Page MenuHomePhabricator
Feed Advanced Search

Mon, Nov 25

Jakuje closed T89: SFTP transfers handled by kio_sftp are much slower than those handled by scp as Resolved.

Thank you for testing the latest change. The throughput looks good now. Closing the issue.

Mon, Nov 25, 1:24 PM · Restricted Project

Thu, Nov 21

Jakuje added a comment to T200: Test torture_proxycommand fails on ubuntu 18.04.

Congratulation to the issue #200 :)

Thu, Nov 21, 6:29 PM · Restricted Project
Jakuje added a comment to T180: tests: "bind: address already in use".

You are probably right. I was not able to reproduce it locally even from repetitive runs in the same container image with the same code.

Thu, Nov 21, 6:15 PM · Restricted Project
Jakuje added a comment to T180: tests: "bind: address already in use".

Thanks. There are just a few nits I pointed out in the comments. The changes generally look good to me now and ready to merge (after the freeze -- see the email).

Thu, Nov 21, 4:54 PM · Restricted Project

Wed, Nov 20

Jakuje added a comment to T180: tests: "bind: address already in use".

Update: Your branch passes for me locally in container with OpenSSL now with last fix. But the commits still need some love before we can merge them. Will you have some time to touch that in coming days so we can add the ubuntu targets?

Wed, Nov 20, 4:23 PM · Restricted Project
Jakuje added a comment to T180: tests: "bind: address already in use".

@aris I added the Ubuntu CI image, where I can successfully build libssh now:

Wed, Nov 20, 4:07 PM · Restricted Project

Mon, Nov 11

Jakuje closed T197: Putty cannot negotiate when the SSH Server adds an ED25519 key as Resolved.

This should be addressed in the latest release 0.9.2. Not sure why it was not auto-closed with the commit referenced above.

Mon, Nov 11, 3:08 PM · Restricted Project

Nov 4 2019

Jakuje updated subscribers of T197: Putty cannot negotiate when the SSH Server adds an ED25519 key.

@ansasaki This looks directly related to the ed25519 support you modified to use OpenSSL. Can you check what might have gone wrong?

Nov 4 2019, 12:34 PM · Restricted Project
Jakuje added a comment to T180: tests: "bind: address already in use".

@aris your commits are missing Sign-off. I added my review. I also see many failed pkd tests in the last CI run with Fedora. Are they related to your changes?

Nov 4 2019, 12:33 PM · Restricted Project

Nov 1 2019

Jakuje added a comment to T191: Server incorrectly assumes rsa-sha2-256 when client meant standard ssh-rsa.

Sounds like an issue with the ed25519 keys then. Can you open a separate issue, since this is indeed different one than the reported above (RSA keys). Clarifying what openssl version are you using and whether it has enable support for ED25519 keys would help.

Nov 1 2019, 10:06 AM · Restricted Project

Oct 31 2019

Jakuje added a comment to T191: Server incorrectly assumes rsa-sha2-256 when client meant standard ssh-rsa.

This should be handled by the code in kex.c. It correctly sets the session->extensions bit field based on what is supported by the client in the key exchange. The problem here is that it informs only about the support of these extensions, but not about their priority and whether to prefer the SHA1 hash or the SHA2 ones. There is already attempt to detect whether the SHA256 or SHA519 was preferred, but this particular use case is not handled (what is the point in signaling that I know stronger algorithms, but prefer the SHA1?).

Oct 31 2019, 1:08 PM · Restricted Project

Oct 25 2019

Jakuje committed rLIBSSHe9e8292370ca: packet: On failure, do not use uninitialized crypto (authored by Jakuje).
packet: On failure, do not use uninitialized crypto
Oct 25 2019, 3:09 PM
Jakuje committed rLIBSSH5a0177def02d: packet_crypt: Avoid out of bounds access in debug functions (authored by Jakuje).
packet_crypt: Avoid out of bounds access in debug functions
Oct 25 2019, 3:08 PM
Jakuje committed rLIBSSH17952c495380: tests: Let shell resolve the absolute path to binaries in Exec tests (authored by Jakuje).
tests: Let shell resolve the absolute path to binaries in Exec tests
Oct 25 2019, 3:08 PM

Oct 10 2019

Jakuje added a comment to T178: Getting unexpected `remote channel is closed` after executing remote command.

Theory sounds right. Were you able to confirm this theory and fix your code to handle empty responses?

