Call for testing: OpenSSH-5.4

Stephen Harris lists at spuddy.org
Sun Feb 28 04:18:24 EST 2010


On Sun, Feb 28, 2010 at 03:26:01AM +1100, Damien Miller wrote:
> On Sat, 27 Feb 2010, Stephen Harris wrote:
> 
> > On Sat, Feb 27, 2010 at 06:25:38PM +1100, Damien Miller wrote:
> > > OpenSSH 5.4 is almost ready for release, so we would appreciate testing
> > > on as many platforms and systems as possible. This is a big release,
> > > with a number of major new features and many bug fixes.
> > 
> > It's been a number of years since I've done this, so please excuse me if
> > I'm lacking information in my report
> 
> Please try this patch:

Compilation completed, last line of "make tests" is "all tests passed".
(sudo required tests appeared to have been skipped)

Complete test output follows in case it helps you.

(Again, for record, CentOS 5.4 32bit)

BUILDDIR=`pwd`; \
        [ -d `pwd`/regress ]  ||  mkdir -p `pwd`/regress; \
        [ -f `pwd`/regress/Makefile ]  || \
            ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile ; \
        TEST_SHELL="sh"; \
        TEST_SSH_SSH="${BUILDDIR}/ssh"; \
        TEST_SSH_SSHD="${BUILDDIR}/sshd"; \
        TEST_SSH_SSHAGENT="${BUILDDIR}/ssh-agent"; \
        TEST_SSH_SSHADD="${BUILDDIR}/ssh-add"; \
        TEST_SSH_SSHKEYGEN="${BUILDDIR}/ssh-keygen"; \
        TEST_SSH_SSHPKCS11HELPER="${BUILDDIR}/ssh-pkcs11-helper"; \
        TEST_SSH_SSHKEYSCAN="${BUILDDIR}/ssh-keyscan"; \
        TEST_SSH_SFTP="${BUILDDIR}/sftp"; \
        TEST_SSH_SFTPSERVER="${BUILDDIR}/sftp-server"; \
        TEST_SSH_PLINK="plink"; \
        TEST_SSH_PUTTYGEN="puttygen"; \
        TEST_SSH_CONCH="conch"; \
        TEST_SSH_IPV6="yes" ; \
        cd ./regress || exit $?; \
        make \
                .OBJDIR="${BUILDDIR}/regress" \
                .CURDIR="`pwd`" \
                BUILDDIR="${BUILDDIR}" \
                OBJ="${BUILDDIR}/regress/" \
                PATH="${BUILDDIR}:${PATH}" \
                TEST_SHELL="${TEST_SHELL}" \
                TEST_SSH_SSH="${TEST_SSH_SSH}" \
                TEST_SSH_SSHD="${TEST_SSH_SSHD}" \
                TEST_SSH_SSHAGENT="${TEST_SSH_SSHAGENT}" \
                TEST_SSH_SSHADD="${TEST_SSH_SSHADD}" \
                TEST_SSH_SSHKEYGEN="${TEST_SSH_SSHKEYGEN}" \
                TEST_SSH_SSHPKCS11HELPER="${TEST_SSH_SSHPKCS11HELPER}" \
                TEST_SSH_SSHKEYSCAN="${TEST_SSH_SSHKEYSCAN}" \
                TEST_SSH_SFTP="${TEST_SSH_SFTP}" \
                TEST_SSH_SFTPSERVER="${TEST_SSH_SFTPSERVER}" \
                TEST_SSH_PLINK="${TEST_SSH_PLINK}" \
                TEST_SSH_PUTTYGEN="${TEST_SSH_PUTTYGEN}" \
                TEST_SSH_CONCH="${TEST_SSH_CONCH}" \
                TEST_SSH_IPV6="yes" \
                EXEEXT="" \
                tests && echo all tests passed
make[1]: Entering directory `/datadisk/home/sweh/ssh_testing/openssh/regress'
ssh-keygen -if /home/sweh/ssh_testing/openssh/regress/rsa_ssh2.prv | diff - /home/sweh/ssh_testing/openssh/regress/rsa_openssh.prv
cat /home/sweh/ssh_testing/openssh/regress/rsa_openssh.prv > /home/sweh/ssh_testing/openssh/regress//t2.out
chmod 600 /home/sweh/ssh_testing/openssh/regress//t2.out
ssh-keygen -yf /home/sweh/ssh_testing/openssh/regress//t2.out | diff - /home/sweh/ssh_testing/openssh/regress/rsa_openssh.pub
ssh-keygen -ef /home/sweh/ssh_testing/openssh/regress/rsa_openssh.pub >/home/sweh/ssh_testing/openssh/regress//rsa_secsh.pub
ssh-keygen -if /home/sweh/ssh_testing/openssh/regress//rsa_secsh.pub | diff - /home/sweh/ssh_testing/openssh/regress/rsa_openssh.pub
rm -f /home/sweh/ssh_testing/openssh/regress/rsa_secsh.pub
ssh-keygen -lf /home/sweh/ssh_testing/openssh/regress/rsa_openssh.pub |\
                awk '{print $2}' | diff - /home/sweh/ssh_testing/openssh/regress/t4.ok
ssh-keygen -Bf /home/sweh/ssh_testing/openssh/regress/rsa_openssh.pub |\
