Bugfixes
--------

* ssh(1), ssh-keygen(1): better support for multiple attached FIDO
tokens. In cases where OpenSSH cannot unambiguously determine which
token to direct a request to, the user is now required to select a
token by touching it. In cases of operations that require a PIN to
be verified, this avoids sending the wrong PIN to the wrong token
and incrementing the token's PIN failure counter (tokens
effectively erase their keys after too many PIN failures).

* sshd(8): fix Include before Match in sshd_config; bz#3122

* ssh(1), sshd(8): limit the amount of channel input data buffered,
avoiding peers that advertise large windows but are slow to read
from causing high memory consumption.

* ssh-agent(1): handle multiple requests sent in a single write() to
the agent.

* sshd(8): allow sshd_config longer than 256k

* sshd(8): avoid spurious "Unable to load host key" message when sshd
load a private key but no public counterpart

* ssh(1): prefer the default hostkey algorithm list whenever we have
a hostkey that matches its best-preference algorithm.

* sshd(1): when ordering the hostkey algorithms to request from a
server, prefer certificate types if the known_hosts files contain a key
marked as a @cert-authority; bz#3157

* ssh(1): perform host key fingerprint comparisons for the "Are you
sure you want to continue connecting (yes/no/[fingerprint])?"
prompt with case sensitivity.

* sshd(8): ensure that address/masklen mismatches in sshd_config
yield fatal errors at daemon start time rather than later when
they are evaluated.

* ssh-keygen(1): ensure that certificate extensions are lexically
sorted. Previously if the user specified a custom extension then
the everything would be in order except the custom ones. bz#3198

* ssh(1): also compare username when checking for JumpHost loops.
bz#3057

* ssh-keygen(1): preserve group/world read permission on known_hosts
files across runs of "ssh-keygen -Rf /path". The old behaviour was
to remove all rights for group/other. bz#3146

* ssh-keygen(1): Mention the [-a rounds] flag in the ssh-keygen
manual page and usage().

* sshd(8): explicitly construct path to ~/.ssh/rc rather than
relying on it being relative to the current directory, so that it
can still be found if the shell startup changes its directory.
bz#3185

* sshd(8): when redirecting sshd's log output to a file, undo this
redirection after the session child process is forked(). Fixes
missing log messages when using this feature under some
circumstances.

* sshd(8): start ClientAliveInterval bookkeeping before first pass
through select() loop; fixed theoretical case where busy sshd may
ignore timeouts from client.

* ssh(1): only reset the ServerAliveInterval check when we receive
traffic from the server and ignore traffic from a port forwarding
client, preventing a client from keeping a connection alive when
it should be terminated. bz#2265

* ssh-keygen(1): avoid spurious error message when ssh-keygen
creates files outside ~/.ssh

* sftp-client(1): fix off-by-one error that caused sftp downloads to
make one more concurrent request that desired. This prevented using
sftp(1) in unpipelined request/response mode, which is useful when
debugging. bz#3054

* ssh(1), sshd(8): handle EINTR in waitfd() and timeout_connect()
helpers. bz#3071

* ssh(1), ssh-keygen(1): defer creation of ~/.ssh until we attempt to
write to it so we don't leave an empty .ssh directory when it's not
needed. bz#3156

* ssh(1), sshd(8): fix multiplier when parsing time specifications
when handling seconds after other units. bz#3171

Portability
-----------

* sshd(8): always send any PAM account messages. If the PAM account
stack returns any messages, always send them to the user and not
just if the check succeeds. bz#2049

* Implement some backwards compatibility for libfido2 libraries
older than 1.5.0. Note that use of an older library will result
in the loss of certain features including resident key support,
PIN support and support for multiple attached tokens.

* configure fixes for XCode 12

* gnome-ssh-askpass3: ensure the "close" button is not focused by
default for SSH_ASKPASS_PROMPT=none prompts. Avoids space/enter
accidentally dismissing FIDO touch notifications.

* gnome-ssh-askpass3: allow some control over textarea colour via
$GNOME_SSH_ASKPASS_FG_COLOR and $GNOME_SSH_ASKPASS_BG_COLOR
environment variables.

* sshd(8): document another PAM spec problem in a frustrated comment

* sshd(8): support NetBSD's utmpx.ut_ss address field. bz#960

* Add the ssh-sk-helper binary and its manpage to the RPM spec file

* Detect the Frankenstein monster of Linux/X32 and allow the sandbox
to function there. bz#3085

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
Tim Rice and Ben Lindstrom.

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On 9/19/20 11:02 PM, Damien Miller wrote:
> Hi,
>
> OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.
>

Debian GNU/Linux 10 (buster)
gcc version 8.3.0 (Debian 8.3.0-6)
OpenSSL 1.1.1d  10 Sep 2019

Hang on conch ciphers test - had to ^C the process:

./configure && make tests
.....
run test putty-kex.sh ...
putty KEX: kex dh-gex-sha1
putty KEX: kex dh-group1-sha1
putty KEX: kex dh-group14-sha1
putty KEX: kex ecdh
ok putty KEX
run test conch-ciphers.sh ...
conch ciphers: cipher aes256-ctr

user    6828  6164  0 08:59 pts/10   00:00:00 sh /home/user/sandbox/openssh/regress/test-exec.sh /home/user/sandbox/openssh/regress /home/user/sandbox/openssh/regress/conch-ciphers.sh
user    6896  6828  0 08:59 pts/10   00:00:00 /usr/bin/python2 /usr/bin/conch --identity /home/user/sandbox/openssh/regress/ssh-rsa --port 4242 --user user -e none --known-hosts /home/user/sandbox/openssh/regress/known_hosts --notty --noagent --nox11 -n 127.0.0.1 cat /home/user/sandbox/openssh/regress/data
user   11095 11073  0 09:24 pts/11   00:00:00 grep conch

--
# include <stddisclaimer.h>
/* Kevin Brott <Kevin.Brott@GMail.com> */


_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Sun, Sep 20, 2020 at 09:34:50AM -0700, Kevin Brott wrote:
> On 9/19/20 11:02 PM, Damien Miller wrote:
> > OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a bugfix release.
>
> Debian GNU/Linux 10 (buster)
> gcc version 8.3.0 (Debian 8.3.0-6)
> OpenSSL 1.1.1d  10 Sep 2019
>
> Hang on conch ciphers test - had to ^C the process:

This might be https://twistedmatrix.com/trac/ticket/9515, which was
fixed in Twisted 19.2.0; Debian 10 has an older version. I forget what
the original symptoms of that bug were, but it seems plausible. Try
applying this workaround patch?

https://salsa.debian.org/ssh-team/openssh/-/blob/debian/1%258.3p1-1/debian/patches/conch-old-privkey-format.patch

(I haven't advocated for this to be applied to OpenSSH upstream, since
the proper fix was in Twisted.)

--
Colin Watson (he/him) [cjwatson@debian.org]
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
I wonder if I'm doing something wrong on NetBSD. From configure I see:

checking if cc supports -Werror... yes
./configure: 5480: Syntax error: Word "-pipe" unexpected (expecting ")")

--
Hisashi T Fujinaka - htodd@twofifty.com
BSEE + BSChem + BAEnglish + MSCS + $2.50 = coffee
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
RE: Call for testing: OpenSSH 8.4 [ In reply to ]
On September 20, 2020 2:02 AM, Damien Miller wrote:
> OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.

