Displaying 10 results from an estimated 10 matches for "ssh_keytypes".
2023 Dec 21
1
9.6p1 test suite help
...Jack Hill <jackhill at jackhill.us> wrote:
[...]
> /tmp/guix-build-openssh-9.6p1.drv-0/openssh-9.6p1/regress/ssh-rsa already exists.
> Overwrite (y/n)? ssh-keygen for ssh-rsa failed
The regression tests do this to regenerate the keys if either the
keygen binary has changed:
for t in ${SSH_KEYTYPES}; do
# generate user key
if [ ! -f $OBJ/$t ] || [ ${SSHKEYGEN_BIN} -nt $OBJ/$t ]; then
trace "generating key type $t"
rm -f $OBJ/$t
${SSHKEYGEN} -q -N '' -t $t -f $OBJ/$t ||\
fail "ssh-ke...
2024 Nov 12
0
[PATCH 1/2] Add test to cover multiple server hostkeys with agent
...J/ssh_proxy.orig
+grep -vi 'globalknownhostsfile' $OBJ/ssh_proxy.orig > $OBJ/ssh_proxy
+echo "UpdateHostkeys=yes" >> $OBJ/ssh_proxy
+echo "GlobalKnownHostsFile=none" >> $OBJ/ssh_proxy
+
+read -p "Doing the multiple keys (y/n)? " answer
+for k in $SSH_KEYTYPES ; do
+ verbose "Addkey type $k"
+ echo "Hostkey $OBJ/agent-key.${k}" >> $OBJ/sshd_proxy
+
+ ( printf 'localhost-with-alias ' ;
+ cat $OBJ/agent-key.$k.pub) > $OBJ/known_hosts
+done
+
+opts="-oStrictHostKeyChecking=yes -F $OBJ/ssh_proxy"
+SSH_CONNECT...
2024 Nov 12
2
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com>
Hello,
I've discovered an issue with sshd when it's configured to use the SSH agent
alongside multiple host keys. Specifically, this problem happens during the
hostkeys-prove-00 at openssh.com request, when the server attempts to
demonstrate ownership of the host keys by calling the agent.
The issue occurs because, while processing the
2023 Dec 21
1
9.6p1 test suite help
Hi OpenSSH,
I'm working on updating Guix's openssh package definition to the latest
release. So far, I have only changed the version (and checksum) and left
the build/test/install recipe the same. However, the test suite now fails.
I could use some pointers to find out what exactly is going wrong with the
failing test or how to fix it. I'm happy to provide more information about
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...p $exp
+}
+
+for fmt in '' PKCS8 PEM ; do
+?? ?for secret in '' 'secret1'; do
+?? ??? ?rounds_list="0"
+?? ??? ?test -n "$secret" -a -z "$fmt" && rounds_list="2 16"
+?? ??? ?for rounds in $rounds_list; do
+?? ??? ??? ?for t in $SSH_KEYTYPES; do
+?? ??? ??? ??? ?trace "generating $t key in '$fmt' format with
'$secret' passphrase and '$rounds' rounds"
+?? ??? ??? ??? ?rm -f $OBJ/$t-key*
+?? ??? ??? ??? ?oldfmt=""
+?? ??? ??? ??? ?case "$fmt" in
+?? ??? ??? ??? ?PKCS8|PEM) oldfmt=1 ;;...
2020 Apr 17
2
[PATCH] regression of comment extraction in private key file without passphrase
Hi
Le 17/04/2020 ? 05:52, Damien Miller a ?crit?:
> On Wed, 15 Apr 2020, Lo?c wrote:
>
>> Hello,
>>
>> In one recent change
>> (https://anongit.mindrot.org/openssh.git/commit/?id=2b13d3934d5803703c04803ca3a93078ecb5b715),
>> I noticed a regression.
>>
>> If ssh-keygen is given a private file without passphrase and without the
>> corresponding
2019 Jan 24
2
[Regression] OpenSSH 7.7p1 no longer tests on NonStop Port
..., representing the bulk of the work. 7.7p1 is from there upward
to
> 814c8f2.
Here's where we are in debugging. I've set +x and fail in test-exec.sh,
here's the log. I am having difficulty interpreting the output or where to
look next. To the uninitiated, this does not look bad.
+ SSH_KEYTYPES=rsa ed25519
+ trace generate keys
+ [ ! -f /home/git/openssh-portable/regress/rsa ]
+ [ /home/git/openssh-portable/ssh-keygen -nt
/home/git/openssh-portable/regress/rsa ]
+ 1>> /home/git/openssh-portable/regress/known_hosts
+ printf localhost-with-alias,127.0.0.1,::1
+ cat /home/git/openssh-p...
2019 Jan 21
4
[Regression] OpenSSH 7.7p1 no longer tests on NonStop Port
Hi All,
I finally got around to trying to test the 7.7p1 release on the HPE NonStop
Platform. 7.6p1 worked just fine - no issues at all.
In 7.7p1, when the agent test ran, the following happened (prior tests
worked perfectly):
run test agent.sh ...
Couldn't open logfile /home/git/openssh-portable/regress/ssh.log:
Permission denied
agent fwd failed (exit code 1)
failed simple agent test
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
Hi,
The main (and probably the only) use case of this PAM module is to let
sudo authenticate users via their ssh-agent, therefore without having
to type any password and without being tempted to use the NOPASSWD sudo
option for such convenience.
The principle is originally implemented by an existing module [0][1]
and many pages that explain how to use it for such purpose can be
found online.
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
...trictModes no
+ cat
+ [ ! -z ]
+ rm -f /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/known_hosts /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/authorized_keys_openssh-tests
+ ssh_version 1
+ echo 2
+ grep 1
+ SSH_KEYTYPES=rsa ed25519
+ trace generate keys
+ start_debug_log generate keys
+ echo trace: generate keys
+ echo trace: generate keys
+ echo trace: generate keys
+ [ X = Xyes ]
+ [ ! -f /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/rsa ]
+ [ ssh-keygen -nt...