                awk '{print $2}' | diff - /home/sweh/ssh_testing/openssh/regress/t5.ok
ssh-keygen -if /home/sweh/ssh_testing/openssh/regress/dsa_ssh2.prv > /home/sweh/ssh_testing/openssh/regress//t6.out1
ssh-keygen -if /home/sweh/ssh_testing/openssh/regress/dsa_ssh2.pub > /home/sweh/ssh_testing/openssh/regress//t6.out2
chmod 600 /home/sweh/ssh_testing/openssh/regress//t6.out1
ssh-keygen -yf /home/sweh/ssh_testing/openssh/regress//t6.out1 | diff - /home/sweh/ssh_testing/openssh/regress//t6.out2
ssh-keygen -q -t rsa -N '' -f /home/sweh/ssh_testing/openssh/regress//t7.out
ssh-keygen -lf /home/sweh/ssh_testing/openssh/regress//t7.out > /dev/null
ssh-keygen -Bf /home/sweh/ssh_testing/openssh/regress//t7.out > /dev/null
run test connect.sh ...
ok simple connect
run test proxy-connect.sh ...
ok proxy connect
run test connect-privsep.sh ...
ok proxy connect with privsep
run test proto-version.sh ...
ok sshd version with different protocol combinations
run test proto-mismatch.sh ...
ok protocol version mismatch
run test exit-status.sh ...
test remote exit status: proto 1 status 0
test remote exit status: proto 1 status 1
test remote exit status: proto 1 status 4
test remote exit status: proto 1 status 5
test remote exit status: proto 1 status 44
test remote exit status: proto 2 status 0
test remote exit status: proto 2 status 1
test remote exit status: proto 2 status 4
test remote exit status: proto 2 status 5
test remote exit status: proto 2 status 44
ok remote exit status
run test envpass.sh ...
test environment passing: pass env, don't accept
test environment passing: don't pass env, accept
test environment passing: pass single env, accept single env
test environment passing: pass multiple env, accept multiple env
ok environment passing
run test transfer.sh ...
transfer data: proto 1
transfer data: proto 2
ok transfer data
run test banner.sh ...
test banner: missing banner file
test banner: size 0
test banner: size 10
test banner: size 100
test banner: size 1000
test banner: size 10000
test banner: size 100000
test banner: suppress banner (-q)
ok banner
run test rekey.sh ...
ok rekey during transfer data
run test stderr-data.sh ...
test stderr data transfer: proto 1 ()
test stderr data transfer: proto 2 ()
test stderr data transfer: proto 1 (-n)
test stderr data transfer: proto 2 (-n)
ok stderr data transfer
run test stderr-after-eof.sh ...
ok stderr data after eof
run test broken-pipe.sh ...
ok broken pipe test
run test try-ciphers.sh ...
test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1
test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5
test try ciphers: proto 2 cipher aes128-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes128-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher aes128-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1
test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5
test try ciphers: proto 2 cipher 3des-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher 3des-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher 3des-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1
test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5
test try ciphers: proto 2 cipher blowfish-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher blowfish-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher blowfish-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1
test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5
test try ciphers: proto 2 cipher cast128-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher cast128-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher cast128-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1
test try ciphers: proto 2 cipher arcfour128 mac hmac-md5
test try ciphers: proto 2 cipher arcfour128 mac umac-64 at openssh.com
test try ciphers: proto 2 cipher arcfour128 mac hmac-sha1-96
test try ciphers: proto 2 cipher arcfour128 mac hmac-md5-96
