freebsd-dev/crypto/openssh/regress
Ed Maste 8c22023ca5 ssh: disable RSA/SHA-1 signatures
From OpenSSH 8.8p1's release notes:

---

Potentially-incompatible changes
================================

This release disables RSA signatures using the SHA-1 hash algorithm
by default. This change has been made as the SHA-1 hash algorithm is
cryptographically broken, and it is possible to create chosen-prefix
hash collisions for <USD$50K [1]

For most users, this change should be invisible and there is
no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
will automatically use the stronger algorithm where possible.

Incompatibility is more likely when connecting to older SSH
implementations that have not been upgraded or have not closely tracked
improvements in the SSH protocol. For these cases, it may be necessary
to selectively re-enable RSA/SHA1 to allow connection and/or user
authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms
options. For example, the following stanza in ~/.ssh/config will enable
RSA/SHA1 for host and user authentication for a single destination host:

    Host old-host
        HostkeyAlgorithms +ssh-rsa
	PubkeyAcceptedAlgorithms +ssh-rsa

We recommend enabling RSA/SHA1 only as a stopgap measure until legacy
implementations can be upgraded or reconfigured with another key type
(such as ECDSA or Ed25519).

[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
    Application to the PGP Web of Trust" Leurent, G and Peyrin, T
    (2020) https://eprint.iacr.org/2020/014.pdf

---

Relnotes:	Yes
Sponsored by:	The FreeBSD Foundation
2021-12-19 11:03:45 -05:00
..
misc openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
unittests openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
addrmatch.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
agent-getpeereid.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
agent-pkcs11.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
agent-ptrace.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
agent-subprocess.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
agent-timeout.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
agent.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
allow-deny-users.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
authinfo.sh Upgrade to OpenSSH 7.8p1. 2018-09-10 16:20:12 +00:00
banner.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
broken-pipe.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
brokenkeys.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
cert-file.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
cert-hostkey.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
cert-userkey.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
cfginclude.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
cfgmatch.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
cfgmatchlisten.sh Upgrade to OpenSSH 7.8p1. 2018-09-10 16:20:12 +00:00
cfgparse.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
check-perm.c
cipher-speed.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
conch-ciphers.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
connect-privsep.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
connect-uri.sh Upgrade to OpenSSH 7.7p1. 2018-05-11 13:22:43 +00:00
connect.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
dhgex.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
dsa_ssh2.prv
dsa_ssh2.pub
dynamic-forward.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
ed25519_openssh.prv openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
ed25519_openssh.pub openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
envpass.sh
exit-status-signal.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
exit-status.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
forcecommand.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
forward-control.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
forwarding.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
host-expand.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
hostkey-agent.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
hostkey-rotate.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
integrity.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
kextype.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
key-options.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-change.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-comment.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-convert.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-knownhosts.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-moduli.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keygen-sshfp.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keys-command.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
keyscan.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
keytype.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
knownhosts-command.sh ssh: disable RSA/SHA-1 signatures 2021-12-19 11:03:45 -05:00
krl.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
limit-keytype.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
localcommand.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
login-timeout.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
Makefile ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
mkdtemp.c Upgrade to OpenSSH 7.8p1. 2018-09-10 16:20:12 +00:00
modpipe.c openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
moduli.in
multiplex.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
multipubkey.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
netcat.c openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
percent.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
portnum.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
principals-command.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
proto-mismatch.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
proto-version.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
proxy-connect.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
putty-ciphers.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
putty-kex.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
putty-transfer.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
README.regress openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
reconfigure.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
reexec.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
rekey.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
rsa_openssh.prv
rsa_openssh.pub
rsa_ssh2.prv
scp3.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
scp-ssh-wrapper.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
scp-uri.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
scp.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
servcfginclude.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
setuid-allowed.c Upgrade to OpenSSH 7.8p1. 2018-09-10 16:20:12 +00:00
sftp-badcmds.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
sftp-batch.sh
sftp-chroot.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
sftp-cmds.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
sftp-glob.sh
sftp-perm.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
sftp-uri.sh Upgrade to OpenSSH 7.7p1. 2018-05-11 13:22:43 +00:00
sftp.sh Upgrade to OpenSSH 7.7p1. 2018-05-11 13:22:43 +00:00
ssh2putty.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
ssh-com-client.sh
ssh-com-keygen.sh
ssh-com-sftp.sh
ssh-com.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
sshcfgparse.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
sshd-log-wrapper.sh Upgrade to OpenSSH 7.7p1. 2018-05-11 13:22:43 +00:00
sshfp-connect.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
sshsig.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
stderr-after-eof.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
stderr-data.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
t4.ok
t5.ok
t11.ok
test-exec.sh ssh: update to OpenSSH v8.8p1 2021-12-19 11:02:02 -05:00
transfer.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
try-ciphers.sh Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1. 2018-05-08 23:13:11 +00:00
valgrind-unit.sh openssh: update to OpenSSH v8.7p1 2021-09-07 21:05:51 -04:00
yes-head.sh Upgrade to OpenSSH 7.7p1. 2018-05-11 13:22:43 +00:00

Overview.