I will be testing this shortly on HPE NonStop platforms.

Side question: We now have access to the hardware random generator and can
decouple for PRNGD. Any guidance on how to do that would be appreciated. We
would be happy to contribute the platform changes as well associated with
this and the port changes.

Thanks,
Randall

-- Brief whoami:
NonStop developer since approximately 211288444200000000
UNIX developer since approximately 421664400
-- In my real life, I talk too much.



_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, 21 Sep 2020 at 03:04, Hisashi T Fujinaka <htodd@twofifty.com> wrote:
> I wonder if I'm doing something wrong on NetBSD. From configure I see:
>
> checking if cc supports -Werror... yes
> ./configure: 5480: Syntax error: Word "-pipe" unexpected (expecting ")")

I've seen that when aclocal (from automake, which is a new dependency
if you're not using a snapshot or release tarball) failed to create
aclocal.m4. Did you check out the source yourself, and if so did you
get any errors when you ran "autoreconf"?

--
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new)
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Sun, Sep 20, 2020 at 03:13:28PM -0400, Randall S. Becker wrote:
> On September 20, 2020 2:02 AM, Damien Miller wrote:
> > OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a bugfix release.
>
> I will be testing this shortly on HPE NonStop platforms.
>
> Side question: We now have access to the hardware random generator and can
> decouple for PRNGD. Any guidance on how to do that would be appreciated. We
> would be happy to contribute the platform changes as well associated with
> this and the port changes.
>

Is this suppose to be openssl 3.0 ready?

> Thanks,
> Randall
>
> -- Brief whoami:
> NonStop developer since approximately 211288444200000000
> UNIX developer since approximately 421664400
> -- In my real life, I talk too much.
>
>
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b
USA call a Nov 3 2020 referndum to dissolve the Union and dissolve!!
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, 21 Sep 2020, Darren Tucker wrote:

> On Mon, 21 Sep 2020 at 03:04, Hisashi T Fujinaka <htodd@twofifty.com> wrote:
>> I wonder if I'm doing something wrong on NetBSD. From configure I see:
>>
>> checking if cc supports -Werror... yes
>> ./configure: 5480: Syntax error: Word "-pipe" unexpected (expecting ")")
>
> I've seen that when aclocal (from automake, which is a new dependency
> if you're not using a snapshot or release tarball) failed to create
> aclocal.m4. Did you check out the source yourself, and if so did you
> get any errors when you ran "autoreconf"?

I get my autoconf commands mixed up and tried autoreconf and it is now
running the tests.

Thanks for the reminder.

--
Hisashi T Fujinaka - htodd@twofifty.com
BSEE + BSChem + BAEnglish + MSCS + $2.50 = coffee
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
RE: Call for testing: OpenSSH 8.4 [ In reply to ]
On September 20, 2020 5:25 PM, The Doctor wrote;
> On Sun, Sep 20, 2020 at 03:13:28PM -0400, Randall S. Becker wrote:
> > On September 20, 2020 2:02 AM, Damien Miller wrote:
> > > OpenSSH 8.4p1 is almost ready for release, so we would appreciate
> > > testing on as many platforms and systems as possible. This is a bugfix
> release.
> >
> > I will be testing this shortly on HPE NonStop platforms.
> >
> > Side question: We now have access to the hardware random generator and
> > can decouple for PRNGD. Any guidance on how to do that would be
> > appreciated. We would be happy to contribute the platform changes as
> > well associated with this and the port changes.
> >
>
> Is this suppose to be openssl 3.0 ready?

I am just finishing up the OpenSSL 3.0 port. I could test with it or 1.1.1.
Either way (or both).

Regards,
Randall

-- Brief whoami:
NonStop developer since approximately 211288444200000000
UNIX developer since approximately 421664400
-- In my real life, I talk too much.



_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Sun, Sep 20, 2020 at 06:18:29PM -0400, Randall S. Becker wrote:
> On September 20, 2020 5:25 PM, The Doctor wrote;
> > On Sun, Sep 20, 2020 at 03:13:28PM -0400, Randall S. Becker wrote:
> > > On September 20, 2020 2:02 AM, Damien Miller wrote:
> > > > OpenSSH 8.4p1 is almost ready for release, so we would appreciate
> > > > testing on as many platforms and systems as possible. This is a bugfix
> > release.
> > >
> > > I will be testing this shortly on HPE NonStop platforms.
> > >
> > > Side question: We now have access to the hardware random generator and
> > > can decouple for PRNGD. Any guidance on how to do that would be
> > > appreciated. We would be happy to contribute the platform changes as
> > > well associated with this and the port changes.
> > >
> >
> > Is this suppose to be openssl 3.0 ready?
>
> I am just finishing up the OpenSSL 3.0 port. I could test with it or 1.1.1.
> Either way (or both).
>

I am ready to test on both with FreeBsd 12.1

> Regards,
> Randall
>
> -- Brief whoami:
> NonStop developer since approximately 211288444200000000
> UNIX developer since approximately 421664400
> -- In my real life, I talk too much.
>
>
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b
USA call a Nov 3 2020 referndum to dissolve the Union and dissolve!!
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
RE: Call for testing: OpenSSH 8.4 [ In reply to ]
On Sun, 20 Sep 2020, Randall S. Becker wrote:

> On September 20, 2020 2:02 AM, Damien Miller wrote:
> > OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a bugfix release.
>
> I will be testing this shortly on HPE NonStop platforms.
>
> Side question: We now have access to the hardware random generator and can
> decouple for PRNGD. Any guidance on how to do that would be appreciated. We
> would be happy to contribute the platform changes as well associated with
> this and the port changes.

If you add support for the hardware RNG to libcrypto then OpenSSH will use
it automatically (assuming you haven't built --without-openssl). This
would also have the benefit of everything else that uses libcrypto/libssl
pick up support too.

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
tests. MacOS, well, I always try it but it has problems.

On Sun, 20 Sep 2020, Damien Miller wrote:

> Hi,
>
> OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via git using the
> instructions at http://www.openssh.com/portable.html#cvs
> At https://anongit.mindrot.org/openssh.git/ or via a mirror at Github:
> https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also appreciated.
> Please send reports of success or failure to
> openssh-unix-dev@mindrot.org. Security bugs should be reported
> directly to openssh@openssh.com.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Security
> ========
>
> * ssh-agent(1): restrict ssh-agent from signing web challenges for
> FIDO/U2F keys.
>
> When signing messages in ssh-agent using a FIDO key that has an
> application string that does not start with "ssh:", ensure that the
> message being signed is one of the forms expected for the SSH protocol
> (currently public key authentication and sshsig signatures).
>
> This prevents ssh-agent forwarding on a host that has FIDO keys
> attached granting the ability for the remote side to sign challenges
> for web authentication using those keys too.
>
> Note that the converse case of web browsers signing SSH challenges is
> already precluded because no web RP can have the "ssh:" prefix in the
> application string that we require.
>
> * ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating
> a FIDO resident key.
>
> The recent FIDO 2.1 Client to Authenticator Protocol introduced a
> "credProtect" feature to better protect resident keys. We use this
> option to require a PIN prior to all operations that may retrieve
> a resident key from a FIDO token.
>
> Potentially-incompatible changes
> ================================
>
> This release includes a number of changes that may affect existing
> configurations:
>
> * For FIDO/U2F support, OpenSSH recommends the use of libfido2 1.5.0
> or greater. Older libraries have limited support at the expense of
> disabling particular features. These include resident keys, PIN-
> required keys and multiple attached tokens.
>
> * ssh-keygen(1): the format of the attestation information optionally
> recorded when a FIDO key is generated has changed. It now includes
> the authenticator data needed to validate attestation signatures.
>
> * The API between OpenSSH and the FIDO token middleware has changed
> and the SSH_SK_VERSION_MAJOR version has been incremented as a
> result. Third-party middleware libraries must support the current
> API version (7) to work with OpenSSH 8.4.
>
> * The portable OpenSSH distribution now requires automake to rebuild
> the configure script and supporting files. This is not required when
> simply building portable OpenSSH from a release tar file.
>
> Changes since OpenSSH 8.3
> =========================
>
> New features
> ------------
>
> * ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for
> each use. These keys may be generated using ssh-keygen using a new
> "verify-required" option. When a PIN-required key is used, the user
> will be prompted for a PIN to complete the signature operation.
>
> * sshd(8): authorized_keys now supports a new "verify-required"
> option to require FIDO signatures assert that the token verified
> that the user was present before making the signature. The FIDO
> protocol supports multiple methods for user-verification, but
> currently OpenSSH only supports PIN verification.
>
> * sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn
> signatures. Webauthn is a standard for using FIDO keys in web
> browsers. These signatures are a slightly different format to plain
> FIDO signatures and thus require explicit support.
>
> * ssh(1): allow some keywords to expand shell-style ${ENV}
> environment variables. The supported keywords are CertificateFile,
> ControlPath, IdentityAgent and IdentityFile, plus LocalForward and
> RemoteForward when used for Unix domain socket paths. bz#3140
>
> * ssh(1), ssh-agent(1): allow some additional control over the use of
> ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable,
> including forcibly enabling and disabling its use. bz#69
>
> * ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time
> limit for keys in addition to its current flag options. Time-
> limited keys will automatically be removed from ssh-agent after
> their expiry time has passed.
>
> * scp(1), sftp(1): allow the -A flag to explicitly enable agent
> forwarding in scp and sftp. The default remains to not forward an
> agent, even when ssh_config enables it.
>
> * ssh(1): add a '%k' TOKEN that expands to the effective HostKey of
> the destination. This allows, e.g., keeping host keys in individual
> files using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654
>
> * ssh(1): add %-TOKEN, environment variable and tilde expansion to
> the UserKnownHostsFile directive, allowing the path to be
> completed by the configuration (e.g. bz#1654)
>
> * ssh-keygen(1): allow "ssh-add -d -" to read keys to be deleted
> from stdin. bz#3180
>
> * sshd(8): improve logging for MaxStartups connection throttling.
> sshd will now log when it starts and stops throttling and periodically
> while in this state. bz#3055
>
> Bugfixes
> --------
>
> * ssh(1), ssh-keygen(1): better support for multiple attached FIDO
> tokens. In cases where OpenSSH cannot unambiguously determine which
> token to direct a request to, the user is now required to select a
> token by touching it. In cases of operations that require a PIN to
> be verified, this avoids sending the wrong PIN to the wrong token
> and incrementing the token's PIN failure counter (tokens
> effectively erase their keys after too many PIN failures).
>
> * sshd(8): fix Include before Match in sshd_config; bz#3122
>
> * ssh(1), sshd(8): limit the amount of channel input data buffered,
> avoiding peers that advertise large windows but are slow to read
> from causing high memory consumption.
>
> * ssh-agent(1): handle multiple requests sent in a single write() to
> the agent.
>
> * sshd(8): allow sshd_config longer than 256k
>
> * sshd(8): avoid spurious "Unable to load host key" message when sshd
> load a private key but no public counterpart
>
> * ssh(1): prefer the default hostkey algorithm list whenever we have
> a hostkey that matches its best-preference algorithm.
>
> * sshd(1): when ordering the hostkey algorithms to request from a
> server, prefer certificate types if the known_hosts files contain a key
> marked as a @cert-authority; bz#3157
>
> * ssh(1): perform host key fingerprint comparisons for the "Are you
> sure you want to continue connecting (yes/no/[fingerprint])?"
> prompt with case sensitivity.
>
> * sshd(8): ensure that address/masklen mismatches in sshd_config
> yield fatal errors at daemon start time rather than later when
> they are evaluated.
>
> * ssh-keygen(1): ensure that certificate extensions are lexically
> sorted. Previously if the user specified a custom extension then
> the everything would be in order except the custom ones. bz#3198
>
> * ssh(1): also compare username when checking for JumpHost loops.
> bz#3057
>
> * ssh-keygen(1): preserve group/world read permission on known_hosts
> files across runs of "ssh-keygen -Rf /path". The old behaviour was
> to remove all rights for group/other. bz#3146
>
> * ssh-keygen(1): Mention the [-a rounds] flag in the ssh-keygen
> manual page and usage().
>
> * sshd(8): explicitly construct path to ~/.ssh/rc rather than
> relying on it being relative to the current directory, so that it
> can still be found if the shell startup changes its directory.
> bz#3185
>
> * sshd(8): when redirecting sshd's log output to a file, undo this
> redirection after the session child process is forked(). Fixes
> missing log messages when using this feature under some
> circumstances.
>
> * sshd(8): start ClientAliveInterval bookkeeping before first pass
> through select() loop; fixed theoretical case where busy sshd may
> ignore timeouts from client.
>
> * ssh(1): only reset the ServerAliveInterval check when we receive
> traffic from the server and ignore traffic from a port forwarding
> client, preventing a client from keeping a connection alive when
> it should be terminated. bz#2265
>
> * ssh-keygen(1): avoid spurious error message when ssh-keygen
> creates files outside ~/.ssh
>
> * sftp-client(1): fix off-by-one error that caused sftp downloads to
> make one more concurrent request that desired. This prevented using
> sftp(1) in unpipelined request/response mode, which is useful when
> debugging. bz#3054
>
> * ssh(1), sshd(8): handle EINTR in waitfd() and timeout_connect()
> helpers. bz#3071
>
> * ssh(1), ssh-keygen(1): defer creation of ~/.ssh until we attempt to
> write to it so we don't leave an empty .ssh directory when it's not
> needed. bz#3156
>
> * ssh(1), sshd(8): fix multiplier when parsing time specifications
> when handling seconds after other units. bz#3171
>
> Portability
> -----------
>
> * sshd(8): always send any PAM account messages. If the PAM account
> stack returns any messages, always send them to the user and not
> just if the check succeeds. bz#2049
>
> * Implement some backwards compatibility for libfido2 libraries
> older than 1.5.0. Note that use of an older library will result
> in the loss of certain features including resident key support,
> PIN support and support for multiple attached tokens.
>
> * configure fixes for XCode 12
>
> * gnome-ssh-askpass3: ensure the "close" button is not focused by
> default for SSH_ASKPASS_PROMPT=none prompts. Avoids space/enter
> accidentally dismissing FIDO touch notifications.
>
> * gnome-ssh-askpass3: allow some control over textarea colour via
> $GNOME_SSH_ASKPASS_FG_COLOR and $GNOME_SSH_ASKPASS_BG_COLOR
> environment variables.
>
> * sshd(8): document another PAM spec problem in a frustrated comment
>
> * sshd(8): support NetBSD's utmpx.ut_ss address field. bz#960
>
> * Add the ssh-sk-helper binary and its manpage to the RPM spec file
>
> * Detect the Frankenstein monster of Linux/X32 and allow the sandbox
> to function there. bz#3085
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>

