sbuild (Debian sbuild) 0.85.0 (04 January 2023) on carme.larted.org.uk +==============================================================================+ | monkeysphere 0.43-3.1 (amd64) Thu, 06 Jul 2023 17:18:10 +0000 | +==============================================================================+ Package: monkeysphere Version: 0.43-3.1 Source Version: 0.43-3.1 Distribution: sid Machine Architecture: amd64 Host Architecture: amd64 Build Architecture: amd64 Build Type: full I: NOTICE: Log filtering will replace 'var/run/schroot/mount/sid-amd64-debomatic-8ddf7695-3965-4d41-94e2-ceb708869351' with '<>' +------------------------------------------------------------------------------+ | Chroot Setup Commands | +------------------------------------------------------------------------------+ /usr/share/debomatic/sbuildcommands/chroot-setup-commands/dpkg-speedup monkeysphere_0.43-3.1 sid amd64 ------------------------------------------------------------------------------------------------------ I: Finished running '/usr/share/debomatic/sbuildcommands/chroot-setup-commands/dpkg-speedup monkeysphere_0.43-3.1 sid amd64'. Finished processing commands. -------------------------------------------------------------------------------- I: NOTICE: Log filtering will replace 'build/monkeysphere-HjLc6h/resolver-W1vN3e' with '<>' +------------------------------------------------------------------------------+ | Update chroot | +------------------------------------------------------------------------------+ Get:1 http://localhost:3142/debian unstable InRelease [199 kB] Get:2 http://localhost:3142/debian sid InRelease [199 kB] Get:3 http://localhost:3142/debian unstable/main amd64 Packages.diff/Index [63.6 kB] Get:4 http://localhost:3142/debian unstable/main amd64 Packages T-2023-07-06-1403.33-F-2023-07-06-0808.38.pdiff [20.5 kB] Get:5 http://localhost:3142/debian sid/main Sources.diff/Index [63.6 kB] Get:4 http://localhost:3142/debian unstable/main amd64 Packages T-2023-07-06-1403.33-F-2023-07-06-0808.38.pdiff [20.5 kB] Get:6 http://localhost:3142/debian sid/main Sources T-2023-07-06-1403.33-F-2023-07-06-0808.38.pdiff [39.6 kB] Get:6 http://localhost:3142/debian sid/main Sources T-2023-07-06-1403.33-F-2023-07-06-0808.38.pdiff [39.6 kB] Fetched 586 kB in 2s (290 kB/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... Calculating upgrade... 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. +------------------------------------------------------------------------------+ | Fetch source files | +------------------------------------------------------------------------------+ Local sources ------------- /srv/debomatic/incoming/monkeysphere_0.43-3.1.dsc exists in /srv/debomatic/incoming; copying to chroot I: NOTICE: Log filtering will replace 'build/monkeysphere-HjLc6h/monkeysphere-0.43' with '<>' I: NOTICE: Log filtering will replace 'build/monkeysphere-HjLc6h' with '<>' +------------------------------------------------------------------------------+ | Install package build dependencies | +------------------------------------------------------------------------------+ Setup apt archive ----------------- Merged Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17), gnupg-agent, libassuan-dev, libcrypt-openssl-rsa-perl, libdigest-sha-perl, libgcrypt20-dev, lockfile-progs | procmail, openssh-server, openssl, socat, build-essential, fakeroot Filtered Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17), gnupg-agent, libassuan-dev, libcrypt-openssl-rsa-perl, libdigest-sha-perl, libgcrypt20-dev, lockfile-progs, openssh-server, openssl, socat, build-essential, fakeroot dpkg-deb: building package 'sbuild-build-depends-main-dummy' in '/<>/apt_archive/sbuild-build-depends-main-dummy.deb'. Ign:1 copy:/<>/apt_archive ./ InRelease Get:2 copy:/<>/apt_archive ./ Release [609 B] Ign:3 copy:/<>/apt_archive ./ Release.gpg Get:4 copy:/<>/apt_archive ./ Sources [919 B] Get:5 copy:/<>/apt_archive ./ Packages [852 B] Fetched 2380 B in 0s (0 B/s) Reading package lists... Reading package lists... Install main build dependencies (apt-based resolver) ---------------------------------------------------- Installing build dependencies Reading package lists... Building dependency tree... Reading state information... The following additional packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils build-essential cpio debhelper dh-autoreconf dh-strip-nondeterminism dpkg-dev dwz fakeroot file g++ g++-12 gcc gcc-12 gettext gettext-base groff-base intltool-debian libarchive-zip-perl libasan8 libassuan-dev libbsd0 libc6-dev libcbor0.8 libcrypt-dev libcrypt-openssl-bignum-perl libcrypt-openssl-random-perl libcrypt-openssl-rsa-perl libdebhelper-perl libdpkg-perl libedit2 libelf1 libfakeroot libfido2-1 libfile-stripnondeterminism-perl libgcc-12-dev libgcrypt20-dev libgpg-error-dev libgssapi-krb5-2 libicu72 libk5crypto3 libkeyutils1 libkrb5-3 libkrb5support0 liblockfile-bin liblockfile1 libmagic-mgc libmagic1 libnsl-dev libnsl2 libpipeline1 libproc2-0 libssl3 libstdc++-12-dev libsub-override-perl libtirpc-common libtirpc-dev libtirpc3 libtool libtsan2 libubsan1 libuchardet0 libwrap0 libxml2 lockfile-progs m4 man-db openssh-client openssh-server openssh-sftp-server openssl perl-openssl-defaults po-debconf procps rpcsvc-proto runit-helper sensible-utils socat ucf Suggested packages: autoconf-archive gnu-standards autoconf-doc libarchive-dev dh-make debian-keyring g++-multilib g++-12-multilib gcc-12-doc gcc-multilib manpages-dev flex bison gdb gcc-doc gcc-12-multilib gcc-12-locales gettext-doc libasprintf-dev libgettextpo-dev groff glibc-doc git bzr libgcrypt20-doc krb5-doc krb5-user libstdc++-12-doc libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc apparmor less www-browser keychain libpam-ssh monkeysphere ssh-askpass molly-guard ufw ca-certificates libmail-box-perl Recommended packages: libalgorithm-merge-perl curl | wget | lynx libfile-fcntllock-perl liblocale-gettext-perl libarchive-cpio-perl krb5-locales libltdl-dev xauth default-logind | logind | libpam-systemd ncurses-term libmail-sendmail-perl psmisc The following NEW packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils build-essential cpio debhelper dh-autoreconf dh-strip-nondeterminism dpkg-dev dwz fakeroot file g++ g++-12 gcc gcc-12 gettext gettext-base groff-base intltool-debian libarchive-zip-perl libasan8 libassuan-dev libbsd0 libc6-dev libcbor0.8 libcrypt-dev libcrypt-openssl-bignum-perl libcrypt-openssl-random-perl libcrypt-openssl-rsa-perl libdebhelper-perl libdpkg-perl libedit2 libelf1 libfakeroot libfido2-1 libfile-stripnondeterminism-perl libgcc-12-dev libgcrypt20-dev libgpg-error-dev libgssapi-krb5-2 libicu72 libk5crypto3 libkeyutils1 libkrb5-3 libkrb5support0 liblockfile-bin liblockfile1 libmagic-mgc libmagic1 libnsl-dev libnsl2 libpipeline1 libproc2-0 libssl3 libstdc++-12-dev libsub-override-perl libtirpc-common libtirpc-dev libtirpc3 libtool libtsan2 libubsan1 libuchardet0 libwrap0 libxml2 lockfile-progs m4 man-db openssh-client openssh-server openssh-sftp-server openssl perl-openssl-defaults po-debconf procps rpcsvc-proto runit-helper sbuild-build-depends-main-dummy sensible-utils socat ucf 0 upgraded, 84 newly installed, 0 to remove and 0 not upgraded. Need to get 72.5 MB of archives. After this operation, 284 MB of additional disk space will be used. Get:1 copy:/<>/apt_archive ./ sbuild-build-depends-main-dummy 0.invalid.0 [996 B] Get:2 http://localhost:3142/debian unstable/main amd64 libbsd0 amd64 0.11.7-4 [115 kB] Get:3 http://localhost:3142/debian unstable/main amd64 libedit2 amd64 3.1-20221030-2 [93.0 kB] Get:4 http://localhost:3142/debian unstable/main amd64 libcbor0.8 amd64 0.8.0-2+b1 [27.4 kB] Get:5 http://localhost:3142/debian unstable/main amd64 libssl3 amd64 3.0.9-1 [2016 kB] Get:6 http://localhost:3142/debian unstable/main amd64 libfido2-1 amd64 1.13.0-1 [77.2 kB] Get:7 http://localhost:3142/debian unstable/main amd64 libkrb5support0 amd64 1.20.1-2 [32.3 kB] Get:8 http://localhost:3142/debian unstable/main amd64 libk5crypto3 amd64 1.20.1-2 [79.0 kB] Get:9 http://localhost:3142/debian unstable/main amd64 libkeyutils1 amd64 1.6.3-2 [8808 B] Get:10 http://localhost:3142/debian unstable/main amd64 libkrb5-3 amd64 1.20.1-2 [331 kB] Get:11 http://localhost:3142/debian unstable/main amd64 libgssapi-krb5-2 amd64 1.20.1-2 [134 kB] Get:12 http://localhost:3142/debian unstable/main amd64 openssh-client amd64 1:9.3p1-1 [990 kB] Get:13 http://localhost:3142/debian unstable/main amd64 openssh-sftp-server amd64 1:9.3p1-1 [65.4 kB] Get:14 http://localhost:3142/debian unstable/main amd64 libproc2-0 amd64 2:4.0.3-1 [63.2 kB] Get:15 http://localhost:3142/debian unstable/main amd64 procps amd64 2:4.0.3-1 [762 kB] Get:16 http://localhost:3142/debian unstable/main amd64 sensible-utils all 0.0.20 [19.3 kB] Get:17 http://localhost:3142/debian unstable/main amd64 ucf all 3.0043+nmu1 [55.2 kB] Get:18 http://localhost:3142/debian unstable/main amd64 runit-helper all 2.15.2 [6520 B] Get:19 http://localhost:3142/debian unstable/main amd64 libtirpc-common all 1.3.3+ds-1 [14.0 kB] Get:20 http://localhost:3142/debian unstable/main amd64 libtirpc3 amd64 1.3.3+ds-1 [85.2 kB] Get:21 http://localhost:3142/debian unstable/main amd64 libnsl2 amd64 1.3.0-2 [39.5 kB] Get:22 http://localhost:3142/debian unstable/main amd64 libwrap0 amd64 7.6.q-32 [54.9 kB] Get:23 http://localhost:3142/debian unstable/main amd64 openssh-server amd64 1:9.3p1-1 [456 kB] Get:24 http://localhost:3142/debian unstable/main amd64 cpio amd64 2.13+dfsg-7.1 [245 kB] Get:25 http://localhost:3142/debian unstable/main amd64 libmagic-mgc amd64 1:5.44-3 [305 kB] Get:26 http://localhost:3142/debian unstable/main amd64 libmagic1 amd64 1:5.44-3 [104 kB] Get:27 http://localhost:3142/debian unstable/main amd64 file amd64 1:5.44-3 [42.5 kB] Get:28 http://localhost:3142/debian unstable/main amd64 gettext-base amd64 0.21-12 [160 kB] Get:29 http://localhost:3142/debian unstable/main amd64 libuchardet0 amd64 0.0.7-1 [67.8 kB] Get:30 http://localhost:3142/debian unstable/main amd64 groff-base amd64 1.22.4-10 [916 kB] Get:31 http://localhost:3142/debian unstable/main amd64 liblockfile-bin amd64 1.17-1+b1 [20.8 kB] Get:32 http://localhost:3142/debian unstable/main amd64 bsdextrautils amd64 2.38.1-5+b1 [86.6 kB] Get:33 http://localhost:3142/debian unstable/main amd64 libpipeline1 amd64 1.5.7-1 [38.5 kB] Get:34 http://localhost:3142/debian unstable/main amd64 man-db amd64 2.11.2-2 [1386 kB] Get:35 http://localhost:3142/debian unstable/main amd64 m4 amd64 1.4.19-3 [287 kB] Get:36 http://localhost:3142/debian unstable/main amd64 autoconf all 2.71-3 [332 kB] Get:37 http://localhost:3142/debian unstable/main amd64 autotools-dev all 20220109.1 [51.6 kB] Get:38 http://localhost:3142/debian unstable/main amd64 automake all 1:1.16.5-1.3 [823 kB] Get:39 http://localhost:3142/debian unstable/main amd64 autopoint all 0.21-12 [495 kB] Get:40 http://localhost:3142/debian unstable/main amd64 libcrypt-dev amd64 1:4.4.35-1 [118 kB] Get:41 http://localhost:3142/debian unstable/main amd64 libtirpc-dev amd64 1.3.3+ds-1 [191 kB] Get:42 http://localhost:3142/debian unstable/main amd64 libnsl-dev amd64 1.3.0-2 [66.4 kB] Get:43 http://localhost:3142/debian unstable/main amd64 rpcsvc-proto amd64 1.4.3-1 [63.3 kB] Get:44 http://localhost:3142/debian unstable/main amd64 libc6-dev amd64 2.37-3 [1902 kB] Get:45 http://localhost:3142/debian unstable/main amd64 libasan8 amd64 13.1.0-7 [2550 kB] Get:46 http://localhost:3142/debian unstable/main amd64 libtsan2 amd64 13.1.0-7 [2326 kB] Get:47 http://localhost:3142/debian unstable/main amd64 libubsan1 amd64 13.1.0-7 [1010 kB] Get:48 http://localhost:3142/debian unstable/main amd64 libgcc-12-dev amd64 12.3.0-5 [2435 kB] Get:49 http://localhost:3142/debian unstable/main amd64 gcc-12 amd64 12.3.0-5 [19.5 MB] Get:50 http://localhost:3142/debian unstable/main amd64 gcc amd64 4:12.3.0-1 [5212 B] Get:51 http://localhost:3142/debian unstable/main amd64 libstdc++-12-dev amd64 12.3.0-5 [2067 kB] Get:52 http://localhost:3142/debian unstable/main amd64 g++-12 amd64 12.3.0-5 [10.8 MB] Get:53 http://localhost:3142/debian unstable/main amd64 g++ amd64 4:12.3.0-1 [1348 B] Get:54 http://localhost:3142/debian unstable/main amd64 libdpkg-perl all 1.21.22 [603 kB] Get:55 http://localhost:3142/debian unstable/main amd64 dpkg-dev all 1.21.22 [1353 kB] Get:56 http://localhost:3142/debian unstable/main amd64 build-essential amd64 12.10 [4516 B] Get:57 http://localhost:3142/debian unstable/main amd64 libdebhelper-perl all 13.11.4 [81.2 kB] Get:58 http://localhost:3142/debian unstable/main amd64 libtool all 2.4.7-5 [517 kB] Get:59 http://localhost:3142/debian unstable/main amd64 dh-autoreconf all 20 [17.1 kB] Get:60 http://localhost:3142/debian unstable/main amd64 libarchive-zip-perl all 1.68-1 [104 kB] Get:61 http://localhost:3142/debian unstable/main amd64 libsub-override-perl all 0.09-4 [9304 B] Get:62 http://localhost:3142/debian unstable/main amd64 libfile-stripnondeterminism-perl all 1.13.1-1 [19.4 kB] Get:63 http://localhost:3142/debian unstable/main amd64 dh-strip-nondeterminism all 1.13.1-1 [8620 B] Get:64 http://localhost:3142/debian unstable/main amd64 libelf1 amd64 0.189-4 [174 kB] Get:65 http://localhost:3142/debian unstable/main amd64 dwz amd64 0.15-1 [109 kB] Get:66 http://localhost:3142/debian unstable/main amd64 libicu72 amd64 72.1-3 [9376 kB] Get:67 http://localhost:3142/debian unstable/main amd64 libxml2 amd64 2.9.14+dfsg-1.2 [687 kB] Get:68 http://localhost:3142/debian unstable/main amd64 gettext amd64 0.21-12 [1300 kB] Get:69 http://localhost:3142/debian unstable/main amd64 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get:70 http://localhost:3142/debian unstable/main amd64 po-debconf all 1.0.21+nmu1 [248 kB] Get:71 http://localhost:3142/debian unstable/main amd64 debhelper all 13.11.4 [942 kB] Get:72 http://localhost:3142/debian unstable/main amd64 libfakeroot amd64 1.31-1.2 [28.3 kB] Get:73 http://localhost:3142/debian unstable/main amd64 fakeroot amd64 1.31-1.2 [66.9 kB] Get:74 http://localhost:3142/debian unstable/main amd64 libgpg-error-dev amd64 1.46-1 [133 kB] Get:75 http://localhost:3142/debian unstable/main amd64 libassuan-dev amd64 2.5.5-5 [107 kB] Get:76 http://localhost:3142/debian unstable/main amd64 perl-openssl-defaults amd64 7+b1 [7924 B] Get:77 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-bignum-perl amd64 0.09-2+b1 [24.0 kB] Get:78 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-random-perl amd64 0.15-3+b1 [10.6 kB] Get:79 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-rsa-perl amd64 0.33-3+b1 [24.9 kB] Get:80 http://localhost:3142/debian unstable/main amd64 libgcrypt20-dev amd64 1.10.2-2 [760 kB] Get:81 http://localhost:3142/debian unstable/main amd64 liblockfile1 amd64 1.17-1+b1 [17.0 kB] Get:82 http://localhost:3142/debian unstable/main amd64 lockfile-progs amd64 0.1.19 [10.5 kB] Get:83 http://localhost:3142/debian unstable/main amd64 openssl amd64 3.0.9-1 [1416 kB] Get:84 http://localhost:3142/debian unstable/main amd64 socat amd64 1.7.4.4-2 [375 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 72.5 MB in 0s (160 MB/s) Selecting previously unselected package libbsd0:amd64. (Reading database ... 