[Bug 2639] New: PuTTY interop tests broken
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Sun Nov 20 02:57:36 AEDT 2016
https://bugzilla.mindrot.org/show_bug.cgi?id=2639
Bug ID: 2639
Summary: PuTTY interop tests broken
Product: Portable OpenSSH
Version: 7.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Regression tests
Assignee: unassigned-bugs at mindrot.org
Reporter: cjwatson at debian.org
Created attachment 2891
--> https://bugzilla.mindrot.org/attachment.cgi?id=2891&action=edit
Fix PuTTY interop tests
The PuTTY interop tests require manual interaction to enter a
passphrase. Even after doing so, they fail as follows, and have done
for some time:
run test putty-transfer.sh ...
Enter passphrase to save key:
Re-enter passphrase to verify:
putty transfer data: proto 2 compression 0
WARNING - POTENTIAL SECURITY BREACH!
The server's host key does not match the one PuTTY has
cached. This means that either the server administrator
has changed the host key, or you have actually connected
to another computer pretending to be the server.
The new rsa2 key fingerprint is:
ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6
Connection abandoned.
cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy
corrupted copy
[... lots of similar output ...]
failed putty transfer data
Makefile:203: recipe for target 't-exec-interop' failed
The attached patch fixes all this.
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list