--
Hisashi T Fujinaka - htodd@twofifty.com
BSEE + BSChem + BAEnglish + MSCS + $2.50 = coffee
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
RE: Call for testing: OpenSSH 8.4 [ In reply to ]
> From: Damien Miller <djm@mindrot.org>
On September 20, 2020 7:29 PM, Damien Miller wrote:
> On Sun, 20 Sep 2020, Randall S. Becker wrote:
>
> > On September 20, 2020 2:02 AM, Damien Miller wrote:
> > > OpenSSH 8.4p1 is almost ready for release, so we would appreciate
> > > testing on as many platforms and systems as possible. This is a bugfix
> release.
> >
> > I will be testing this shortly on HPE NonStop platforms.
> >
> > Side question: We now have access to the hardware random generator and
> > can decouple for PRNGD. Any guidance on how to do that would be
> > appreciated. We would be happy to contribute the platform changes as
> > well associated with this and the port changes.
>
> If you add support for the hardware RNG to libcrypto then OpenSSH will use
> it automatically (assuming you haven't built --without-openssl). This
would
> also have the benefit of everything else that uses libcrypto/libssl pick
up
> support too.

I do not build with --without-openssl, so that probably is a good thing. I
have more control on our Itanium platform so can test with OpenSSL 3.0
before it goes to GA, but have to wait for the x86 platform until after that
point. It's a matter of policy. Good to know anyway that changes picked up
via OpenSSL will remove the dependency on PRNGD - somewhat of a RandallBane
in my view.

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd@twofifty.com> wrote:
> OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
> tests. MacOS, well, I always try it but it has problems.

What's the problem on OS X? We test on it regularly (El Capitan and
High Sierra) and the only problem I'm aware of is that the native
libcrypto on High Sierra is extremely slow[0] (I'm told this is going
to be fixed, but as of today the libcrypto I have is still slow).

[0] https://marc.info/?l=openssh-unix-dev&m=153138346004439&w=2

--
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new)
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
I've compiled snap20200921 with both openssl 1.1.1g and 3.0.0-alpha6-dev
successfully on OSX 10.15.6 (Catalina).

On 2020-09-20 22:31 :36, Darren Tucker wrote:
> On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd@twofifty.com> wrote:
>> OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
>> tests. MacOS, well, I always try it but it has problems.
> What's the problem on OS X? We test on it regularly (El Capitan and
> High Sierra) and the only problem I'm aware of is that the native
> libcrypto on High Sierra is extremely slow[0] (I'm told this is going
> to be fixed, but as of today the libcrypto I have is still slow).
>
> [0] https://marc.info/?l=openssh-unix-dev&m=153138346004439&w=2
>
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On 9/20/20 9:58 AM, Colin Watson wrote:
> On Sun, Sep 20, 2020 at 09:34:50AM -0700, Kevin Brott wrote:
>> On 9/19/20 11:02 PM, Damien Miller wrote:
>>> OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
>>> on as many platforms and systems as possible. This is a bugfix release.
>> Debian GNU/Linux 10 (buster)
>> gcc version 8.3.0 (Debian 8.3.0-6)
>> OpenSSL 1.1.1d  10 Sep 2019
>>
>> Hang on conch ciphers test - had to ^C the process:
> This might be https://twistedmatrix.com/trac/ticket/9515, which was
> fixed in Twisted 19.2.0; Debian 10 has an older version. I forget what
> the original symptoms of that bug were, but it seems plausible. Try
> applying this workaround patch?
>
> https://salsa.debian.org/ssh-team/openssh/-/blob/debian/1%258.3p1-1/debian/patches/conch-old-privkey-format.patch
>
> (I haven't advocated for this to be applied to OpenSSH upstream, since
> the proper fix was in Twisted.)
>

Yup, older twisted:  python-twisted  18.9.0-3.  Applying the workaround patch to openssh-SNAP-20200921.tar.gz and "all tests passed".
So what's the best-practice fix here - replace the system install of twisted, install an alternate copy for builds, or patch the configure process to test for the broken twisted version(s) and adjust accordingly?

--
# include <stddisclaimer.h>
/* Kevin Brott <Kevin.Brott@GMail.com> */


_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
Hi Darren,

Darren Tucker <dtucker@dtucker.net> writes:

> What's the problem on OS X?

On macOS Catalina (10.15.6) it seems that multiplex.sh is failing.
(Configured to use homebrew's openssl 1.1.1g)