11022 files and directories currently installed.) Preparing to unpack .../00-libbsd0_0.11.7-4_amd64.deb ... Unpacking libbsd0:amd64 (0.11.7-4) ... Selecting previously unselected package libedit2:amd64. Preparing to unpack .../01-libedit2_3.1-20221030-2_amd64.deb ... Unpacking libedit2:amd64 (3.1-20221030-2) ... Selecting previously unselected package libcbor0.8:amd64. Preparing to unpack .../02-libcbor0.8_0.8.0-2+b1_amd64.deb ... Unpacking libcbor0.8:amd64 (0.8.0-2+b1) ... Selecting previously unselected package libssl3:amd64. Preparing to unpack .../03-libssl3_3.0.9-1_amd64.deb ... Unpacking libssl3:amd64 (3.0.9-1) ... Selecting previously unselected package libfido2-1:amd64. Preparing to unpack .../04-libfido2-1_1.13.0-1_amd64.deb ... Unpacking libfido2-1:amd64 (1.13.0-1) ... Selecting previously unselected package libkrb5support0:amd64. Preparing to unpack .../05-libkrb5support0_1.20.1-2_amd64.deb ... Unpacking libkrb5support0:amd64 (1.20.1-2) ... Selecting previously unselected package libk5crypto3:amd64. Preparing to unpack .../06-libk5crypto3_1.20.1-2_amd64.deb ... Unpacking libk5crypto3:amd64 (1.20.1-2) ... Selecting previously unselected package libkeyutils1:amd64. Preparing to unpack .../07-libkeyutils1_1.6.3-2_amd64.deb ... Unpacking libkeyutils1:amd64 (1.6.3-2) ... Selecting previously unselected package libkrb5-3:amd64. Preparing to unpack .../08-libkrb5-3_1.20.1-2_amd64.deb ... Unpacking libkrb5-3:amd64 (1.20.1-2) ... Selecting previously unselected package libgssapi-krb5-2:amd64. Preparing to unpack .../09-libgssapi-krb5-2_1.20.1-2_amd64.deb ... Unpacking libgssapi-krb5-2:amd64 (1.20.1-2) ... Selecting previously unselected package openssh-client. Preparing to unpack .../10-openssh-client_1%3a9.3p1-1_amd64.deb ... Unpacking openssh-client (1:9.3p1-1) ... Selecting previously unselected package openssh-sftp-server. Preparing to unpack .../11-openssh-sftp-server_1%3a9.3p1-1_amd64.deb ... Unpacking openssh-sftp-server (1:9.3p1-1) ... Selecting previously unselected package libproc2-0:amd64. Preparing to unpack .../12-libproc2-0_2%3a4.0.3-1_amd64.deb ... Unpacking libproc2-0:amd64 (2:4.0.3-1) ... Selecting previously unselected package procps. Preparing to unpack .../13-procps_2%3a4.0.3-1_amd64.deb ... Unpacking procps (2:4.0.3-1) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../14-sensible-utils_0.0.20_all.deb ... Unpacking sensible-utils (0.0.20) ... Selecting previously unselected package ucf. Preparing to unpack .../15-ucf_3.0043+nmu1_all.deb ... Moving old data out of the way Unpacking ucf (3.0043+nmu1) ... Selecting previously unselected package runit-helper. Preparing to unpack .../16-runit-helper_2.15.2_all.deb ... Unpacking runit-helper (2.15.2) ... Selecting previously unselected package libtirpc-common. Preparing to unpack .../17-libtirpc-common_1.3.3+ds-1_all.deb ... Unpacking libtirpc-common (1.3.3+ds-1) ... Selecting previously unselected package libtirpc3:amd64. Preparing to unpack .../18-libtirpc3_1.3.3+ds-1_amd64.deb ... Unpacking libtirpc3:amd64 (1.3.3+ds-1) ... Selecting previously unselected package libnsl2:amd64. Preparing to unpack .../19-libnsl2_1.3.0-2_amd64.deb ... Unpacking libnsl2:amd64 (1.3.0-2) ... Selecting previously unselected package libwrap0:amd64. Preparing to unpack .../20-libwrap0_7.6.q-32_amd64.deb ... Unpacking libwrap0:amd64 (7.6.q-32) ... Selecting previously unselected package openssh-server. Preparing to unpack .../21-openssh-server_1%3a9.3p1-1_amd64.deb ... Unpacking openssh-server (1:9.3p1-1) ... Selecting previously unselected package cpio. Preparing to unpack .../22-cpio_2.13+dfsg-7.1_amd64.deb ... Unpacking cpio (2.13+dfsg-7.1) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../23-libmagic-mgc_1%3a5.44-3_amd64.deb ... Unpacking libmagic-mgc (1:5.44-3) ... Selecting previously unselected package libmagic1:amd64. Preparing to unpack .../24-libmagic1_1%3a5.44-3_amd64.deb ... Unpacking libmagic1:amd64 (1:5.44-3) ... Selecting previously unselected package file. Preparing to unpack .../25-file_1%3a5.44-3_amd64.deb ... Unpacking file (1:5.44-3) ... Selecting previously unselected package gettext-base. Preparing to unpack .../26-gettext-base_0.21-12_amd64.deb ... Unpacking gettext-base (0.21-12) ... Selecting previously unselected package libuchardet0:amd64. Preparing to unpack .../27-libuchardet0_0.0.7-1_amd64.deb ... Unpacking libuchardet0:amd64 (0.0.7-1) ... Selecting previously unselected package groff-base. Preparing to unpack .../28-groff-base_1.22.4-10_amd64.deb ... Unpacking groff-base (1.22.4-10) ... Selecting previously unselected package liblockfile-bin. Preparing to unpack .../29-liblockfile-bin_1.17-1+b1_amd64.deb ... Unpacking liblockfile-bin (1.17-1+b1) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../30-bsdextrautils_2.38.1-5+b1_amd64.deb ... Unpacking bsdextrautils (2.38.1-5+b1) ... Selecting previously unselected package libpipeline1:amd64. Preparing to unpack .../31-libpipeline1_1.5.7-1_amd64.deb ... Unpacking libpipeline1:amd64 (1.5.7-1) ... Selecting previously unselected package man-db. Preparing to unpack .../32-man-db_2.11.2-2_amd64.deb ... Unpacking man-db (2.11.2-2) ... Selecting previously unselected package m4. Preparing to unpack .../33-m4_1.4.19-3_amd64.deb ... Unpacking m4 (1.4.19-3) ... Selecting previously unselected package autoconf. Preparing to unpack .../34-autoconf_2.71-3_all.deb ... Unpacking autoconf (2.71-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../35-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../36-automake_1%3a1.16.5-1.3_all.deb ... Unpacking automake (1:1.16.5-1.3) ... Selecting previously unselected package autopoint. Preparing to unpack .../37-autopoint_0.21-12_all.deb ... Unpacking autopoint (0.21-12) ... Selecting previously unselected package libcrypt-dev:amd64. Preparing to unpack .../38-libcrypt-dev_1%3a4.4.35-1_amd64.deb ... Unpacking libcrypt-dev:amd64 (1:4.4.35-1) ... Selecting previously unselected package libtirpc-dev:amd64. Preparing to unpack .../39-libtirpc-dev_1.3.3+ds-1_amd64.deb ... Unpacking libtirpc-dev:amd64 (1.3.3+ds-1) ... Selecting previously unselected package libnsl-dev:amd64. Preparing to unpack .../40-libnsl-dev_1.3.0-2_amd64.deb ... Unpacking libnsl-dev:amd64 (1.3.0-2) ... Selecting previously unselected package rpcsvc-proto. Preparing to unpack .../41-rpcsvc-proto_1.4.3-1_amd64.deb ... Unpacking rpcsvc-proto (1.4.3-1) ... Selecting previously unselected package libc6-dev:amd64. Preparing to unpack .../42-libc6-dev_2.37-3_amd64.deb ... Unpacking libc6-dev:amd64 (2.37-3) ... Selecting previously unselected package libasan8:amd64. Preparing to unpack .../43-libasan8_13.1.0-7_amd64.deb ... Unpacking libasan8:amd64 (13.1.0-7) ... Selecting previously unselected package libtsan2:amd64. Preparing to unpack .../44-libtsan2_13.1.0-7_amd64.deb ... Unpacking libtsan2:amd64 (13.1.0-7) ... Selecting previously unselected package libubsan1:amd64. Preparing to unpack .../45-libubsan1_13.1.0-7_amd64.deb ... Unpacking libubsan1:amd64 (13.1.0-7) ... Selecting previously unselected package libgcc-12-dev:amd64. Preparing to unpack .../46-libgcc-12-dev_12.3.0-5_amd64.deb ... Unpacking libgcc-12-dev:amd64 (12.3.0-5) ... Selecting previously unselected package gcc-12. Preparing to unpack .../47-gcc-12_12.3.0-5_amd64.deb ... Unpacking gcc-12 (12.3.0-5) ... Selecting previously unselected package gcc. Preparing to unpack .../48-gcc_4%3a12.3.0-1_amd64.deb ... Unpacking gcc (4:12.3.0-1) ... Selecting previously unselected package libstdc++-12-dev:amd64. Preparing to unpack .../49-libstdc++-12-dev_12.3.0-5_amd64.deb ... Unpacking libstdc++-12-dev:amd64 (12.3.0-5) ... Selecting previously unselected package g++-12. Preparing to unpack .../50-g++-12_12.3.0-5_amd64.deb ... Unpacking g++-12 (12.3.0-5) ... Selecting previously unselected package g++. Preparing to unpack .../51-g++_4%3a12.3.0-1_amd64.deb ... Unpacking g++ (4:12.3.0-1) ... Selecting previously unselected package libdpkg-perl. Preparing to unpack .../52-libdpkg-perl_1.21.22_all.deb ... Unpacking libdpkg-perl (1.21.22) ... Selecting previously unselected package dpkg-dev. Preparing to unpack .../53-dpkg-dev_1.21.22_all.deb ... Unpacking dpkg-dev (1.21.22) ... Selecting previously unselected package build-essential. Preparing to unpack .../54-build-essential_12.10_amd64.deb ... Unpacking build-essential (12.10) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../55-libdebhelper-perl_13.11.4_all.deb ... Unpacking libdebhelper-perl (13.11.4) ... Selecting previously unselected package libtool. Preparing to unpack .../56-libtool_2.4.7-5_all.deb ... Unpacking libtool (2.4.7-5) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../57-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../58-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libsub-override-perl. Preparing to unpack .../59-libsub-override-perl_0.09-4_all.deb ... Unpacking libsub-override-perl (0.09-4) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../60-libfile-stripnondeterminism-perl_1.13.1-1_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.13.1-1) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../61-dh-strip-nondeterminism_1.13.1-1_all.deb ... Unpacking dh-strip-nondeterminism (1.13.1-1) ... Selecting previously unselected package libelf1:amd64. Preparing to unpack .../62-libelf1_0.189-4_amd64.deb ... Unpacking libelf1:amd64 (0.189-4) ... Selecting previously unselected package dwz. Preparing to unpack .../63-dwz_0.15-1_amd64.deb ... Unpacking dwz (0.15-1) ... Selecting previously unselected package libicu72:amd64. Preparing to unpack .../64-libicu72_72.1-3_amd64.deb ... Unpacking libicu72:amd64 (72.1-3) ... Selecting previously unselected package libxml2:amd64. Preparing to unpack .../65-libxml2_2.9.14+dfsg-1.2_amd64.deb ... Unpacking libxml2:amd64 (2.9.14+dfsg-1.2) ... Selecting previously unselected package gettext. Preparing to unpack .../66-gettext_0.21-12_amd64.deb ... Unpacking gettext (0.21-12) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../67-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../68-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../69-debhelper_13.11.4_all.deb ... Unpacking debhelper (13.11.4) ... Selecting previously unselected package libfakeroot:amd64. Preparing to unpack .../70-libfakeroot_1.31-1.2_amd64.deb ... Unpacking libfakeroot:amd64 (1.31-1.2) ... Selecting previously unselected package fakeroot. Preparing to unpack .../71-fakeroot_1.31-1.2_amd64.deb ... Unpacking fakeroot (1.31-1.2) ... Selecting previously unselected package libgpg-error-dev. Preparing to unpack .../72-libgpg-error-dev_1.46-1_amd64.deb ... Unpacking libgpg-error-dev (1.46-1) ... Selecting previously unselected package libassuan-dev. Preparing to unpack .../73-libassuan-dev_2.5.5-5_amd64.deb ... Unpacking libassuan-dev (2.5.5-5) ... Selecting previously unselected package perl-openssl-defaults:amd64. Preparing to unpack .../74-perl-openssl-defaults_7+b1_amd64.deb ... Unpacking perl-openssl-defaults:amd64 (7+b1) ... Selecting previously unselected package libcrypt-openssl-bignum-perl. Preparing to unpack .../75-libcrypt-openssl-bignum-perl_0.09-2+b1_amd64.deb ... Unpacking libcrypt-openssl-bignum-perl (0.09-2+b1) ... Selecting previously unselected package libcrypt-openssl-random-perl:amd64. Preparing to unpack .../76-libcrypt-openssl-random-perl_0.15-3+b1_amd64.deb ... Unpacking libcrypt-openssl-random-perl:amd64 (0.15-3+b1) ... Selecting previously unselected package libcrypt-openssl-rsa-perl:amd64. Preparing to unpack .../77-libcrypt-openssl-rsa-perl_0.33-3+b1_amd64.deb ... Unpacking libcrypt-openssl-rsa-perl:amd64 (0.33-3+b1) ... Selecting