bugzilla-daemon at bugzilla.mindrot.org
2016-Nov-19 15:57 UTC
[Bug 2639] New: PuTTY interop tests broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2639 Bug ID: 2639 Summary: PuTTY interop tests broken Product: Portable OpenSSH Version: 7.3p1 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P5 Component: Regression tests Assignee: unassigned-bugs at mindrot.org Reporter: cjwatson at debian.org Created attachment 2891 --> https://bugzilla.mindrot.org/attachment.cgi?id=2891&action=edit Fix PuTTY interop tests The PuTTY interop tests require manual interaction to enter a passphrase. Even after doing so, they fail as follows, and have done for some time: run test putty-transfer.sh ... Enter passphrase to save key: Re-enter passphrase to verify: putty transfer data: proto 2 compression 0 WARNING - POTENTIAL SECURITY BREACH! The server's host key does not match the one PuTTY has cached. This means that either the server administrator has changed the host key, or you have actually connected to another computer pretending to be the server. The new rsa2 key fingerprint is: ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6 Connection abandoned. cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy corrupted copy [... lots of similar output ...] failed putty transfer data Makefile:203: recipe for target 't-exec-interop' failed The attached patch fixes all this. -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2016-Nov-19 16:00 UTC
[Bug 2639] PuTTY interop tests broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2639 Colin Watson <cjwatson at debian.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |anakin at pobox.com -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2016-Nov-21 22:34 UTC
[Bug 2639] PuTTY interop tests broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2639 Darren Tucker <dtucker at zip.com.au> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Assignee|unassigned-bugs at mindrot.org |dtucker at zip.com.au Blocks| |2594 CC| |dtucker at zip.com.au --- Comment #1 from Darren Tucker <dtucker at zip.com.au> --- Thanks, I'll look at this for 7.4 when I get a chance. Referenced Bugs: https://bugzilla.mindrot.org/show_bug.cgi?id=2594 [Bug 2594] Tracking bug for OpenSSH 7.4 release -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2016-Nov-25 03:02 UTC
[Bug 2639] PuTTY interop tests broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2639 Darren Tucker <dtucker at zip.com.au> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution|--- |FIXED --- Comment #2 from Darren Tucker <dtucker at zip.com.au> --- Applied to OpenBSD, will be pulled into portable during the next sync. Thanks. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2018-Apr-06 02:26 UTC
[Bug 2639] PuTTY interop tests broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2639 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #3 from Damien Miller <djm at mindrot.org> --- Close all resolved bugs after release of OpenSSH 7.7. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Maybe Matching Threads
- [Bug 1818] New: SSH2_MSG_CHANNEL_FAILURE on closed channel
- [Bug 3671] New: Improve PuTTY version detection
- [Bug 2390] New: PROTOCOL.key mis-describes private section
- [PATCH] fix %n expansion in LocalCommand
- [PATCH libnbd 5/5] interop: Add tests of nbdkit + LIBNBD_TLS_ALLOW.