Displaying 20 results from an estimated 29 matches for "sshd_proxy".
Did you mean:
ssh_proxy
2024 Nov 12
0
[PATCH 1/2] Add test to cover multiple server hostkeys with agent
...31 insertions(+)
diff --git a/regress/hostkey-agent.sh b/regress/hostkey-agent.sh
index 222d424bd..3fa80655e 100644
--- a/regress/hostkey-agent.sh
+++ b/regress/hostkey-agent.sh
@@ -82,6 +82,37 @@ for k in $SSH_CERTTYPES ; do
fi
done
+# Run sshd with multiple keys handeled by agent
+
+cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
+
+mv $OBJ/ssh_proxy $OBJ/ssh_proxy.orig
+grep -vi 'globalknownhostsfile' $OBJ/ssh_proxy.orig > $OBJ/ssh_proxy
+echo "UpdateHostkeys=yes" >> $OBJ/ssh_proxy
+echo "GlobalKnownHostsFile=none" >> $OBJ/ssh_proxy
+
+read -p "Doing the...
2024 Nov 12
2
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com>
Hello,
I've discovered an issue with sshd when it's configured to use the SSH agent
alongside multiple host keys. Specifically, this problem happens during the
hostkeys-prove-00 at openssh.com request, when the server attempts to
demonstrate ownership of the host keys by calling the agent.
The issue occurs because, while processing the
2019 Jan 24
2
[Regression] OpenSSH 7.7p1 no longer tests on NonStop Port
...ome/git/openssh-portable/regress/rsa
/home/git/openssh-portable/regress/host.rsa
+ echo HostKey /home/git/openssh-portable/regress/host.rsa
+ 1>> /home/git/openssh-portable/regress/sshd_config
+ echo HostKey /home/git/openssh-portable/regress/rsa
+ 1>> /home/git/openssh-portable/regress/sshd_proxy
+ [ ! -f /home/git/openssh-portable/regress/ed25519 ]
+ [ /home/git/openssh-portable/ssh-keygen -nt
/home/git/openssh-portable/regress/ed25519 ]
+ 1>> /home/git/openssh-portable/regress/known_hosts
+ printf localhost-with-alias,127.0.0.1,::1
+ cat /home/git/openssh-portable/regress/ed25519.pu...
2015 May 31
2
Call for testing: OpenSSH 6.9
FreeBSD 10.1-RELEASE
passes tests
DragonflyBSD snapshot
passes tests
Debian 8
run test connect.sh ...
Missing privilege separation directory: /var/empty
FATAL: sshd_proxy broken
Makefile:192: recipe for target 't-exec' failed
make[1]: *** [t-exec] Error 1
make[1]: Leaving directory '/home/sme/openssh/regress'
Makefile:544: recipe for target 'tests' failed
make: *** [tests] Error 2
OmniOS
test_sshbuf: ............................................
2002 Jul 22
9
[Patch] Improve portability of regression tests
...t
(
- echo -n 'localhost-with-alias,127.0.0.1,::1 '
+ echon 'localhost-with-alias,127.0.0.1,::1 '
cat $OBJ/$t.pub
) >> $OBJ/known_hosts
@@ -189,7 +201,7 @@
# create a proxy version of the client config
(
cat $OBJ/ssh_config
- echo proxycommand ${SSHD} -i -f $OBJ/sshd_proxy
+ echo proxycommand ${SUDO} ${SSHD} -i -f $OBJ/sshd_proxy
) > $OBJ/ssh_proxy
# check proxy config
2024 May 21
2
[Bug 3692] New: rekey.sh doesn't actually test different algorithms
...is a function ssh_data_rekeying(). It sets the first
parameter as _kexopt but then 2 lines later tests _kexopts - note the
trailing "s":
ssh_data_rekeying()
{
_kexopt=$1 ; shift
_opts="$@"
if ! test -z "$_kexopts" ; then
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
echo "$_kexopt" >> $OBJ/sshd_proxy
_opts="$_opts -o$_kexopt"
fi
This means that the various algorithms never are set and so it tests
the same default algorithm over and over.