test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1
test try ciphers: proto 2 cipher arcfour256 mac hmac-md5
test try ciphers: proto 2 cipher arcfour256 mac umac-64 at openssh.com
test try ciphers: proto 2 cipher arcfour256 mac hmac-sha1-96
test try ciphers: proto 2 cipher arcfour256 mac hmac-md5-96
test try ciphers: proto 2 cipher arcfour mac hmac-sha1
test try ciphers: proto 2 cipher arcfour mac hmac-md5
test try ciphers: proto 2 cipher arcfour mac umac-64 at openssh.com
test try ciphers: proto 2 cipher arcfour mac hmac-sha1-96
test try ciphers: proto 2 cipher arcfour mac hmac-md5-96
test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1
test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5
test try ciphers: proto 2 cipher aes192-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes192-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher aes192-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1
test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5
test try ciphers: proto 2 cipher aes256-cbc mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes256-cbc mac hmac-sha1-96
test try ciphers: proto 2 cipher aes256-cbc mac hmac-md5-96
test try ciphers: proto 2 cipher rijndael-cbc at lysator.liu.se mac hmac-sha1
test try ciphers: proto 2 cipher rijndael-cbc at lysator.liu.se mac hmac-md5
test try ciphers: proto 2 cipher rijndael-cbc at lysator.liu.se mac umac-64 at openssh.com
test try ciphers: proto 2 cipher rijndael-cbc at lysator.liu.se mac hmac-sha1-96
test try ciphers: proto 2 cipher rijndael-cbc at lysator.liu.se mac hmac-md5-96
test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1
test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5
test try ciphers: proto 2 cipher aes128-ctr mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes128-ctr mac hmac-sha1-96
test try ciphers: proto 2 cipher aes128-ctr mac hmac-md5-96
test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1
test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5
test try ciphers: proto 2 cipher aes192-ctr mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes192-ctr mac hmac-sha1-96
test try ciphers: proto 2 cipher aes192-ctr mac hmac-md5-96
test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1
test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5
test try ciphers: proto 2 cipher aes256-ctr mac umac-64 at openssh.com
test try ciphers: proto 2 cipher aes256-ctr mac hmac-sha1-96
test try ciphers: proto 2 cipher aes256-ctr mac hmac-md5-96
test try ciphers: proto 1 cipher 3des
test try ciphers: proto 1 cipher blowfish
test try ciphers: proto 2 cipher acss at openssh.org mac hmac-sha1
test try ciphers: proto 2 cipher acss at openssh.org mac hmac-md5
test try ciphers: proto 2 cipher acss at openssh.org mac umac-64 at openssh.com
test try ciphers: proto 2 cipher acss at openssh.org mac hmac-sha1-96
test try ciphers: proto 2 cipher acss at openssh.org mac hmac-md5-96
ok try ciphers
run test yes-head.sh ...
ok yes pipe head
run test login-timeout.sh ...
ok connect after login grace timeout
run test agent.sh ...
ok simple agent test
run test agent-getpeereid.sh ...
skipped: need SUDO to switch to uid nobody
run test agent-timeout.sh ...
ok agent timeout test
run test agent-ptrace.sh ...
skipped (SUDO not set)
run test keyscan.sh ...
ok keyscan
run test keygen-change.sh ...
ok change passphrase for key
run test keygen-convert.sh ...
ok convert keys
run test key-options.sh ...
key option proto 1 command="echo bar"
key option proto 1 no-pty,command="echo bar"
key option proto 2 command="echo bar"
key option proto 2 no-pty,command="echo bar"
key option proto 1 no-pty
key option proto 2 no-pty
key option proto 1 environment
key option proto 2 environment
key option proto 1 from="127.0.0.1"
key option proto 1 from="127.0.0.0/8"
key option proto 2 from="127.0.0.1"
key option proto 2 from="127.0.0.0/8"
ok key options
