Bug 2639 - PuTTY interop tests broken
Summary: PuTTY interop tests broken
Status: CLOSED FIXED
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: Regression tests (show other bugs)
Version: 7.3p1
Hardware: All Linux
: P5 normal
Assignee: Darren Tucker
URL:
Keywords:
Depends on:
Blocks: V_7_4
  Show dependency treegraph
 
Reported: 2016-11-20 02:57 AEDT by Colin Watson
Modified: 2018-04-06 12:26 AEST (History)
2 users (show)

See Also:


Attachments
Fix PuTTY interop tests (4.32 KB, patch)
2016-11-20 02:57 AEDT, Colin Watson
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Colin Watson 2016-11-20 02:57:36 AEDT
Created attachment 2891 [details]
Fix PuTTY interop tests

The PuTTY interop tests require manual interaction to enter a passphrase.  Even after doing so, they fail as follows, and have done for some time:

run test putty-transfer.sh ...
Enter passphrase to save key:
Re-enter passphrase to verify:
putty transfer data: proto 2 compression 0
WARNING - POTENTIAL SECURITY BREACH!
The server's host key does not match the one PuTTY has
cached. This means that either the server administrator
has changed the host key, or you have actually connected
to another computer pretending to be the server.
The new rsa2 key fingerprint is:
ssh-rsa 2048 6d:a7:9e:cf:0c:16:a2:9e:2c:99:d9:de:cd:8c:08:c6
Connection abandoned.
cmp: EOF on /tmp/tmp.L0zo5sPJ8w/tree/regress/copy
corrupted copy
[... lots of similar output ...]
failed putty transfer data
Makefile:203: recipe for target 't-exec-interop' failed

The attached patch fixes all this.
Comment 1 Darren Tucker 2016-11-22 09:34:39 AEDT
Thanks, I'll look at this for 7.4 when I get a chance.
Comment 2 Darren Tucker 2016-11-25 14:02:37 AEDT
Applied to OpenBSD, will be pulled into portable during the next sync.

Thanks.
Comment 3 Damien Miller 2018-04-06 12:26:48 AEST
Close all resolved bugs after release of OpenSSH 7.7.