--
You are receiving this mail beca...
2019 Jan 21
4
[Regression] OpenSSH 7.7p1 no longer tests on NonStop Port
Hi All,
I finally got around to trying to test the 7.7p1 release on the HPE NonStop
Platform. 7.6p1 worked just fine - no issues at all.
In 7.7p1, when the agent test ran, the following happened (prior tests
worked perfectly):
run test agent.sh ...
Couldn't open logfile /home/git/openssh-portable/regress/ssh.log:
Permission denied
agent fwd failed (exit code 1)
failed simple agent test
2016 Feb 18
3
Call for testing: OpenSSH 7.2
On 2/17/16 6:02 PM, Darren Tucker wrote:
> On Thu, Feb 18, 2016 at 12:43 PM, Carson Gaspar <carson at taltos.org> wrote:
> [...]
>> Is there a sane way to run just one test script? LTESTS can't be overridden
>> AFAIK...
>
> make t-exec LTESTS=testname
>
> where testname is the name of the specific test script without the .sh
> extension.
Nope, that runs
2018 Apr 24
2
AIX make checks issue
...the end)?
root at x066:[/home/aixtools/openbsd/openssh-7.7p1]cat
/home/aixtools/openbsd/openssh-7.7p1/ssh.log
trace: kill agent
debug1: Executing proxy command: exec sh ./regress/sshd-log-wrapper.sh
/home/aixtools/openbsd/openssh-7.7p1/sshd.log ./sshd -i -f
/home/aixtools/openbsd/openssh-7.7p1/sshd_proxy
debug1: permanently_drop_suid: 0
debug1: permanently_set_uid: 0/0
debug1: key_load_public: No such file or directory
debug1: identity file /.ssh/id_rsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or...
2015 May 31
2
Call for testing: OpenSSH 6.9
...e into place if you like (as long as it's world readable), or you
can use configure --sysconfdir to point it at wherever the file actually is.
> Later in the test sequence I got the error:
>
> run test connect.sh ...
> Missing privilege separation directory: /var/empty
> FATAL: sshd_proxy broken
> make[1]: *** [t-exec] Error 1
> make[1]: Leaving directory `/tmp/openssh/regress'
> make: *** [tests] Error 2
> make tests 153.92s user 4.68s system 98% cpu 2:41.52 total
>
> I was not running as root at the time, as I wasn?t intending to install
> this version. I...
2014 Jan 17
0
OpenSSH 6.5 test results
Hello,
here are my test results on an Ubuntu 13.10 64Bit DigitalOcean 512 MB
Droplet
Linux cloud.gc-mc.de 3.8.0-19-generic #30-Ubuntu SMP Wed May 1 16:35:23
UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
1st test:
run test connect.sh ...
Missing privilege separation directory: /var/empty
FATAL: sshd_proxy broken
make[1]: *** [t-exec] Error 1
make[1]: Leaving directory `/root/openssh/regress'
make: *** [tests] Error 2
2st test:
mkdir /var/empty
http://pastebin.com/y4SzETDD
or
https://tobiassachs.de/paste/?ffda4dbaa4f1677f#YWPHWFWUzAt09C13xM1NWqItBhewv+vJwfxa3IFvD5k=
please ignore the ssl warnin...
2017 Sep 29
2
Call for testing: OpenSSH 7.6
On 29 September 2017 at 11:05, Iain Morgan <imorgan+openssh at nas.nasa.gov> wrote:
[...]
> This is due to my shell being csh, which is pickier about undefined
> variables than the Bourne-style shells. The attached patch fixes the
> issue.
Thanks for figuring this out.