Oct 10 2019, 11:59 AM

Oct 1 2019

Jakuje committed rLIBSSH689f1b0a6b8a: callbacks: Improve documentation about callbacks handling (authored by Jakuje).
callbacks: Improve documentation about callbacks handling
Oct 1 2019, 10:29 AM
Jakuje committed rLIBSSHa22367fbe193: tests: Verify multiple match conditions can be present on a line (authored by Jakuje).
tests: Verify multiple match conditions can be present on a line
Oct 1 2019, 10:29 AM
Jakuje committed rLIBSSH46c3563da9a4: tests: Verify match exec keyword works on itself (authored by Jakuje).
tests: Verify match exec keyword works on itself
Oct 1 2019, 10:28 AM
Jakuje closed T103: ssh_set_channel_callbacks() does not create a copy of ssh_channel_callbacks_struct, while documentation implies otherwise as Resolved by committing rLIBSSH689f1b0a6b8a: callbacks: Improve documentation about callbacks handling.
Oct 1 2019, 10:28 AM · Restricted Project
Jakuje committed rLIBSSH349abe594290: config_parser: Implement more useful variant of get_token() (authored by Jakuje).
config_parser: Implement more useful variant of get_token()
Oct 1 2019, 10:28 AM
Jakuje committed rLIBSSHc7da113f1d27: tests: Verify functionality of low-level config parser functions (authored by Jakuje).
tests: Verify functionality of low-level config parser functions
Oct 1 2019, 10:28 AM
Jakuje committed rLIBSSHc983c994a2de: config: Implement match exec keyword (authored by Jakuje).
config: Implement match exec keyword
Oct 1 2019, 10:28 AM
Jakuje closed T169: Support multi-criteria Match like Match host `hostname` exec `statement` as Resolved by committing rLIBSSHc983c994a2de: config: Implement match exec keyword.
Oct 1 2019, 10:28 AM · Restricted Project

Sep 25 2019

Jakuje added a comment to T158: Use curve25519-sha256 from crypto libs if available.

I think this was addressed by https://gitlab.com/libssh/libssh-mirror/merge_requests/63 for OpenSSL.

Sep 25 2019, 4:19 PM · Restricted Project
Jakuje added a project to T174: pkd_hello fails for some host key types: Restricted Project.
Sep 25 2019, 4:09 PM · Restricted Project
Jakuje added a project to T103: ssh_set_channel_callbacks() does not create a copy of ssh_channel_callbacks_struct, while documentation implies otherwise: Restricted Project.

I think we should update the documentation so it is clear that the structure needs to be valid as long as the channel/session is valid.

Sep 25 2019, 4:00 PM · Restricted Project
Jakuje added a project to T177: Build error. Version 0.9.0 / 0.8.5: Restricted Project.
Sep 25 2019, 10:51 AM · Restricted Project

Sep 24 2019

Jakuje committed rLIBSSHaff7c500d572: buffer: Avoid use of uninitialized values (authored by Jakuje).
buffer: Avoid use of uninitialized values
Sep 24 2019, 4:50 PM
Jakuje committed rLIBSSHe72429f205bd: buffer: Simplify handling of the return codes (authored by Jakuje).
buffer: Simplify handling of the return codes
Sep 24 2019, 4:50 PM
Jakuje committed rLIBSSHaac682f60ea8: dh-gex: Correctly free modulus and generator with openssl (authored by Jakuje).
dh-gex: Correctly free modulus and generator with openssl
Sep 24 2019, 4:50 PM
Jakuje committed rLIBSSH2f05243a4a7b: channels: Correctly reports failed channels opening (authored by Jakuje).
channels: Correctly reports failed channels opening
Sep 24 2019, 4:50 PM
Jakuje closed T176: I have upgraded libssh from 0.7.6 to 0.9.0 to use diffie-hellman-group-exchange-sha256 kex algo both in client and server, but I found that memory leak , see details as Resolved by committing rLIBSSHaac682f60ea8: dh-gex: Correctly free modulus and generator with openssl.
Sep 24 2019, 4:50 PM · Restricted Project
Jakuje committed rLIBSSH89a9eb8811da: Reformat channel_open() (authored by Jakuje).
Reformat channel_open()
Sep 24 2019, 4:49 PM
Jakuje closed T75: OpenSSH : ssh_channel_new and ssh_channel_open_session blocks when we reach MaxSessions limit as Resolved by committing rLIBSSH2f05243a4a7b: channels: Correctly reports failed channels opening.
Sep 24 2019, 4:49 PM · Restricted Project
Jakuje committed rLIBSSH3cf2b41f5eaf: channels: Do not use deprecated functions in the example code (authored by Jakuje).
channels: Do not use deprecated functions in the example code
Sep 24 2019, 4:49 PM
Jakuje committed rLIBSSH223cc9623992: options: Do not attempt to expand percents in PKCS#11 URIs (authored by Jakuje).
options: Do not attempt to expand percents in PKCS#11 URIs
Sep 24 2019, 4:49 PM
Jakuje committed rLIBSSH61b1e0e7e99e: tests: Verify the localuser match works (authored by Jakuje).
tests: Verify the localuser match works
Sep 24 2019, 4:49 PM
Jakuje committed rLIBSSH6500134259c4: config: Support match localuser (authored by Jakuje).
config: Support match localuser
Sep 24 2019, 4:49 PM
Jakuje committed rLIBSSH9b8b312b88ee: config: Make the matching case sensitive as documented in ssh_config manual… (authored by Jakuje).
config: Make the matching case sensitive as documented in ssh_config manual…
Sep 24 2019, 4:49 PM
Jakuje added a comment to T177: Build error. Version 0.9.0 / 0.8.5.