run test scp.sh ...
scp: simple copy local file to local file
scp: simple copy local file to remote file
scp: simple copy remote file to local file
scp: simple copy local file to remote dir
scp: simple copy local file to local dir
scp: simple copy remote file to local dir
scp: recursive local dir to remote dir
scp: recursive local dir to local dir
scp: recursive remote dir to local dir
scp: shell metacharacters
scp: disallow bad server #0
scp: disallow bad server #1
scp: disallow bad server #2
scp: disallow bad server #3
scp: disallow bad server #4
scp: detect non-directory target
/home/sweh/ssh_testing/openssh/regress/copy2: Not a directory
ok scp
run test sftp.sh ...
test basic sftp put/get: buffer_size 5 num_requests 1
test basic sftp put/get: buffer_size 5 num_requests 2
test basic sftp put/get: buffer_size 5 num_requests 10
test basic sftp put/get: buffer_size 1000 num_requests 1
test basic sftp put/get: buffer_size 1000 num_requests 2
test basic sftp put/get: buffer_size 1000 num_requests 10
test basic sftp put/get: buffer_size 32000 num_requests 1
test basic sftp put/get: buffer_size 32000 num_requests 2
test basic sftp put/get: buffer_size 32000 num_requests 10
test basic sftp put/get: buffer_size 64000 num_requests 1
test basic sftp put/get: buffer_size 64000 num_requests 2
test basic sftp put/get: buffer_size 64000 num_requests 10
ok basic sftp put/get
run test sftp-cmds.sh ...
rm: cannot remove `.' or `..'
rm: cannot remove `.' or `..'
sftp commands: lls
sftp commands: lls w/path
sftp commands: ls
sftp commands: shell
sftp commands: pwd
sftp commands: lpwd
sftp commands: quit
sftp commands: help
sftp commands: get
sftp commands: get quoted
sftp commands: get filename with quotes
sftp commands: get filename with spaces
sftp commands: get filename with glob metacharacters
sftp commands: get to directory
sftp commands: glob get to directory
sftp commands: get to local dir
sftp commands: glob get to local dir
sftp commands: put
sftp commands: put filename with quotes
sftp commands: put filename with spaces
sftp commands: put to directory
sftp commands: glob put to directory
sftp commands: put to local dir
sftp commands: glob put to local dir
sftp commands: rename
sftp commands: rename directory
sftp commands: ln
sftp commands: mkdir
sftp commands: chdir
sftp commands: rmdir
sftp commands: lmkdir
sftp commands: lchdir
rm: cannot remove `.' or `..'
rm: cannot remove `.' or `..'
ok sftp commands
run test sftp-badcmds.sh ...
sftp invalid commands: get nonexistent
sftp invalid commands: glob get to nonexistent directory
sftp invalid commands: put nonexistent
sftp invalid commands: glob put to nonexistent directory
sftp invalid commands: rename nonexistent
sftp invalid commands: rename target exists (directory)
sftp invalid commands: glob put files to local file
ok sftp invalid commands
run test sftp-batch.sh ...
sftp batchfile: good commands
sftp batchfile: bad commands
sftp batchfile: comments and blanks
sftp batchfile: junk command
ok sftp batchfile
run test sftp-glob.sh ...
sftp glob: file glob
sftp glob: dir glob
sftp glob: quoted glob
sftp glob: escaped glob
sftp glob: escaped quote
sftp glob: quoted quote
sftp glob: single-quoted quote
sftp glob: escaped slash
sftp glob: quoted slash
sftp glob: escaped slash at EOL
sftp glob: quoted slash at EOL
sftp glob: escaped slash+quote
sftp glob: quoted slash+quote
sftp glob: escaped space
sftp glob: quoted space
ok sftp glob
run test reconfigure.sh ...
ok simple connect after reconfigure
run test dynamic-forward.sh ...
ok dynamic forwarding
run test forwarding.sh ...
ok local and remote forwarding
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
test connection multiplexing: status 0
test connection multiplexing: status 1
test connection multiplexing: status 4
test connection multiplexing: status 5
test connection multiplexing: status 44
Master running (pid=15820)
