sbuild (Debian sbuild) 0.85.9 (29 May 2024) on carme.larted.org.uk +==============================================================================+ | monkeysphere 0.43-3.1 (amd64) Wed, 05 Jun 2024 16:27:40 +0000 | +==============================================================================+ Package: monkeysphere Version: 0.43-3.1 Source Version: 0.43-3.1 Distribution: sid Machine Architecture: amd64 Host Architecture: amd64 Build Architecture: amd64 Build Type: full I: NOTICE: Log filtering will replace 'var/run/schroot/mount/sid-amd64-debomatic-969b14bc-4259-4033-8c42-a9542a57112c' with '<>' +------------------------------------------------------------------------------+ | Chroot Setup Commands | +------------------------------------------------------------------------------+ /usr/share/debomatic/sbuildcommands/chroot-setup-commands/dpkg-speedup monkeysphere_0.43-3.1 sid amd64 ------------------------------------------------------------------------------------------------------ I: Finished running '/usr/share/debomatic/sbuildcommands/chroot-setup-commands/dpkg-speedup monkeysphere_0.43-3.1 sid amd64'. Finished processing commands. -------------------------------------------------------------------------------- I: NOTICE: Log filtering will replace 'build/monkeysphere-1ojqaw/resolver-sb1RKl' with '<>' +------------------------------------------------------------------------------+ | Update chroot | +------------------------------------------------------------------------------+ Get:1 http://localhost:3142/debian unstable InRelease [198 kB] Get:2 http://localhost:3142/debian sid InRelease [198 kB] Get:3 http://localhost:3142/debian unstable/main amd64 Packages.diff/Index [63.6 kB] Get:4 http://localhost:3142/debian unstable/main amd64 Packages T-2024-06-05-1405.56-F-2024-06-02-1406.32.pdiff [216 kB] Get:4 http://localhost:3142/debian unstable/main amd64 Packages T-2024-06-05-1405.56-F-2024-06-02-1406.32.pdiff [216 kB] Get:5 http://localhost:3142/debian sid/main Sources.diff/Index [63.6 kB] Get:6 http://localhost:3142/debian sid/main Sources T-2024-06-05-1405.56-F-2024-06-02-1406.32.pdiff [120 kB] Get:6 http://localhost:3142/debian sid/main Sources T-2024-06-05-1405.56-F-2024-06-02-1406.32.pdiff [120 kB] Fetched 860 kB in 9s (101 kB/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... Calculating upgrade... The following packages will be upgraded: bsdutils libblkid1 libgnutls30t64 libmount1 libsmartcols1 libssl3t64 libuuid1 login passwd util-linux 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 7097 kB of archives. After this operation, 47.1 kB disk space will be freed. Get:1 http://localhost:3142/debian unstable/main amd64 bsdutils amd64 1:2.40.1-8 [104 kB] Get:2 http://localhost:3142/debian unstable/main amd64 login amd64 1:4.13+dfsg1-5 [590 kB] Get:3 http://localhost:3142/debian unstable/main amd64 libsmartcols1 amd64 2.40.1-8 [137 kB] Get:4 http://localhost:3142/debian unstable/main amd64 libuuid1 amd64 2.40.1-8 [34.7 kB] Get:5 http://localhost:3142/debian unstable/main amd64 libblkid1 amd64 2.40.1-8 [166 kB] Get:6 http://localhost:3142/debian unstable/main amd64 libmount1 amd64 2.40.1-8 [197 kB] Get:7 http://localhost:3142/debian unstable/main amd64 util-linux amd64 2.40.1-8 [1210 kB] Get:8 http://localhost:3142/debian unstable/main amd64 passwd amd64 1:4.13+dfsg1-5 [974 kB] Get:9 http://localhost:3142/debian unstable/main amd64 libgnutls30t64 amd64 3.8.5-4 [1437 kB] Get:10 http://localhost:3142/debian unstable/main amd64 libssl3t64 amd64 3.2.2-1 [2246 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 7097 kB in 0s (148 MB/s) (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19697 files and directories currently installed.) Preparing to unpack .../bsdutils_1%3a2.40.1-8_amd64.deb ... Unpacking bsdutils (1:2.40.1-8) over (1:2.40.1-4) ... Setting up bsdutils (1:2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19697 files and directories currently installed.) Preparing to unpack .../login_1%3a4.13+dfsg1-5_amd64.deb ... Unpacking login (1:4.13+dfsg1-5) over (1:4.13+dfsg1-4) ... Setting up login (1:4.13+dfsg1-5) ... Installing new version of config file /etc/pam.d/login ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libsmartcols1_2.40.1-8_amd64.deb ... Unpacking libsmartcols1:amd64 (2.40.1-8) over (2.40.1-4) ... Setting up libsmartcols1:amd64 (2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libuuid1_2.40.1-8_amd64.deb ... Unpacking libuuid1:amd64 (2.40.1-8) over (2.40.1-4) ... Setting up libuuid1:amd64 (2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libblkid1_2.40.1-8_amd64.deb ... Unpacking libblkid1:amd64 (2.40.1-8) over (2.40.1-4) ... Setting up libblkid1:amd64 (2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libmount1_2.40.1-8_amd64.deb ... Unpacking libmount1:amd64 (2.40.1-8) over (2.40.1-4) ... Setting up libmount1:amd64 (2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../util-linux_2.40.1-8_amd64.deb ... Unpacking util-linux (2.40.1-8) over (2.40.1-4) ... Setting up util-linux (2.40.1-8) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../passwd_1%3a4.13+dfsg1-5_amd64.deb ... Unpacking passwd (1:4.13+dfsg1-5) over (1:4.13+dfsg1-4) ... Setting up passwd (1:4.13+dfsg1-5) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libgnutls30t64_3.8.5-4_amd64.deb ... Unpacking libgnutls30t64:amd64 (3.8.5-4) over (3.8.5-3) ... Setting up libgnutls30t64:amd64 (3.8.5-4) ... (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../libssl3t64_3.2.2-1_amd64.deb ... Unpacking libssl3t64:amd64 (3.2.2-1) over (3.2.1-3) ... Setting up libssl3t64:amd64 (3.2.2-1) ... Processing triggers for libc-bin (2.38-12) ... +------------------------------------------------------------------------------+ | Fetch source files | +------------------------------------------------------------------------------+ Local sources ------------- /srv/debomatic/incoming/monkeysphere_0.43-3.1.dsc exists in /srv/debomatic/incoming; copying to chroot I: NOTICE: Log filtering will replace 'build/monkeysphere-1ojqaw/monkeysphere-0.43' with '<>' I: NOTICE: Log filtering will replace 'build/monkeysphere-1ojqaw' with '<>' +------------------------------------------------------------------------------+ | Install package build dependencies | +------------------------------------------------------------------------------+ Setup apt archive ----------------- Merged Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17), gnupg-agent, libassuan-dev, libcrypt-openssl-rsa-perl, libdigest-sha-perl, libgcrypt20-dev, lockfile-progs | procmail, openssh-server, openssl, socat, build-essential, fakeroot Filtered Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17), gnupg-agent, libassuan-dev, libcrypt-openssl-rsa-perl, libdigest-sha-perl, libgcrypt20-dev, lockfile-progs, openssh-server, openssl, socat, build-essential, fakeroot dpkg-deb: building package 'sbuild-build-depends-main-dummy' in '/<>/apt_archive/sbuild-build-depends-main-dummy.deb'. Ign:1 copy:/<>/apt_archive ./ InRelease Get:2 copy:/<>/apt_archive ./ Release [609 B] Ign:3 copy:/<>/apt_archive ./ Release.gpg Get:4 copy:/<>/apt_archive ./ Sources [919 B] Get:5 copy:/<>/apt_archive ./ Packages [852 B] Fetched 2380 B in 0s (0 B/s) Reading package lists... Reading package lists... Install main build dependencies (apt-based resolver) ---------------------------------------------------- Installing build dependencies Reading package lists... Building dependency tree... Reading state information... The following additional packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils cpio debhelper dh-autoreconf dh-strip-nondeterminism dwz fakeroot file gettext gettext-base groff-base intltool-debian libarchive-zip-perl libassuan-dev libbsd0 libcbor0.10 libcom-err2 libcrypt-openssl-bignum-perl libcrypt-openssl-random-perl libcrypt-openssl-rsa-perl libdebhelper-perl libedit2 libelf1t64 libfakeroot libfido2-1 libfile-stripnondeterminism-perl libgcrypt20-dev libgpg-error-dev libgssapi-krb5-2 libicu72 libk5crypto3 libkeyutils1 libkrb5-3 libkrb5support0 liblockfile-bin liblockfile1 libmagic-mgc libmagic1t64 libpipeline1 libproc2-0 libtool libuchardet0 libwrap0 libxml2 lockfile-progs m4 man-db openssh-client openssh-server openssh-sftp-server openssl perl-openssl-defaults po-debconf procps runit-helper sensible-utils socat ucf Suggested packages: autoconf-archive gnu-standards autoconf-doc libarchive-dev dh-make gettext-doc libasprintf-dev libgettextpo-dev groff libgcrypt20-doc krb5-doc krb5-user libtool-doc gfortran | fortran95-compiler gcj-jdk m4-doc apparmor less www-browser keychain libpam-ssh monkeysphere ssh-askpass molly-guard ufw ca-certificates libmail-box-perl Recommended packages: curl | wget | lynx libarchive-cpio-perl krb5-locales libltdl-dev xauth default-logind | logind | libpam-systemd ncurses-term libmail-sendmail-perl psmisc The following NEW packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils cpio debhelper dh-autoreconf dh-strip-nondeterminism dwz fakeroot file gettext gettext-base groff-base intltool-debian libarchive-zip-perl libassuan-dev libbsd0 libcbor0.10 libcom-err2 libcrypt-openssl-bignum-perl libcrypt-openssl-random-perl libcrypt-openssl-rsa-perl libdebhelper-perl libedit2 libelf1t64 libfakeroot libfido2-1 libfile-stripnondeterminism-perl libgcrypt20-dev libgpg-error-dev libgssapi-krb5-2 libicu72 libk5crypto3 libkeyutils1 libkrb5-3 libkrb5support0 liblockfile-bin liblockfile1 libmagic-mgc libmagic1t64 libpipeline1 libproc2-0 libtool libuchardet0 libwrap0 libxml2 lockfile-progs m4 man-db openssh-client openssh-server openssh-sftp-server openssl perl-openssl-defaults po-debconf procps runit-helper sbuild-build-depends-main-dummy sensible-utils socat ucf 0 upgraded, 63 newly installed, 0 to remove and 0 not upgraded. Need to get 25.8 MB of archives. After this operation, 96.0 MB of additional disk space will be used. Get:1 copy:/<>/apt_archive ./ sbuild-build-depends-main-dummy 0.invalid.0 [996 B] Get:2 http://localhost:3142/debian unstable/main amd64 libbsd0 amd64 0.12.2-1 [131 kB] Get:3 http://localhost:3142/debian unstable/main amd64 libedit2 amd64 3.1-20240517-1 [93.3 kB] Get:4 http://localhost:3142/debian unstable/main amd64 libcbor0.10 amd64 0.10.2-1.2 [28.2 kB] Get:5 http://localhost:3142/debian unstable/main amd64 libfido2-1 amd64 1.14.0-1+b2 [77.7 kB] Get:6 http://localhost:3142/debian unstable/main amd64 libkrb5support0 amd64 1.20.1-6+b1 [33.3 kB] Get:7 http://localhost:3142/debian unstable/main amd64 libcom-err2 amd64 1.47.1-1 [22.9 kB] Get:8 http://localhost:3142/debian unstable/main amd64 libk5crypto3 amd64 1.20.1-6+b1 [79.8 kB] Get:9 http://localhost:3142/debian unstable/main amd64 libkeyutils1 amd64 1.6.3-3 [8952 B] Get:10 http://localhost:3142/debian unstable/main amd64 libkrb5-3 amd64 1.20.1-6+b1 [333 kB] Get:11 http://localhost:3142/debian unstable/main amd64 libgssapi-krb5-2 amd64 1.20.1-6+b1 [135 kB] Get:12 http://localhost:3142/debian unstable/main amd64 openssh-client amd64 1:9.7p1-5 [964 kB] Get:13 http://localhost:3142/debian unstable/main amd64 openssh-sftp-server amd64 1:9.7p1-5 [65.3 kB] Get:14 http://localhost:3142/debian unstable/main amd64 libproc2-0 amd64 2:4.0.4-4 [64.6 kB] Get:15 http://localhost:3142/debian unstable/main amd64 procps amd64 2:4.0.4-4 [880 kB] Get:16 http://localhost:3142/debian unstable/main amd64 sensible-utils all 0.0.22 [22.4 kB] Get:17 http://localhost:3142/debian unstable/main amd64 ucf all 3.0043+nmu1 [55.2 kB] Get:18 http://localhost:3142/debian unstable/main amd64 runit-helper all 2.16.2 [6568 B] Get:19 http://localhost:3142/debian unstable/main amd64 libwrap0 amd64 7.6.q-33 [55.1 kB] Get:20 http://localhost:3142/debian unstable/main amd64 openssh-server amd64 1:9.7p1-5 [458 kB] Get:21 http://localhost:3142/debian unstable/main amd64 cpio amd64 2.15+dfsg-1 [260 kB] Get:22 http://localhost:3142/debian unstable/main amd64 libmagic-mgc amd64 1:5.45-3 [314 kB] Get:23 http://localhost:3142/debian unstable/main amd64 libmagic1t64 amd64 1:5.45-3 [105 kB] Get:24 http://localhost:3142/debian unstable/main amd64 file amd64 1:5.45-3 [42.9 kB] Get:25 http://localhost:3142/debian unstable/main amd64 gettext-base amd64 0.21-14+b1 [161 kB] Get:26 http://localhost:3142/debian unstable/main amd64 libuchardet0 amd64 0.0.8-1+b1 [68.8 kB] Get:27 http://localhost:3142/debian unstable/main amd64 groff-base amd64 1.23.0-4 [1180 kB] Get:28 http://localhost:3142/debian unstable/main amd64 liblockfile-bin amd64 1.17-1+b1 [20.8 kB] Get:29 http://localhost:3142/debian unstable/main amd64 bsdextrautils amd64 2.40.1-8 [96.0 kB] Get:30 http://localhost:3142/debian unstable/main amd64 libpipeline1 amd64 1.5.7-2 [38.0 kB] Get:31 http://localhost:3142/debian unstable/main amd64 man-db amd64 2.12.1-1 [1411 kB] Get:32 http://localhost:3142/debian unstable/main amd64 m4 amd64 1.4.19-4 [287 kB] Get:33 http://localhost:3142/debian unstable/main amd64 autoconf all 2.71-3 [332 kB] Get:34 http://localhost:3142/debian unstable/main amd64 autotools-dev all 20220109.1 [51.6 kB] Get:35 http://localhost:3142/debian unstable/main amd64 automake all 1:1.16.5-1.3 [823 kB] Get:36 http://localhost:3142/debian unstable/main amd64 autopoint all 0.21-14 [496 kB] Get:37 http://localhost:3142/debian unstable/main amd64 libdebhelper-perl all 13.15.3 [88.0 kB] Get:38 http://localhost:3142/debian unstable/main amd64 libtool all 2.4.7-7 [517 kB] Get:39 http://localhost:3142/debian unstable/main amd64 dh-autoreconf all 20 [17.1 kB] Get:40 http://localhost:3142/debian unstable/main amd64 libarchive-zip-perl all 1.68-1 [104 kB] Get:41 http://localhost:3142/debian unstable/main amd64 libfile-stripnondeterminism-perl all 1.14.0-1 [19.5 kB] Get:42 http://localhost:3142/debian unstable/main amd64 dh-strip-nondeterminism all 1.14.0-1 [8448 B] Get:43 http://localhost:3142/debian unstable/main amd64 libelf1t64 amd64 0.191-1+b1 [189 kB] Get:44 http://localhost:3142/debian unstable/main amd64 dwz amd64 0.15-1+b1 [110 kB] Get:45 http://localhost:3142/debian unstable/main amd64 libicu72 amd64 72.1-4+b1 [9395 kB] Get:46 http://localhost:3142/debian unstable/main amd64 libxml2 amd64 2.12.7+dfsg-3 [670 kB] Get:47 http://localhost:3142/debian unstable/main amd64 gettext amd64 0.21-14+b1 [1301 kB] Get:48 http://localhost:3142/debian unstable/main amd64 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get:49 http://localhost:3142/debian unstable/main amd64 po-debconf all 1.0.21+nmu1 [248 kB] Get:50 http://localhost:3142/debian unstable/main amd64 debhelper all 13.15.3 [901 kB] Get:51 http://localhost:3142/debian unstable/main amd64 libfakeroot amd64 1.34-1 [28.9 kB] Get:52 http://localhost:3142/debian unstable/main amd64 fakeroot amd64 1.34-1 [74.0 kB] Get:53 http://localhost:3142/debian unstable/main amd64 libgpg-error-dev amd64 1.49-2 [138 kB] Get:54 http://localhost:3142/debian unstable/main amd64 libassuan-dev amd64 2.5.6-1+b1 [109 kB] Get:55 http://localhost:3142/debian unstable/main amd64 perl-openssl-defaults amd64 7+b2 [6724 B] Get:56 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-bignum-perl amd64 0.09-2+b3 [23.6 kB] Get:57 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-random-perl amd64 0.16-1 [10.5 kB] Get:58 http://localhost:3142/debian unstable/main amd64 libcrypt-openssl-rsa-perl amd64 0.33-3+b3 [24.7 kB] Get:59 http://localhost:3142/debian unstable/main amd64 libgcrypt20-dev amd64 1.10.3-3 [764 kB] Get:60 http://localhost:3142/debian unstable/main amd64 liblockfile1 amd64 1.17-1+b1 [17.0 kB] Get:61 http://localhost:3142/debian unstable/main amd64 lockfile-progs amd64 0.1.19+nmu1 [8656 B] Get:62 http://localhost:3142/debian unstable/main amd64 openssl amd64 3.2.2-1 [1364 kB] Get:63 http://localhost:3142/debian unstable/main amd64 socat amd64 1.8.0.0-4+b1 [404 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 25.8 MB in 0s (71.0 MB/s) Selecting previously unselected package libbsd0:amd64. (Reading database ... 