[Bug 2639] New: PuTTY interop tests broken

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Sun Nov 20 02:57:36 AEDT 2016


https://bugzilla.mindrot.org/show_bug.cgi?id=2639

            Bug ID: 2639
           Summary: PuTTY interop tests broken
           Product: Portable OpenSSH
           Version: 7.3p1
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Regression tests
          Assignee: unassigned-bugs at mindrot.org
          Reporter: cjwatson at debian.org

Created attachment 2891
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2891&action=edit
Fix PuTTY interop tests

The PuTTY interop tests require manual interaction to enter a
passphrase.  Even after doing so, they fail as follows, and have done
for some time:

run test putty-transfer.sh ...
Enter passphrase to save key:
Re-enter passphrase to verify:
putty transfer data: proto 2 compression 0
WARNING - POTENTIAL SECURITY BREACH!
The server's host key does not match the one PuTTY has
cached. This means that either the server administrator
has changed the host key, or you have actually connected
to another computer pretending to be the server.
The new rsa2 key fingerprint is:
ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6
Connection abandoned.
cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy
corrupted copy
[... lots of similar output ...]
failed putty transfer data
Makefile:203: recipe for target 't-exec-interop' failed

The attached patch fixes all this.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list