mdb@mdb-mbp$make tests LTESTS=multiplex
./install-sh -c -d `pwd`/regress/unittests/test_helper
./install-sh -c -d `pwd`/regress/unittests/sshbuf
./install-sh -c -d `pwd`/regress/unittests/sshkey
./install-sh -c -d `pwd`/regress/unittests/sshsig
./install-sh -c -d `pwd`/regress/unittests/bitmap
./install-sh -c -d `pwd`/regress/unittests/conversion
./install-sh -c -d `pwd`/regress/unittests/hostkeys
./install-sh -c -d `pwd`/regress/unittests/kex
./install-sh -c -d `pwd`/regress/unittests/match
./install-sh -c -d `pwd`/regress/unittests/utf8
./install-sh -c -d `pwd`/regress/misc/kexfuzz
./install-sh -c -d `pwd`/regress/misc/sk-dummy
[ -f `pwd`/regress/Makefile ] || \
ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile
(cd openbsd-compat && /Library/Developer/CommandLineTools/usr/bin/make)
make[1]: Nothing to be done for `all'.
BUILDDIR=`pwd`; \
cd ./regress || exit $?; \
EGREP='/usr/bin/grep -E' \
/Library/Developer/CommandLineTools/usr/bin/make \
.OBJDIR="${BUILDDIR}/regress" \
.CURDIR="`pwd`" \
BUILDDIR="${BUILDDIR}" \
OBJ="${BUILDDIR}/regress/" \
PATH="${BUILDDIR}:${PATH}" \
TEST_ENV=MALLOC_OPTIONS="" \
TEST_MALLOC_OPTIONS="" \
TEST_SSH_SCP="${BUILDDIR}/scp" \
TEST_SSH_SSH="${BUILDDIR}/ssh" \
TEST_SSH_SSHD="${BUILDDIR}/sshd" \
TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent" \
TEST_SSH_SSHADD="${BUILDDIR}/ssh-add" \
TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen" \
TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper" \
TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan" \
TEST_SSH_SFTP="${BUILDDIR}/sftp" \
TEST_SSH_PKCS11_HELPER="${BUILDDIR}/ssh-pkcs11-helper" \
TEST_SSH_SK_HELPER="${BUILDDIR}/ssh-sk-helper" \
TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server" \
TEST_SSH_PLINK="plink" \
TEST_SSH_PUTTYGEN="puttygen" \
TEST_SSH_CONCH="conch" \
TEST_SSH_IPV6="yes" \
TEST_SSH_UTF8="yes" \
TEST_SSH_ECC="yes" \
TEST_SHELL="sh" \
EXEEXT="" \
file-tests && echo all file-tests passed
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2.prv | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.prv
tr '\n' '\r' </Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2.prv > /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2_cr.prv
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2_cr.prv | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.prv
awk '{print $0 "\r"}' /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2.prv > /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2_crnl.prv
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_ssh2_crnl.prv | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.prv
cat /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.prv > /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t2.out
chmod 600 /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t2.out
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -yf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t2.out | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -ef /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub >/Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t3.out
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t3.out | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -E md5 -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub |\
awk '{print $2}' | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/t4.ok
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -Bf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub |\
awk '{print $2}' | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/t5.ok
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/dsa_ssh2.prv > /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t6.out1
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -if /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/dsa_ssh2.pub > /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t6.out2
chmod 600 /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t6.out1
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -yf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t6.out1 | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t6.out2
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t7.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -Bf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t7.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t8.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -Bf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t8.out > /dev/null
test "yes" != yes || \
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t9.out > /dev/null
test "yes" != yes || \
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -Bf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t9.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t10.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -Bf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t10.out > /dev/null
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -E sha256 -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/rsa_openssh.pub |\
awk '{print $2}' | diff - /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/t11.ok
/Users/mdb/Work/openssh-versions/openssh-git/openssh/ssh-keygen -lf /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress//t12.out.pub | grep test-comment-1234 >/dev/null
all file-tests passed
BUILDDIR=`pwd`; \
cd ./regress || exit $?; \
EGREP='/usr/bin/grep -E' \
/Library/Developer/CommandLineTools/usr/bin/make \
.OBJDIR="${BUILDDIR}/regress" \
.CURDIR="`pwd`" \
BUILDDIR="${BUILDDIR}" \
OBJ="${BUILDDIR}/regress/" \
PATH="${BUILDDIR}:${PATH}" \
TEST_ENV=MALLOC_OPTIONS="" \
TEST_MALLOC_OPTIONS="" \
TEST_SSH_SCP="${BUILDDIR}/scp" \
TEST_SSH_SSH="${BUILDDIR}/ssh" \
TEST_SSH_SSHD="${BUILDDIR}/sshd" \
TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent" \
TEST_SSH_SSHADD="${BUILDDIR}/ssh-add" \
TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen" \
TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper" \
TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan" \
TEST_SSH_SFTP="${BUILDDIR}/sftp" \
TEST_SSH_PKCS11_HELPER="${BUILDDIR}/ssh-pkcs11-helper" \
TEST_SSH_SK_HELPER="${BUILDDIR}/ssh-sk-helper" \
TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server" \
TEST_SSH_PLINK="plink" \
TEST_SSH_PUTTYGEN="puttygen" \
TEST_SSH_CONCH="conch" \
TEST_SSH_IPV6="yes" \
TEST_SSH_UTF8="yes" \
TEST_SSH_ECC="yes" \
TEST_SHELL="sh" \
EXEEXT="" \
t-exec && echo all t-exec passed
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
test connection multiplexing: forward
cmp: EOF on /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/copy
ssh: corrupted copy of /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/data
/Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/multiplex.sh: line 86: 58948 Terminated: 15 $NC -N -l 127.0.0.1 $((${PORT} + 1)) < ${DATA} > /dev/null
test connection multiplexing: status 0 ()
test connection multiplexing: status 0 (-Oproxy)
test connection multiplexing: status 1 ()
test connection multiplexing: status 1 (-Oproxy)
test connection multiplexing: status 4 ()
test connection multiplexing: status 4 (-Oproxy)
test connection multiplexing: status 5 ()
test connection multiplexing: status 5 (-Oproxy)
test connection multiplexing: status 44 ()
test connection multiplexing: status 44 (-Oproxy)
test connection multiplexing: cmd check
test connection multiplexing: cmd forward local (TCP)
test connection multiplexing: cmd forward remote (TCP)
test connection multiplexing: cmd forward local (UNIX)
test connection multiplexing: cmd forward remote (UNIX)
test connection multiplexing: cmd exit
test connection multiplexing: cmd stop
failed connection multiplexing
make[1]: *** [t-exec] Error 1
make: *** [t-exec] Error 2
mdb@mdb-mbp$ ls regress/failed*
regress/failed-regress.log regress/failed-sshd.log
regress/failed-ssh.log
mdb@mdb-mbp$ for fail in regress/failed*; do echo "=== $fail start ==="; cat $fail; echo "=== $fail end ==="; done
=== regress/failed-regress.log start ===
trace: forward over TCP/IP and check result
debug1: multiplexing control connection
debug3: fd 6 is O_NONBLOCK
debug3: fd 6 is O_NONBLOCK
debug1: channel 1: new [mux-control]
debug3: channel_post_mux_listener: new mux channel 1 fd 6
debug3: mux_master_read_cb: channel 1: hello sent
debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4
debug2: mux_master_process_hello: channel 1 client version 4
debug3: mux_master_read_cb: channel 1 packet type 0x10000006 len 42
debug2: mux_master_process_open_fwd: channel 1: request local forward 127.0.0.1:4244 -> 127.0.0.1:4243
debug3: channel_setup_fwd_listener_tcpip: type 2 wildcard 0 addr 127.0.0.1
debug1: Local forwarding listening on 127.0.0.1 port 4244.
bind [127.0.0.1]:4244: Address already in use
channel_setup_fwd_listener_tcpip: cannot listen to port: 4244
mux_master_process_open_fwd: requested local forward 127.0.0.1:4244 -> 127.0.0.1:4243 failed
debug2: channel 1: ctl read<=0 rfd 6 len 0
debug2: channel 1: read failed
debug2: channel 1: chan_shutdown_read (i0 o0 sock 6 wfd 6 efd -1 [closed])
debug2: channel 1: input open -> drain
debug2: channel 1: ibuf empty
debug2: channel 1: input drain -> closed
debug2: channel 1: rcvd close
debug2: channel 1: output open -> drain
debug2: channel 1: obuf empty
debug2: channel 1: chan_shutdown_write (i3 o1 sock 6 wfd 6 efd -1 [closed])
debug2: channel 1: chan_shutdown_write: shutdown() failed for fd 6 [i3 o1]: Socket is not connected
debug2: channel 1: output drain -> closed
debug2: channel 1: is dead (local)
debug2: channel 1: gc: notify user
debug3: mux_master_control_cleanup_cb: entering for channel 1
debug2: channel 1: gc: user detached
debug2: channel 1: is dead (local)
debug2: channel 1: garbage collecting
debug1: channel 1: free: mux-control, nchannels 2
debug3: channel 1: status: The following connections are open:
#1 mux-control (t16 nr0 i3/0 o3/0 e[closed]/0 fd 6/6/-1 sock 6 cc -1)

FAIL: ssh: corrupted copy of /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/data