19683 files and directories currently installed.) Preparing to unpack .../00-libbsd0_0.12.2-1_amd64.deb ... Unpacking libbsd0:amd64 (0.12.2-1) ... Selecting previously unselected package libedit2:amd64. Preparing to unpack .../01-libedit2_3.1-20240517-1_amd64.deb ... Unpacking libedit2:amd64 (3.1-20240517-1) ... Selecting previously unselected package libcbor0.10:amd64. Preparing to unpack .../02-libcbor0.10_0.10.2-1.2_amd64.deb ... Unpacking libcbor0.10:amd64 (0.10.2-1.2) ... Selecting previously unselected package libfido2-1:amd64. Preparing to unpack .../03-libfido2-1_1.14.0-1+b2_amd64.deb ... Unpacking libfido2-1:amd64 (1.14.0-1+b2) ... Selecting previously unselected package libkrb5support0:amd64. Preparing to unpack .../04-libkrb5support0_1.20.1-6+b1_amd64.deb ... Unpacking libkrb5support0:amd64 (1.20.1-6+b1) ... Selecting previously unselected package libcom-err2:amd64. Preparing to unpack .../05-libcom-err2_1.47.1-1_amd64.deb ... Unpacking libcom-err2:amd64 (1.47.1-1) ... Selecting previously unselected package libk5crypto3:amd64. Preparing to unpack .../06-libk5crypto3_1.20.1-6+b1_amd64.deb ... Unpacking libk5crypto3:amd64 (1.20.1-6+b1) ... Selecting previously unselected package libkeyutils1:amd64. Preparing to unpack .../07-libkeyutils1_1.6.3-3_amd64.deb ... Unpacking libkeyutils1:amd64 (1.6.3-3) ... Selecting previously unselected package libkrb5-3:amd64. Preparing to unpack .../08-libkrb5-3_1.20.1-6+b1_amd64.deb ... Unpacking libkrb5-3:amd64 (1.20.1-6+b1) ... Selecting previously unselected package libgssapi-krb5-2:amd64. Preparing to unpack .../09-libgssapi-krb5-2_1.20.1-6+b1_amd64.deb ... Unpacking libgssapi-krb5-2:amd64 (1.20.1-6+b1) ... Selecting previously unselected package openssh-client. Preparing to unpack .../10-openssh-client_1%3a9.7p1-5_amd64.deb ... Unpacking openssh-client (1:9.7p1-5) ... Selecting previously unselected package openssh-sftp-server. Preparing to unpack .../11-openssh-sftp-server_1%3a9.7p1-5_amd64.deb ... Unpacking openssh-sftp-server (1:9.7p1-5) ... Selecting previously unselected package libproc2-0:amd64. Preparing to unpack .../12-libproc2-0_2%3a4.0.4-4_amd64.deb ... Unpacking libproc2-0:amd64 (2:4.0.4-4) ... Selecting previously unselected package procps. Preparing to unpack .../13-procps_2%3a4.0.4-4_amd64.deb ... Unpacking procps (2:4.0.4-4) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../14-sensible-utils_0.0.22_all.deb ... Unpacking sensible-utils (0.0.22) ... Selecting previously unselected package ucf. Preparing to unpack .../15-ucf_3.0043+nmu1_all.deb ... Moving old data out of the way Unpacking ucf (3.0043+nmu1) ... Selecting previously unselected package runit-helper. Preparing to unpack .../16-runit-helper_2.16.2_all.deb ... Unpacking runit-helper (2.16.2) ... Selecting previously unselected package libwrap0:amd64. Preparing to unpack .../17-libwrap0_7.6.q-33_amd64.deb ... Unpacking libwrap0:amd64 (7.6.q-33) ... Selecting previously unselected package openssh-server. Preparing to unpack .../18-openssh-server_1%3a9.7p1-5_amd64.deb ... Unpacking openssh-server (1:9.7p1-5) ... Selecting previously unselected package cpio. Preparing to unpack .../19-cpio_2.15+dfsg-1_amd64.deb ... Unpacking cpio (2.15+dfsg-1) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../20-libmagic-mgc_1%3a5.45-3_amd64.deb ... Unpacking libmagic-mgc (1:5.45-3) ... Selecting previously unselected package libmagic1t64:amd64. Preparing to unpack .../21-libmagic1t64_1%3a5.45-3_amd64.deb ... Unpacking libmagic1t64:amd64 (1:5.45-3) ... Selecting previously unselected package file. Preparing to unpack .../22-file_1%3a5.45-3_amd64.deb ... Unpacking file (1:5.45-3) ... Selecting previously unselected package gettext-base. Preparing to unpack .../23-gettext-base_0.21-14+b1_amd64.deb ... Unpacking gettext-base (0.21-14+b1) ... Selecting previously unselected package libuchardet0:amd64. Preparing to unpack .../24-libuchardet0_0.0.8-1+b1_amd64.deb ... Unpacking libuchardet0:amd64 (0.0.8-1+b1) ... Selecting previously unselected package groff-base. Preparing to unpack .../25-groff-base_1.23.0-4_amd64.deb ... Unpacking groff-base (1.23.0-4) ... Selecting previously unselected package liblockfile-bin. Preparing to unpack .../26-liblockfile-bin_1.17-1+b1_amd64.deb ... Unpacking liblockfile-bin (1.17-1+b1) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../27-bsdextrautils_2.40.1-8_amd64.deb ... Unpacking bsdextrautils (2.40.1-8) ... Selecting previously unselected package libpipeline1:amd64. Preparing to unpack .../28-libpipeline1_1.5.7-2_amd64.deb ... Unpacking libpipeline1:amd64 (1.5.7-2) ... Selecting previously unselected package man-db. Preparing to unpack .../29-man-db_2.12.1-1_amd64.deb ... Unpacking man-db (2.12.1-1) ... Selecting previously unselected package m4. Preparing to unpack .../30-m4_1.4.19-4_amd64.deb ... Unpacking m4 (1.4.19-4) ... Selecting previously unselected package autoconf. Preparing to unpack .../31-autoconf_2.71-3_all.deb ... Unpacking autoconf (2.71-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../32-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../33-automake_1%3a1.16.5-1.3_all.deb ... Unpacking automake (1:1.16.5-1.3) ... Selecting previously unselected package autopoint. Preparing to unpack .../34-autopoint_0.21-14_all.deb ... Unpacking autopoint (0.21-14) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../35-libdebhelper-perl_13.15.3_all.deb ... Unpacking libdebhelper-perl (13.15.3) ... Selecting previously unselected package libtool. Preparing to unpack .../36-libtool_2.4.7-7_all.deb ... Unpacking libtool (2.4.7-7) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../37-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../38-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../39-libfile-stripnondeterminism-perl_1.14.0-1_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.14.0-1) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../40-dh-strip-nondeterminism_1.14.0-1_all.deb ... Unpacking dh-strip-nondeterminism (1.14.0-1) ... Selecting previously unselected package libelf1t64:amd64. Preparing to unpack .../41-libelf1t64_0.191-1+b1_amd64.deb ... Unpacking libelf1t64:amd64 (0.191-1+b1) ... Selecting previously unselected package dwz. Preparing to unpack .../42-dwz_0.15-1+b1_amd64.deb ... Unpacking dwz (0.15-1+b1) ... Selecting previously unselected package libicu72:amd64. Preparing to unpack .../43-libicu72_72.1-4+b1_amd64.deb ... Unpacking libicu72:amd64 (72.1-4+b1) ... Selecting previously unselected package libxml2:amd64. Preparing to unpack .../44-libxml2_2.12.7+dfsg-3_amd64.deb ... Unpacking libxml2:amd64 (2.12.7+dfsg-3) ... Selecting previously unselected package gettext. Preparing to unpack .../45-gettext_0.21-14+b1_amd64.deb ... Unpacking gettext (0.21-14+b1) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../46-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../47-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../48-debhelper_13.15.3_all.deb ... Unpacking debhelper (13.15.3) ... Selecting previously unselected package libfakeroot:amd64. Preparing to unpack .../49-libfakeroot_1.34-1_amd64.deb ... Unpacking libfakeroot:amd64 (1.34-1) ... Selecting previously unselected package fakeroot. Preparing to unpack .../50-fakeroot_1.34-1_amd64.deb ... Unpacking fakeroot (1.34-1) ... Selecting previously unselected package libgpg-error-dev:amd64. Preparing to unpack .../51-libgpg-error-dev_1.49-2_amd64.deb ... Unpacking libgpg-error-dev:amd64 (1.49-2) ... Selecting previously unselected package libassuan-dev. Preparing to unpack .../52-libassuan-dev_2.5.6-1+b1_amd64.deb ... Unpacking libassuan-dev (2.5.6-1+b1) ... Selecting previously unselected package perl-openssl-defaults:amd64. Preparing to unpack .../53-perl-openssl-defaults_7+b2_amd64.deb ... Unpacking perl-openssl-defaults:amd64 (7+b2) ... Selecting previously unselected package libcrypt-openssl-bignum-perl. Preparing to unpack .../54-libcrypt-openssl-bignum-perl_0.09-2+b3_amd64.deb ... Unpacking libcrypt-openssl-bignum-perl (0.09-2+b3) ... Selecting previously unselected package libcrypt-openssl-random-perl:amd64. Preparing to unpack .../55-libcrypt-openssl-random-perl_0.16-1_amd64.deb ... Unpacking libcrypt-openssl-random-perl:amd64 (0.16-1) ... Selecting previously unselected package libcrypt-openssl-rsa-perl:amd64. Preparing to unpack .../56-libcrypt-openssl-rsa-perl_0.33-3+b3_amd64.deb ... Unpacking libcrypt-openssl-rsa-perl:amd64 (0.33-3+b3) ... Selecting previously unselected package libgcrypt20-dev. Preparing to unpack .../57-libgcrypt20-dev_1.10.3-3_amd64.deb ... Unpacking libgcrypt20-dev (1.10.3-3) ... Selecting previously unselected package liblockfile1:amd64. Preparing to unpack .../58-liblockfile1_1.17-1+b1_amd64.deb ... Unpacking liblockfile1:amd64 (1.17-1+b1) ... Selecting previously unselected package lockfile-progs. Preparing to unpack .../59-lockfile-progs_0.1.19+nmu1_amd64.deb ... Unpacking lockfile-progs (0.1.19+nmu1) ... Selecting previously unselected package openssl. Preparing to unpack .../60-openssl_3.2.2-1_amd64.deb ... Unpacking openssl (3.2.2-1) ... Selecting previously unselected package socat. Preparing to unpack .../61-socat_1.8.0.0-4+b1_amd64.deb ... Unpacking socat (1.8.0.0-4+b1) ... Selecting previously unselected package sbuild-build-depends-main-dummy. Preparing to unpack .../62-sbuild-build-depends-main-dummy_0.invalid.0_amd64.deb ... Unpacking sbuild-build-depends-main-dummy (0.invalid.0) ... Setting up cpio (2.15+dfsg-1) ... update-alternatives: using /bin/mt-gnu to provide /bin/mt (mt) in auto mode Setting up libpipeline1:amd64 (1.5.7-2) ... Setting up runit-helper (2.16.2) ... Setting up libkeyutils1:amd64 (1.6.3-3) ... Setting up libicu72:amd64 (72.1-4+b1) ... Setting up liblockfile-bin (1.17-1+b1) ... Setting up bsdextrautils (2.40.1-8) ... Setting up libmagic-mgc (1:5.45-3) ... Setting up libcbor0.10:amd64 (0.10.2-1.2) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libdebhelper-perl (13.15.3) ... Setting up libmagic1t64:amd64 (1:5.45-3) ... Setting up perl-openssl-defaults:amd64 (7+b2) ... Setting up gettext-base (0.21-14+b1) ... Setting up m4 (1.4.19-4) ... Setting up libcom-err2:amd64 (1.47.1-1) ... Setting up file (1:5.45-3) ... Setting up libfakeroot:amd64 (1.34-1) ... Setting up libelf1t64:amd64 (0.191-1+b1) ... Setting up libkrb5support0:amd64 (1.20.1-6+b1) ... Setting up fakeroot (1.34-1) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Setting up autotools-dev (20220109.1) ... Setting up libwrap0:amd64 (7.6.q-33) ... Setting up libgpg-error-dev:amd64 (1.49-2) ... Setting up libcrypt-openssl-bignum-perl (0.09-2+b3) ... Setting up socat (1.8.0.0-4+b1) ... Setting up libproc2-0:amd64 (2:4.0.4-4) ... Setting up autopoint (0.21-14) ... Setting up libassuan-dev (2.5.6-1+b1) ... Setting up libk5crypto3:amd64 (1.20.1-6+b1) ... Setting up autoconf (2.71-3) ... Setting up dwz (0.15-1+b1) ... Setting up libcrypt-openssl-random-perl:amd64 (0.16-1) ... Setting up sensible-utils (0.0.22) ... Setting up libuchardet0:amd64 (0.0.8-1+b1) ... Setting up procps (2:4.0.4-4) ... Setting up libkrb5-3:amd64 (1.20.1-6+b1) ... Setting up libcrypt-openssl-rsa-perl:amd64 (0.33-3+b3) ... Setting up liblockfile1:amd64 (1.17-1+b1) ... Setting up libfido2-1:amd64 (1.14.0-1+b2) ... Setting up openssl (3.2.2-1) ... Setting up libbsd0:amd64 (0.12.2-1) ... Setting up libxml2:amd64 (2.12.7+dfsg-3) ... Setting up automake (1:1.16.5-1.3) ... update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.14.0-1) ... Setting up gettext (0.21-14+b1) ... Setting up libtool (2.4.7-7) ... Setting up libedit2:amd64 (3.1-20240517-1) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up dh-autoreconf (20) ... Setting up libgcrypt20-dev (1.10.3-3) ... Setting up lockfile-progs (0.1.19+nmu1) ... Setting up libgssapi-krb5-2:amd64 (1.20.1-6+b1) ... Setting up ucf (3.0043+nmu1) ... Setting up dh-strip-nondeterminism (1.14.0-1) ... Setting up groff-base (1.23.0-4) ... Setting up openssh-client (1:9.7p1-5) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up man-db (2.12.1-1) ... Not building database; man-db/auto-update is not 'true'. Setting up openssh-sftp-server (1:9.7p1-5) ... Setting up openssh-server (1:9.7p1-5) ... Creating config file /etc/ssh/sshd_config with new version Creating SSH2 RSA key; this may take some time ... 3072 SHA256:EsfWJzb7jQ/ysEdGvTr5Arlpu73iijpTDm8SrgfWQTQ root@carme (RSA) Creating SSH2 ECDSA key; this may take some time ... 256 SHA256:rNwg8K+QqJBOjfW3wsG7QX6t1JVIZXFKk3/iZSgPHmE root@carme (ECDSA) Creating SSH2 ED25519 key; this may take some time ... 