previously unselected package libgcrypt20-dev. Preparing to unpack .../78-libgcrypt20-dev_1.10.2-2_amd64.deb ... Unpacking libgcrypt20-dev (1.10.2-2) ... Selecting previously unselected package liblockfile1:amd64. Preparing to unpack .../79-liblockfile1_1.17-1+b1_amd64.deb ... Unpacking liblockfile1:amd64 (1.17-1+b1) ... Selecting previously unselected package lockfile-progs. Preparing to unpack .../80-lockfile-progs_0.1.19_amd64.deb ... Unpacking lockfile-progs (0.1.19) ... Selecting previously unselected package openssl. Preparing to unpack .../81-openssl_3.0.9-1_amd64.deb ... Unpacking openssl (3.0.9-1) ... Selecting previously unselected package socat. Preparing to unpack .../82-socat_1.7.4.4-2_amd64.deb ... Unpacking socat (1.7.4.4-2) ... Selecting previously unselected package sbuild-build-depends-main-dummy. Preparing to unpack .../83-sbuild-build-depends-main-dummy_0.invalid.0_amd64.deb ... Unpacking sbuild-build-depends-main-dummy (0.invalid.0) ... Setting up cpio (2.13+dfsg-7.1) ... update-alternatives: using /bin/mt-gnu to provide /bin/mt (mt) in auto mode Setting up libpipeline1:amd64 (1.5.7-1) ... Setting up runit-helper (2.15.2) ... Setting up libkeyutils1:amd64 (1.6.3-2) ... Setting up libicu72:amd64 (72.1-3) ... Setting up liblockfile-bin (1.17-1+b1) ... Setting up bsdextrautils (2.38.1-5+b1) ... Setting up libmagic-mgc (1:5.44-3) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libtirpc-common (1.3.3+ds-1) ... Setting up libcbor0.8:amd64 (0.8.0-2+b1) ... Setting up libdebhelper-perl (13.11.4) ... Setting up libssl3:amd64 (3.0.9-1) ... Setting up libmagic1:amd64 (1:5.44-3) ... Setting up perl-openssl-defaults:amd64 (7+b1) ... Setting up gettext-base (0.21-12) ... Setting up m4 (1.4.19-3) ... Setting up file (1:5.44-3) ... Setting up libfakeroot:amd64 (1.31-1.2) ... Setting up libkrb5support0:amd64 (1.20.1-2) ... Setting up fakeroot (1.31-1.2) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Setting up autotools-dev (20220109.1) ... Setting up rpcsvc-proto (1.4.3-1) ... Setting up libgpg-error-dev (1.46-1) ... Setting up libcrypt-openssl-bignum-perl (0.09-2+b1) ... Setting up libproc2-0:amd64 (2:4.0.3-1) ... Setting up autopoint (0.21-12) ... Setting up libassuan-dev (2.5.5-5) ... Setting up libk5crypto3:amd64 (1.20.1-2) ... Setting up libdpkg-perl (1.21.22) ... Setting up autoconf (2.71-3) ... Setting up libubsan1:amd64 (13.1.0-7) ... Setting up libcrypt-openssl-random-perl:amd64 (0.15-3+b1) ... Setting up sensible-utils (0.0.20) ... Setting up libcrypt-dev:amd64 (1:4.4.35-1) ... Setting up libasan8:amd64 (13.1.0-7) ... Setting up libuchardet0:amd64 (0.0.7-1) ... Setting up procps (2:4.0.3-1) ... Setting up libsub-override-perl (0.09-4) ... Setting up libkrb5-3:amd64 (1.20.1-2) ... Setting up libcrypt-openssl-rsa-perl:amd64 (0.33-3+b1) ... Setting up liblockfile1:amd64 (1.17-1+b1) ... Setting up libtsan2:amd64 (13.1.0-7) ... Setting up libfido2-1:amd64 (1.13.0-1) ... Setting up openssl (3.0.9-1) ... Setting up libbsd0:amd64 (0.11.7-4) ... Setting up libelf1:amd64 (0.189-4) ... Setting up libxml2:amd64 (2.9.14+dfsg-1.2) ... Setting up automake (1:1.16.5-1.3) ... update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.13.1-1) ... Setting up gettext (0.21-12) ... Setting up libedit2:amd64 (3.1-20221030-2) ... Setting up dpkg-dev (1.21.22) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up libgcc-12-dev:amd64 (12.3.0-5) ... Setting up lockfile-progs (0.1.19) ... Setting up libgssapi-krb5-2:amd64 (1.20.1-2) ... Setting up ucf (3.0043+nmu1) ... Setting up dh-strip-nondeterminism (1.13.1-1) ... Setting up dwz (0.15-1) ... Setting up groff-base (1.22.4-10) ... Setting up libtirpc3:amd64 (1.3.3+ds-1) ... Setting up openssh-client (1:9.3p1-1) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up man-db (2.11.2-2) ... Not building database; man-db/auto-update is not 'true'. Setting up libtirpc-dev:amd64 (1.3.3+ds-1) ... Setting up gcc-12 (12.3.0-5) ... Setting up libnsl2:amd64 (1.3.0-2) ... Setting up openssh-sftp-server (1:9.3p1-1) ... Setting up gcc (4:12.3.0-1) ... Setting up libwrap0:amd64 (7.6.q-32) ... Setting up socat (1.7.4.4-2) ... Setting up libnsl-dev:amd64 (1.3.0-2) ... Setting up libc6-dev:amd64 (2.37-3) ... Setting up openssh-server (1:9.3p1-1) ... Creating config file /etc/ssh/sshd_config with new version Creating SSH2 RSA key; this may take some time ... 3072 SHA256:aj5NP8TaEb4cO8G+Db1alB7K8oAUQ/uL9hndcQyB2as root@carme (RSA) Creating SSH2 ECDSA key; this may take some time ... 256 SHA256:mr+omItqsgVXyu5OlA0XCgd6cHTvj9r4MTki8xTV0oU root@carme (ECDSA) Creating SSH2 ED25519 key; this may take some time ... 256 SHA256:CJv2GBFKLeF/61JjSeLi/gCDidkqL+IhLOgeSV4VGzQ root@carme (ED25519) invoke-rc.d: could not determine current runlevel invoke-rc.d: WARNING: No init system and policy-rc.d missing! Defaulting to block. Setting up libstdc++-12-dev:amd64 (12.3.0-5) ... Setting up libtool (2.4.7-5) ... Setting up dh-autoreconf (20) ... Setting up libgcrypt20-dev (1.10.2-2) ... Setting up g++-12 (12.3.0-5) ... Setting up debhelper (13.11.4) ... Setting up g++ (4:12.3.0-1) ... update-alternatives: using /usr/bin/g++ to provide /usr/bin/c++ (c++) in auto mode Setting up build-essential (12.10) ... Setting up sbuild-build-depends-main-dummy (0.invalid.0) ... Processing triggers for libc-bin (2.37-3) ... +------------------------------------------------------------------------------+ | Check architectures | +------------------------------------------------------------------------------+ Arch check ok (amd64 included in any all) +------------------------------------------------------------------------------+ | Build environment | +------------------------------------------------------------------------------+ Kernel: Linux 6.1.0-3-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.8-1 (2023-01-29) amd64 (x86_64) Toolchain package versions: binutils_2.40.90.20230705-1 dpkg-dev_1.21.22 g++-12_12.3.0-5 gcc-12_12.3.0-5 libc6-dev_2.37-3 libstdc++-12-dev_12.3.0-5 libstdc++6_13.1.0-7 linux-libc-dev_6.3.11-1 Package versions: adduser_3.137 apt_2.6.1 autoconf_2.71-3 automake_1:1.16.5-1.3 autopoint_0.21-12 autotools-dev_20220109.1 base-files_13 base-passwd_3.6.1 bash_5.2.15-2+b2 binutils_2.40.90.20230705-1 binutils-common_2.40.90.20230705-1 binutils-x86-64-linux-gnu_2.40.90.20230705-1 bsdextrautils_2.38.1-5+b1 bsdutils_1:2.38.1-5+b1 build-essential_12.10 bzip2_1.0.8-5+b1 coreutils_9.1-1 cpio_2.13+dfsg-7.1 cpp_4:12.3.0-1 cpp-12_12.3.0-5 cpp-7_7.5.0-6 dash_0.5.12-6 debconf_1.5.82 debhelper_13.11.4 debian-archive-keyring_2023.3 debianutils_5.7-0.5 dh-autoreconf_20 dh-strip-nondeterminism_1.13.1-1 diffutils_1:3.8-4 dirmngr_2.2.40-1.1 dpkg_1.21.22 dpkg-dev_1.21.22 dwz_0.15-1 e2fsprogs_1.47.0-2 eatmydata_130-2 fakeroot_1.31-1.2 fdisk_2.38.1-5+b1 file_1:5.44-3 findutils_4.9.0-5 g++_4:12.3.0-1 g++-12_12.3.0-5 gcc_4:12.3.0-1 gcc-11-base_11.4.0-1 gcc-12_12.3.0-5 gcc-12-base_12.3.0-5 gcc-13-base_13.1.0-7 gcc-7-base_7.5.0-6 gcc-8-base_8.4.0-7 gettext_0.21-12 gettext-base_0.21-12 gnupg_2.2.40-1.1 gnupg-l10n_2.2.40-1.1 gnupg-utils_2.2.40-1.1 gpg_2.2.40-1.1 gpg-agent_2.2.40-1.1 gpg-wks-client_2.2.40-1.1 gpg-wks-server_2.2.40-1.1 gpgconf_2.2.40-1.1 gpgsm_2.2.40-1.1 gpgv_2.2.40-1.1 grep_3.8-5 groff-base_1.22.4-10 gzip_1.12-1 hostname_3.23+nmu1 init-system-helpers_1.65.2 intltool-debian_0.35.0+20060710.6 libacl1_2.3.1-3 libapt-pkg5.0_1.8.4 libapt-pkg6.0_2.6.1 libarchive-zip-perl_1.68-1 libasan4_7.5.0-6 libasan8_13.1.0-7 libassuan-dev_2.5.5-5 libassuan0_2.5.5-5 libatomic1_13.1.0-7 libattr1_1:2.5.1-4 libaudit-common_1:3.0.9-1 libaudit1_1:3.0.9-1 libbinutils_2.40.90.20230705-1 libblkid1_2.38.1-5+b1 libbsd0_0.11.7-4 libbz2-1.0_1.0.8-5+b1 libc-bin_2.37-3 libc-dev-bin_2.37-3 libc6_2.37-3 libc6-dev_2.37-3 libcap-ng0_0.8.3-1+b3 libcap2_1:2.66-4 libcbor0.8_0.8.0-2+b1 libcc1-0_13.1.0-7 libcilkrts5_7.5.0-6 libcom-err2_1.47.0-2 libcrypt-dev_1:4.4.35-1 libcrypt-openssl-bignum-perl_0.09-2+b1 libcrypt-openssl-random-perl_0.15-3+b1 libcrypt-openssl-rsa-perl_0.33-3+b1 libcrypt1_1:4.4.35-1 libctf-nobfd0_2.40.90.20230705-1 libctf0_2.40.90.20230705-1 libdb5.3_5.3.28+dfsg2-1 libdebconfclient0_0.270 libdebhelper-perl_13.11.4 libdpkg-perl_1.21.22 libeatmydata1_130-2+b1 libedit2_3.1-20221030-2 libelf1_0.189-4 libext2fs2_1.47.0-2 libfakeroot_1.31-1.2 libfdisk1_2.38.1-5+b1 libffi6_3.2.1-9 libffi8_3.4.4-1 libfido2-1_1.13.0-1 libfile-stripnondeterminism-perl_1.13.1-1 libgcc-12-dev_12.3.0-5 libgcc-s1_13.1.0-7 libgcrypt20_1.10.2-2 libgcrypt20-dev_1.10.2-2 libgdbm-compat4_1.23-3 libgdbm5_1.14.1-6+b1 libgdbm6_1.23-3 libgmp10_2:6.2.1+dfsg1-1.1 libgnutls30_3.7.9-2 libgomp1_13.1.0-7 libgpg-error-dev_1.46-1 libgpg-error0_1.46-1 libgprofng0_2.40.90.20230705-1 libgssapi-krb5-2_1.20.1-2 libhogweed4_3.5.1+really3.4.1-1 libhogweed6_3.8.1-2 libicu72_72.1-3 libidn2-0_2.3.3-1+b1 libisl19_0.20-2 libisl22_0.22.1-1 libisl23_0.26-3 libitm1_13.1.0-7 libjansson4_2.14-2 libk5crypto3_1.20.1-2 libkeyutils1_1.6.3-2 libkrb5-3_1.20.1-2 libkrb5support0_1.20.1-2 libksba8_1.6.4-2 libldap-2.4-2_2.4.59+dfsg-1+b1 libldap-2.5-0_2.5.13+dfsg-5 libldap-common_2.5.13+dfsg-5 liblockfile-bin_1.17-1+b1 liblockfile1_1.17-1+b1 liblsan0_13.1.0-7 liblz4-1_1.9.4-1 liblzma5_5.4.1-0.2 libmagic-mgc_1:5.44-3 libmagic1_1:5.44-3 libmd0_1.1.0-1 libmount1_2.38.1-5+b1 libmpc3_1.3.1-1 libmpfr6_4.2.0-1 libmpx2_8.4.0-7 libncursesw6_6.4+20230625-1 libnettle6_3.5.1+really3.4.1-1 libnettle8_3.8.1-2 libnpth0_1.6-3 libnsl-dev_1.3.0-2 libnsl2_1.3.0-2 libp11-kit0_0.25.0-2 libpam-modules_1.5.2-6 libpam-modules-bin_1.5.2-6 libpam-runtime_1.5.2-6 libpam0g_1.5.2-6 libpcre2-8-0_10.42-1 libpcre3_2:8.39-15 libperl5.36_5.36.0-7 libpipeline1_1.5.7-1 libproc2-0_2:4.0.3-1 libquadmath0_13.1.0-7 libreadline7_7.0-5 libreadline8_8.2-1.3 libsasl2-2_2.1.28+dfsg1-1 libsasl2-modules-db_2.1.28+dfsg1-1 libseccomp2_2.5.4-1+b3 libselinux1_3.4-1+b6 libsemanage-common_3.4-1 libsemanage1_3.1-2 libsemanage2_3.4-1+b5 libsepol1_3.1-1 libsepol2_3.4-2.1 libsframe1_2.40.90.20230705-1 libsmartcols1_2.38.1-5+b1 libsqlite3-0_3.42.0-1 libss2_1.47.0-2 libssl3_3.0.9-1 libstdc++-12-dev_12.3.0-5 libstdc++6_13.1.0-7 libsub-override-perl_0.09-4 libsystemd0_253.5-1 libtasn1-6_4.19.0-3 libtinfo6_6.4+20230625-1 libtirpc-common_1.3.3+ds-1 libtirpc-dev_1.3.3+ds-1 libtirpc3_1.3.3+ds-1 libtool_2.4.7-5 libtsan0_11.4.0-1 libtsan2_13.1.0-7 libubsan0_7.5.0-6 libubsan1_13.1.0-7 libuchardet0_0.0.7-1 libudev1_253.5-1 libunistring2_1.0-2 libuuid1_2.38.1-5+b1 libwrap0_7.6.q-32 libxml2_2.9.14+dfsg-1.2 libxxhash0_0.8.1-1 libzstd1_1.5.5+dfsg2-1 linux-libc-dev_6.3.11-1 lockfile-progs_0.1.19 login_1:4.13+dfsg1-1+b1 logsave_1.47.0-2 m4_1.4.19-3 make_4.3-4.1 man-db_2.11.2-2 mawk_1.3.4.20230525-1 mount_2.38.1-5+b1 ncurses-base_6.4+20230625-1 ncurses-bin_6.4+20230625-1 netbase_6.4 openssh-client_1:9.3p1-1 openssh-server_1:9.3p1-1 openssh-sftp-server_1:9.3p1-1 openssl_3.0.9-1 passwd_1:4.13+dfsg1-1+b1 patch_2.7.6-7 perl_5.36.0-7 perl-base_5.36.0-7 perl-modules-5.26_5.26.2-7 perl-modules-5.36_5.36.0-7 perl-openssl-defaults_7+b1 pinentry-curses_1.2.1-1 po-debconf_1.0.21+nmu1 procps_2:4.0.3-1 readline-common_8.2-1.3 rpcsvc-proto_1.4.3-1 runit-helper_2.15.2 sbuild-build-depends-main-dummy_0.invalid.0 sed_4.9-1 sensible-utils_0.0.20 socat_1.7.4.4-2 sysvinit-utils_3.07-1 tar_1.34+dfsg-1.2 tzdata_2023c-7 ucf_3.0043+nmu1 usr-is-merged_35 util-linux_2.38.1-5+b1 util-linux-extra_2.38.1-5+b1 xz-utils_5.4.1-0.2 zlib1g_1:1.2.13.dfsg-1 +------------------------------------------------------------------------------+ | Build | +------------------------------------------------------------------------------+ Unpack source ------------- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: monkeysphere Binary: monkeysphere, agent-transfer Architecture: any all Version: 0.43-3.1 Maintainer: Debian Privacy Tools Maintainers Uploaders: Antoine Beaupré , Daniel Kahn Gillmor , Jameson Rollins , Homepage: https://web.monkeysphere.info/ Standards-Version: 4.3.0 Vcs-Browser: https://salsa.debian.org/pkg-privacy-team/monkeysphere Vcs-Git: https://salsa.debian.org/pkg-privacy-team/monkeysphere.git Testsuite: autopkgtest Testsuite-Triggers: cpio, openssh-server, openssl, socat Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17) , gnupg-agent , libassuan-dev, libcrypt-openssl-rsa-perl , libdigest-sha-perl , libgcrypt20-dev, lockfile-progs | procmail , openssh-server , openssl , socat Package-List: agent-transfer deb net optional arch=any monkeysphere deb net optional arch=all Checksums-Sha1: c88734f6cafcb77463f5ad1e125780248146078a 111784 monkeysphere_0.43.orig.tar.gz bdf1068565b1e5410ee616275463e2efebc182e6 11076 monkeysphere_0.43-3.1.debian.tar.xz Checksums-Sha256: 80e12635ae7ad0c9ab8202eb65074dca67504a5438970f5aad67e172f7c527a2 111784 monkeysphere_0.43.orig.tar.gz b457224f3d03dd09dd8be3812d31a4782876ba8e27754bd63a90b0c8463dbae4 11076 monkeysphere_0.43-3.1.debian.tar.xz Files: a91cff026a5f07b3c35fb0e1da1c1d0a 111784 monkeysphere_0.43.orig.tar.gz 05b2a8d3673c0f4dd067719b431d4d95 11076 monkeysphere_0.43-3.1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEuL9UE3sJ01zwJv6dCRq4VgaaqhwFAl/wp6YACgkQCRq4Vgaa qhyhUw/7BeborSDoSZzmy/bQzU/Au1qFTPDGHPxeB5+tN5RSdXAWVskueJMDtBEa hD4k/1+xoNMA7pJ+eXErplSosSquXZlRrjvKWCInHaJUIrV2/tAeHGi3MONcovis WT8Pqqt8v6PXRqetw92GDEuN6TWjRmBuQPo+WOQX10uBclgRKA7ZZNsqbZ20qOkm qdh9m5iJKgHa9MLhfxYDcUwnXFnAbGRyE7Nf6A6iJbSxfngechbi7m7qVUY5Z1A/ jHjtMKSi8vA8UiiM9pljsdjeRT+7NhCnv1qwD6efkYapg4mx9Bd9Dg/qk+llUPXn hmZmgLY/z8MFh9r0e8DpgYR3cPxDt+hiKGmJHAeAQuB2PLpBK/yNFVLrICj4pzLp