Bug 2639

Summary: PuTTY interop tests broken
Product: Portable OpenSSH Reporter: Colin Watson <cjwatson>
Component: Regression testsAssignee: Darren Tucker <dtucker>
Status: CLOSED FIXED    
Severity: normal CC: anakin, dtucker
Priority: P5    
Version: 7.3p1   
Hardware: All   
OS: Linux   
Bug Depends on:    
Bug Blocks: 2594    
Attachments:
Description Flags
Fix PuTTY interop tests none

Description Colin Watson 2016-11-20 02:57:36 AEDT
Created attachment 2891 [details]
Fix PuTTY interop tests

The PuTTY interop tests require manual interaction to enter a passphrase.  Even after doing so, they fail as follows, and have done for some time:

run test putty-transfer.sh ...
Enter passphrase to save key:
Re-enter passphrase to verify:
putty transfer data: proto 2 compression 0
WARNING - POTENTIAL SECURITY BREACH!
The server's host key does not match the one PuTTY has
cached. This means that either the server administrator
has changed the host key, or you have actually connected
to another computer pretending to be the server.
The new rsa2 key fingerprint is:
ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6
Connection abandoned.
cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy
corrupted copy
[... lots of similar output ...]
failed putty transfer data
Makefile:203: recipe for target 't-exec-interop' failed

The attached patch fixes all this.
Comment 1 Darren Tucker 2016-11-22 09:34:39 AEDT
Thanks, I'll look at this for 7.4 when I get a chance.
Comment 2 Darren Tucker 2016-11-25 14:02:37 AEDT
Applied to OpenBSD, will be pulled into portable during the next sync.

Thanks.
Comment 3 Damien Miller 2018-04-06 12:26:48 AEST
Close all resolved bugs after release of OpenSSH 7.7.