256 SHA256:L4A8lLuqP++0QPzWD9O24+BWbvhcvvHrjw33etYwByg root@carme (ED25519) invoke-rc.d: could not determine current runlevel invoke-rc.d: WARNING: No init system and policy-rc.d missing! Defaulting to block. Setting up debhelper (13.15.3) ... Setting up sbuild-build-depends-main-dummy (0.invalid.0) ... Processing triggers for libc-bin (2.38-12) ... +------------------------------------------------------------------------------+ | Check architectures | +------------------------------------------------------------------------------+ Arch check ok (amd64 included in any all) +------------------------------------------------------------------------------+ | Build environment | +------------------------------------------------------------------------------+ Kernel: Linux 6.1.0-21-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.90-1 (2024-05-03) amd64 (x86_64) Toolchain package versions: binutils_2.42-4 dpkg-dev_1.22.6 g++-13_13.2.0-25 gcc-13_13.2.0-25 libc6-dev_2.38-12 libstdc++-13-dev_13.2.0-25 libstdc++6_14.1.0-1 linux-libc-dev_6.8.12-1 Package versions: adduser_3.137 apt_2.9.4 autoconf_2.71-3 automake_1:1.16.5-1.3 autopoint_0.21-14 autotools-dev_20220109.1 base-files_13.2 base-passwd_3.6.3 bash_5.2.21-2+b1 binutils_2.42-4 binutils-common_2.42-4 binutils-x86-64-linux-gnu_2.42-4 bsdextrautils_2.40.1-8 bsdutils_1:2.40.1-8 build-essential_12.10 bzip2_1.0.8-5.1 coreutils_9.4-3.1 cpio_2.15+dfsg-1 cpp_4:13.2.0-7 cpp-13_13.2.0-25 cpp-13-x86-64-linux-gnu_13.2.0-25 cpp-x86-64-linux-gnu_4:13.2.0-7 dash_0.5.12-8 debconf_1.5.86 debhelper_13.15.3 debian-archive-keyring_2023.4 debianutils_5.17 dh-autoreconf_20 dh-strip-nondeterminism_1.14.0-1 diffutils_1:3.10-1 dirmngr_2.2.43-7 dpkg_1.22.6 dpkg-dev_1.22.6 dwz_0.15-1+b1 eatmydata_131-2 fakeroot_1.34-1 file_1:5.45-3 findutils_4.9.0-6 g++_4:13.2.0-7 g++-13_13.2.0-25 g++-13-x86-64-linux-gnu_13.2.0-25 g++-x86-64-linux-gnu_4:13.2.0-7 gcc_4:13.2.0-7 gcc-13_13.2.0-25 gcc-13-base_13.2.0-25 gcc-13-x86-64-linux-gnu_13.2.0-25 gcc-14-base_14.1.0-1 gcc-x86-64-linux-gnu_4:13.2.0-7 gettext_0.21-14+b1 gettext-base_0.21-14+b1 gnupg_2.2.43-7 gnupg-l10n_2.2.43-7 gnupg-utils_2.2.43-7 gpg_2.2.43-7 gpg-agent_2.2.43-7 gpg-wks-client_2.2.43-7 gpgconf_2.2.43-7 gpgsm_2.2.43-7 gpgv_2.2.43-7 grep_3.11-4 groff-base_1.23.0-4 gzip_1.12-1.1 hostname_3.23+nmu2 init-system-helpers_1.66 intltool-debian_0.35.0+20060710.6 libacl1_2.3.2-2 libapt-pkg6.0t64_2.9.4 libarchive-zip-perl_1.68-1 libasan8_14.1.0-1 libassuan-dev_2.5.6-1+b1 libassuan0_2.5.6-1+b1 libatomic1_14.1.0-1 libattr1_1:2.5.2-1 libaudit-common_1:3.1.2-2.1 libaudit1_1:3.1.2-2.1 libbinutils_2.42-4 libblkid1_2.40.1-8 libbsd0_0.12.2-1 libbz2-1.0_1.0.8-5.1 libc-bin_2.38-12 libc-dev-bin_2.38-12 libc-l10n_2.38-12 libc6_2.38-12 libc6-dev_2.38-12 libcap-ng0_0.8.5-1 libcap2_1:2.66-5 libcbor0.10_0.10.2-1.2 libcc1-0_14.1.0-1 libcom-err2_1.47.1-1 libcrypt-dev_1:4.4.36-4 libcrypt-openssl-bignum-perl_0.09-2+b3 libcrypt-openssl-random-perl_0.16-1 libcrypt-openssl-rsa-perl_0.33-3+b3 libcrypt1_1:4.4.36-4 libctf-nobfd0_2.42-4 libctf0_2.42-4 libdb5.3t64_5.3.28+dfsg2-7 libdebconfclient0_0.272 libdebhelper-perl_13.15.3 libdpkg-perl_1.22.6 libeatmydata1_131-2 libedit2_3.1-20240517-1 libelf1t64_0.191-1+b1 libfakeroot_1.34-1 libffi8_3.4.6-1 libfido2-1_1.14.0-1+b2 libfile-stripnondeterminism-perl_1.14.0-1 libgcc-13-dev_13.2.0-25 libgcc-s1_14.1.0-1 libgcrypt20_1.10.3-3 libgcrypt20-dev_1.10.3-3 libgdbm-compat4t64_1.23-5.1+b1 libgdbm6t64_1.23-5.1+b1 libgmp10_2:6.3.0+dfsg-2+b1 libgnutls30t64_3.8.5-4 libgomp1_14.1.0-1 libgpg-error-dev_1.49-2 libgpg-error0_1.49-2 libgprofng0_2.42-4 libgssapi-krb5-2_1.20.1-6+b1 libhogweed6t64_3.9.1-2.2 libhwasan0_14.1.0-1 libicu72_72.1-4+b1 libidn2-0_2.3.7-2 libisl23_0.26-3+b2 libitm1_14.1.0-1 libjansson4_2.14-2+b2 libk5crypto3_1.20.1-6+b1 libkeyutils1_1.6.3-3 libkrb5-3_1.20.1-6+b1 libkrb5support0_1.20.1-6+b1 libksba8_1.6.6-1 libldap-2.5-0_2.5.17+dfsg-1 liblockfile-bin_1.17-1+b1 liblockfile1_1.17-1+b1 liblsan0_14.1.0-1 liblz4-1_1.9.4-2 liblzma5_5.6.1+really5.4.5-1 libmagic-mgc_1:5.45-3 libmagic1t64_1:5.45-3 libmd0_1.1.0-2 libmount1_2.40.1-8 libmpc3_1.3.1-1+b2 libmpfr6_4.2.1-1+b1 libncursesw6_6.5-2 libnettle8t64_3.9.1-2.2 libnpth0t64_1.6-3.1 libp11-kit0_0.25.3-5 libpam-modules_1.5.3-7 libpam-modules-bin_1.5.3-7 libpam-runtime_1.5.3-7 libpam0g_1.5.3-7 libpcre2-8-0_10.42-4+b1 libperl5.38t64_5.38.2-5 libpipeline1_1.5.7-2 libproc2-0_2:4.0.4-4 libquadmath0_14.1.0-1 libreadline8t64_8.2-4 libsasl2-2_2.1.28+dfsg1-6 libsasl2-modules-db_2.1.28+dfsg1-6 libseccomp2_2.5.5-1 libselinux1_3.5-2+b2 libsemanage-common_3.5-1 libsemanage2_3.5-1+b3 libsepol2_3.5-2+b1 libsframe1_2.42-4 libsmartcols1_2.40.1-8 libsqlite3-0_3.46.0-1 libssl3t64_3.2.2-1 libstdc++-13-dev_13.2.0-25 libstdc++6_14.1.0-1 libsystemd0_256~rc3-7 libtasn1-6_4.19.0-3+b2 libtinfo6_6.5-2 libtool_2.4.7-7 libtsan2_14.1.0-1 libubsan1_14.1.0-1 libuchardet0_0.0.8-1+b1 libudev1_256~rc3-7 libunistring5_1.2-1 libuuid1_2.40.1-8 libwrap0_7.6.q-33 libxml2_2.12.7+dfsg-3 libxxhash0_0.8.2-2+b1 libzstd1_1.5.5+dfsg2-2 linux-libc-dev_6.8.12-1 locales-all_2.38-12 lockfile-progs_0.1.19+nmu1 login_1:4.13+dfsg1-5 m4_1.4.19-4 make_4.3-4.1 man-db_2.12.1-1 mawk_1.3.4.20240123-1 ncurses-base_6.5-2 ncurses-bin_6.5-2 openssh-client_1:9.7p1-5 openssh-server_1:9.7p1-5 openssh-sftp-server_1:9.7p1-5 openssl_3.2.2-1 passwd_1:4.13+dfsg1-5 patch_2.7.6-7 perl_5.38.2-5 perl-base_5.38.2-5 perl-modules-5.38_5.38.2-5 perl-openssl-defaults_7+b2 pinentry-curses_1.2.1-3+b2 po-debconf_1.0.21+nmu1 procps_2:4.0.4-4 readline-common_8.2-4 rpcsvc-proto_1.4.3-1 runit-helper_2.16.2 sbuild-build-depends-main-dummy_0.invalid.0 sed_4.9-2 sensible-utils_0.0.22 socat_1.8.0.0-4+b1 sysvinit-utils_3.09-1 tar_1.35+dfsg-3 ucf_3.0043+nmu1 usr-is-merged_39 util-linux_2.40.1-8 xz-utils_5.6.1+really5.4.5-1 zlib1g_1:1.3.dfsg+really1.3.1-1 +------------------------------------------------------------------------------+ | Build | +------------------------------------------------------------------------------+ Unpack source ------------- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: monkeysphere Binary: monkeysphere, agent-transfer Architecture: any all Version: 0.43-3.1 Maintainer: Debian Privacy Tools Maintainers Uploaders: Antoine Beaupré , Daniel Kahn Gillmor , Jameson Rollins , Homepage: https://web.monkeysphere.info/ Standards-Version: 4.3.0 Vcs-Browser: https://salsa.debian.org/pkg-privacy-team/monkeysphere Vcs-Git: https://salsa.debian.org/pkg-privacy-team/monkeysphere.git Testsuite: autopkgtest Testsuite-Triggers: cpio, openssh-server, openssl, socat Build-Depends: bash (>= 3.2), cpio, debhelper-compat (= 12), dpkg-dev (>= 1.17.14), gnupg (>= 2.1.17) , gnupg-agent , libassuan-dev, libcrypt-openssl-rsa-perl , libdigest-sha-perl , libgcrypt20-dev, lockfile-progs | procmail , openssh-server , openssl , socat Package-List: agent-transfer deb net optional arch=any monkeysphere deb net optional arch=all Checksums-Sha1: c88734f6cafcb77463f5ad1e125780248146078a 111784 monkeysphere_0.43.orig.tar.gz bdf1068565b1e5410ee616275463e2efebc182e6 11076 monkeysphere_0.43-3.1.debian.tar.xz Checksums-Sha256: 80e12635ae7ad0c9ab8202eb65074dca67504a5438970f5aad67e172f7c527a2 111784 monkeysphere_0.43.orig.tar.gz b457224f3d03dd09dd8be3812d31a4782876ba8e27754bd63a90b0c8463dbae4 11076 monkeysphere_0.43-3.1.debian.tar.xz Files: a91cff026a5f07b3c35fb0e1da1c1d0a 111784 monkeysphere_0.43.orig.tar.gz 05b2a8d3673c0f4dd067719b431d4d95 11076 monkeysphere_0.43-3.1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEuL9UE3sJ01zwJv6dCRq4VgaaqhwFAl/wp6YACgkQCRq4Vgaa qhyhUw/7BeborSDoSZzmy/bQzU/Au1qFTPDGHPxeB5+tN5RSdXAWVskueJMDtBEa hD4k/1+xoNMA7pJ+eXErplSosSquXZlRrjvKWCInHaJUIrV2/tAeHGi3MONcovis WT8Pqqt8v6PXRqetw92GDEuN6TWjRmBuQPo+WOQX10uBclgRKA7ZZNsqbZ20qOkm qdh9m5iJKgHa9MLhfxYDcUwnXFnAbGRyE7Nf6A6iJbSxfngechbi7m7qVUY5Z1A/ jHjtMKSi8vA8UiiM9pljsdjeRT+7NhCnv1qwD6efkYapg4mx9Bd9Dg/qk+llUPXn hmZmgLY/z8MFh9r0e8DpgYR3cPxDt+hiKGmJHAeAQuB2PLpBK/yNFVLrICj4pzLp difumuWXQ6BYvH2XMu/UxSESGRLJqIuuc6BcLTF7Pqwk3vRN4yGt1NVv3zU1/B6I VYgx4wxtoiOyV5M2HI2/Klz1nJ4c5j8QRYwPO0zeZylkDWBo7n6UWucllADIL9Hv sg8GGbs46o6nOVcb5dOQAtKi0YoiauealQ5ff+2FOp1nS7js6lAGHVoQoTgddqS/ IohoTC5kMKuPujjGVTqAxdHjjApYpLZeCa9KIhcQsPGgyYpN+jVuQs/AiqNJ26XK IgjuvfRfKA4IVooopYcfvFD4QxryQSd5LmnVJt2BF+w0D1XZUW8= =seiL -----END PGP SIGNATURE----- gpgv: Signature made Sat Jan 2 17:04:38 2021 UTC gpgv: using RSA key B8BF54137B09D35CF026FE9D091AB856069AAA1C gpgv: Can't check signature: No public key dpkg-source: warning: cannot verify inline signature for ./monkeysphere_0.43-3.1.dsc: no acceptable signature found dpkg-source: info: extracting monkeysphere in /<> dpkg-source: info: unpacking monkeysphere_0.43.orig.tar.gz dpkg-source: info: unpacking monkeysphere_0.43-3.1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 0001-Expose-sshd-logs-when-ssh-test-fails.patch dpkg-source: info: applying 0002-Ensure-that-make-test-ed25519-works-when-no-tty-is-p.patch dpkg-source: info: applying 0003-Dump-remaining-jobs-during-test-cleanup.patch dpkg-source: info: applying 0004-tests-basic-ensure-functionality-with-output-of-stan.patch dpkg-source: info: applying 0005-Use-gpg-s-reworked-quick-interface-for-adding-revoki.patch dpkg-source: info: applying 0006-mh-import-key-use-ssh-add-and-gpg-agent-for-import-C.patch Check disk space ---------------- Sufficient free space for build +------------------------------------------------------------------------------+ | Starting Timed Build Commands | +------------------------------------------------------------------------------+ /usr/share/debomatic/sbuildcommands/starting-build-commands/no-network monkeysphere_0.43-3.1 sid amd64 ------------------------------------------------------------------------------------------------------ I: Finished running '/usr/share/debomatic/sbuildcommands/starting-build-commands/no-network monkeysphere_0.43-3.1 sid amd64'. Finished processing commands. -------------------------------------------------------------------------------- User Environment ---------------- APT_CONFIG=/var/lib/sbuild/apt.conf HOME=/sbuild-nonexistent LANG=en_GB.UTF-8 LANGUAGE=en_GB:en LC_ALL=C.UTF-8 LD_LIBRARY_PATH=/usr/lib/libeatmydata LD_PRELOAD=libeatmydata.so LOGNAME=debomatic PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games PWD=/<> SCHROOT_ALIAS_NAME=sid-amd64-debomatic SCHROOT_CHROOT_NAME=sid-amd64-debomatic SCHROOT_COMMAND=env SCHROOT_GID=110 SCHROOT_GROUP=sbuild SCHROOT_SESSION_ID=sid-amd64-debomatic-969b14bc-4259-4033-8c42-a9542a57112c SCHROOT_UID=1002 SCHROOT_USER=debomatic SHELL=/bin/sh USER=debomatic dpkg-buildpackage ----------------- Command: dpkg-buildpackage --sanitize-env -us -uc -rfakeroot -Zxz dpkg-buildpackage: info: source package monkeysphere dpkg-buildpackage: info: source version 0.43-3.1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Holger Levsen dpkg-source -Zxz --before-build . dpkg-buildpackage: info: host architecture amd64 debian/rules clean dh clean dh_auto_clean make -j2 clean make[1]: Entering directory '/<>' rm -f src/agent-transfer/agent-transfer rm -rf replaced/ # clean up old monkeysphere packages lying around as well. rm -f monkeysphere_* make[1]: Leaving directory '/<>' dh_clean dpkg-source -Zxz -b . dpkg-source: info: using source format '3.0 (quilt)' dpkg-source: info: building monkeysphere using existing ./monkeysphere_0.43.orig.tar.gz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: building monkeysphere in monkeysphere_0.43-3.1.debian.tar.xz dpkg-source: info: building monkeysphere in monkeysphere_0.43-3.1.dsc debian/rules binary dh binary dh_update_autotools_config dh_autoreconf dh_auto_configure dh_auto_build make -j2 "INSTALL=install --strip-program=true" make[1]: Entering directory '/<>' cc -o src/agent-transfer/agent-transfer -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection --pedantic -Wall -Werror -std=c99 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now src/agent-transfer/main.c -lassuan -L/usr/lib/x86_64-linux-gnu -lgpg-error -L/usr/lib/x86_64-linux-gnu -lgcrypt mkdir -p replaced/src/ sed < src/monkeysphere > replaced/src/monkeysphere \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/ sed < src/monkeysphere-host > replaced/src/monkeysphere-host \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/ sed < src/monkeysphere-authentication > replaced/src/monkeysphere-authentication \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/share/ sed < src/share/defaultenv > replaced/src/share/defaultenv \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/transitions/0.23 > replaced/src/transitions/0.23 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/transitions/0.28 > replaced/src/transitions/0.28 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/src/transitions/ sed < src/transitions/README.txt > replaced/src/transitions/README.txt \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/agent-transfer.1 > replaced/man/man1/agent-transfer.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/monkeysphere.1 > replaced/man/man1/monkeysphere.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ sed < man/man1/openpgp2ssh.1 > replaced/man/man1/openpgp2ssh.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man1/ mkdir -p replaced/man/man7/ sed < man/man1/pem2openpgp.1 > replaced/man/man1/pem2openpgp.1 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man8/ sed < man/man7/monkeysphere.7 > replaced/man/man7/monkeysphere.7 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' sed < man/man8/monkeysphere-authentication.8 > replaced/man/man8/monkeysphere-authentication.8 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' mkdir -p replaced/man/man8/ sed < man/man8/monkeysphere-host.8 > replaced/man/man8/monkeysphere-host.8 \ -e 's:__SYSSHAREDIR_PREFIX__:/usr:' \ -e 's:__SYSCONFDIR_PREFIX__::' \ -e 's:__SYSDATADIR_PREFIX__:/var/lib:' gzip -f -n replaced/man/man1/agent-transfer.1 gzip -f -n replaced/man/man1/monkeysphere.1 gzip -f -n replaced/man/man1/openpgp2ssh.1 gzip -f -n replaced/man/man1/pem2openpgp.1 gzip -f -n replaced/man/man7/monkeysphere.7 gzip -f -n replaced/man/man8/monkeysphere-authentication.8 gzip -f -n replaced/man/man8/monkeysphere-host.8 make[1]: Leaving directory '/<>' dh_auto_test make -j2 test make[1]: Entering directory '/<>' MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/keytrans MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/basic ################################################## ### generating openpgp key... gpg: keybox '/<>/tests/tmp/ms.Okr/pubring.kbx' created improper ownership on '/build': owner ID 103 is neither debomatic (ID 1002) nor the superuser !