Exit request sent.
ok connection multiplexing
run test reexec.sh ...
test config passing
reexec tests: proto 1
reexec tests: proto 2
test reexec fallback
reexec tests: proto 1
reexec tests: proto 2
test reexec fallback without privsep
reexec tests: proto 1
reexec tests: proto 2
ok reexec tests
run test brokenkeys.sh ...
ok broken keys
run test cfgmatch.sh ...
ok sshd_config match
run test addrmatch.sh ...
test permit, first entry for user 192.168.0.1 somehost
test deny, negative match for user 192.168.30.1 somehost
test deny, no match for user 19.0.0.1 somehost
test permit, list middle for user 10.255.255.254 somehost
test deny, faked IP in hostname for user 192.168.30.1 192.168.0.1
test permit, bare IP4 address for user 1.1.1.1 somehost.example.com
test permit, bare IP6 address for user ::1 somehost.example.com
test deny IPv6 for user ::2 somehost.exaple.com
test deny IP6 negated for user ::3 somehost
test deny, IP6 no match for user ::4 somehost
test permit, IP6 network for user 2000::1 somehost
test deny, IP6 network for user 2001::1 somehost
ok address match
run test localcommand.sh ...
test localcommand: proto 1 localcommand
test localcommand: proto 2 localcommand
ok localcommand
run test forcecommand.sh ...
ok forced command
run test portnum.sh ...
port number parsing: invalid port 0
port number parsing: invalid port 65536
port number parsing: invalid port 131073
port number parsing: invalid port 2000blah
port number parsing: invalid port blah2000
port number parsing: valid port 1
port number parsing: valid port 22
port number parsing: valid port 2222
port number parsing: valid port 22222
port number parsing: valid port 65535
ok port number parsing
run test cert-hostkey.sh ...
certified host keys: sign host rsa cert
certified host keys: sign host dsa cert
certified host keys: host rsa cert connect privsep yes
certified host keys: host dsa cert connect privsep yes
certified host keys: host rsa cert connect privsep no
certified host keys: host dsa cert connect privsep no
certified host keys: test host cert connect user-certificate expect failure
certified host keys: test host cert connect empty principals expect success
certified host keys: test host cert connect wrong principals expect failure
certified host keys: test host cert connect cert not yet valid expect failure
certified host keys: test host cert connect cert expired expect failure
certified host keys: test host cert connect cert valid interval expect success
certified host keys: test host cert connect cert has constraints expect failure
certified host keys: host rsa cert downgrade to raw key
certified host keys: host dsa cert downgrade to raw key
ok certified host keys
run test cert-userkey.sh ...
certified user keys: sign user rsa cert
certified user keys: sign user dsa cert
certified user keys: user rsa cert connect privsep yes
certified user keys: user dsa cert connect privsep yes
certified user keys: user rsa cert connect privsep no
certified user keys: user dsa cert connect privsep no
certified user keys: ensure CA key does not authenticate user
certified user keys: test user cert connect host-certificate expect failure
certified user keys: test user cert connect empty principals expect success
certified user keys: test user cert connect wrong principals expect failure
certified user keys: test user cert connect cert not yet valid expect failure
certified user keys: test user cert connect cert expired expect failure
certified user keys: test user cert connect cert valid interval expect success
certified user keys: test user cert connect wrong source-address expect failure
certified user keys: test user cert connect force-command expect failure
ok certified user keys
make[1]: Leaving directory `/datadisk/home/sweh/ssh_testing/openssh/regress'
all tests passed

-- 

rgds
Stephen


More information about the openssh-unix-dev mailing list