=== regress/failed-regress.log end ===
=== regress/failed-ssh.log start ===
trace: forward over TCP/IP and check result
debug2: fd 4 setting O_NONBLOCK
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 1 local, 0 remote
debug1: Requesting forwarding of local forward 127.0.0.1:4244 -> 127.0.0.1:4243
mux_client_forward: forwarding request failed: Port forwarding failed
muxclient: master forward request failed
FAIL: ssh: corrupted copy of /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/data

=== regress/failed-ssh.log end ===
=== regress/failed-sshd.log start ===
trace: forward over TCP/IP and check result
FAIL: ssh: corrupted copy of /Users/mdb/Work/openssh-versions/openssh-git/openssh/regress/data

=== regress/failed-sshd.log end ===
mdb@mdb-mbp$

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, 21 Sep 2020, Mark D. Baushke wrote:

> Hi Darren,
>
> Darren Tucker <dtucker@dtucker.net> writes:
>
> > What's the problem on OS X?
>
> On macOS Catalina (10.15.6) it seems that multiplex.sh is failing.
> (Configured to use homebrew's openssl 1.1.1g)

[sniiiip]

> debug1: Local forwarding listening on 127.0.0.1 port 4244.
> bind [127.0.0.1]:4244: Address already in use
> channel_setup_fwd_listener_tcpip: cannot listen to port: 4244

Looks like something is already using that. Could you try changing
the PORT= line in regress/test-exec.sh and rerunning?

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
Damien Miller <djm@mindrot.org> writes:

> On Mon, 21 Sep 2020, Mark D. Baushke wrote:
> > On macOS Catalina (10.15.6) it seems that multiplex.sh is failing.
> > (Configured to use homebrew's openssl 1.1.1g)
>
> [sniiiip]
>
> > debug1: Local forwarding listening on 127.0.0.1 port 4244.
> > bind [127.0.0.1]:4244: Address already in use
> > channel_setup_fwd_listener_tcpip: cannot listen to port: 4244
>
> Looks like something is already using that. Could you try changing
> the PORT= line in regress/test-exec.sh and rerunning?

Modified to use PORT=4245 (after checking with netstat that nothing was
listening on that port).

The 'make tests ' command got "all tests passed" at the end.

Be safe, stay healthy,
-- Mark
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On 9/20/20 8:02 AM, Damien Miller wrote:
> Hi,
>
> OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.

Basic tests in Fedora 32 passed. Running some more now.

For the release, can we consider also pulling the various fixes for
ssh-copy-id, which recently received some care:

https://gitlab.com/phil_hands/ssh-copy-id

Thanks,
--
Jakub Jelen
Senior Software Engineer
Crypto Team, Security Engineering
Red Hat, Inc.

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Solaris 10 for SPARC, built SNAP-20200921 using Solaris Studio
12.4 and local build of OpenSSL 1.1.1g, and passed all tests.

--
Jeff Wieland, UNIX Systems Administrator
Purdue University IT Infrastructure Services UNIX Platforms

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, Sep 21, 2020 at 12:09:32AM -0700, Kevin Brott wrote:
> Yup, older twisted:  python-twisted  18.9.0-3.  Applying the
> workaround patch to openssh-SNAP-20200921.tar.gz and "all tests
> passed".
> So what's the best-practice fix here - replace the system install of
> twisted, install an alternate copy for builds, or patch the configure
> process to test for the broken twisted version(s) and adjust
> accordingly?

My approach for interop testing of the official Debian packaging has
been to apply the patch I mentioned until such time as the Debian
packaging of Twisted catches up.

I don't know if it's worth having extra elaborate stuff in OpenSSH to
detect the situation without requiring a patch. I kind of feel that the
test failure you encountered was detecting a legitimate interoperability
problem so avoiding it permanently wouldn't really be right.

--
Colin Watson (he/him) [cjwatson@debian.org]
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Sun, Sep 20, 2020 at 10:39:55PM -0700, Larry Ploetz wrote:
> I've compiled snap20200921 with both openssl 1.1.1g and 3.0.0-alpha6-dev
> successfully on OSX 10.15.6 (Catalina).
>
> On 2020-09-20 22:31 :36, Darren Tucker wrote:
> > On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd@twofifty.com> wrote:
> >> OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
> >> tests. MacOS, well, I always try it but it has problems.
> > What's the problem on OS X? We test on it regularly (El Capitan and
> > High Sierra) and the only problem I'm aware of is that the native
> > libcrypto on High Sierra is extremely slow[0] (I'm told this is going
> > to be fixed, but as of today the libcrypto I have is still slow).
> >
> > [0] https://marc.info/?l=openssh-unix-dev&m=153138346004439&w=2
> >
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

What about make tests?

--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b
USA call a Nov 3 2020 referndum to dissolve the Union and dissolve!!
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
ANd here is a failed test on openssh-SNAP-20200921 and openssl 3.0 alpha


Script started on Mon Sep 21 06:16:55 2020
root@gallifrey:/usr/source/openssh-SNAP-20200921 # make distclean

root@gallifrey:/usr/source/openssh-SNAP-20200921 # less configsshd

[?1h=
#!/usr/local/bin/bash
CC=/usr/local/bin/clang10 ./configure --prefix=/usr --sysconfdir=/etc --localsta tedir=/var --with-zlib=/usr --with-ssl-dir=/usr/local/ --with-ssl-engine --with- pie --without-pam --with-xauth=/usr/local/bin/xauth --with-maildir=/var/mail --w ith-4in6 --with-pid-dir=/var/run --with-mantype=man
[.7mconfigsshd (END)[.27m[.K
[.K[.?1l>root@gallifrey:/usr/source/openssh-SNAP-20200921 # /bin/sh ./configsshd

...
checking openssl/opensslv.h usability... yes
checking openssl/opensslv.h presence... yes
checking for openssl/opensslv.h... yes
checking OpenSSL header version... 30000000 (OpenSSL 3.0.0-alpha7-dev )
checking for OpenSSL_version... yes
checking for OpenSSL_version_num... yes
checking OpenSSL library version... 30000000 (OpenSSL 3.0.0-alpha7-dev )
checking whether OpenSSL's headers match the library... yes
checking if programs using OpenSSL functions will link... yes
...
OpenSSH has been configured with the following options:
User binaries: /usr/bin
System binaries: /usr/sbin
Configuration files: /etc
Askpass program: /usr/libexec/ssh-askpass
Manual pages: /usr/share/man/manX
PID file: /var/run
Privilege separation chroot path: /var/empty
At runtime, sshd will use the path defined in /etc/login.conf
Make sure the path to scp is present, otherwise scp will not work
Manpage format: man
PAM support: no
OSF SIA support: no
KerberosV support: no
SELinux support: no
MD5 password support: no
libedit support: no
libldns support: no
Solaris process contract support: no
Solaris project support: no
Solaris privilege support: no
IP address in $DISPLAY hack: no
Translate v4 in v6 hack: yes
BSD Auth support: no
Random number source: OpenSSL internal ONLY
Privsep sandbox style: capsicum
PKCS#11 support: yes
U2F/FIDO support: yes

Host: x86_64-unknown-freebsd12.1
Compiler: /usr/local/bin/clang10
Compiler flags: -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE
Preprocessor flags: -I/usr/local//include -I/usr/include
Linker flags: -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie
Libraries: -lcrypto -lutil -lz -lcrypt

root@gallifrey:/usr/source/openssh-SNAP-20200921 # make tests

/usr/local/bin/gmkdir -p `pwd`/regress/unittests/test_helper
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/sshbuf
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/sshkey
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/sshsig
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/bitmap
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/conversion
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/hostkeys
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/kex
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/match
/usr/local/bin/gmkdir -p `pwd`/regress/unittests/utf8
/usr/local/bin/gmkdir -p `pwd`/regress/misc/kexfuzz
/usr/local/bin/gmkdir -p `pwd`/regress/misc/sk-dummy
[ -f `pwd`/regress/Makefile ] || ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile
(cd openbsd-compat && make)
.