The first issue was fixed in 65bc24d8 which is already in libssh 0.9 release. The second is probably fixed by 58113d48, which is also part of 0.9 release. Can you retest with 0.9?

Sep 24 2019, 1:03 PM · Restricted Project

Sep 20 2019

Jakuje added a comment to T175: Building v9.0.0 with gcc 7.4.0 fails..

Can you clarify on what platform you are experiencing these issues?

Sep 20 2019, 3:05 PM · Restricted Project
Jakuje updated subscribers of T176: I have upgraded libssh from 0.7.6 to 0.9.0 to use diffie-hellman-group-exchange-sha256 kex algo both in client and server, but I found that memory leak , see details.

Thank you for the bug report. Indeed, the handling of the modulus and generator is wrong. These bignums are copied in the ssh_dh_set_parameters() into the keypair structures (when using openssl backend), but the calling function did not free them as expected. Also the handling of errors was wrong in case of some failures checking them.

Sep 20 2019, 1:26 PM · Restricted Project

Sep 19 2019

Jakuje added a comment to T174: pkd_hello fails for some host key types.

The tests/pkd/pkd_util.c already parses the openssh version so it can be used with a bit of refactoring. Or you can adjust the tests/CMakeLists.txt to expose the already-collected versions also the pkd tests and allow these alogirhtms only on the newer openssh.

Sep 19 2019, 5:32 PM · Restricted Project

Sep 18 2019

Jakuje updated subscribers of T75: OpenSSH : ssh_channel_new and ssh_channel_open_session blocks when we reach MaxSessions limit.

Thank you for testing. Whether and where to list your perl bindings in the main page, that is more up to @asn, but I do not think it should be a problem.

Sep 18 2019, 10:43 AM · Restricted Project

Sep 17 2019

Jakuje added a comment to T75: OpenSSH : ssh_channel_new and ssh_channel_open_session blocks when we reach MaxSessions limit.

Thank you for the reproducer. I can confirm and reproduce with your attached code. This is the backtrace:

#0  0x00007f8df8576c10 in __poll_nocancel () from /lib64/libc.so.6
#1  0x00007f8df14d58c0 in ssh_poll () from /lib64/libssh.so.4
#2  0x00007f8df14d6033 in ssh_poll_ctx_dopoll () from /lib64/libssh.so.4
#3  0x00007f8df14d798c in ssh_handle_packets () from /lib64/libssh.so.4
#4  0x00007f8df14d7a93 in ssh_handle_packets_termination () from /lib64/libssh.so.4
#5  0x00007f8df14ae889 in channel_request () from /lib64/libssh.so.4
#6  0x00007f8df14afa6b in ssh_channel_request_exec () from /lib64/libssh.so.4
#7  0x00007f8df1740837 in XS_Libssh__Session_ssh_channel_request_exec ()
   from /usr/lib64/perl5/vendor_perl/auto/Libssh/Session/Session.so
#8  0x00007f8df989c41f in Perl_pp_entersub () from /usr/lib64/perl5/CORE/libperl.so
#9  0x00007f8df9894b96 in Perl_runops_standard () from /usr/lib64/perl5/CORE/libperl.so
#10 0x00007f8df9831985 in perl_run () from /usr/lib64/perl5/CORE/libperl.so
#11 0x0000000000400ce9 in main ()

In the server, log the event of failed session opening is visible here:

Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug1: channel 10: new [server-session]
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug1: session_open: channel 10
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: error: no more sessions
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug1: session open failed, free channel 10
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug1: channel 10: free: server-session, nchannels 11
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug3: channel 10: status: The following connections are open:\r\n ...
Sep 17 14:59:42 jjelen-rhel-7.3 sshd[1553]: debug1: server_input_channel_open: failure session
Sep 17 2019, 4:46 PM · Restricted Project

Sep 16 2019

Jakuje claimed T169: Support multi-criteria Match like Match host `hostname` exec `statement`.

