Call for testing: OpenSSH 9.9

Kevin Brott kevin.brott at gmail.com
Mon Sep 16 03:51:07 AEST 2024


On 9/15/24 01:11, Damien Miller wrote:
> OpenSSH 9.9p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.

# openssh-SNAP-20240916.tar.gz
# Intel(R) Core(TM) i7-14700K
# Linux 6.8.0-44-generic
# Linux Mint 22 (wilma)
# gcc (Ubuntu 13.2.0-23ubuntu4) 13.2.0
# OpenSSL 3.0.13 30 Jan 2024 (Library: OpenSSL 3.0.13 30 Jan 2024)

Compiles (code warnings = 4), tests and runs as expected:

$ ./configure && make tests
...
OpenSSH has been configured with the following options:
                      User binaries: /usr/local/bin
                    System binaries: /usr/local/sbin
                Configuration files: /usr/local/etc
                    Askpass program: /usr/local/libexec/ssh-askpass
                       Manual pages: /usr/local/share/man/manX
                           PID file: /var/run
   Privilege separation chroot path: /var/empty
             sshd default user PATH: /usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin
                     Manpage format: doc
                        PAM support: no
                    OSF SIA support: no
                  KerberosV support: no
                    SELinux support: no
                    libedit support: no
                    libldns support: no
   Solaris process contract support: no
            Solaris project support: no
          Solaris privilege support: no
        IP address in $DISPLAY hack: no
            Translate v4 in v6 hack: yes
                   BSD Auth support: no
               Random number source: OpenSSL internal ONLY
              Privsep sandbox style: seccomp_filter
                    PKCS#11 support: yes
                   U2F/FIDO support: yes

               Host: x86_64-pc-linux-gnu
           Compiler: cc
     Compiler flags: -g -O2 -pipe -Wno-error=format-truncation -Wall -Wextra -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wsizeof-pointer-memaccess -Wno-pointer-sign -Wno-unused-parameter -Wno-unused-result -Wimplicit-fallthrough -Wmisleading-indentation -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -ftrapv -fzero-call-used-regs=used -ftrivial-auto-var-init=zero -fno-builtin-memset -fstack-protector-strong -fPIE
Preprocessor flags:  -D_XOPEN_SOURCE=600 -D_BSD_SOURCE -D_DEFAULT_SOURCE -D_GNU_SOURCE -DOPENSSL_API_COMPAT=0x10100000L
       Linker flags:  -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie
          Libraries:
      +for channels: -lcrypto  -lz
          +for sshd: -lcrypt
...
all tests passed

$ ./ssh -V
OpenSSH_9.8p1-snap20240916, OpenSSL 3.0.13 30 Jan 2024
$ ./ssh localhost uname -srvmo
Linux 6.8.0-44-generic #44-Ubuntu SMP PREEMPT_DYNAMIC Tue Aug 13 13:35:26 UTC 2024 x86_64 GNU/Linux

-- 
# include <stddisclaimer.h>
/* Kevin Brott<Kevin.Brott at GMail.com> */


More information about the openssh-unix-dev mailing list