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! Permissions on testing directory '/<>/tests/tmp/ms.Lu7' are too loose to do proper strict permissions checking. Some tests will be disabled or ignored. To avoid this warning (and to make sure that all tests are run properly), please run these tests within a directory that meets sshd's standards for "StrictModes yes" -- the directory (and every one of its parents) should be owned only be the user running this test or root, and should not be writable by group or other. !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! ################################################## ### configuring testuser home... 2 blocks gpg: keybox '/<>/tests/tmp/ms.Lu7/testuser/.gnupg/pubring.kbx' created gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: /<>/tests/tmp/ms.Lu7/testuser/.gnupg/trustdb.gpg: trustdb created gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) " imported gpg: /<>/tests/tmp/ms.Okr/trustdb.gpg: trustdb created gpg: directory '/<>/tests/tmp/ms.Okr/openpgp-revocs.d' created gpg: revocation certificate stored as '/<>/tests/tmp/ms.Okr/openpgp-revocs.d/D8385C8966592EEC20E383F4ADEBBB6F28BAFF3D.rev' gpg: done ################################################## ### retrieving key timestamp... gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ################################################## ### exporting key to ssh file... ################################################## ### reconvert key, and compare to key in gpg keyring... conversions look good! Now working with key ADEBBB6F28BAFF3D at time 1717604894 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u /<>/tests/tmp/ms.Okr/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2024-06-05 [SC] D8385C8966592EEC20E383F4ADEBBB6F28BAFF3D uid [ultimate] testtest ################################################## ### test User ID addition... gpg: key ADEBBB6F28BAFF3D: "monkeymonkey" 1 new user ID gpg: key ADEBBB6F28BAFF3D: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u /<>/tests/tmp/ms.Okr/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2024-06-05 [SC] D8385C8966592EEC20E383F4ADEBBB6F28BAFF3D uid [ultimate] monkeymonkey uid [ultimate] testtest ################################################## ### sleeping to avoid test suite breakage on fast ### processors (see https://bugs.debian.org/591118) gpg: key E00B5EEEBA79B482: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: no ultimately trusted keys found gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) " not changed gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: Total number processed: 2 gpg: imported: 1 gpg: unchanged: 1 gpg: no ultimately trusted keys found gpg: inserting ownertrust of 6 gpg: inserting ownertrust of 5 ################################################## ### configuring admin home... gpg: keybox '/<>/tests/tmp/ms.Lu7/admin/.gnupg/pubring.kbx' created gpg: /<>/tests/tmp/ms.Lu7/admin/.gnupg/trustdb.gpg: trustdb created gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: key 36FF78B37005D3BE: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: inserting ownertrust of 6 ################################################## ### configuring sshd... ################################################## ### import host key... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.Lu7/ssh_host_rsa_key Your public key has been saved in /<>/tests/tmp/ms.Lu7/ssh_host_rsa_key.pub The key fingerprint is: SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debomatic@carme The key's randomart image is: +---[RSA 3072]----+ | *+. | | .o= | | o o | | . +. o . | | . . .+S . o | | . ...o o.+ | | o o+.ooB+ | | o B=+o*+o. E| | ==B ..=+o+.| +----[SHA256]-----+ using keyserver: example.org ms: lock created on '/<>/tests/tmp/ms.Lu7/host/importlock'. ms: importing RSA key from file '/<>/tests/tmp/ms.Lu7/ssh_host_rsa_key'... Identity added: /<>/tests/tmp/ms.Lu7/ssh_host_rsa_key (debomatic@carme) ms: lock removed on '/<>/tests/tmp/ms.Lu7/host/importlock'. ms: updating openpgp public key file '/<>/tests/tmp/ms.Lu7/host_keys.pub.pgp'... ms: host key imported: pub rsa3072 2024-06-05 [CA] 2EF527B94317F98B09FAE9A3288FBED342504906 uid [ unknown] ssh://testhost.example OpenPGP fingerprint: 2EF527B94317F98B09FAE9A3288FBED342504906 ssh fingerprint: 3072 SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 . (RSA) ################################################## ### getting host key fingerprint... using keyserver: example.org ms: listing primary fingerprints from /<>/tests/tmp/ms.Lu7/host_keys.pub.pgp ms: obtained the following fingerprints: 2EF527B94317F98B09FAE9A3288FBED342504906 ms: publishing all keys ms: using keys: 2EF527B94317F98B09FAE9A3288FBED342504906 ms: invoking show_key 2EF527B94317F98B09FAE9A3288FBED342504906 2EF527B94317F98B09FAE9A3288FBED342504906 ################################################## ### setting host key expiration... using keyserver: example.org ms: extending without prompting. ms: setting key expiration to 1. ms: executing key expire script... ms: updating openpgp public key file '/<>/tests/tmp/ms.Lu7/host_keys.pub.pgp'... ################################################## ### test User ID revocation ... ms: Key 2EF527B94317F98B09FAE9A3288FBED342504906 now expires at 2024-06-06 16:28:19 ms: NOTE: Key expiration date adjusted, but not yet published. ms: Run 'monkeysphere-host publish-key' to publish the new expiration date. ################################################## ### certifying server host key... gpg: key 288FBED342504906: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ################################################## ### setup monkeysphere authentication... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: ms: setting up Monkeysphere authentication trust core... gpg: key ADEBBB6F28BAFF3D: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ms: generating monkeysphere authentication trust core key: ms: size: 3072 bits ms: uid: 'Monkeysphere authentication trust core UID (random string: 6+SWMSfqd+4NSwD3RMMcYex3TjpU)' /<>/tests/tmp/ms.Okr/pubring.kbx ------------------------------------------------------------------------- pub rsa3072 2024-06-05 [SC] D8385C8966592EEC20E383F4ADEBBB6F28BAFF3D uid [ultimate] monkeymonkey uid [ revoked] testtest ################################################## ### test working with two primary keys ... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.Okr/newkey Your public key has been saved in /<>/tests/tmp/ms.Okr/newkey.pub The key fingerprint is: SHA256:40SKvRdqFK13Bg2MPLBdTbuNxdquTXIhzEIrRsJKpcA debomatic@carme The key's randomart image is: +---[RSA 3072]----+ |o oo ooo. | | E + o+o.o.o | | o + +.= o o | | . . = * = B | | . . B S X + | | o B * o . | | + o . + | | . . * | | . . | +----[SHA256]-----+ ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:21 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### adding admin as certifier... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... gpg: key A634E28330445627: public key "fubar" imported gpg: key A634E28330445627: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:21 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: reading key from stdin... ms: checking keys in file... ms: loading key into core keyring... ms: executing core ltsign script... gpg: key ADEBBB6F28BAFF3D: "monkeymonkey" 1 new user ID gpg: key ADEBBB6F28BAFF3D: "monkeymonkey" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 test: diff expected gpg list output ms: exporting core local sigs to sphere... test: diff expected keytrans listfpr output ms: updating sphere trustdb... ms: Identity certifier added. ################################################## ### list certifiers... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:22 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: finding trusted keys... ms: determining core key fingerprint... 4275279C9512E14BDD14098A36FF78B37005D3BE: :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) :1:120: ################################################## ### generating standard monkeysphere key for testuser... ################################################## Monkeysphere keytrans test completed successfully! ################################################## ### removing temp dir... MONKEYSPHERE_TEST_NO_EXAMINE=true MONKEYSPHERE_TEST_USE_ED25519=true ./tests/basic ms: creating password fifo... ms: Prompting for passphrase ms: Launching "/<>/tests/tmp/ms.Lu7/testuser/.ssh/askpass" ms: (with prompt "Please enter your passphrase for E00B5EEEBA79B482: ") ms: Generating subkey. This may take a long time... improper ownership on '/build': owner ID 103 is neither debomatic (ID 1002) nor the superuser !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! Permissions on testing directory '/<>/tests/tmp/ms.aOg' are too loose to do proper strict permissions checking. Some tests will be disabled or ignored. To avoid this warning (and to make sure that all tests are run properly), please run these tests within a directory that meets sshd's standards for "StrictModes yes" -- the directory (and every one of its parents) should be owned only be the user running this test or root, and should not be writable by group or other. !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! ################################################## ### configuring testuser home... 2 blocks gpg: keybox '/<>/tests/tmp/ms.aOg/testuser/.gnupg/pubring.kbx' created gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: /<>/tests/tmp/ms.aOg/testuser/.gnupg/trustdb.gpg: trustdb created gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) " imported gpg: key E00B5EEEBA79B482: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: no ultimately trusted keys found gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) " not changed gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: Total number processed: 2 gpg: imported: 1 gpg: unchanged: 1 gpg: no ultimately trusted keys found gpg: inserting ownertrust of 6 gpg: inserting ownertrust of 5 ################################################## ### configuring admin home... gpg: keybox '/<>/tests/tmp/ms.aOg/admin/.gnupg/pubring.kbx' created gpg: /<>/tests/tmp/ms.aOg/admin/.gnupg/trustdb.gpg: trustdb created gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " imported gpg: key 36FF78B37005D3BE: secret key imported gpg: Total number processed: 1 gpg: imported: 1 gpg: secret keys read: 1 gpg: secret keys imported: 1 gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) " not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: inserting ownertrust of 6 ################################################## ### configuring sshd... ################################################## ### import host key... ms: done. ################################################## ### export server key to testuser... gpg: key 288FBED342504906: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ################################################## ### export testuser key to server... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... Generating public/private rsa key pair. Your identification has been saved in /<>/tests/tmp/ms.aOg/ssh_host_rsa_key Your public key has been saved in /<>/tests/tmp/ms.aOg/ssh_host_rsa_key.pub The key fingerprint is: SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debomatic@carme The key's randomart image is: +---[RSA 3072]----+ | .oo+.. | | ...+ o | | . .o o | | . o o . o | | . B + S . | | ..+ =oo | |+..ooB.+. o | |+.. *.B.*= . | |. .+oE.++ | +----[SHA256]-----+ ms: fixing sphere gnupg home ownership... using keyserver: example.org ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: lock created on '/<>/tests/tmp/ms.aOg/host/importlock'. ms: importing RSA key from file '/<>/tests/tmp/ms.aOg/ssh_host_rsa_key'... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:27 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... Identity added: /<>/tests/tmp/ms.aOg/ssh_host_rsa_key (debomatic@carme) ms: sphere trust model: 1:3:1 ################################################## ### update server authorized_keys file for this testuser... ms: checking authentication directory structure... ms: lock removed on '/<>/tests/tmp/ms.aOg/host/importlock'. ms: updating openpgp public key file '/<>/tests/tmp/ms.aOg/host_keys.pub.pgp'... ms: host key imported: ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... pub rsa3072 2024-06-05 [CA] 887E69F4B3C25D055D1E26C2101D0B155429C43C uid [ unknown] ssh://testhost.example ms: determining core key fingerprint... OpenPGP fingerprint: 887E69F4B3C25D055D1E26C2101D0B155429C43C ssh fingerprint: 3072 SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs . (RSA) ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ################################################## ### getting host key fingerprint... ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... using keyserver: example.org ms: listing primary fingerprints from /<>/tests/tmp/ms.aOg/host_keys.pub.pgp ms: # List of assigned trustvalues, created Wed Jun 5 16:28:27 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: obtained the following fingerprints: 887E69F4B3C25D055D1E26C2101D0B155429C43C ms: publishing all keys ms: sphere trust model: 1:3:1 ms: using keys: 887E69F4B3C25D055D1E26C2101D0B155429C43C ms: invoking show_key 887E69F4B3C25D055D1E26C2101D0B155429C43C ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... 887E69F4B3C25D055D1E26C2101D0B155429C43C ################################################## ### setting host key expiration... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - using keyserver: example.org ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: extending without prompting. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:27 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: setting key expiration to 1. ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: executing key expire script... ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: updating openpgp public key file '/<>/tests/tmp/ms.aOg/host_keys.pub.pgp'... ################################################## ### testing monkeysphere keys-for-userid ... ms: Key 887E69F4B3C25D055D1E26C2101D0B155429C43C now expires at 2024-06-06 16:28:28 ms: NOTE: Key expiration date adjusted, but not yet published. ms: Run 'monkeysphere-host publish-key' to publish the new expiration date. ################################################## ### certifying server host key... ms: processing: ssh://testhost.example gpg: key 101D0B155429C43C: public key "ssh://testhost.example" imported ms: key file: - gpg: Total number processed: 1 gpg: imported: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u ms: primary key found: 288FBED342504906 ################################################## ### setup monkeysphere authentication... ms: checking authentication directory structure... ms: * acceptable primary key. ms: key line: ssh-rsa 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 ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ################################################## ### ssh connection test for success... ##### starting ssh server... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: ms: setting up Monkeysphere authentication trust core... ms: generating monkeysphere authentication trust core key: ms: size: 3072 bits ms: uid: 'Monkeysphere authentication trust core UID (random string: Cg==)Monkeysphere authentication trust core UID (random string: /0WOfCNum6XcKNfHzwWmmwm+UeY=)' ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:29 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ################################################## ### adding admin as certifier... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:30 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: reading key from stdin... ms: checking keys in file... ms: loading key into core keyring... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: executing core ltsign script... ms: exporting core local sigs to sphere... ms: updating sphere trustdb... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: Identity certifier added. ################################################## ### list certifiers... ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.tWX9eW ms: checking authentication directory structure... ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:31 ms: fixing sphere gnupg home ownership... ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: determining core key fingerprint... ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: known_hosts file updated. ms: setting ultimate owner trust on core key in gpg_sphere... ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: # List of assigned trustvalues, created Wed Jun 5 16:28:31 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: checking trust model for authentication ... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork ms: sphere trust model: 1:3:1 ms: finding trusted keys... Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 223549.8, received 230290.9 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### testing functionality in the face of unusual gpg.conf settings... ##### starting ssh server... ms: determining core key fingerprint... 4275279C9512E14BDD14098A36FF78B37005D3BE: :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) :1:120: ################################################## ### generating ed25519 key for testuser... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ################################################## ### export server key to testuser... gpg: key 101D0B155429C43C: public key "ssh://testhost.example" imported gpg: Total number processed: 1 gpg: imported: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ################################################## ### export testuser key to server... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: checking authentication directory structure... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.5vQ1h3 ms: writing core gpg.conf... ms: primary key found: 288FBED342504906 ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: * acceptable primary key. ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: removing matching key lines... ms: setting ultimate owner trust on core key in gpg_sphere... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:34 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:34 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: checking trust model for authentication ... ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: sphere trust model: 1:3:1 ################################################## ### update server authorized_keys file for this testuser... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 ms: checking authentication directory structure... debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 239350.9, received 246568.5 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### removing testuser authorized_user_ids and updating... ms: writing core gpg.conf... ms: checking authentication directory structure... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: setting ultimate owner trust on core key in gpg_sphere... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: # List of assigned trustvalues, created Wed Jun 5 16:28:35 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: setting ultimate owner trust on core key in gpg_sphere... ms: sphere trust model: 1:3:1 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:35 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: ----- user: debomatic ----- ms: checking trust model for authentication ... ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: sphere trust model: 1:3:1 ms: processing authorized_user_ids... ms: ----- user: debomatic ----- ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: checking for authorized_user_ids... ms: primary key found: E00B5EEEBA79B482 ms: empty or absent authorized_user_ids file. ################################################## ### ssh connection test for failure... ##### starting ssh server... ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:34 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### testing monkeysphere keys-for-userid ... ms: processing: ssh://testhost.example ms: key file: - ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDB1z1Sif6xyf0isDQYcsmOES4jPfL42W3C1+E8brYTYz09HRx8u7KzXjQL0wFyoRry6NYncWVJXRfZTP2JPjlUa2zgBTEiBPwf6Fe+RRMPDO1qMiRCDS6kwhFah3mqqt6SXuNbi9kb0kJrTgyoTAkUh/+ma1Bsm7CLeLFnzyaEl5IkvUVbX3do0MtUTym6yoprAwyFim65JFFKx3A6yPmo0Mo0bgtQ9IMUyWsIdyXZ9d3PclF3PZ8d+RrxMdYU/QJtj3KXM2eUMDwxp0E6P0raZIbC71zo6E/khh2y+45MPIKsTpHRKMT/AW/TlkX5u0DPcZGsdUmvfYFE2W/yndJWhSJAevXMlWdQ37QfUv4T0UZRnXkhTo+XVccX2gwhQoC0Qy0TruHhjwj4IK9fTq8gE/sN6HK00Y0pjwP3Uh/xxm8fZGaUH/0he66WPMeNGJT/wI6rZfVUifEcmNEFFcy1sxkoc7NYMfvJ27HEGjS66NFPW8jYJIbzDwdyPRxHfDk= ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.8jHpDw ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:37 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 ms: known_hosts file updated. /<>/tests/../src/monkeysphere ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 ms: processing: ssh://testhost.example debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.heWbG1 debug1: Authentications that can continue: publickey debug1: Trying private key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity no such identity: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity: No such file or directory debug1: No more authentication methods to try. debomatic@testhost.example: Permission denied (publickey). ##### ssh connection test PASSED. returned: 255 ################################################## ### setting group writability on authorized_user_ids and updating... ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDB1z1Sif6xyf0isDQYcsmOES4jPfL42W3C1+E8brYTYz09HRx8u7KzXjQL0wFyoRry6NYncWVJXRfZTP2JPjlUa2zgBTEiBPwf6Fe+RRMPDO1qMiRCDS6kwhFah3mqqt6SXuNbi9kb0kJrTgyoTAkUh/+ma1Bsm7CLeLFnzyaEl5IkvUVbX3do0MtUTym6yoprAwyFim65JFFKx3A6yPmo0Mo0bgtQ9IMUyWsIdyXZ9d3PclF3PZ8d+RrxMdYU/QJtj3KXM2eUMDwxp0E6P0raZIbC71zo6E/khh2y+45MPIKsTpHRKMT/AW/TlkX5u0DPcZGsdUmvfYFE2W/yndJWhSJAevXMlWdQ37QfUv4T0UZRnXkhTo+XVccX2gwhQoC0Qy0TruHhjwj4IK9fTq8gE/sN6HK00Y0pjwP3Uh/xxm8fZGaUH/0he66WPMeNGJT/wI6rZfVUifEcmNEFFcy1sxkoc7NYMfvJ27HEGjS66NFPW8jYJIbzDwdyPRxHfDk= MonkeySphere2024-06-05T16:28:37 ms: checking authentication directory structure... ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: writing core gpg.conf... debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 394259.2, received 477668.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### testing functionality in the face of unusual gpg.conf settings... ##### starting ssh server... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:38 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:38 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### setting other writability on authorized_user_ids and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: # List of assigned trustvalues, created Wed Jun 5 16:28:39 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:39 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:40 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: /<>/tests/../src/monkeysphere ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: checking for authorized_user_ids... ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.D8JMs8 ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: removing matching key lines... ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:40 ms: - unacceptable primary key. ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: * acceptable sub key. ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: known_hosts file updated. ms: KEYS_VALID=1 ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ################################################## ### setup for symlink tests... ################################################## ### make authorized_user_ids an absolute symlink and updating... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent ms: checking authentication directory structure... Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 752127.4, received 911246.2 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### removing testuser authorized_user_ids and updating... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: checking authentication directory structure... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: writing core gpg.conf... ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: setting ultimate owner trust on core key in gpg_sphere... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:41 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: setting ultimate owner trust on core key in gpg_sphere... ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:41 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: processing authorized_user_ids... ms: checking trust model for authentication ... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: sphere trust model: 1:3:1 ms: primary key found: E00B5EEEBA79B482 ms: ----- user: debomatic ----- ms: - unacceptable primary key. ms: checking for authorized_user_ids... ms: empty or absent authorized_user_ids file. ms: * acceptable sub key. ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDS3uH4KF060PTBP/BxiI8+3n4GLerO2wjMqC/yORqI25vLb5tM1RgkKd91Cd9jlWYN5KN3Nb51M3kqgMB9eCtmUCe1YqcC5Y41ZJ+FZVFm/BJyoYgB0bPfeT5Zn9s3+SyJvAoehXuzkhO9oU2cM/bnB4uM4f1Jr/1wIknhISjbi6NxfNwvv6bBCmK3IyDtQfiGrMtMKxOaxbC/RXu011f+CVJrIivs9y8z4OdDHZmGVb+r6A0G46o14/AxYTy57IgWAmJ0mi1euFC2HeCYvbX06RovRdwm/FT67sOXUEV+A1rssN7vCUxW0fY1w1gHWQPSf3G6DLqGw9dPYS/Ri/OMmfjgY/1lJOnpYXPqDq7FjU2sbI9mlGvOqcgl94MbmkWqiItXIbAKc1TH79GHR/5o9ec5Lfa22zmI3gYyKQlh61KoX/T0LNWbzQcpTHkCT5rzMWrw6Mt3CU98GNQxtm0x6XI8BtruA+j9s43qSeu0NWbX2e+thh8j7g0VIThLQik= MonkeySphere2024-06-05T16:28:40 Monkeysphere Test Suite Test User (DO NOT USE!!!) ################################################## ### ssh connection test for failure... ##### starting ssh server... ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. /<>/tests/../src/monkeysphere ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.vUjCWD ms: primary key found: 101D0B155429C43C ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: * acceptable primary key. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.akYXt0 ms: removing matching key lines... ms: primary key found: 288FBED342504906 ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:43 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: * acceptable primary key. ms: removing matching key lines... ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:43 debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Authentications that can continue: publickey debug1: Trying private key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity no such identity: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity: No such file or directory debug1: No more authentication methods to try. debomatic@testhost.example: Permission denied (publickey). ##### ssh connection test PASSED. returned: 255 ################################################## ### setting group writability on authorized_user_ids and updating... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: checking authentication directory structure... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 346370.2, received 356814.9 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: checking authentication directory structure... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: setting ultimate owner trust on core key in gpg_sphere... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:44 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: checking trust model for authentication ... ms: setting ultimate owner trust on core key in gpg_sphere... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: # List of assigned trustvalues, created Wed Jun 5 16:28:44 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: checking trust model for authentication ... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: sphere trust model: 1:3:1 ms: key file: - ms: ----- user: debomatic ----- ms: primary key found: E00B5EEEBA79B482 ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: - unacceptable primary key. ms: * acceptable sub key. ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:44 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ms: primary key found: E00B5EEEBA79B482 ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### setting other writability on authorized_user_ids and updating... ms: - unacceptable primary key. ms: * acceptable sub key. ms: checking authentication directory structure... ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDS3uH4KF060PTBP/BxiI8+3n4GLerO2wjMqC/yORqI25vLb5tM1RgkKd91Cd9jlWYN5KN3Nb51M3kqgMB9eCtmUCe1YqcC5Y41ZJ+FZVFm/BJyoYgB0bPfeT5Zn9s3+SyJvAoehXuzkhO9oU2cM/bnB4uM4f1Jr/1wIknhISjbi6NxfNwvv6bBCmK3IyDtQfiGrMtMKxOaxbC/RXu011f+CVJrIivs9y8z4OdDHZmGVb+r6A0G46o14/AxYTy57IgWAmJ0mi1euFC2HeCYvbX06RovRdwm/FT67sOXUEV+A1rssN7vCUxW0fY1w1gHWQPSf3G6DLqGw9dPYS/Ri/OMmfjgY/1lJOnpYXPqDq7FjU2sbI9mlGvOqcgl94MbmkWqiItXIbAKc1TH79GHR/5o9ec5Lfa22zmI3gYyKQlh61KoX/T0LNWbzQcpTHkCT5rzMWrw6Mt3CU98GNQxtm0x6XI8BtruA+j9s43qSeu0NWbX2e+thh8j7g0VIThLQik= MonkeySphere2024-06-05T16:28:44 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ms: determining core key fingerprint... ################################################## ### make authorized_user_ids a relative symlink and updating... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: checking authentication directory structure... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:45 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: checking trust model for authentication ... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: checking for authorized_user_ids... ms: setting ultimate owner trust on core key in gpg_sphere... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:45 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: checking gpg_sphere owner trust set properly... ms: key file: - ms: checking trust model for authentication ... ms: primary key found: E00B5EEEBA79B482 ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: - unacceptable primary key. ms: * acceptable sub key. ms: checking for authorized_user_ids... ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:45 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: checking authentication directory structure... ms: - unacceptable primary key. ms: writing core gpg.conf... ms: * acceptable sub key. ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:45 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: determining core key fingerprint... ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:46 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:46 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### setup for symlink tests... ################################################## ### make authorized_user_ids an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:47 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:46 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.Byv2g6 ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCuz4S5JqMY2we48HgEEH6q6Rz8DVqxp25PFG6abbZRL2wdVT4HL8RiiLDMH6+7QCA/ia1a/o7vWQLDyVde4zGOYiEJ3YiMI6rbB5YLifgcgz3I2NwwPJc3Df4f7udF04R1HJzKqCigzn+SnI7DxCiiUej0Ii6iytrSTNNUr3568r7Z3U8Bb/By47CTV5xnPk4bo9ioeUmNmXlL901MW1w/mK199U7qL7Ia2hi4l5m3EJR3DGv32tp5ofGse+zhPZAMRVrk8zJ6X/OpmdgQCpcDpxXQHiNLN5AiVXQKU1XKxXjJJfm8m6kXRnZpafFiI/q+jdE6DkE4NmR9T3GNKfYdtjAgYr9TTmAgAiSfhwz05YDdtGjmLxhfQAznAeIx9CGuOA78t2QXcPyIU3VSrh7nxFfvPc2R7lpNqCwo8P88J9YxR/HR/KJXaLqdpZBvOEIhbDxUaKCgghDzOeuQlEKgAC4DM8S68h4e1oNzcyCRL6iWvkgbj/cZEcDlgqdkitE= MonkeySphere2024-06-05T16:28:48 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 413323.3, received 425787.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:49 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: - unacceptable primary key. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.IX6CmN ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:48 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: primary key found: 101D0B155429C43C ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: * acceptable primary key. ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ms: removing matching key lines... ################################################## ### make .monkeysphere directory an absolute symlink and updating... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:49 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: checking authentication directory structure... ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork ms: setting ultimate owner trust on core key in gpg_sphere... Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 205580.2, received 249072.4 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:50 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking authentication directory structure... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: checking for authorized_user_ids... ms: determining core key fingerprint... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: setting ultimate owner trust on core key in gpg_sphere... ms: primary key found: E00B5EEEBA79B482 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:50 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: - unacceptable primary key. ms: checking trust model for authentication ... ms: * acceptable sub key. ms: sphere trust model: 1:3:1 ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:49 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: ----- user: debomatic ----- ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:50 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make authorized_user_ids a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:51 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:51 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ##### starting ssh client... ms: processing: ssh://testhost.example ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.52TZYh ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:53 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 161904.8, received 166787.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: # List of assigned trustvalues, created Wed Jun 5 16:28:54 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: sphere trust model: 1:3:1 ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: ----- user: debomatic ----- ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.5K1aKb ms: primary key found: 101D0B155429C43C ms: checking for authorized_user_ids... ms: * acceptable primary key. ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: removing matching key lines... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:54 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: primary key found: E00B5EEEBA79B482 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: - unacceptable primary key. ms: * acceptable sub key. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:53 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory a relative symlink and updating... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 178955.3, received 216814.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: determining core key fingerprint... ms: fixing sphere gnupg home ownership... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: determining core key fingerprint... ms: exporting core pub key to sphere keyring... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: setting ultimate owner trust on core key in gpg_sphere... ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:54 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:55 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking trust model for authentication ... ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: sphere trust model: 1:3:1 ms: checking for authorized_user_ids... ms: ----- user: debomatic ----- ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: checking for authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: key file: - ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: primary key found: E00B5EEEBA79B482 ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: - unacceptable primary key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:54 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: * acceptable sub key. ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:54 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory an absolute symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:55 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:55 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.bowvI6 ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:57 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 183293.1, received 188820.3 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:28:58 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 ms: checking gpg_sphere owner trust set properly... debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: checking for authorized_user_ids... ms: processing: ssh://testhost.example ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.kzvdEu ms: processing authorized_user_ids... ms: primary key found: 101D0B155429C43C ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: * acceptable primary key. ms: removing matching key lines... ms: - unacceptable primary key. ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:28:58 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: * acceptable sub key. ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:58 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### making sure we are back to normal... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 ms: checking authentication directory structure... debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 173806.5, received 210576.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir and updating... ms: writing core gpg.conf... ms: checking authentication directory structure... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: writing core gpg.conf... ms: exporting core pub key to sphere keyring... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: setting ultimate owner trust on core key in gpg_sphere... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:59 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: Monkeysphere authentication trust core already exists. ms: checking gpg_sphere owner trust set properly... ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: # List of assigned trustvalues, created Wed Jun 5 16:28:59 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: ----- user: debomatic ----- ms: checking trust model for authentication ... ms: checking for authorized_user_ids... ms: sphere trust model: 1:3:1 ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: ----- user: debomatic ----- ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: primary key found: E00B5EEEBA79B482 ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: - unacceptable primary key. ms: * acceptable sub key. ms: primary key found: E00B5EEEBA79B482 ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:28:59 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ms: - unacceptable primary key. ms: * acceptable sub key. ##### starting ssh server... ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:28:59 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### make .monkeysphere directory a relative symlink and updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:00 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:00 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.nhQFKs ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCuz4S5JqMY2we48HgEEH6q6Rz8DVqxp25PFG6abbZRL2wdVT4HL8RiiLDMH6+7QCA/ia1a/o7vWQLDyVde4zGOYiEJ3YiMI6rbB5YLifgcgz3I2NwwPJc3Df4f7udF04R1HJzKqCigzn+SnI7DxCiiUej0Ii6iytrSTNNUr3568r7Z3U8Bb/By47CTV5xnPk4bo9ioeUmNmXlL901MW1w/mK199U7qL7Ia2hi4l5m3EJR3DGv32tp5ofGse+zhPZAMRVrk8zJ6X/OpmdgQCpcDpxXQHiNLN5AiVXQKU1XKxXjJJfm8m6kXRnZpafFiI/q+jdE6DkE4NmR9T3GNKfYdtjAgYr9TTmAgAiSfhwz05YDdtGjmLxhfQAznAeIx9CGuOA78t2QXcPyIU3VSrh7nxFfvPc2R7lpNqCwo8P88J9YxR/HR/KJXaLqdpZBvOEIhbDxUaKCgghDzOeuQlEKgAC4DM8S68h4e1oNzcyCRL6iWvkgbj/cZEcDlgqdkitE= MonkeySphere2024-06-05T16:29:02 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 197931.4, received 203900.0 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### checking ssh authorized_key option support... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:03 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: checking trust model for authentication ... ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.3YLA5J ms: sphere trust model: 1:3:1 ms: primary key found: 101D0B155429C43C ms: ----- user: debomatic ----- ms: * acceptable primary key. ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: removing matching key lines... ms: processing authorized_user_ids... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:03 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: primary key found: E00B5EEEBA79B482 ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: - unacceptable primary key. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: * acceptable sub key. ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-rsa 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 MonkeySphere2024-06-05T16:29:03 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ##### starting ssh server... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 977958.4, received 1184853.6 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### create bad permissions on link dir updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:04 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:04 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for failure... WARNING!!! Test SKIPPED because we are running in an unsafe working directory. ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:04 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:04 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.yQ61iN ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:06 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5008 bytes, in 0.0 seconds Bytes per second: sent 200131.7, received 204209.3 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.Wnk5bw ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:07 ms: adding key line to file... ms: KEYS_PROCESSED=1 ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 294556.6, received 356872.5 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### checking ssh authorized_key option support... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:08 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: primary key found: E00B5EEEBA79B482 ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.x6gd2K ms: - unacceptable primary key. ms: primary key found: 288FBED342504906 ms: * acceptable sub key. ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:08 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: * acceptable primary key. ms: removing matching key lines... ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ##### starting ssh server... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:08 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/false debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4916, received 5008 bytes, in 0.0 seconds Bytes per second: sent 1142791.8, received 1164178.4 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:09 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:29:09 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.uPFiKf ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:11 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4648 bytes, in 0.0 seconds Bytes per second: sent 116950.1, received 140243.5 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.I5wUuf ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:12 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 ##### starting ssh client... debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 252399.6, received 260010.7 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' without new name... ##### starting ssh server... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.ihWvZc ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:14 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding command pty user-rc debug1: Sending command: /bin/false debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3884, received 4648 bytes, in 0.0 seconds Bytes per second: sent 120623.4, received 144350.5 debug1: Exit status 1 ##### ssh connection test PASSED. returned: 1 ################################################## ### making sure we are back to normal... ms: checking authentication directory structure... debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: setting ultimate owner trust on core key in gpg_sphere... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.V5eISv ms: # List of assigned trustvalues, created Wed Jun 5 16:29:15 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: no primary keys found. ms: checking gpg_sphere owner trust set properly... ms: KEYS_PROCESSED=0 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: checking trust model for authentication ... ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: sphere trust model: 1:3:1 debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: ----- user: debomatic ----- debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: checking for authorized_user_ids... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### add servicename, certify by admin, import by user... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... using keyserver: example.org ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: adding service name without prompting. ms: * acceptable sub key. gpg: no need for a trustdb check with 'always' trust model ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:14 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: updating openpgp public key file '/<>/tests/tmp/ms.Lu7/host_keys.pub.pgp'... ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ##### starting ssh server... pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] 2EF527B94317F98B09FAE9A3288FBED342504906 uid [ unknown] ssh://testhost2.example uid [ unknown] ssh://testhost.example OpenPGP fingerprint: 2EF527B94317F98B09FAE9A3288FBED342504906 ssh fingerprint: 3072 SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 . (RSA) NOTE: Service name added to key, but key not published. Run 'monkeysphere-host publish-key' to publish the new service name. gpg: key 288FBED342504906: "ssh://testhost2.example" 1 new user ID gpg: key 288FBED342504906: "ssh://testhost2.example" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ################################################## ### ssh connection test with hostname 'testhost2.example' added... gpg: key 288FBED342504906: "ssh://testhost2.example" 1 new user ID gpg: key 288FBED342504906: "ssh://testhost2.example" 2 new signatures gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 2 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... /<>/tests/../src/monkeysphere ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.OZ2m1Z ms: primary key found: 101D0B155429C43C ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: * acceptable primary key. ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: removing matching key lines... ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.rCNnxw ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:17 ms: primary key found: 288FBED342504906 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCuz4S5JqMY2we48HgEEH6q6Rz8DVqxp25PFG6abbZRL2wdVT4HL8RiiLDMH6+7QCA/ia1a/o7vWQLDyVde4zGOYiEJ3YiMI6rbB5YLifgcgz3I2NwwPJc3Df4f7udF04R1HJzKqCigzn+SnI7DxCiiUej0Ii6iytrSTNNUr3568r7Z3U8Bb/By47CTV5xnPk4bo9ioeUmNmXlL901MW1w/mK199U7qL7Ia2hi4l5m3EJR3DGv32tp5ofGse+zhPZAMRVrk8zJ6X/OpmdgQCpcDpxXQHiNLN5AiVXQKU1XKxXjJJfm8m6kXRnZpafFiI/q+jdE6DkE4NmR9T3GNKfYdtjAgYr9TTmAgAiSfhwz05YDdtGjmLxhfQAznAeIx9CGuOA78t2QXcPyIU3VSrh7nxFfvPc2R7lpNqCwo8P88J9YxR/HR/KJXaLqdpZBvOEIhbDxUaKCgghDzOeuQlEKgAC4DM8S68h4e1oNzcyCRL6iWvkgbj/cZEcDlgqdkitE= MonkeySphere2024-06-05T16:29:18 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey ms: known_hosts file updated. debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 Could not chdir to home directory /home/debomatic: No such file or directory debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 259410.8, received 314291.3 debug1: Exit status 0 debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' without new name... ##### starting ssh server... debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 1285717.4, received 1324488.1 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' ... gpg: key 288FBED342504906: "ssh://testhost2.example" not changed gpg: Total number processed: 1 gpg: unchanged: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.GbZHQZ ms: no primary keys found. ms: KEYS_PROCESSED=0 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### add servicename, certify by admin, import by user... using keyserver: example.org ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.JBD4xi ms: primary key found: 288FBED342504906 ms: * acceptable primary key. ms: adding service name without prompting. ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:20 ms: adding key line to file... ms: KEYS_PROCESSED=1 gpg: no need for a trustdb check with 'always' trust model ms: KEYS_VALID=1 ms: updating openpgp public key file '/<>/tests/tmp/ms.aOg/host_keys.pub.pgp'... ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] 887E69F4B3C25D055D1E26C2101D0B155429C43C uid [ unknown] ssh://testhost2.example uid [ unknown] ssh://testhost.example OpenPGP fingerprint: 887E69F4B3C25D055D1E26C2101D0B155429C43C ssh fingerprint: 3072 SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs . (RSA) NOTE: Service name added to key, but key not published. Run 'monkeysphere-host publish-key' to publish the new service name. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY gpg: key 101D0B155429C43C: "ssh://testhost2.example" 1 new user ID gpg: key 101D0B155429C43C: "ssh://testhost2.example" 1 new signature gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 1 debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost2.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:2 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent ################################################## ### ssh connection test with hostname 'testhost2.example' added... Authenticated to testhost2.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 262954.5, received 270883.8 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test for failure with 'testhost2.example' revoked... gpg: key 101D0B155429C43C: "ssh://testhost2.example" 1 new user ID gpg: key 101D0B155429C43C: "ssh://testhost2.example" 2 new signatures gpg: Total number processed: 1 gpg: new user IDs: 1 gpg: new signatures: 2 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... using keyserver: example.org ms: revoking service name without prompting. gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.Lu7/host_keys.pub.pgp'... pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] 2EF527B94317F98B09FAE9A3288FBED342504906 uid [ unknown] ssh://testhost.example uid [ revoked] ssh://testhost2.example OpenPGP fingerprint: 2EF527B94317F98B09FAE9A3288FBED342504906 ssh fingerprint: 3072 SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 . (RSA) NOTE: Service name revoked, but revocation not published. Run 'monkeysphere-host publish-key' to publish the revocation. gpg: key 288FBED342504906: "ssh://testhost.example" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.yIM5I4 ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:23 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 161749.0, received 195968.4 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test directly to 'testhost2.example' ... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... gpg: key 101D0B155429C43C: "ssh://testhost2.example" not changed gpg: Total number processed: 1 gpg: unchanged: 1 ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.mrH0Nv ms: primary key found: 288FBED342504906 ms: - unacceptable user ID validity (r). ms: - unacceptable primary key. ms: removing matching key lines... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: output ssh marginal ui... -------------------- Monkeysphere warning ------------------- Monkeysphere found OpenPGP keys for this hostname, but none had full validity. Could not retrieve RSA host key from testhost2.example. The following keys were found with marginal validity: gpg: 2 good signatures Other user IDs on this key: uid [ full ] ssh://testhost.example pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] RSA key fingerprint is SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28. Run the following command for more info about the found keys: gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example -------------------- ssh continues below -------------------- debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### testing monkeysphere authentication keys-for-user ms: checking authentication directory structure... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:26 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa 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 MonkeySphere2024-06-05T16:29:25 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: outputting keys to stdout... ################################################## ### settings reset, updating... ms: checking authentication directory structure... debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: determining core key fingerprint... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: core fingerprint: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B ms: processing: ssh://testhost2.example ms: Monkeysphere authentication trust core already exists. ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.iwF6UV ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: primary key found: 101D0B155429C43C ms: # List of assigned trustvalues, created Wed Jun 5 16:29:27 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: 9E477639EAAC4C12E03A5B1FC7F1C7415504E20B:6: ms: checking gpg_sphere owner trust set properly... ms: * acceptable primary key. ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:26 ms: checking trust model for authentication ... ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: sphere trust model: 1:3:1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: ----- user: debomatic ----- ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: checking for authorized_user_ids... debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost2.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:2 ms: key file: - debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent ms: primary key found: E00B5EEEBA79B482 Authenticated to testhost2.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 348274.1, received 421954.4 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### ssh connection test for failure with 'testhost2.example' revoked... using keyserver: example.org ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDS3uH4KF060PTBP/BxiI8+3n4GLerO2wjMqC/yORqI25vLb5tM1RgkKd91Cd9jlWYN5KN3Nb51M3kqgMB9eCtmUCe1YqcC5Y41ZJ+FZVFm/BJyoYgB0bPfeT5Zn9s3+SyJvAoehXuzkhO9oU2cM/bnB4uM4f1Jr/1wIknhISjbi6NxfNwvv6bBCmK3IyDtQfiGrMtMKxOaxbC/RXu011f+CVJrIivs9y8z4OdDHZmGVb+r6A0G46o14/AxYTy57IgWAmJ0mi1euFC2HeCYvbX06RovRdwm/FT67sOXUEV+A1rssN7vCUxW0fY1w1gHWQPSf3G6DLqGw9dPYS/Ri/OMmfjgY/1lJOnpYXPqDq7FjU2sbI9mlGvOqcgl94MbmkWqiItXIbAKc1TH79GHR/5o9ec5Lfa22zmI3gYyKQlh61KoX/T0LNWbzQcpTHkCT5rzMWrw6Mt3CU98GNQxtm0x6XI8BtruA+j9s43qSeu0NWbX2e+thh8j7g0VIThLQik= MonkeySphere2024-06-05T16:29:26 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ms: revoking service name without prompting. gpg: no need for a trustdb check with 'always' trust model ms: updating openpgp public key file '/<>/tests/tmp/ms.aOg/host_keys.pub.pgp'... pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] 887E69F4B3C25D055D1E26C2101D0B155429C43C uid [ unknown] ssh://testhost.example uid [ revoked] ssh://testhost2.example OpenPGP fingerprint: 887E69F4B3C25D055D1E26C2101D0B155429C43C ssh fingerprint: 3072 SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs . (RSA) NOTE: Service name revoked, but revocation not published. Run 'monkeysphere-host publish-key' to publish the revocation. gpg: key 101D0B155429C43C: "ssh://testhost.example" 1 new signature gpg: Total number processed: 1 gpg: new signatures: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2024-06-06 ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.Lu7/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.Lu7/ssh-socket debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost2.