Testing for the 4.4p1 release, round 2

santhi santhi.amirta at gmail.com
Fri Sep 22 19:04:43 EST 2006


Hi All,

I have tested the openssh-SNAP-20060922 in the following HP-UX machines:

11.11 PA-RISC:
-----------------
Configure and compile successfully.

11.23 IPF:
-----------
Configure and compile successfully.

HP-UX 11.00 PA-RISC:
--------------------------
Configures successfully.  But the compilation ends with the following error:

     cc -o ssh ssh.o readconf.o clientloop.o sshtty.o  sshconnect.o
sshconnect1.o
sshconnect2.o -L. -Lopenbsd-compat/ -L/usr/local/SSH-LIBS-42/openssl-0.9.7i/
ssl-2.0/lib -L/usr/local/SSH-LIBS-42/tcp_wrappers_7.6/tcp_wrappers-2.0 -L/us
r/local/SSH-LIBS-42/zlib-1.2.3/zlib-2.0/lib  -L/usr/local/lib -lssh -lopenbs
d-compat -lcrypto -lz -lnsl -lxnet  -lsec -lgssapi_krb5 -lkrb5 -lk5crypto -l
com_err
/usr/ccs/bin/ld: Unsatisfied symbols:
   htonl (first referenced in ./libssh.a(canohost.o)) (code)
*** Error exit code 1

Stop.

Fix:
----
Include <arpa/inet.h> in canohost.c

Again the compilation ends with the following error:

        cc -o ssh ssh.o readconf.o clientloop.o sshtty.o  sshconnect.o
sshconnect1.o
sshconnect2.o -L. -Lopenbsd-compat/ -L/usr/local/SSH-LIBS-42/openssl-0.9.7i/
ssl-2.0/lib -L/usr/local/SSH-LIBS-42/tcp_wrappers_7.6/tcp_wrappers-2.0 -L/us
r/local/SSH-LIBS-42/zlib-1.2.3/zlib-2.0/lib  -L/usr/local/lib -lssh -lopenbs
d-compat -lcrypto -lz -lnsl -lxnet  -lsec -lgssapi_krb5 -lkrb5 -lk5crypto -l
com_err
/usr/ccs/bin/ld: Unsatisfied symbols:
   htonl (first referenced in ./libssh.a(packet.o)) (code)
*** Error exit code 1

Stop

Fix:
----
Include <arpa/inet.h> in packet.c

Thanks,
Santhi.

----- Original Message -----
From: "Darren Tucker" <dtucker at zip.com.au>
To: <openssh-unix-dev at mindrot.org>
Sent: Thursday, September 21, 2006 7:50 PM
Subject: Testing for the 4.4p1 release, round 2


> Hi all.
>
> As most of you know, we are preparing OpenSSH 4.4p1 for release.  We have
> had one round of testing and I would like to thank all who responded.
>
> We believe that most of the problems reported have been resolved.
> If you are so inclined, we would appreciate a quick retest to ensure
> that the fixed ones remain fixed and the working ones remain working.
>
> Of the problems identitified, I am only aware of two reported that I do
> not believe have been resolved:
>
> regress hangs on Redhat 7.3, reason unknown (maybe IPv6 related?):
> http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115700350117023
>
> regress failure on IRIX w/mipspro compiler (SSH protocol 1 only):
> http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115716627223333
>
> I believe the first is new, but the latter is not.  Unfortunately we are
> not able to reproduce either.
>
> And now, a rerun of the earlier message with the details:
>
> Snapshots are available from http://www.mindrot.org/openssh_snap or
> from any of the mirrors listed on http://www.openssh.org/portable.html
> The latter page also includes instructions for checking out portable
> OpenSSH via anonymous CVS.
>
> This release contains many bugfixes and feature improvements. Here
> are some highlights:
>
> - Implemented conditional configuration in sshd_config(5) using the
>   "Match" directive. This allows some configuration options to be
>   selectively overridden if specific criteria (based on user, group,
>   hostname and/or address) are met. So far a useful subset of post-
>   authentication options are supported and more are expected to be
>   added in future releases.
> - Added a "ForceCommand" directive to sshd_config(5). Similar to the
>   command="..." option accepted in ~/.ssh/authorized_keys, this forces
>   the execution of the specified command regardless of what the user
>   requested. This is very useful in conjunction with the new "Match"
>   option.
> - Add a "PermitOpen" directive to sshd_config(5). This mirrors the
>   permitopen="..." authorized_keys option, allowing fine-grained
>   control over the port-forwardings that a user is allowed to
>   establish.
> - Add optional logging of transactions to sftp-server(8).
> - ssh(1) will now record port numbers for hosts stored in
>   ~/.ssh/authorized_keys when a non-standard port has been requested.
> - Add an "ExitOnForwardFailure" options to cause ssh(1) to exit (with
>   a non-zero exit code) when requested port forwardings could not be
>   established.
> - Extend the sshd_config(5) "SubSystem" directive to allow the
>   specification of commandline arguments.
> - Add optional support for SELinux, controlled using the --with-selinux
>   configure option (experimental)
> - Add optional support for Solaris process contracts, enabled using the
>   --with-solaris-contracts configure option (experimental)
> - Add support for Diffie-Hellman group exchange key agreement with a
>   final hash of SHA256.
> - Fixed a lot of bugs. See
>   http://bugzilla.mindrot.org/show_bug.cgi?id=1155 for an incomplete
>   list (more in the ChangeLog)
> - Lots of manpage fixes and improvements
> - Many code cleanups, including:
>     - Switching to safer memory allocation functions that avoid integer
>       overflows when allocating arrays
>     - Cleanups of header file usage (ongoing)
>     - Fixes to leaks reported by the Coverity static analysis tool
>
> Running the regression tests supplied with Portable does not require
> installation, just run:
>
> $ ./configure && make tests
>
> Testing on suitable non-production systems is also appreciated. Please
send
> reports of success or failure to openssh-unix-dev at mindrot.org, including
> details of your platform, compiler and configure options.
>
> Thanks.
>
> --
> Darren Tucker (dtucker at zip.com.au)
> GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
>     Good judgement comes with experience. Unfortunately, the experience
> usually comes from bad judgement.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> http://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>




More information about the openssh-unix-dev mailing list