I implemented the match exec. Can you try if it works for you as expected in your use case? There are several commits adjusting the tests and as well as I had to implement new token parsing function, but my basic tests looked good. This code also does not work on windows since I am not Windows developer, but if interested, I believe there will be somebody who could implement that.

Sep 16 2019, 6:11 PM · Restricted Project
Jakuje closed T165: 0.9.0 gcc compiler warnings deprecated-declarations as Resolved.
Sep 16 2019, 12:56 PM · Restricted Project
Jakuje closed T137: Difference between sftp_new() and sftp_init() is not clear as Resolved.
Sep 16 2019, 12:56 PM · Restricted Project
Jakuje closed T142: torture_proxycommand failing as Resolved.

The original issue should be resolved in master now.

Sep 16 2019, 12:56 PM · Restricted Project
Jakuje committed rLIBSSH4900ab6ca9a0: Skip the proxycommand test in case the netcat is not avaliable (authored by Jakuje).
Skip the proxycommand test in case the netcat is not avaliable
Sep 16 2019, 12:44 PM
Jakuje committed rLIBSSH83fa060cec0f: known_hosts: Avoid using deprecated functions (even from deprecated functions) (authored by Jakuje).
known_hosts: Avoid using deprecated functions (even from deprecated functions)
Sep 16 2019, 12:44 PM
Jakuje committed rLIBSSH618b858e49ce: sftp: Improve the documentation of sftp_init() and sftp_new() (authored by Jakuje).
sftp: Improve the documentation of sftp_init() and sftp_new()
Sep 16 2019, 12:44 PM
Jakuje added a project to T172: libssh 0.8.7 failed to build in debug mode with openssl 1.1.1c: Restricted Project.
Sep 16 2019, 9:49 AM · Restricted Project
Jakuje added a project to T175: Building v9.0.0 with gcc 7.4.0 fails.: Restricted Project.
Sep 16 2019, 9:47 AM · Restricted Project
Jakuje added a comment to T142: torture_proxycommand failing.

Aris, can you open a new bug for this, ideally with more debug information as proposed by @ansasaki?

Sep 16 2019, 9:42 AM · Restricted Project

Sep 13 2019

Jakuje added a comment to T142: torture_proxycommand failing.

Can you check the following patch if t addresses the issue for you?

Sep 13 2019, 5:41 PM · Restricted Project
Jakuje added a comment to T142: torture_proxycommand failing.

I am getting exactly the same result as the OP when I remove the /usr/bin/nc, which is used in the respective failing test so I assume that this is the issue, but the error should be more properly reported and the test probably skipped in case the netcat is not in place. I will submit a patch.

Sep 13 2019, 5:30 PM · Restricted Project
Jakuje added a comment to T142: torture_proxycommand failing.

Thank you for having a look into that. In that case, I am wondering why it did work for me and for the CI we run, but I think most of that is on Fedora, which might be a difference. Can you check whether the netcat (nc) is installed in your system?

Sep 13 2019, 5:23 PM · Restricted Project
Jakuje added a comment to T75: OpenSSH : ssh_channel_new and ssh_channel_open_session blocks when we reach MaxSessions limit.

I just tested the ssh-client from examples, which is using channel_open with sshd configured with MaxSessions 0 and it is correctly failing and not hanging for me. Can you test with current libssh master or 0.9 and provide more ellaborate reproducer?

Sep 13 2019, 2:59 PM · Restricted Project
Jakuje added a comment to T137: Difference between sftp_new() and sftp_init() is not clear.

The file doc/sftp.dox contains the following information (not sure whether it is rendered somewhere on the web):

Sep 13 2019, 2:47 PM · Restricted Project
Jakuje added a comment to T165: 0.9.0 gcc compiler warnings deprecated-declarations.