...

openssl-compat.c:83:2: warning: 'ENGINE_load_builtin_engines' is deprecated
[-Wdeprecated-declarations][.0m
ENGINE_load_builtin_engines();
[.0;1;32m ^
[.0m[.1m/usr/local//include/openssl/engine.h:347:1: [.0m[.0;1;30mnote: [.0m'ENGINE_load_builtin_engines'
has been explicitly marked deprecated here[.0m
DEPRECATEDIN_3_0(void ENGINE_load_builtin_engines(void))
^
/usr/local//include/openssl/macros.h:141:38: note: expanded from macro
'DEPRECATEDIN_3_0'
# define DEPRECATEDIN_3_0(f) DECLARE_DEPRECATED(f)
 ^
/usr/local//include/openssl/macros.h:38:57: note: expanded from macro
'DECLARE_DEPRECATED'
# define DECLARE_DEPRECATED(f) f __attribute__ ((deprecated));
 ^
openssl-compat.c:84:2: warning: 'ENGINE_register_all_complete' is deprecated
[-Wdeprecated-declarations][.0m
ENGINE_register_all_complete();
[.0;1;32m ^
[.0m[.1m/usr/local//include/openssl/engine.h:407:1: [.0m[.0;1;30mnote: [.0m
'ENGINE_register_all_complete' has been explicitly marked deprecated here[.0m
DEPRECATEDIN_3_0(int ENGINE_register_all_complete(void))
^
/usr/local//include/openssl/macros.h:141:38: note: expanded from macro
'DEPRECATEDIN_3_0'
# define DEPRECATEDIN_3_0(f) DECLARE_DEPRECATED(f)
 ^
/usr/local//include/openssl/macros.h:38:57: note: expanded from macro
'DECLARE_DEPRECATED'
# define DECLARE_DEPRECATED(f) f __attribute__ ((deprecated));
[.0;1;32m ^
[.0m2 warnings generated.
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIC -I. -I.. -I. -I./.. -I/usr/local//include -I/usr/include -DHAVE_CONFIG_H -c libressl-api-compat.c
libressl-api-compat.c:386:10: warning: 'EVP_CIPHER_CTX_iv_noconst' is deprecated
[-Wdeprecated-declarations][.0m
memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, len);
[.0;1;32m ^
[.0m[.1m/usr/local//include/openssl/evp.h:549:1: [.0m[.0;1;30mnote: [.0m'EVP_CIPHER_CTX_iv_noconst' has
been explicitly marked deprecated here[.0m
DEPRECATEDIN_3_0(unsigned char *EVP_CIPHER_CTX_iv_noconst(EVP_CIPHER_CTX *ctx))
^
/usr/local//include/openssl/macros.h:141:38: note: expanded from macro
'DEPRECATEDIN_3_0'
# define DEPRECATEDIN_3_0(f) DECLARE_DEPRECATED(f)
 ^
/usr/local//include/openssl/macros.h:38:57: note: expanded from macro
'DECLARE_DEPRECATED'
# define DECLARE_DEPRECATED(f) f __attribute__ ((deprecated));
[.0;1;32m ^
[.0m1 warning generated.
...
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c dh.c -o dh.o
dh.c:291:6: warning: 'DH_generate_key' is deprecated [-Wdeprecated-declarations][.0m
if (DH_generate_key(dh) == 0)
[.0;1;32m ^
[.0m[.1m/usr/local//include/openssl/dh.h:183:1: [.0m[.0;1;30mnote: [.0m'DH_generate_key' has been
explicitly marked deprecated here[.0m
DEPRECATEDIN_3_0(int DH_generate_key(DH *dh))
^
/usr/local//include/openssl/macros.h:141:38: note: expanded from macro
'DEPRECATEDIN_3_0'
# define DEPRECATEDIN_3_0(f) DECLARE_DEPRECATED(f)
 ^
/usr/local//include/openssl/macros.h:38:57: note: expanded from macro
'DECLARE_DEPRECATED'
# define DECLARE_DEPRECATED(f) f __attribute__ ((deprecated));
[.0;1;32m ^
[.0m1 warning generated.
...
/usr/local/bin/clang10 -o ssh-agent ssh-agent.o ssh-pkcs11-client.o ssh-sk-client.o -L. -Lopenbsd-compat/ -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lcrypto -lutil -lz -lcrypt
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c scp.c -o scp.o
/usr/local/bin/clang10 -o scp scp.o progressmeter.o -L. -Lopenbsd-compat/ -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lcrypto -lutil -lz -lcrypt
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sftp-server-main.c -o sftp-server-main.o
/usr/local/bin/clang10 -o sftp-server sftp-common.o sftp-server.o sftp-server-main.o -L. -Lopenbsd-compat/ -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lcrypto -lutil -lz -lcrypt
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sftp.c -o sftp.o
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sftp-client.c -o sftp-client.o
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sftp-glob.c -o sftp-glob.o
/usr/local/bin/clang10 -o sftp sftp.o sftp-client.o sftp-common.o sftp-glob.o progressmeter.o -L. -Lopenbsd-compat/ -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lcrypto -lutil -lz -lcrypt
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c ssh-sk-helper.c -o ssh-sk-helper.o
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c ssh-sk.c -o ssh-sk.o
/usr/local/bin/clang10 -g -O2 -pipe -Wunknown-warning-option -Qunused-arguments -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -fno-strict-aliasing -mretpoline -D_FORTIFY_SOURCE=2 -ftrapv -fno-builtin-memset -fstack-protector-strong -fPIE -I. -I. -I/usr/local//include -I/usr/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_KEY_SIGN=\"/usr/libexec/ssh-keysign\" -D_PATH_SSH_PKCS11_HELPER=\"/usr/libexec/ssh-pkcs11-helper\" -D_PATH_SSH_SK_HELPER=\"/usr/libexec/ssh-sk-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sk-usbhid.c -o sk-usbhid.o
/usr/local/bin/clang10 -o ssh-sk-helper ssh-sk-helper.o ssh-sk.o sk-usbhid.o -L. -Lopenbsd-compat/ -L/usr/local//lib -L/usr/lib -Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lssh -lopenbsd-compat -lcrypto -lutil -lz -lcrypt
BUILDDIR=`pwd`; cd ./regress || exit $?; EGREP='/usr/bin/grep -E' make .OBJDIR="${BUILDDIR}/regress" .CURDIR="`pwd`" BUILDDIR="${BUILDDIR}" OBJ="${BUILDDIR}/regress/" PATH="${BUILDDIR}:${PATH}" TEST_ENV=MALLOC_OPTIONS="AJRX" TEST_MALLOC_OPTIONS="AJRX" TEST_SSH_SCP="${BUILDDIR}/scp" TEST_SSH_SSH="${BUILDDIR}/ssh" TEST_SSH_SSHD="${BUILDDIR}/sshd" TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent" TEST_SSH_SSHADD="${BUILDDIR}/ssh-add" TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen" TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper" TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan" TEST_SSH_SFTP="${BUILDDIR}/sftp" TEST_SSH_PKCS11_HELPER="${BUILDDIR}/ssh-pkcs11-helper" TEST_SSH_SK_HELPER="${BUILDDIR}/ssh-sk-helper" TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server" TEST_SSH_PLINK="plink" TEST_SSH_PUTTYGEN="puttygen" TEST_SSH_CONCH="conch" TEST_SSH_IPV6="yes" TEST_SSH_UTF8="yes" TEST_SSH_ECC="yes" TEST_SHELL="sh" EXEEXT="" file-tests && echo all file-tests passed
