Call for testing: OpenSSH 7.8

Darren Tucker dtucker at dtucker.net
Sat Aug 18 03:56:32 AEST 2018


On 17 August 2018 at 10:45, Darren Tucker <dtucker at dtucker.net> wrote:
> On 17 August 2018 at 08:21, Jeff Wieland <wieland at purdue.edu> wrote:
>> On SPARC Solaris 10, using Solaris' native OpenSSL and Solaris
>> Studio 12.2, I got the following errors:
>>
>>
>> run test agent-getpeereid.sh ...
>> ssh-add did not fail for nobody: 1 < 2
>
> I'm not sure why this might be.  It passes for me on Solaris 10 x86
> with gcc.  I suggest adding a "set -x" at the start of
> agent-getpeereid.sh and running the test ("make tests
> LTESTS=agent-getpeereid.sh SKIP_UNIT=1") and see what it's doing under
> the covers.

Correction on the command: you'll need to also set SUDO:
SUDO=sudo make tests SKIP_UNIT=1 LTESTS=agent-getpeereid

For comparision here's the output from my system:

[dtucker at sol10]$ SUDO=sudo make tests SKIP_UNIT=1 LTESTS=agent-getpeereid
[make output snipped]
run test agent-getpeereid.sh ...
++ tid='disallow agent attach from other uid'
++ UNPRIV=nobody
++ ASOCK=/home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent
++ SSH_AUTH_SOCK=/nonexistent
++ config_defined HAVE_GETPEEREID HAVE_GETPEERUCRED HAVE_SO_PEERCRED
++ str=HAVE_GETPEEREID
++ test xHAVE_GETPEERUCRED '!=' x
++ str='HAVE_GETPEEREID|HAVE_GETPEERUCRED'
++ shift
++ test xHAVE_SO_PEERCRED '!=' x
++ str='HAVE_GETPEEREID|HAVE_GETPEERUCRED|HAVE_SO_PEERCRED'
++ shift
++ test x '!=' x
++ egrep '^#define.*(HAVE_GETPEEREID|HAVE_GETPEERUCRED|HAVE_SO_PEERCRED)'
/home/dtucker/openssh/upstream/openssh/build/sol10/config.h
++ :
++ case "x$SUDO" in
++ sudo=1
++ trace 'start agent'
++ start_debug_log start agent
++ echo 'trace: start' agent
++ echo 'trace: start' agent
++ echo 'trace: start' agent
++ '[' X = Xyes ']'
+++ /home/dtucker/openssh/upstream/openssh/build/sol10/ssh-agent -s -a
/home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent
++ eval 'SSH_AUTH_SOCK=/home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent;'
export 'SSH_AUTH_SOCK;' 'SSH_AGENT_PID=8814;' export 'SSH_AGENT_PID;'
echo Agent pid '8814;'
+++ SSH_AUTH_SOCK=/home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent
+++ export SSH_AUTH_SOCK
+++ SSH_AGENT_PID=8814
+++ export SSH_AGENT_PID
+++ echo Agent pid 8814
++ r=0
++ '[' 0 -ne 0 ']'
++ chmod 644 /home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent
++ /home/dtucker/openssh/upstream/openssh/build/sol10/ssh-add -l
++ r=1
++ '[' 1 -ne 1 ']'
++ test -z 1
++ sudo -S -u nobody
/home/dtucker/openssh/upstream/openssh/build/sol10/ssh-add -l
++ r=2
++ '[' 2 -lt 2 ']'
++ trace 'kill agent'
++ start_debug_log kill agent
++ echo 'trace: kill' agent
++ echo 'trace: kill' agent
++ echo 'trace: kill' agent
++ '[' X = Xyes ']'
++ /home/dtucker/openssh/upstream/openssh/build/sol10/ssh-agent -k
++ rm -f /home/dtucker/openssh/upstream/openssh/build/sol10/regress/agent
+ cleanup
+ '[' x '!=' x ']'
+ '[' x '!=' x ']'
+ stop_sshd
+ '[' -f /home/dtucker/openssh/upstream/openssh/build/sol10/regress/pidfile ']'
+ '[' 0 -eq 0 ']'
+ verbose ok disallow agent attach from other uid
+ start_debug_log ok disallow agent attach from other uid
+ echo 'trace: ok' disallow agent attach from other uid
+ echo 'trace: ok' disallow agent attach from other uid
+ echo 'trace: ok' disallow agent attach from other uid
+ '[' X '!=' Xyes ']'
+ echo ok disallow agent attach from other uid
ok disallow agent attach from other uid
+ exit 0
make[1]: Leaving directory `/home/dtucker/openssh/upstream/openssh/regress'
all tests passed


>
> --
> Darren Tucker (dtucker at dtucker.net)
> GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
>     Good judgement comes with experience. Unfortunately, the experience
> usually comes from bad judgement.



-- 
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.


More information about the openssh-unix-dev mailing list