difumuWXQ6BYvH2XMu/UxSESGRLJqIuuc6BcLTF7Pqwk3vRN4yGt1NVv3zU1/B6I VYgx4wxtoiOyV5M2HI2/Klz1nJ4c5j8QRYwPO0zeZylkDWBo7n6UWucllADIL9Hv sg8GGbs46o6nOVcb5dOQAtKi0YoiauealQ5ff+2FOp1nS7js6lAGHVoQoTgddqS/ IohoTC5kMKuPujjGVTqAxdHjjApYpLZeCa9KIhcQsPGgyYpN+jVuQs/AiqNJ26XK IgjuvfRfKA4IVooopYcfvFD4QxryQSd5LmnVJt2BF+w0D1XZUW8= =seiL -----END PGP SIGNATURE----- gpgv: Signature made Sat Jan 2 17:04:38 2021 UTC gpgv: using RSA key B8BF54137B09D35CF026FE9D091AB856069AAA1C gpgv: Can't check signature: No public key dpkg-source: warning: cannot verify inline signature for ./monkeysphere_0.43-3.1.dsc: no acceptable signature found dpkg-source: info: extracting monkeysphere in /<> dpkg-source: info: unpacking monkeysphere_0.43.orig.tar.gz dpkg-source: info: unpacking monkeysphere_0.43-3.1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 0001-Expose-sshd-logs-when-ssh-test-fails.patch dpkg-source: info: applying 0002-Ensure-that-make-test-ed25519-works-when-no-tty-is-p.patch dpkg-source: info: applying 0003-Dump-remaining-jobs-during-test-cleanup.patch dpkg-source: info: applying 0004-tests-basic-ensure-functionality-with-output-of-stan.patch dpkg-source: info: applying 0005-Use-gpg-s-reworked-quick-interface-for-adding-revoki.patch dpkg-source: info: applying 0006-mh-import-key-use-ssh-add-and-gpg-agent-for-import-C.patch Check disk space ---------------- Sufficient free space for build +------------------------------------------------------------------------------+ | Starting Timed Build Commands | +------------------------------------------------------------------------------+ /usr/share/debomatic/sbuildcommands/starting-build-commands/no-network monkeysphere_0.43-3.1 sid amd64 ------------------------------------------------------------------------------------------------------ I: Finished running '/usr/share/debomatic/sbuildcommands/starting-build-commands/no-network monkeysphere_0.43-3.1 sid amd64'. Finished processing commands. -------------------------------------------------------------------------------- User Environment ---------------- APT_CONFIG=/var/lib/sbuild/apt.conf HOME=/sbuild-nonexistent LANG=C LC_ALL=C.UTF-8 LD_LIBRARY_PATH=/usr/lib/libeatmydata LD_PRELOAD=libeatmydata.so LOGNAME=debomatic PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games PWD=/<> SCHROOT_ALIAS_NAME=sid-amd64-debomatic SCHROOT_CHROOT_NAME=sid-amd64-debomatic SCHROOT_COMMAND=env SCHROOT_GID=112 SCHROOT_GROUP=sbuild SCHROOT_SESSION_ID=sid-amd64-debomatic-8ddf7695-3965-4d41-94e2-ceb708869351 SCHROOT_UID=1001 SCHROOT_USER=debomatic SHELL=/bin/sh USER=debomatic dpkg-buildpackage ----------------- Command: dpkg-buildpackage --sanitize-env -us -uc -rfakeroot -Zxz dpkg-buildpackage: info: source package monkeysphere dpkg-buildpackage: info: source version 0.43-3.1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Holger Levsen dpkg-source -Zxz --before-build . dpkg-buildpackage: info: host architecture amd64 debian/rules clean dh clean dh_auto_clean make -j4 clean make[1]: Entering directory '/<>' rm -f src/agent-transfer/agent-transfer rm -rf replaced/ # clean up old monkeysphere packages lying around as well. rm -f monkeysphere_* make[1]: Leaving directory '/<>' dh_clean dpkg-source -Zxz -b . dpkg-source: info: using source format '3.0 (quilt)' dpkg-source: info: building monkeysphere using existing ./monkeysphere_0.43.orig.tar.gz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: building monkeysphere in monkeysphere_0.43-3.1.debian.tar.xz dpkg-source: info: building monkeysphere in monkeysphere_0.43-3.1.dsc debian/rules binary dh binary dh_update_autotools_config dh_autoreconf dh_auto_configure dh_auto_build make -j4 "INSTALL=install --strip-program=true" make[1]: Entering directory '/<>' cc -o src/agent-transfer/agent-transfer -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security --pedantic -Wall -Werror -std=c99 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now src/agent-transfer/main.c -lassuan -L/usr/lib/x86_64-linux-gnu -lgpg-error -L/usr/lib/x86_64-linux-gnu -lgcrypt mkdir -p replaced/src/ mkdir -p replaced/src/ sed < src/monkeysphere > replaced/src/monkeysphere \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/ sed < src/monkeysphere-host > replaced/src/monkeysphere-host \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/share/ sed < src/monkeysphere-authentication > replaced/src/monkeysphere-authentication \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/share/defaultenv > replaced/src/share/defaultenv \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/transitions/0.23 > replaced/src/transitions/0.23 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/transitions/0.28 > replaced/src/transitions/0.28 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < src/transitions/README.txt > replaced/src/transitions/README.txt \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/agent-transfer.1 > replaced/man/man1/agent-transfer.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/monkeysphere.1 > replaced/man/man1/monkeysphere.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/openpgp2ssh.1 > replaced/man/man1/openpgp2ssh.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man7/ sed < man/man1/pem2openpgp.1 > replaced/man/man1/pem2openpgp.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man8/ sed < man/man7/monkeysphere.7 > replaced/man/man7/monkeysphere.7 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man8/ sed < man/man8/monkeysphere-authentication.8 > replaced/man/man8/monkeysphere-authentication.8 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' sed < man/man8/monkeysphere-host.8 > replaced/man/man8/monkeysphere-host.8 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' gzip -f -n replaced/man/man1/agent-transfer.1 gzip -f -n replaced/man/man1/monkeysphere.1 gzip -f -n replaced/man/man1/openpgp2ssh.1 gzip -f -n replaced/man/man1/pem2openpgp.1 gzip -f -n replaced/man/man7/monkeysphere.7 gzip -f -n replaced/man/man8/monkeysphere-authentication.8 gzip -f -n replaced/man/man8/monkeysphere-host.8 make[1]: Leaving directory '/<>' dh_auto_test make -j4 test make[1]: Entering directory '/<>' MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/keytrans MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/basic MONKEYSPHERE_TEST_NO_EXAMINE=true MONKEYSPHERE_TEST_USE_ED25519=true ./tests/basic ################################################## ### generating openpgp key... gpg: keybox '/<>/tests/tmp/ms.ZYw/pubring.kbx' created improper ownership on '/build': owner ID 107 is neither debomatic (ID 1001) nor the superuser !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! Permissions on testing directory '/<>/tests/tmp/ms.SHp' are too loose to do proper strict permissions checking. Some tests will be disabled or ignored. To avoid this warning (and to make sure that all tests are run properly), please run these tests within a directory that meets sshd's standards for "StrictModes yes" -- the directory (and every one of its parents) should be owned only be the user running this test or root, and should not be writable by group or other. !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! ################################################## ### configuring testuser home... improper ownership on '/build': owner ID 107 is neither debomatic (ID 1001) nor the superuser 2 blocks !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! Permissions on testing directory '/<>/tests/tmp/ms.9bD' are too loose to do proper strict permissions checking. Some tests will be disabled or ignored. To avoid this warning (and to make sure that all tests are run properly), please run these tests within a directory that meets sshd's standards for "StrictModes yes" -- the directory (and every one of its parents) should be owned only be the user running this test or root, and should not be writable by group or other. !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! ################################################## ### configuring testuser home... 2 blocks gpg: keybox '/<>/tests/tmp/ms.SHp/testuser/.gnupg/pubring.kbx' created gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: /<>/tests/tmp/ms.SHp/testuser/.gnupg/trustdb.gpg: trustdb created gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) " imported gpg: keybox '/<>/tests/tmp/ms.9bD/testuser/.gnupg/pubring.kbx' created gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: /<>/tests/tmp/ms.9bD/testuser/.gnupg/trustdb.gpg: trustdb created gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) " imported gpg: /<>/tests/tmp/ms.ZYw/trustdb.gpg: trustdb created gpg: directory '/<>/tests/tmp/ms.ZYw/openpgp-revocs.d' created gpg: revocation certificate stored as '/<>/tests/tmp/ms.ZYw/openpgp-revocs.d/728DD1B8A48FA6312705F48130419A628D2F4F47.rev' gpg: done ################################################## ### retrieving key timestamp... gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ################################################## ### exporting key to ssh file... ################################################## ### reconvert key, and compare to key in gpg keyring... conversions look good! Now working with key 30419A628D2F4F47 at time 1688663906 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u /<>/tests/tmp/ms.ZYw/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2023-07-06 [SC] 728DD1B8A48FA6312705F48130419A628D2F4F47 uid [ultimate] testtest ################################################## ### test User ID addition... gpg: key E00B5EEEBA79B482: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: no ultimately trusted keys found gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) " not changed gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: Total number processed: 2 gpg: imported: 1 gpg: unchanged: 1 gpg: no ultimately trusted keys found gpg: inserting ownertrust of 6 gpg: inserting ownertrust of 5 ################################################## ### configuring admin home... gpg: keybox '/<>/tests/tmp/ms.SHp/admin/.gnupg/pubring.kbx' created gpg: /<>/tests/tmp/ms.SHp/admin/.gnupg/trustdb.gpg: trustdb created gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: key 36FF78B37005D3BE: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: inserting ownertrust of 6 ################################################## ### configuring sshd... ################################################## ### import host key... gpg: key 30419A628D2F4F47: "monkeymonkey" 1 new user ID gpg: key 30419A628D2F4F47: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u /<>/tests/tmp/ms.ZYw/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2023-07-06 [SC] 728DD1B8A48FA6312705F48130419A628D2F4F47 uid [ultimate] monkeymonkey uid [ultimate] testtest ################################################## ### sleeping to avoid test suite breakage on fast ### processors (see https://bugs.debian.org/591118) gpg: key E00B5EEEBA79B482: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: no ultimately trusted keys found gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) " not changed gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: Total number processed: 2 gpg: imported: 1 gpg: unchanged: 1 gpg: no ultimately trusted keys found gpg: inserting ownertrust of 6 gpg: inserting ownertrust of 5 ################################################## ### configuring admin home... gpg: keybox '/<>/tests/tmp/ms.9bD/admin/.gnupg/pubring.kbx' created gpg: /<>/tests/tmp/ms.9bD/admin/.gnupg/trustdb.gpg: trustdb created gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: key 36FF78B37005D3BE: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: inserting ownertrust of 6 ################################################## ### configuring sshd... ################################################## ### import host key... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.SHp/ssh_host_rsa_key Your public key has been saved in /<>/tests/tmp/ms.SHp/ssh_host_rsa_key.pub The key fingerprint is: SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debomatic@carme The key's randomart image is: +---[RSA 3072]----+ | . . =*o.... | | . + .o..*. .| | . + +o..+ o . o| | + + o+ oo . B | | . o . S+ .o + .| | = . . .. o | | = o .. o + | | E o o. . . | |..o ... | +----[SHA256]-----+ using keyserver: example.org ms: lock created on '/<>/tests/tmp/ms.SHp/host/importlock'. ms: importing RSA key from file '/<>/tests/tmp/ms.SHp/ssh_host_rsa_key'... Identity added: /<>/tests/tmp/ms.SHp/ssh_host_rsa_key (debomatic@carme) ms: lock removed on '/<>/tests/tmp/ms.SHp/host/importlock'. ms: updating openpgp public key file '/<>/tests/tmp/ms.SHp/host_keys.pub.pgp'... ms: host key imported: pub rsa3072 2023-07-06 [CA] D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 uid [ unknown] ssh://testhost.example OpenPGP fingerprint: D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 ssh fingerprint: 3072 SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g . (RSA) ################################################## ### getting host key fingerprint... using keyserver: example.org ms: listing primary fingerprints from /<>/tests/tmp/ms.SHp/host_keys.pub.pgp ms: obtained the following fingerprints: D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 ms: publishing all keys ms: using keys: D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 ms: invoking show_key D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 ################################################## ### setting host key expiration... using keyserver: example.org ms: extending without prompting. ms: setting key expiration to 1. ms: executing key expire script... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.9bD/ssh_host_rsa_key Your public key has been saved in /<>/tests/tmp/ms.9bD/ssh_host_rsa_key.pub The key fingerprint is: SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debomatic@carme The key's randomart image is: +---[RSA 3072]----+ | .+..=+ ..+. | | . =+=o..=. .| | . ..=.o o+ ..| | . . . ...++.| | . . S .. *+.E| | . . o B .+o| | o = o| | ...o..| | .oo..| +----[SHA256]-----+ using keyserver: example.org ms: lock created on '/<>/tests/tmp/ms.9bD/host/importlock'. ms: importing RSA key from file '/<>/tests/tmp/ms.9bD/ssh_host_rsa_key'... Identity added: /<>/tests/tmp/ms.9bD/ssh_host_rsa_key (debomatic@carme) ms: lock removed on '/<>/tests/tmp/ms.9bD/host/importlock'. ms: updating openpgp public key file '/<>/tests/tmp/ms.9bD/host_keys.pub.pgp'... ms: host key imported: pub rsa3072 2023-07-06 [CA] 275BB82442F21DBC387B0CE1D1322ABCD56799FE uid [ unknown] ssh://testhost.example OpenPGP fingerprint: 275BB82442F21DBC387B0CE1D1322ABCD56799FE ssh fingerprint: 3072 SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 . (RSA) ################################################## ### getting host key fingerprint... using keyserver: example.org ms: listing primary fingerprints from /<>/tests/tmp/ms.9bD/host_keys.pub.pgp ms: obtained the following fingerprints: 275BB82442F21DBC387B0CE1D1322ABCD56799FE ms: publishing all keys ms: using keys: 275BB82442F21DBC387B0CE1D1322ABCD56799FE ms: invoking show_key 275BB82442F21DBC387B0CE1D1322ABCD56799FE 275BB82442F21DBC387B0CE1D1322ABCD56799FE ################################################## ### setting host key expiration... using keyserver: example.org ms: extending without prompting. ms: setting key expiration to 1. ms: executing key expire script... ms: updating openpgp public key file '/<>/tests/tmp/ms.SHp/host_keys.pub.pgp'... ms: Key D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 now expires at 2023-07-07 17:18:29 ms: NOTE: Key expiration date adjusted, but not yet published. ms: Run 'monkeysphere-host publish-key' to publish the new expiration date. ################################################## ### certifying server host key... gpg: key 97CCD67BA5C783E1: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ################################################## ### setup monkeysphere authentication... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: ms: setting up Monkeysphere authentication trust core... ms: generating monkeysphere authentication trust core key: ms: size: 3072 bits ms: uid: 'Monkeysphere authentication trust core UID (random string: Nn1Dsvbqlowh1vW02ziNsLRg5U++)' ################################################## ### test User ID revocation ... gpg: key 30419A628D2F4F47: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u /<>/tests/tmp/ms.ZYw/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2023-07-06 [SC] 728DD1B8A48FA6312705F48130419A628D2F4F47 uid [ultimate] monkeymonkey uid [ revoked] testtest ################################################## ### test working with two primary keys ... ms: updating openpgp public key file '/<>/tests/tmp/ms.9bD/host_keys.pub.pgp'... ms: Key 275BB82442F21DBC387B0CE1D1322ABCD56799FE now expires at 2023-07-07 17:18:29 ms: NOTE: Key expiration date adjusted, but not yet published. ms: Run 'monkeysphere-host publish-key' to publish the new expiration date. ################################################## ### certifying server host key... gpg: key D1322ABCD56799FE: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ################################################## ### setup monkeysphere authentication... ms: checking authentication directory structure... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.ZYw/newkey Your public key has been saved in /<>/tests/tmp/ms.ZYw/newkey.pub The key fingerprint is: SHA256:rEjUgfsE0jvrHyzd65Tpac6Ng44hSSt4sB8gMyBc9i4 debomatic@carme The key's randomart image is: +---[RSA 3072]----+ | + .. | |. + =. . | |o. ..=. | |o .= .. | |* .E.* S | |oB +o+.o o | |+ *.+ =.= | | + o.+.=o= | | . .oo+O.. | +----[SHA256]-----+ ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: ms: setting up Monkeysphere authentication trust core... ms: generating monkeysphere authentication trust core key: ms: size: 3072 bits ms: uid: 'Monkeysphere authentication trust core UID (random string: kdLtG68hPSjeWsxOn0IApXfANpvs)' gpg: key 6E70D6BFE48BB64E: public key "fubar" imported gpg: key 6E70D6BFE48BB64E: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:31 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### adding admin as certifier... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... gpg: key 30419A628D2F4F47: "monkeymonkey" 1 new user ID gpg: key 30419A628D2F4F47: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 test: diff expected gpg list output ms: # List of assigned trustvalues, created Thu Jul 6 17:18:31 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... test: diff expected keytrans listfpr output ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: reading key from stdin... ms: checking keys in file... ms: loading key into core keyring... ms: executing core ltsign script... ms: exporting core local sigs to sphere... ms: updating sphere trustdb... ms: Identity certifier added. ################################################## ### list certifiers... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:32 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: finding trusted keys... ms: determining core key fingerprint... 4275279C9512E14BDD14098A36FF78B37005D3BE: :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) :1:120: ################################################## ### generating ed25519 key for testuser... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:32 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### adding admin as certifier... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:32 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: reading key from stdin... ms: checking keys in file... ################################################## Monkeysphere keytrans test completed successfully! ################################################## ### removing temp dir... ms: loading key into core keyring... ms: executing core ltsign script... ms: exporting core local sigs to sphere... ms: updating sphere trustdb... ms: Identity certifier added. ################################################## ### list certifiers... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:32 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: finding trusted keys... ms: determining core key fingerprint... 4275279C9512E14BDD14098A36FF78B37005D3BE: :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) :1:120: ################################################## ### generating standard monkeysphere key for testuser... ms: creating password fifo... ms: Prompting for passphrase ms: Launching "/<>/tests/tmp/ms.SHp/testuser/.ssh/askpass" ms: (with prompt "Please enter your passphrase for E00B5EEEBA79B482: ") ms: Generating subkey. This may take a long time... ################################################## ### export server key to testuser... gpg: key D1322ABCD56799FE: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ################################################## ### export testuser key to server... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:33 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### update server authorized_keys file for this testuser... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:33 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:33 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### testing monkeysphere keys-for-userid ... ms: processing: ssh://testhost.example ms: key file: - ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: key line: ssh-rsa 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 ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ################################################## ### ssh connection test for success... ##### starting ssh server... ms: done. ################################################## ### export server key to testuser... gpg: key 97CCD67BA5C783E1: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ################################################## ### export testuser key to server... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:34 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### update server authorized_keys file for this testuser... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:34 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:34 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### testing monkeysphere keys-for-userid ... ms: processing: ssh://testhost.example ms: key file: - ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: key line: ssh-rsa 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 ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.Cl3xqb ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:35 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 841383.0, received 996701.6 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### testing functionality in the face of unusual gpg.conf settings... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.BL1SL5 ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:36 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1107302.5, received 1113729.6 debug1: Exit status 0 ./tests/basic: line 81: kill: (319416) - No such process ##### ssh connection test PASSED. returned: 0 ################################################## ### testing functionality in the face of unusual gpg.conf settings... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.j9EX4c ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:37 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 927296.5, received 1098474.6 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### removing testuser authorized_user_ids and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:37 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: empty or absent authorized_user_ids file. ################################################## ### ssh connection test for failure... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.oRPRO8 ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:37 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1121147.5, received 1127655.0 debug1: Exit status 0 ./tests/basic: line 81: kill: (319718) - No such process ##### ssh connection test PASSED. returned: 0 ################################################## ### removing testuser authorized_user_ids and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:38 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: empty or absent authorized_user_ids file. ################################################## ### ssh connection test for failure... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.1OYiYl ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:39 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Authentications that can continue: publickey debug1: Trying private key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity no such identity: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity: No such file or directory debug1: No more authentication methods to try. debomatic@testhost.example: Permission denied (publickey). ##### ssh connection test PASSED. returned: 255 ################################################## ### setting group writability on authorized_user_ids and updating... ms: checking authentication directory structure... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:39 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:39 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### setting other writability on authorized_user_ids and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:39 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:39 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: checking authentication directory structure... /<>/tests/../src/monkeysphere ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: processing: ssh://testhost.example ms: Monkeysphere authentication trust core already exists. ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.6RoLZ8 ms: exporting core pub key to sphere keyring... ms: primary key found: 97CCD67BA5C783E1 ms: setting ultimate owner trust on core key in gpg_sphere... ms: * acceptable primary key. ms: removing matching key lines... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:39 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDl0HZ5M9lt7fxZhW5/MeS5jv3JM0/ptdpYqyMqUi8ywhb090h+iZ3KIbV/sJUOrw/A6QX1QsGjyUs96x/8riz3Ir75UwlyG6J3MBB1bSSLL2IiisjaycZ1iHovuXncJKnPjZXX7ZciAIOAFUJ2yqfOzsGL8YV3mbr6IU8szWTQHkBX5yOnHnVZFTw7vOgTK+OL7lpx3gl4fZMlVHRSzLDUksnYioaGzZU6rfjfM5YAiBObc5Dnrmn9UTyu75lB0mILsLlT8nIj1s5ngYmm6+B5HE+2BUN6hQMqfWIjKcMtg0dL3BepZfdzRjPpRP3OUd3v9GmGQhGpdNMrL+HSqZvmBjVGHAiPF8T2I2iMT3k7xIHyCXyBmieQCx3/WaebGFWow7UE+u4piQY5ylSYzZrdtIKsJ03HsZu+Fw+KipAql2jdl6TR51lQl64LJ7jj7rTS704lNx7DEBmunhQcaCxxbI4HRD8+JJyfSdcny5O+hG1pt0uZD4AvyhKfgDdPVlE= MonkeySphere2023-07-06T17:18:39 ms: adding key line to file... ms: checking trust model for authentication ... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: sphere trust model: 1:3:1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: ----- user: debomatic ----- ms: known_hosts file updated. ms: checking for authorized_user_ids... ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: processing authorized_user_ids... debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:39 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### setup for symlink tests... ################################################## ### make authorized_user_ids an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:40 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: checking trust model for authentication ... debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent ms: sphere trust model: 1:3:1 debug1: Authentications that can continue: publickey debug1: Trying private key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity no such identity: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity: No such file or directory debug1: No more authentication methods to try. debomatic@testhost.example: Permission denied (publickey). ms: ----- user: debomatic ----- ##### ssh connection test PASSED. returned: 255 ################################################## ### setting group writability on authorized_user_ids and updating... ms: checking for authorized_user_ids... ms: checking authentication directory structure... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: writing core gpg.conf... ms: key file: - ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: primary key found: E00B5EEEBA79B482 ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: - unacceptable primary key. ms: setting ultimate owner trust on core key in gpg_sphere... ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: # List of assigned trustvalues, created Thu Jul 6 17:18:40 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ms: checking gpg_sphere owner trust set properly... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### setting other writability on authorized_user_ids and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:40 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:40 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### setup for symlink tests... ################################################## ### make authorized_user_ids an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:40 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.555zcI ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:41 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 790495.2, received 936420.0 debug1: Exit status 0 ./tests/basic: line 81: kill: (321334) - No such process ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:42 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:41 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make authorized_user_ids a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:42 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ################################################## ### ssh connection test for success... ##### starting ssh server... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.LeMLXU ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDl0HZ5M9lt7fxZhW5/MeS5jv3JM0/ptdpYqyMqUi8ywhb090h+iZ3KIbV/sJUOrw/A6QX1QsGjyUs96x/8riz3Ir75UwlyG6J3MBB1bSSLL2IiisjaycZ1iHovuXncJKnPjZXX7ZciAIOAFUJ2yqfOzsGL8YV3mbr6IU8szWTQHkBX5yOnHnVZFTw7vOgTK+OL7lpx3gl4fZMlVHRSzLDUksnYioaGzZU6rfjfM5YAiBObc5Dnrmn9UTyu75lB0mILsLlT8nIj1s5ngYmm6+B5HE+2BUN6hQMqfWIjKcMtg0dL3BepZfdzRjPpRP3OUd3v9GmGQhGpdNMrL+HSqZvmBjVGHAiPF8T2I2iMT3k7xIHyCXyBmieQCx3/WaebGFWow7UE+u4piQY5ylSYzZrdtIKsJ03HsZu+Fw+KipAql2jdl6TR51lQl64LJ7jj7rTS704lNx7DEBmunhQcaCxxbI4HRD8+JJyfSdcny5O+hG1pt0uZD4AvyhKfgDdPVlE= MonkeySphere2023-07-06T17:18:42 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1164896.9, received 1171658.4 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:42 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDDiXKUKLBTa64A6TMa23exERYXs1adyqtOp7hYCJKl0atM/5czIAMEIdSnh0vW8DnDz4HI8Hhz3g94XcMTFMSXz0RiLHF0HOLbuuXfZqnaqSQ7DLXmYE6ZXxhnOpj84jmoS30HPlT7UBzrJLkyjCw5STTVnLAirBJRx4MRCEqVsQAbbLd0ijSp8wn5+Q5o9oQvYSH2uJazJEQQV2rFFe+9pAe7tCvp2uvysL8kZqdIb8OFTUPYRq4gjD1CUOPxljuPq2DMswGCIuAKqHf4UKEb35xMkVQOKRsMUxOywRvnjc38Er4lg9q9dxtnixeLEQYjHNNAPoOZxLE2qiH3xvr/FdhKiTlhbYqsqK5D33ElajUNj3MMebwe2q5ds8d9UOGblUL3KGL1BLRKyY6BmrdNiw5Gzj9iuvPPMv8SWnTnM1Imu6AgNXNDWKT//t7elDOl0kS/bt7vdFmsOLpzbhDSKqWZpi5KdsZx0+gEg0crqB0RxUgLhp/AsbXxcubRlxk= MonkeySphere2023-07-06T17:18:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make authorized_user_ids a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:42 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDDiXKUKLBTa64A6TMa23exERYXs1adyqtOp7hYCJKl0atM/5czIAMEIdSnh0vW8DnDz4HI8Hhz3g94XcMTFMSXz0RiLHF0HOLbuuXfZqnaqSQ7DLXmYE6ZXxhnOpj84jmoS30HPlT7UBzrJLkyjCw5STTVnLAirBJRx4MRCEqVsQAbbLd0ijSp8wn5+Q5o9oQvYSH2uJazJEQQV2rFFe+9pAe7tCvp2uvysL8kZqdIb8OFTUPYRq4gjD1CUOPxljuPq2DMswGCIuAKqHf4UKEb35xMkVQOKRsMUxOywRvnjc38Er4lg9q9dxtnixeLEQYjHNNAPoOZxLE2qiH3xvr/FdhKiTlhbYqsqK5D33ElajUNj3MMebwe2q5ds8d9UOGblUL3KGL1BLRKyY6BmrdNiw5Gzj9iuvPPMv8SWnTnM1Imu6AgNXNDWKT//t7elDOl0kS/bt7vdFmsOLpzbhDSKqWZpi5KdsZx0+gEg0crqB0RxUgLhp/AsbXxcubRlxk= MonkeySphere2023-07-06T17:18:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.1O6oCD ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:43 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 801018.6, received 948886.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:44 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:44 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:44 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:44 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ################################################## ### ssh connection test for success... ##### starting ssh server... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.rTBFlh ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:44 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 295739.7, received 297456.3 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:45 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:45 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:45 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:45 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.h0PVPj ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:46 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 804075.1, received 952506.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:46 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:46 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:46 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:46 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.BRW2AC ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:46 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 860166.9, received 865159.6 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: fixing sphere gnupg home ownership... /<>/tests/../src/monkeysphere ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: setting ultimate owner trust on core key in gpg_sphere... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.wqle0Y ms: # List of assigned trustvalues, created Thu Jul 6 17:18:47 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: primary key found: D1322ABCD56799FE ms: checking trust model for authentication ... ms: * acceptable primary key. ms: sphere trust model: 1:3:1 ms: removing matching key lines... ms: ----- user: debomatic ----- ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:47 ms: adding key line to file... ms: checking for authorized_user_ids... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing authorized_user_ids... ms: known_hosts file updated. ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: key file: - debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:47 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:47 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 1142517.0, received 1353424.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: primary key found: E00B5EEEBA79B482 ms: checking authentication directory structure... ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:47 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: writing core gpg.conf... ms: KEYS_VALID=1 ms: writing sphere gpg.conf... ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:47 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:47 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:47 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:47 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.rCcTem ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:49 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: Sending command: true debug1: pledge: fork debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1301378.4, received 1308932.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 /<>/tests/../src/monkeysphere ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: writing core gpg.conf... ms: processing: ssh://testhost.example ms: writing sphere gpg.conf... ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.gHWPw8 ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: primary key found: D1322ABCD56799FE ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: * acceptable primary key. ms: setting ultimate owner trust on core key in gpg_sphere... ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:49 ms: # List of assigned trustvalues, created Thu Jul 6 17:18:49 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: adding key line to file... ms: checking gpg_sphere owner trust set properly... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: checking trust model for authentication ... ms: known_hosts file updated. ms: sphere trust model: 1:3:1 ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:49 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ms: # List of assigned trustvalues, created Thu Jul 6 17:18:49 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc ms: checking trust model for authentication ... debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 906346.0, received 1073656.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### checking ssh authorized_key option support... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking authentication directory structure... ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: writing core gpg.conf... ms: key file: - ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: primary key found: E00B5EEEBA79B482 ms: determining core key fingerprint... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: - unacceptable primary key. ms: setting ultimate owner trust on core key in gpg_sphere... ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:49 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: # List of assigned trustvalues, created Thu Jul 6 17:18:49 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ##### starting ssh server... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:49 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.ZKwQr3 ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: removing matching key lines... /<>/tests/../src/monkeysphere ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:51 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.3tIx7I ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:51 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1319621.4, received 1327280.9 debug1: Exit status 0 ./tests/basic: line 81: kill: (325977) - No such process ##### ssh connection test PASSED. returned: 0 ################################################## ### checking ssh authorized_key option support... ms: checking authentication directory structure... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: writing core gpg.conf... debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4444 bytes, in 0.0 seconds Bytes per second: sent 763795.2, received 895122.9 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ##### starting ssh server... ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:51 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDDiXKUKLBTa64A6TMa23exERYXs1adyqtOp7hYCJKl0atM/5czIAMEIdSnh0vW8DnDz4HI8Hhz3g94XcMTFMSXz0RiLHF0HOLbuuXfZqnaqSQ7DLXmYE6ZXxhnOpj84jmoS30HPlT7UBzrJLkyjCw5STTVnLAirBJRx4MRCEqVsQAbbLd0ijSp8wn5+Q5o9oQvYSH2uJazJEQQV2rFFe+9pAe7tCvp2uvysL8kZqdIb8OFTUPYRq4gjD1CUOPxljuPq2DMswGCIuAKqHf4UKEb35xMkVQOKRsMUxOywRvnjc38Er4lg9q9dxtnixeLEQYjHNNAPoOZxLE2qiH3xvr/FdhKiTlhbYqsqK5D33ElajUNj3MMebwe2q5ds8d9UOGblUL3KGL1BLRKyY6BmrdNiw5Gzj9iuvPPMv8SWnTnM1Imu6AgNXNDWKT//t7elDOl0kS/bt7vdFmsOLpzbhDSKqWZpi5KdsZx0+gEg0crqB0RxUgLhp/AsbXxcubRlxk= MonkeySphere2023-07-06T17:18:51 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.V2FgkW /<>/tests/../src/monkeysphere ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: removing matching key lines... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:52 ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.AY6trU ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: primary key found: 97CCD67BA5C783E1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:52 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: expecting SSH2_MSG_KEX_ECDH_REPLY Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/false debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3800, received 4444 bytes, in 0.0 seconds Bytes per second: sent 777786.9, received 909601.4 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ################################################## ### making sure we are back to normal... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: determining core key fingerprint... debug1: Authentications that can continue: publickey ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory ms: # List of assigned trustvalues, created Thu Jul 6 17:18:53 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4804 bytes, in 0.0 seconds Bytes per second: sent 952923.9, received 948973.2 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ##### starting ssh server... ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:18:53 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.PpeZRO ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:54 ms: adding key line to file... /<>/tests/../src/monkeysphere ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.Vcntew ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:18:54 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: expecting SSH2_MSG_KEX_ECDH_REPLY Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/false debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4832, received 4804 bytes, in 0.0 seconds Bytes per second: sent 998477.5, received 992691.6 debug1: Exit status 1 ./tests/basic: line 81: kill: (326920) - No such process ##### ssh connection test PASSED. returned: 1 ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ms: exporting core pub key to sphere keyring... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc ms: setting ultimate owner trust on core key in gpg_sphere... debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 961183.5, received 1138617.1 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' without new name... ##### starting ssh server... ms: # List of assigned trustvalues, created Thu Jul 6 17:18:55 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2023-07-06T17:18:54 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.ycRiRc ms: no primary keys found. ms: KEYS_PROCESSED=0 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.OyjrD9 ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:56 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### add servicename, certify by admin, import by user... using keyserver: example.org debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 ms: adding service name without prompting. gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.9bD/host_keys.pub.pgp'... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] 275BB82442F21DBC387B0CE1D1322ABCD56799FE uid [ unknown] ssh://testhost2.example uid [ unknown] ssh://testhost.example Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 980402.0, received 986092.6 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' without new name... ##### starting ssh server... OpenPGP fingerprint: 275BB82442F21DBC387B0CE1D1322ABCD56799FE ssh fingerprint: 3072 SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 . (RSA) NOTE: Service name added to key, but key not published. Run 'monkeysphere-host publish-key' to publish the new service name. gpg: key D1322ABCD56799FE: "ssh://testhost2.example" 1 new user ID gpg: key D1322ABCD56799FE: "ssh://testhost2.example" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ################################################## ### ssh connection test with hostname 'testhost2.example' added... gpg: key D1322ABCD56799FE: "ssh://testhost2.example" 1 new user ID gpg: key D1322ABCD56799FE: "ssh://testhost2.example" 2 new signatures gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 2 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.lLeCW4 ms: no primary keys found. ms: KEYS_PROCESSED=0 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent /<>/tests/../src/monkeysphere debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.awS0Fm ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:18:58 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### add servicename, certify by admin, import by user... using keyserver: example.org ms: adding service name without prompting. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.SHp/host_keys.pub.pgp'... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 uid [ unknown] ssh://testhost2.example uid [ unknown] ssh://testhost.example debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received OpenPGP fingerprint: D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ssh fingerprint: 3072 SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g . (RSA) NOTE: Service name added to key, but key not published. Run 'monkeysphere-host publish-key' to publish the new service name. gpg: key 97CCD67BA5C783E1: "ssh://testhost2.example" 1 new user ID Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc gpg: key 97CCD67BA5C783E1: "ssh://testhost2.example" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 1141976.1, received 1352783.9 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' ... gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 gpg: key D1322ABCD56799FE: "ssh://testhost2.example" not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ################################################## ### ssh connection test with hostname 'testhost2.example' added... ##### starting ssh server... gpg: key 97CCD67BA5C783E1: "ssh://testhost2.example" 1 new user ID gpg: key 97CCD67BA5C783E1: "ssh://testhost2.example" 2 new signatures gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 2 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.Ln1qLi ms: primary key found: D1322ABCD56799FE ms: * acceptable primary key. ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2023-07-06T17:19:00 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. /<>/tests/../src/monkeysphere debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.geCkWx ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2023-07-06T17:19:00 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost2.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:2 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent Authenticated to testhost2.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 Could not chdir to home directory /home/debomatic: No such file or directory debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 1231301.7, received 1458598.9 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test for failure with 'testhost2.example' revoked... using keyserver: example.org debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 ms: revoking service name without prompting. gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.9bD/host_keys.pub.pgp'... debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] 275BB82442F21DBC387B0CE1D1322ABCD56799FE uid [ unknown] ssh://testhost.example uid [ revoked] ssh://testhost2.example OpenPGP fingerprint: 275BB82442F21DBC387B0CE1D1322ABCD56799FE Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1306090.6, received 1313671.5 debug1: Exit status 0 ssh fingerprint: 3072 SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 . (RSA) ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' ... gpg: key 97CCD67BA5C783E1: "ssh://testhost2.example" not changed gpg: Total number processed: 1 gpg: unchanged: 1 NOTE: Service name revoked, but revocation not published. Run 'monkeysphere-host publish-key' to publish the revocation. gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. gpg: key D1322ABCD56799FE: "ssh://testhost.example" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.u8Lty6 ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2023-07-06T17:19:00 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost2.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:2 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost2.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1057253.6, received 1063390.2 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test for failure with 'testhost2.example' revoked... using keyserver: example.org ms: revoking service name without prompting. gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.SHp/host_keys.pub.pgp'... pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 uid [ unknown] ssh://testhost.example uid [ revoked] ssh://testhost2.example OpenPGP fingerprint: D77FB5E54E0BCD2739FA5D7597CCD67BA5C783E1 ssh fingerprint: 3072 SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g . (RSA) NOTE: Service name revoked, but revocation not published. Run 'monkeysphere-host publish-key' to publish the revocation. gpg: key 97CCD67BA5C783E1: "ssh://testhost.example" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-07-07 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.pnIhsh ms: primary key found: 97CCD67BA5C783E1 ms: - unacceptable user ID validity (r). ms: - unacceptable primary key. ms: removing matching key lines... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: output ssh marginal ui... -------------------- Monkeysphere warning ------------------- Monkeysphere found OpenPGP keys for this hostname, but none had full validity. Could not retrieve RSA host key from testhost2.example. The following keys were found with marginal validity: gpg: 2 good signatures Other user IDs on this key: uid [ full ] ssh://testhost.example pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] RSA key fingerprint is SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g. Run the following command for more info about the found keys: gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example -------------------- ssh continues below -------------------- debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.5t7l39 ms: primary key found: D1322ABCD56799FE ms: - unacceptable user ID validity (r). ms: - unacceptable primary key. ms: removing matching key lines... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: output ssh marginal ui... -------------------- Monkeysphere warning ------------------- Monkeysphere found OpenPGP keys for this hostname, but none had full validity. Could not retrieve RSA host key from testhost2.example. The following keys were found with marginal validity: debug1: expecting SSH2_MSG_KEX_ECDH_REPLY gpg: 2 good signatures debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### testing monkeysphere authentication keys-for-user Other user IDs on this key: uid [ full ] ssh://testhost.example pub rsa3072 2023-07-06 [CA] [expires: 2023-07-07] RSA key fingerprint is SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4. ms: checking authentication directory structure... Run the following command for more info about the found keys: gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example -------------------- ssh continues below -------------------- debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:19:02 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### testing monkeysphere authentication keys-for-user ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: checking authentication directory structure... ms: - unacceptable primary key. ms: writing core gpg.conf... ms: * acceptable sub key. ms: writing sphere gpg.conf... ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDDiXKUKLBTa64A6TMa23exERYXs1adyqtOp7hYCJKl0atM/5czIAMEIdSnh0vW8DnDz4HI8Hhz3g94XcMTFMSXz0RiLHF0HOLbuuXfZqnaqSQ7DLXmYE6ZXxhnOpj84jmoS30HPlT7UBzrJLkyjCw5STTVnLAirBJRx4MRCEqVsQAbbLd0ijSp8wn5+Q5o9oQvYSH2uJazJEQQV2rFFe+9pAe7tCvp2uvysL8kZqdIb8OFTUPYRq4gjD1CUOPxljuPq2DMswGCIuAKqHf4UKEb35xMkVQOKRsMUxOywRvnjc38Er4lg9q9dxtnixeLEQYjHNNAPoOZxLE2qiH3xvr/FdhKiTlhbYqsqK5D33ElajUNj3MMebwe2q5ds8d9UOGblUL3KGL1BLRKyY6BmrdNiw5Gzj9iuvPPMv8SWnTnM1Imu6AgNXNDWKT//t7elDOl0kS/bt7vdFmsOLpzbhDSKqWZpi5KdsZx0+gEg0crqB0RxUgLhp/AsbXxcubRlxk= MonkeySphere2023-07-06T17:19:02 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: fixing sphere gnupg home ownership... ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: determining core key fingerprint... ms: outputting keys to stdout... ################################################## ### settings reset, updating... ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: checking authentication directory structure... ms: # List of assigned trustvalues, created Thu Jul 6 17:19:02 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: checking trust model for authentication ... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: sphere trust model: 1:3:1 ms: core fingerprint: D5487DF5380073E02C32166577E7255D206721DF ms: Monkeysphere authentication trust core already exists. ms: ----- user: debomatic ----- ms: exporting core pub key to sphere keyring... ms: checking for authorized_user_ids... ms: setting ultimate owner trust on core key in gpg_sphere... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: # List of assigned trustvalues, created Thu Jul 6 17:19:02 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: D5487DF5380073E02C32166577E7255D206721DF:6: ms: checking gpg_sphere owner trust set properly... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: checking trust model for authentication ... ms: primary key found: E00B5EEEBA79B482 ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: - unacceptable primary key. ms: * acceptable sub key. ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:19:02 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: processing authorized_user_ids... ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: outputting keys to stdout... ################################################## ### settings reset, updating... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: checking authentication directory structure... ms: - unacceptable primary key. ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: * acceptable sub key. ms: fixing sphere gnupg home ownership... ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDDiXKUKLBTa64A6TMa23exERYXs1adyqtOp7hYCJKl0atM/5czIAMEIdSnh0vW8DnDz4HI8Hhz3g94XcMTFMSXz0RiLHF0HOLbuuXfZqnaqSQ7DLXmYE6ZXxhnOpj84jmoS30HPlT7UBzrJLkyjCw5STTVnLAirBJRx4MRCEqVsQAbbLd0ijSp8wn5+Q5o9oQvYSH2uJazJEQQV2rFFe+9pAe7tCvp2uvysL8kZqdIb8OFTUPYRq4gjD1CUOPxljuPq2DMswGCIuAKqHf4UKEb35xMkVQOKRsMUxOywRvnjc38Er4lg9q9dxtnixeLEQYjHNNAPoOZxLE2qiH3xvr/FdhKiTlhbYqsqK5D33ElajUNj3MMebwe2q5ds8d9UOGblUL3KGL1BLRKyY6BmrdNiw5Gzj9iuvPPMv8SWnTnM1Imu6AgNXNDWKT//t7elDOl0kS/bt7vdFmsOLpzbhDSKqWZpi5KdsZx0+gEg0crqB0RxUgLhp/AsbXxcubRlxk= MonkeySphere2023-07-06T17:19:02 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: determining core key fingerprint... ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: core fingerprint: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C ms: moving new file to /<>/tests/tmp/ms.SHp/authorized_keys/debomatic... ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Thu Jul 6 17:19:02 2023 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 6D77C507BC64FB031ED130CA0FF0E0F6125A8A9C:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDaSZ8JqThkRahZ98c7Xx5+WCR6mUOvoeMCC1qbGA07N MonkeySphere2023-07-06T17:19:02 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.9bD/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.SHp/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.SHp/ssh-socket debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts.monkeysphere.KpHwWp ms: primary key found: 97CCD67BA5C783E1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDl0HZ5M9lt7fxZhW5/MeS5jv3JM0/ptdpYqyMqUi8ywhb090h+iZ3KIbV/sJUOrw/A6QX1QsGjyUs96x/8riz3Ir75UwlyG6J3MBB1bSSLL2IiisjaycZ1iHovuXncJKnPjZXX7ZciAIOAFUJ2yqfOzsGL8YV3mbr6IU8szWTQHkBX5yOnHnVZFTw7vOgTK+OL7lpx3gl4fZMlVHRSzLDUksnYioaGzZU6rfjfM5YAiBObc5Dnrmn9UTyu75lB0mILsLlT8nIj1s5ngYmm6+B5HE+2BUN6hQMqfWIjKcMtg0dL3BepZfdzRjPpRP3OUd3v9GmGQhGpdNMrL+HSqZvmBjVGHAiPF8T2I2iMT3k7xIHyCXyBmieQCx3/WaebGFWow7UE+u4piQY5ylSYzZrdtIKsJ03HsZu+Fw+KipAql2jdl6TR51lQl64LJ7jj7rTS704lNx7DEBmunhQcaCxxbI4HRD8+JJyfSdcny5O+hG1pt0uZD4AvyhKfgDdPVlE= MonkeySphere2023-07-06T17:19:04 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Executing proxy command: exec /<>/tests/tmp/ms.9bD/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.9bD/ssh-socket debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.3p1 Debian-1 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: key file: /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts.monkeysphere.2OotlJ ms: primary key found: D1322ABCD56799FE debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:SNcFD+gnVLT5nhN0p9lYAQLrrYPaBnCFptSLvjSme2g debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.SHp/testuser/.ssh/known_hosts:1 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0wJT6X5EypaUzD3TzypToSYmmMOLA0t5peT24sXL8EShfgs1COuxYU2cCVXtV2acBKtN7Ygic0ZRHuC44X0y68Gn/DnFf1fwnHaHjCTdvjeYPU5q5Dw8kYd1rpISficauQMJoiVHKBMODLjaqHZWrqzAHxmAUXLvt6Zna5I3Xn0GAJOUzYaKtv2AJZGA1vqp2ounc926KY7zg/Pvk0G+FWYrH4O0GaE4UIC6Uazoj7IcFxPzj3nAplOTo83vkBw9Kcl4qPvXcr6gM0Zl/6227FO61MCKxebn+crcE4K3dH/QynKomV1rtw8OaoO5oY9RF+dVAG8mUCsNd5JfMjMVvF3El9E7Lx4X2HhhE2ByaQXQ1BLptTrFu8O631UjW/6w7p53YliFzT1ws9tr6I7lo8TO/PFZWrm2SQf4nfTGF6IN/wK2C+Hs4GU/HbkZmDTskHHVt/7cUGdflAgQaUxIh5BUgZaap5vwbwJojEvRdz0C1GEyp+Tj2MghvWx/zSfs= MonkeySphere2023-07-06T17:19:04 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. ms: known_hosts file updated. debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Will attempt key: /<>/tests/tmp/ms.SHp/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ms: lock removed on '/<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.3p1 Debian-1 debug1: compat_banner: match: OpenSSH_9.3p1 Debian-1 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:0aXgJLQ3asp77FvX5HtTWbpBetvR4Cu67RmiJBElAy8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.SHp/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4824, received 4852 bytes, in 0.0 seconds Bytes per second: sent 1038801.6, received 1044831.1 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### Testing TLS setup... Can't load /sbuild-nonexistent/.rnd into RNG 40505F9B6F7F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd ......+........+.......+.....+...+....+.........+......+........+.......+.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+.....+....+...+..+...+..................+..........+.....+.+.....+...+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+.........+..........+..+.+.....+...............+..................+.+.........+..+.......+.......................+.........+...+.debug1: expecting SSH2_MSG_KEX_ECDH_REPLY .........+...+.....+..........+..+.debug1: SSH2_MSG_KEX_ECDH_REPLY received .debug1: Server host key: ssh-rsa SHA256:7QMi0VfEaIfwQHeL3JdRZi3y6JPZYfoDu89ddA88Xc4 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.9bD/testuser/.ssh/known_hosts:1 .............+................+......+...+...+...+.....+......+...+.debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks .debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent debug1: Will attempt key: /<>/tests/tmp/ms.9bD/testuser/.ssh/no-such-identity explicit debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs= debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received ....+.+.......debug1: Authentications that can continue: publickey .debug1: Next authentication method: publickey debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent .debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:sxZ/hzOb9Gzi3CjKGpvNOjXkJBn4OXxf+TlWWXM2Cx8 agent ......+...+...+............+Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc ..debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 .debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.9bD/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork +Could not chdir to home directory /home/debomatic: No such file or directory ...debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 .Transferred: sent 3792, received 4492 bytes, in 0.0 seconds Bytes per second: sent 1114516.9, received 1320255.8 debug1: Exit status 0 .+##### ssh connection test PASSED. returned: 0 .################################################## ### Testing TLS setup... ........+Can't load /sbuild-nonexistent/.rnd into RNG 40E0A58A117F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd ............+++.++++++++++++++++++.++++++++++++++++++++.++++++++++++++++++++.++++*............+.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.......+......+.+............................++............................++.........+...............................+.........++...........++......+.......+....+............++..........+.+.............++...................+..++........+.......+..........+..+.....++.........+....+.+.........++...........++.......+.........+.......+.....+...............+..........++........+.....+...+.....+...+..+..........+........................+..........+..+...+..+..++++..+.++++..+..+..+..+..+.+++.++++.+.++.+..+..+.+..+.+..+.+.+..+.+..+++..+..++++..+.+..+.+..+.++++.+.+.+..+.+.+..+.+.+.+..+.+.+..+.+.+++ ........+......+..................+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+...+..+.+.......+...+..+....++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+......+.............+.................+........+......++..+.......+........+.+..............+...+...+.+.....+..............+.......+.....+....+.....+....+........+.....++...........+.+.........+...+............+...++...++........++.......+.....+......+....+.............+.+...........+...............+.+.....+.........+........++........+..+...+......+...++.....+...........+..............+........++...+............+..+..+......+......+............+.+...+.....+..........+.............................+.....++..+..+.++.+++..+..+..++..+...++.+....+..++..+.++..+.+.+.++..+...+....+...+....+....+....+...+...+.+..+.++...++.+..+..+++..+..+..+.+++.+.+..+.+.+.+.+++.+.+..+.+..+..+.+.+..+..+.+..+.+.+.++ ............+..----- ........Cannot write random bytes: 40505F9B6F7F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd +FAILED! ### removing temp dir... .....make[1]: *** [Makefile:113: test-basic] Error 1 make[1]: *** Waiting for unfinished jobs.... ...+............+...+..........+...............+..+...+...............+.+.......................+.......+.....+......+....+......+...+.........+.....+.+.........+..+....+......+...+...+..+..........+...+.................+...............+...+...+....+..+....+..+..........+..+.+...........+...+................+......+.....................+.....+....+...+..+.........+.+...+........+.......+..+..........+.........+....................+.+...+............+...........+...+................+.........+.....+.......+...+..+.............+..............+......+......+.........+.+......+.....+...+....+.....+......+.......+...........................+......+..+.......+...+...+......+.....+.+...............+.....+.......................................+......+.......+........+...+.+...+...+.........+...+..........................+....+..+...+..........+..+................+..............+...+.+......+...+...+.....+...+.+...+......+.................+...+...................+........+.........+......+.........+.........+.+...+...+...+...........+.........+.+......+..+......+......+.+..+.............+..............+.............+..+...+......+....+.....+.......+...+.....+.......+.........+..+....+...+...+.....+....+......+........+....+.................+..........+...........+.......+...........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ...+...+...+....+...+........+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+...+.+..+............+......+.+.....+....+...........+.+...+..+............+...+....+...+.....+...+.........+.+........+............+..........+.....+....+...+......+..+...+......+....+.........+..+...+..........+............+...+..+.+........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*......+.........+.....+.+.....+..........+...+......+...........+....+......+...+..+..........+...............+...+.....+.+...........+.............+...+........+....+...........+....+............+...+..+......+...+.+...+...+........+.+......+..+.+.....+...............+.+.....+.+..+...+.............+...........+...+...+....+.....+.........+.+...+......+......+........+.............+..+..........+..+...+..........+......+.....+......+.+..............+...................+..+....+.....+.+..................+......+...........+...+.......+...............+.....+....+...+......+..+....+........+.+.........+......+...........+...+..........+.....+......+.+.....+.....................+.......+......+.....+..........+.....+......................+........+.+...+............+...+...+.....+.......+............+...+...........+...............+.......+........................+...+..+......+...............+.............+..+....+...........+.......+.....+..........+..+.+........+......+....+......+.....+.............+..+.........+......+.+..............+...+.+..+.......+.....+...+...+....+..+...............+..........+..................+......+.....+...................+..+.....................+.............+.....+.+.........+..............+.......+.....+..................+.+..............+.+.....+.........+.............+........+......+....+.....+.......+....................+.......+..+.............+..+......+............+.+......+...+..+...............+...+.+..+...+.........+............+.........+.........+.......+...+..+...+.+......+......+........+..........+.....+.......+........+.......+..+............+....+..+............+.+......+...+.....+...+...+.+.........................................+....+........+......+......+.+.....+......................+.....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- Cannot write random bytes: 40E0A58A117F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd FAILED! ### removing temp dir... make[1]: *** [Makefile:116: test-ed25519] Error 1 make[1]: Leaving directory '/<>' dh_auto_test: error: make -j4 test returned exit code 2 make: *** [debian/rules:6: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- Build finished at 2023-07-06T17:19:06Z Finished -------- +------------------------------------------------------------------------------+ | Cleanup | +------------------------------------------------------------------------------+ Purging /<> Not cleaning session: cloned chroot in use E: Build failure (dpkg-buildpackage died) +------------------------------------------------------------------------------+ | Summary | +------------------------------------------------------------------------------+ Build Architecture: amd64 Build Type: full Build-Space: 1240 Build-Time: 41 Distribution: sid Fail-Stage: build Host Architecture: amd64 Install-Time: 9 Job: /srv/debomatic/incoming/monkeysphere_0.43-3.1.dsc Machine Architecture: amd64 Package: monkeysphere Package-Time: 56 Source-Version: 0.43-3.1 Space: 1240 Status: attempted Version: 0.43-3.1 -------------------------------------------------------------------------------- Finished at 2023-07-06T17:19:06Z Build needed 00:00:56, 1240k disk space