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2.prv | diff - /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.prv
tr '\n' '\r' </usr/source/openssh-SNAP-20200921/regress/rsa_ssh2.prv > /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2_cr.prv
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2_cr.prv | diff - /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.prv
awk '{print $0 "\r"}' /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2.prv > /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2_crnl.prv
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress/rsa_ssh2_crnl.prv | diff - /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.prv
cat /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.prv > /usr/source/openssh-SNAP-20200921/regress//t2.out
chmod 600 /usr/source/openssh-SNAP-20200921/regress//t2.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -yf /usr/source/openssh-SNAP-20200921/regress//t2.out | diff - /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub
/usr/source/openssh-SNAP-20200921/ssh-keygen -ef /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub >/usr/source/openssh-SNAP-20200921/regress//t3.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress//t3.out | diff - /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub
/usr/source/openssh-SNAP-20200921/ssh-keygen -E md5 -lf /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub | awk '{print $2}' | diff - /usr/source/openssh-SNAP-20200921/regress/t4.ok
/usr/source/openssh-SNAP-20200921/ssh-keygen -Bf /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub | awk '{print $2}' | diff - /usr/source/openssh-SNAP-20200921/regress/t5.ok
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress/dsa_ssh2.prv > /usr/source/openssh-SNAP-20200921/regress//t6.out1
/usr/source/openssh-SNAP-20200921/ssh-keygen -if /usr/source/openssh-SNAP-20200921/regress/dsa_ssh2.pub > /usr/source/openssh-SNAP-20200921/regress//t6.out2
chmod 600 /usr/source/openssh-SNAP-20200921/regress//t6.out1
/usr/source/openssh-SNAP-20200921/ssh-keygen -yf /usr/source/openssh-SNAP-20200921/regress//t6.out1 | diff - /usr/source/openssh-SNAP-20200921/regress//t6.out2
/usr/source/openssh-SNAP-20200921/ssh-keygen -q -t rsa -N '' -f /usr/source/openssh-SNAP-20200921/regress//t7.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -lf /usr/source/openssh-SNAP-20200921/regress//t7.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -Bf /usr/source/openssh-SNAP-20200921/regress//t7.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -q -t dsa -N '' -f /usr/source/openssh-SNAP-20200921/regress//t8.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -lf /usr/source/openssh-SNAP-20200921/regress//t8.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -Bf /usr/source/openssh-SNAP-20200921/regress//t8.out > /dev/null
test "yes" != yes || /usr/source/openssh-SNAP-20200921/ssh-keygen -q -t ecdsa -N '' -f /usr/source/openssh-SNAP-20200921/regress//t9.out
test "yes" != yes || /usr/source/openssh-SNAP-20200921/ssh-keygen -lf /usr/source/openssh-SNAP-20200921/regress//t9.out > /dev/null
test "yes" != yes || /usr/source/openssh-SNAP-20200921/ssh-keygen -Bf /usr/source/openssh-SNAP-20200921/regress//t9.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -q -t ed25519 -N '' -f /usr/source/openssh-SNAP-20200921/regress//t10.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -lf /usr/source/openssh-SNAP-20200921/regress//t10.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -Bf /usr/source/openssh-SNAP-20200921/regress//t10.out > /dev/null
/usr/source/openssh-SNAP-20200921/ssh-keygen -E sha256 -lf /usr/source/openssh-SNAP-20200921/regress/rsa_openssh.pub | awk '{print $2}' | diff - /usr/source/openssh-SNAP-20200921/regress/t11.ok
/usr/source/openssh-SNAP-20200921/ssh-keygen -q -t ed25519 -N '' -C 'test-comment-1234' -f /usr/source/openssh-SNAP-20200921/regress//t12.out
/usr/source/openssh-SNAP-20200921/ssh-keygen -lf /usr/source/openssh-SNAP-20200921/regress//t12.out.pub | grep test-comment-1234 >/dev/null
all file-tests passed
BUILDDIR=`pwd`; cd ./regress || exit $?; EGREP='/usr/bin/grep -E' make .OBJDIR="${BUILDDIR}/regress" .CURDIR="`pwd`" BUILDDIR="${BUILDDIR}" OBJ="${BUILDDIR}/regress/" PATH="${BUILDDIR}:${PATH}" TEST_ENV=MALLOC_OPTIONS="AJRX" TEST_MALLOC_OPTIONS="AJRX" TEST_SSH_SCP="${BUILDDIR}/scp" TEST_SSH_SSH="${BUILDDIR}/ssh" TEST_SSH_SSHD="${BUILDDIR}/sshd" TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent" TEST_SSH_SSHADD="${BUILDDIR}/ssh-add" TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen" TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper" TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan" TEST_SSH_SFTP="${BUILDDIR}/sftp" TEST_SSH_PKCS11_HELPER="${BUILDDIR}/ssh-pkcs11-helper" TEST_SSH_SK_HELPER="${BUILDDIR}/ssh-sk-helper" TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server" TEST_SSH_PLINK="plink" TEST_SSH_PUTTYGEN="puttygen" TEST_SSH_CONCH="conch" TEST_SSH_IPV6="yes" TEST_SSH_UTF8="yes" TEST_SSH_ECC="yes" TEST_SHELL="sh" EXEEXT="" t-exec && echo all t-exec passed
run test connect.sh ...
ssh direct connect failed
ssh proxycommand connect failed
failed simple connect
*** Error code 1

Stop.
make[1]: stopped in /usr/source/openssh-SNAP-20200921/regress
*** Error code 1

Stop.
make: stopped in /usr/source/openssh-SNAP-20200921
root@gallifrey:/usr/source/openssh-SNAP-20200921 # exit

exit

Script done on Mon Sep 21 06:20:52 2020
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b
USA call a Nov 3 2020 referndum to dissolve the Union and dissolve!!
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Re: Call for testing: OpenSSH 8.4 [ In reply to ]
On Mon, 21 Sep 2020, Jakub Jelen wrote:

> On 9/20/20 8:02 AM, Damien Miller wrote:
> > Hi,
> >
> > OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a bugfix release.
>
> Basic tests in Fedora 32 passed. Running some more now.
>
> For the release, can we consider also pulling the various fixes for
> ssh-copy-id, which recently received some care:
>
> https://gitlab.com/phil_hands/ssh-copy-id

I've synced with rev f0da1a1b7d8

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

1 2  View All