> - 'test -z "$SSH_USER_AUTH"' || fail "SSH_USER_AUTH present"
> +
2005 Mar 01
7
[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
...server
+ [ ! -z LogLevel=DEBUG3 ]
+ trace adding sshd_config option LogLevel=DEBUG3
+ [ Xyes = Xyes ]
+ echo adding sshd_config option LogLevel=DEBUG3
adding sshd_config option LogLevel=DEBUG3
+ echo LogLevel=DEBUG3
+ cp /opt/SSH/openssh-3.9p1/regress/sshd_config
/opt/SSH/openssh-3.9p1/regress/sshd_proxy
+ echo StrictModes no
+ cat
Host *
Hostname 127.0.0.1
HostKeyAlias localhost-with-alias
Port 4242
User root
GlobalKnownHostsFile /opt/SSH/openssh-3.9p1/regress/known_hosts
UserKnown...
2017 Sep 29
3
Call for testing: OpenSSH 7.6
..._proxy x \
- 'test -z "$SSH_USER_AUTH"' || fail "SSH_USER_AUTH present"
+ "exec sh -c 'test -z \"\$SSH_USER_AUTH\"'" || \
+ fail "SSH_USER_AUTH present"
verbose "ExposeAuthInfo=yes"
echo ExposeAuthInfo=yes >> $OBJ/sshd_proxy
2003 Jun 20
0
[PATCH] Regression test portabilization.
...t7.out t7.out.pub copy.1 copy.2
+clean:
+ @for F in $(CLEANFILES); do rm -f $(OBJ)/$${F}; done
LTESTS= connect \
proxy-connect \
@@ -30,7 +33,6 @@
reconfigure \
forwarding
-USER!= id -un
CLEANFILES+= authorized_keys_${USER} known_hosts pidfile \
ssh_config ssh_proxy sshd_config sshd_proxy \
rsa.pub rsa rsa1.pub rsa1 host.rsa host.rsa1 \
@@ -48,9 +50,9 @@
ssh-keygen -yf t2.out | diff - ${.CURDIR}/rsa_openssh.pub
t3:
- ssh-keygen -ef ${.CURDIR}/rsa_openssh.pub |\
- ssh-keygen -if /dev/stdin |\
- diff - ${.CURDIR}/rsa_openssh.pub
+ ssh-keygen -ef ${.CURDIR}/rsa_openssh.pub &g...
2014 Oct 18
10
[Bug 2297] New: EDD25519 Signature verification failed on Solaris
https://bugzilla.mindrot.org/show_bug.cgi?id=2297
Bug ID: 2297
Summary: EDD25519 Signature verification failed on Solaris
Product: Portable OpenSSH
Version: 6.7p1
Hardware: amd64
OS: Solaris
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2018 Apr 21
4
build-issue on AIX with openssh-7.7p1 - easy correction! included
Get the following error:
root at x065:[/data/prj/openbsd/openssh/openssh-7.7p1/openbsd-compat]make
??????? xlc_r -I/opt/include -O2 -qmaxmem=-1 -qarch=pwr5 -q64 -I. -I..
-I../../src/openssh-7.7p1/openbsd-compat
-I../../src/openssh-7.7p1/openbsd-compat/.. -I/opt/include
-DHAVE_CONFIG_H -c ../../src/openssh-7.7p1/openbsd-compat/strndup.c
2015 May 29
16
Call for testing: OpenSSH 6.9
Hi,
OpenSSH 6.9 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains
some substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2005 Aug 22
12
Call for release testing
Hi,
We would like to make one of our periodic releases shortly, so once
again we are asking for readers of this list (or anyone else) to
download and test a CVS snapshot of OpenSSH on your favourite
platforms.
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable snapshots are available the mirrors listed at
http://www.openssh.com/portable.html#ftp in the
2005 Aug 22
12
Call for release testing
Hi,
We would like to make one of our periodic releases shortly, so once
again we are asking for readers of this list (or anyone else) to
download and test a CVS snapshot of OpenSSH on your favourite
platforms.
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable snapshots are available the mirrors listed at
http://www.openssh.com/portable.html#ftp in the