This should be addressed by using the new API even inside of the deprecated functions without the change of functionality. Can you try the following patch?

Sep 13 2019, 1:29 PM · Restricted Project
Jakuje added a comment to T170: Add HAVE_INTTYPES_H.

The modification of the libssh.h is breaking other applications (for example the applications in example directory) using this header file not defining HAVE_INTTYPES_H and HAVE_UNISTD_H themselves. Can you clarify what problem are you solving by this and on what system you do not have these header files?

Sep 13 2019, 12:46 PM · Restricted Project
Jakuje added a comment to T172: libssh 0.8.7 failed to build in debug mode with openssl 1.1.1c.

Did you try the latest libssh 0.9 [1]. Not sure what went wrong with the old version, but the windows builds are part of CI and they should work in recent version

Sep 13 2019, 12:04 PM · Restricted Project

Aug 20 2019

Jakuje added a comment to T169: Support multi-criteria Match like Match host `hostname` exec `statement`.

I think the multi-criteria matches are generally supported, but I agree that they are not tested and that should be fixed.

Aug 20 2019, 5:48 PM · Restricted Project

Aug 8 2019

Jakuje committed rLIBSSH93113ccfb989: misc: Allow %% to escape a single % in paths. (authored by Richard W.M. Jones <rjones@redhat.com>).
misc: Allow %% to escape a single % in paths.
Aug 8 2019, 10:37 AM
Jakuje committed rLIBSSH9ffaa12012b0: dh: Add ssh_dh_debug_crypto() (authored by asn).
dh: Add ssh_dh_debug_crypto()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSHae5146f7ba6b: bignum: Pass const to ssh_print_bignum() (authored by asn).
bignum: Pass const to ssh_print_bignum()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSHdd554ebb3226: pki_mbedcrypto: Add missing misc.h header file (authored by asn).
pki_mbedcrypto: Add missing misc.h header file
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSHfae61f1d0960: tests: Skip testing 1024 bits key generation in FIPS mode (authored by ansasaki).
tests: Skip testing 1024 bits key generation in FIPS mode
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH9e8e5f5cb22a: knownhosts: Use ssh_mkdirs() instead of ssh_mkdir() (authored by ansasaki).
knownhosts: Use ssh_mkdirs() instead of ssh_mkdir()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH80c1dbdb6188: misc: Introduce internal function ssh_mkdirs() (authored by ansasaki).
misc: Introduce internal function ssh_mkdirs()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH4505c076b333: misc: Introduce internal function ssh_dir_writeable() (authored by ansasaki).
misc: Introduce internal function ssh_dir_writeable()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH99dc2002b92c: libcrypto: Avoid incompatible pointers (authored by Jakuje).
libcrypto: Avoid incompatible pointers
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH878d8320c1b4: pki_container_openssh: Avoid bogus newline in debug message (authored by Jakuje).
pki_container_openssh: Avoid bogus newline in debug message
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH47945671afe1: examples: Load ED25519 key when loading all keys (authored by Jakuje).
examples: Load ED25519 key when loading all keys
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH80e729fe33d9: pki_container_openssh: Reformat whitespace (authored by Jakuje).
pki_container_openssh: Reformat whitespace
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSHb2e7ef6836be: Replace ssh_print_hexa() with ssh_log_hexdump() (authored by ansasaki).
Replace ssh_print_hexa() with ssh_log_hexdump()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSH651fea9f1408: misc: Introduce ssh_log_hexdump() (authored by ansasaki).
misc: Introduce ssh_log_hexdump()
Aug 8 2019, 9:57 AM
Jakuje committed rLIBSSHf10db964b5d5: tests: Try PEM files with leading white spaces (authored by ansasaki).
tests: Try PEM files with leading white spaces
Aug 8 2019, 9:56 AM
Jakuje committed rLIBSSH703f0a0f36f6: pki: Search OpenSSH header not only at the beginning (authored by ansasaki).
pki: Search OpenSSH header not only at the beginning
Aug 8 2019, 9:56 AM
Jakuje committed rLIBSSH4799915a3659: gitlab-ci: Turn DEBUG_CRYPTO on for standard crypto lib builds (authored by asn).
gitlab-ci: Turn DEBUG_CRYPTO on for standard crypto lib builds
Aug 8 2019, 9:34 AM
Jakuje committed rLIBSSH92d3efec8184: dh: Add ssh_dh_debug_crypto() (authored by asn).
dh: Add ssh_dh_debug_crypto()
Aug 8 2019, 9:34 AM

Aug 7 2019

Jakuje added a comment to T168: Add support for curve448-sha512.