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts.monkeysphere.xCPkJe ms: processing: ssh://testhost2.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.BCSQ2X ms: primary key found: 288FBED342504906 ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: - unacceptable user ID validity (r). ms: - unacceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:29 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: KEYS_PROCESSED=1 ms: KEYS_VALID=0 ms: lock touched on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ms: output ssh marginal ui... -------------------- Monkeysphere warning ------------------- Monkeysphere found OpenPGP keys for this hostname, but none had full validity. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY Could not retrieve RSA host key from testhost2.example. debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:Kn36yWzMqd1xvEvuoJoA3WQVhs3Mm7JtH5e0jvFzy28 debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.Lu7/testuser/.ssh/known_hosts:1 The following keys were found with marginal validity: debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Will attempt key: /<>/tests/tmp/ms.Lu7/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) RSA SHA256:RgfenzFrZ6rn4yYjOm1pLlAgGyYkTOmeytGmBCaMkt8 agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.Lu7/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 4908, received 5056 bytes, in 0.0 seconds Bytes per second: sent 247159.2, received 254612.3 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### Testing TLS setup... Can't load /sbuild-nonexistent/.rnd into RNG 4047A756277F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd ..++++++++++++++++++++++++++++++++++++++++++*.+....+...+..+...+...+...+..........+.....+.+...+..+.........+.+........+......+.+...+...+..+...+...+.+.........+..+.......+......+......+.........+............+...............+........+.......+..++++++++++++++++++++++++++++++++++++++++++*........+...+..+.+........+................+.........+.................+....+........+.......+.....+...+...............+......+........................................+.....+.......+++++ .................................+..+...++++++++++++++++++++++++++++++++++++++++++*..........+...+...+..+.+.....+.+..............+.++++++++++++++++++++++++++++++++++++++++++*.......+...+....+.....................+..+.gpg: 2 good signatures ......+......+.....+......+.+..+...............+..........+...+..+.......+..... +.+.....+.......+...+...+......+........+......+....+.....+...+.......+.....+.......+........+......+....+...+........+..........+..+..........+...+.............................+.......+.............................+.+...+............+...+........+..........+..+...+.............+......+...............+...+. Other user IDs on this key: ................+...............+...............+.........+.........+.+.........+..+...+.+.........uid [ full ] ssh://testhost.example +pub rsa3072 2024-06-05 [CA] [expires: 2024-06-06] RSA key fingerprint is SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs. .....+.+.........+.....+......+.......+..+.......+.....................+...+..+...+..........+...........+...+......+....+......+...........+.+..................+..+............+...+..................+....+..+.Run the following command for more info about the found keys: gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example ...+......+........+.......+........+.......+.........+......+..............+-------------------- ssh continues below -------------------- ......+debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost2.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent ......+.......+...+............+.debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none ...................+...+..........+.....+...+.+...............+......+.....+...+............+.............+............+.........+...........+.......+...+.....+..........+...+...........+.+........................+.....+.+...+..+.........+.............+........+...+.+........+..........+...+.........+++++ ----- Cannot write random bytes: 4047A756277F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd FAILED! ### removing temp dir... debug1: expecting SSH2_MSG_KEX_ECDH_REPLY make[1]: *** [Makefile:113: test-basic] Error 1 make[1]: *** Waiting for unfinished jobs.... debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory No RSA host key is known for testhost2.example and you have requested strict checking. Host key verification failed. ##### ssh connection test PASSED. returned: 255 ################################################## ### testing monkeysphere authentication keys-for-user ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:31 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:30 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: outputting keys to stdout... ################################################## ### settings reset, updating... ms: checking authentication directory structure... ms: writing core gpg.conf... ms: writing sphere gpg.conf... ms: fixing sphere gnupg home ownership... ms: determining core key fingerprint... ms: core fingerprint: F5ACDB22439FC6D17384EF48A06198D8F0273355 ms: Monkeysphere authentication trust core already exists. ms: exporting core pub key to sphere keyring... ms: setting ultimate owner trust on core key in gpg_sphere... ms: # List of assigned trustvalues, created Wed Jun 5 16:29:31 2024 UTC ms: # (Use "gpg --import-ownertrust" to restore them) ms: F5ACDB22439FC6D17384EF48A06198D8F0273355:6: ms: checking gpg_sphere owner trust set properly... ms: checking trust model for authentication ... ms: sphere trust model: 1:3:1 ms: ----- user: debomatic ----- ms: checking for authorized_user_ids... ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false... ms: processing authorized_user_ids... ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: key file: - ms: primary key found: E00B5EEEBA79B482 ms: - unacceptable primary key. ms: * acceptable sub key. ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIODSmCEu+NoeaXfWruLnfjJPcLNybUVjhA2wWdGSj5re MonkeySphere2024-06-05T16:29:31 Monkeysphere Test Suite Test User (DO NOT USE!!!) ms: KEYS_PROCESSED=2 ms: KEYS_VALID=1 ms: moving new file to /<>/tests/tmp/ms.aOg/authorized_keys/debomatic... ################################################## ### ssh connection test for success... ##### starting ssh server... ##### starting ssh client... ERROR: ld.so: object 'libeatmydata.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. debug1: Executing proxy command: exec /<>/tests/tmp/ms.aOg/testuser/.ssh/proxy-command testhost.example 22 /<>/tests/tmp/ms.aOg/ssh-socket debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity type -1 debug1: identity file /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.7p1 Debian-5 /<>/tests/../src/monkeysphere ms: skipping path permission check for '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts' because STRICT_MODES is false... ms: lock created on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: processing: ssh://testhost.example ms: key file: /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts.monkeysphere.6JzgLl ms: primary key found: 101D0B155429C43C ms: * acceptable primary key. ms: removing matching key lines... ms: key line: testhost.example ssh-rsa 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 MonkeySphere2024-06-05T16:29:33 ms: adding key line to file... ms: KEYS_PROCESSED=1 ms: KEYS_VALID=1 ms: lock touched on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. ms: known_hosts file updated. ms: lock removed on '/<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts'. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.7p1 Debian-5 debug1: compat_banner: match: OpenSSH_9.7p1 Debian-5 pat OpenSSH* compat 0x04000000 debug1: Authenticating to testhost.example:22 as 'debomatic' debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: sntrup761x25519-sha512@openssh.com debug1: kex: host key algorithm: rsa-sha2-512 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-rsa SHA256:VDCGUuHZjyI9kot9wAauomHHZ9YO3ur02YAfbteSvIs debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host 'testhost.example' is known and matches the RSA host key. debug1: Found key in /<>/tests/tmp/ms.aOg/testuser/.ssh/known_hosts:1 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug1: rekey in after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: get_agent_identities: bound agent to hostkey debug1: get_agent_identities: agent returned 1 keys debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Will attempt key: /<>/tests/tmp/ms.aOg/testuser/.ssh/no-such-identity explicit debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) ED25519 SHA256:vScnK/xuvYdiLT84aQ9g025g563AdAiOKiaxwUedz3o agent Authenticated to testhost.example (via proxy) using "publickey". debug1: channel 0: new session [client-session] (inactive timeout: 0) debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: pledge: proc debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /<>/tests/tmp/ms.aOg/authorized_keys/debomatic:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Sending command: true debug1: pledge: fork Could not chdir to home directory /home/debomatic: No such file or directory debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 3876, received 4696 bytes, in 0.0 seconds Bytes per second: sent 185765.6, received 225065.8 debug1: Exit status 0 ##### ssh connection test PASSED. returned: 0 ################################################## ### Testing TLS setup... Can't load /sbuild-nonexistent/.rnd into RNG 4067C72BF17F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd ..+.....+.+...+.....++++++++++++++++++++++++++++++++++++++++++*.......+...+.......+...+..................++++++++++++++++++++++++++++++++++++++++++*.+.....+.......+..+.+.........+.........+..+............+...+.......+........+.......+.....+.....................+...............+....+...+..+.......+.....+...+...+..........+........+......+.+........+.........+.+...........+...+.+......+........+..........+....................+...+.........+......+.......+.....................+.........+..+...+.......+...+...+.....+...+.+.....+.+........+.......+........+.........+...+...+......+.+........................+........+.......+...+........+....+.....+...+................+.....+....+..+......+.......+...........+....+...............+............+........+.......+......+...............+..+.+..+.......+..+.............+..+.+...+............+.........+...........+.............+..+...+....+...+........+..........+.........+..+...+............+....+...........+...+.......+...+..+...+.+..+............+......+.+........+.+............+...............+..+.............+........+......+..........+...+..+.........+....+...+..+.+.....+.+........+......................+...............+...+........+...+......+....+.........+........+.............+..+...+......+...............+......+...+.......+.....+.............+.....+................+.....+....+......+..................+......+............+.........+.....+......+...+.+.........+..+...+............+.........+....+......+......+.....+.......+...+..+.+......+.....+.+........+............+.............+.........+............+.....+...+...............+.............+...+......+........+...+....+......+...............+...+..+.........+.............+..+......+.........................+..+.+.....+.+..............+............+...+.......+...............+.....+............+.+............+...............+........+.......+..+.....................+.+.....+......+.......+...+..+++++ ....+....+......+...+..+...+...................++++++++++++++++++++++++++++++++++++++++++*.+......+...+..+...+......+...++++++++++++++++++++++++++++++++++++++++++*...+..+.........+......+....+.....+.........+.........+..........+...........+..........+..+....+......+..+......+..........+..+..........+.........+........+.....................+.+........+.+.................+...+.+......+..+......+...............+................+...........+..........+............+.....+.......+......+..+......+......+......+....+...+......+..........................+......+...+..........+.........+..+.+..............+....+............+.....+..........+...+..............+++++ ----- Cannot write random bytes: 4067C72BF17F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd FAILED! ### removing temp dir... make[1]: *** [Makefile:116: test-ed25519] Error 1 make[1]: Leaving directory '/<>' dh_auto_test: error: make -j2 test returned exit code 2 make: *** [debian/rules:6: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- Build finished at 2024-06-05T16:29:34Z Finished -------- +------------------------------------------------------------------------------+ | Cleanup | +------------------------------------------------------------------------------+ Purging /<> Not cleaning session: cloned chroot in use E: Build failure (dpkg-buildpackage died) +------------------------------------------------------------------------------+ | Summary | +------------------------------------------------------------------------------+ Build Architecture: amd64 Build Type: full Build-Space: 1240 Build-Time: 82 Distribution: sid Fail-Stage: build Host Architecture: amd64 Install-Time: 14 Job: /srv/debomatic/incoming/monkeysphere_0.43-3.1.dsc Machine Architecture: amd64 Package: monkeysphere Package-Time: 114 Source-Version: 0.43-3.1 Space: 1240 Status: attempted Version: 0.43-3.1 -------------------------------------------------------------------------------- Finished at 2024-06-05T16:29:34Z Build needed 00:01:54, 1240k disk space