Just for the record, the OpenSSH position to implementing this key exchange algorithm:

Aug 7 2019, 9:53 AM · Restricted Project

Aug 1 2019

Jakuje closed T157: libssh 0.9.0 issue for mingw build as Resolved.

Fixed in 2884f97bc5d3ea23e609ebd789b9c1d3e79764b3

Aug 1 2019, 3:07 PM · Restricted Project
Jakuje closed T164: 0.9.0 gcc compiler warnings incompatible-pointer-types as Resolved.
Aug 1 2019, 3:04 PM · Restricted Project

Jul 30 2019

Jakuje committed rLIBSSH3737e5f0e75f: misc: Allow %% to escape a single % in paths. (authored by Richard W.M. Jones <rjones@redhat.com>).
misc: Allow %% to escape a single % in paths.
Jul 30 2019, 5:27 PM
Jakuje committed rLIBSSHe42d44e48a91: libcrypto: Avoid incompatible pointers (authored by Jakuje).
libcrypto: Avoid incompatible pointers
Jul 30 2019, 5:27 PM
Jakuje committed rLIBSSH683096ae7eb1: pki_container_openssh: Avoid bogus newline in debug message (authored by Jakuje).
pki_container_openssh: Avoid bogus newline in debug message
Jul 30 2019, 5:27 PM
Jakuje committed rLIBSSH3811c73f8f41: pki_container_openssh: Reformat whitespace (authored by Jakuje).
pki_container_openssh: Reformat whitespace
Jul 30 2019, 5:27 PM
Jakuje committed rLIBSSHcc92e743094b: examples: Load ED25519 key when loading all keys (authored by Jakuje).
examples: Load ED25519 key when loading all keys
Jul 30 2019, 5:27 PM

Jul 25 2019

Jakuje added a comment to T164: 0.9.0 gcc compiler warnings incompatible-pointer-types.

You are probably right, Can you try with the following patch:

Jul 25 2019, 12:08 PM · Restricted Project

Jun 27 2019

Jakuje updated the task description for T156: The HostKeyAlgorithms configuration option should not override the order of the key types gathered from the know hosts file .
Jun 27 2019, 5:00 PM · Restricted Project
Jakuje created T156: The HostKeyAlgorithms configuration option should not override the order of the key types gathered from the know hosts file .
Jun 27 2019, 4:59 PM · Restricted Project

Jun 26 2019

Jakuje added a comment to T89: SFTP transfers handled by kio_sftp are much slower than those handled by scp.

The current version should have improved memory handling. Can you retest whether the speed is better now?

Jun 26 2019, 11:06 AM · Restricted Project

Jun 24 2019

Jakuje added a comment to T151: curve25519-sha256 problems under Valgrind on i386.

Thank you for the clarification and updated reproducer. I can reproduce it with the latest version installed by the package manager in Debian (0.8.7), but I can not reproduce it when I build the example against current master. I can not reproduce it even if I manually checkout the version 0.8.7 from git.

Jun 24 2019, 4:16 PM · Restricted Project
Jakuje added a comment to T155: ssh_options_parse_config() does not parse the Match 'final' keyword.

This is already available in master (e989c4afffa154d92fe8c4ae1716ecc6bb4c2fd5) and will be in 0.9. Unfortunately, this did not got updated in Fedora as we updated the default configuration file so I would propose to wait few days for the updated libssh or fill a fedora bug.

Jun 24 2019, 11:31 AM

Jun 21 2019

Jakuje committed rLIBSSH17a531d2af35: tests: Skip 1k RSA key generation in FIPS (authored by Jakuje).
tests: Skip 1k RSA key generation in FIPS
Jun 21 2019, 3:42 PM
Jakuje committed rLIBSSHa80547bdf998: pki_crypto: Correct error checking after RSA key generation (authored by Jakuje).
pki_crypto: Correct error checking after RSA key generation
Jun 21 2019, 3:42 PM
Jakuje committed rLIBSSHa4fa51454910: tests: Filter out bogus output from openssh in FIPS Mode (authored by Jakuje).
tests: Filter out bogus output from openssh in FIPS Mode
Jun 21 2019, 3:42 PM

Jun 19 2019

Jakuje committed rLIBSSHd5095a55b991: tests: Add reproducer for T76 (authored by Jakuje).
tests: Add reproducer for T76
Jun 19 2019, 6:19 PM