$ ./configure && make tests

You'll see some progress info. A failure will cause either the make to
abort or the driver script to report a "FATAL" failure.

The test consists of 2 parts. The first is the file-based tests which is
driven by the Makefile, and the second is a set of network or proxycommand
based tests, which are driven by a driver script (test-exec.sh) which is
called multiple times by the Makefile.

Failures in the first part will cause the Makefile to return an error.
Failures in the second part will print a "FATAL" message for the failed
test and continue.

OpenBSD has a system-wide regression test suite. OpenSSH Portable's test
suite is based on OpenBSD's with modifications.


Environment variables.

SKIP_UNIT: Skip unit tests.
SUDO: path to sudo/doas command, if desired. Note that some systems
	(notably systems using PAM) require sudo to execute some tests.
LTESTS: Whitespace separated list of tests (filenames without the .sh
	extension) to run.
SKIP_LTESTS: Whitespace separated list of tests to skip.
OBJ: used by test scripts to access build dir.
TEST_SHELL: shell used for running the test scripts.
TEST_SSH_FAIL_FATAL: set to "yes" to make any failure abort the test
	currently in progress.
TEST_SSH_PORT: TCP port to be used for the listening tests.
TEST_SSH_QUIET: set to "yes" to suppress non-fatal output.
TEST_SSH_SSHD_CONFOPTS: Configuration directives to be added to sshd_config
	before running each test.
TEST_SSH_SSH_CONFOPTS: Configuration directives to be added to
	ssh_config before running each test.
TEST_SSH_TRACE: set to "yes" for verbose output from tests 
TEST_SSH_x: path to "ssh" command under test, where x is one of
	SSH, SSHD, SSHAGENT, SSHADD, SSHKEYGEN, SSHKEYSCAN, SFTP or
	SFTPSERVER
USE_VALGRIND: Run the tests under valgrind memory checker.


Individual tests.

You can run an individual test from the top-level Makefile, eg:
$ make tests LTESTS=agent-timeout

If you need to manipulate the environment more you can invoke test-exec.sh
directly if you set up the path to find the binaries under test and the
test scripts themselves, for example:

$ cd regress
$ PATH=`pwd`/..:$PATH:. TEST_SHELL=/bin/sh sh test-exec.sh `pwd` \
    agent-timeout.sh
ok agent timeout test


Files.

test-exec.sh: the main test driver. Sets environment, creates config files
and keys and runs the specified test.

At the time of writing, the individual tests are:
connect.sh:		simple connect
proxy-connect.sh:	proxy connect
connect-privsep.sh:	proxy connect with privsep
connect-uri.sh:		uri connect
proto-version.sh:	sshd version with different protocol combinations
proto-mismatch.sh:	protocol version mismatch
exit-status.sh:		remote exit status
envpass.sh:		environment passing
transfer.sh:		transfer data
banner.sh:		banner
rekey.sh:		rekey
stderr-data.sh:		stderr data transfer
stderr-after-eof.sh:	stderr data after eof
broken-pipe.sh:		broken pipe test
try-ciphers.sh:		try ciphers
yes-head.sh:		yes pipe head
login-timeout.sh:	connect after login grace timeout
agent.sh:		simple connect via agent
agent-getpeereid.sh:	disallow agent attach from other uid
agent-timeout.sh:	agent timeout test
agent-ptrace.sh:	disallow agent ptrace attach
keyscan.sh:		keyscan
keygen-change.sh:	change passphrase for key
keygen-convert.sh:	convert keys
keygen-moduli.sh:	keygen moduli
key-options.sh:		key options
scp.sh:			scp
scp-uri.sh:		scp-uri
sftp.sh:		basic sftp put/get
sftp-chroot.sh:		sftp in chroot
sftp-cmds.sh:		sftp command
sftp-badcmds.sh:	sftp invalid commands
sftp-batch.sh:		sftp batchfile
sftp-glob.sh:		sftp glob
sftp-perm.sh:		sftp permissions
sftp-uri.sh:		sftp-uri
ssh-com-client.sh:	connect with ssh.com client
ssh-com-keygen.sh:	ssh.com key import
ssh-com-sftp.sh:	basic sftp put/get with ssh.com server
ssh-com.sh:		connect to ssh.com server
reconfigure.sh:		simple connect after reconfigure
dynamic-forward.sh:	dynamic forwarding
forwarding.sh:		local and remote forwarding
multiplex.sh:		connection multiplexing
reexec.sh:		reexec tests
brokenkeys.sh:		broken keys
sshcfgparse.sh:		ssh config parse
cfgparse.sh:		sshd config parse
cfgmatch.sh:		sshd_config match
cfgmatchlisten.sh:	sshd_config matchlisten
addrmatch.sh:		address match
localcommand.sh:	localcommand
forcecommand.sh:	forced command
portnum.sh:		port number parsing
keytype.sh:		login with different key types
kextype.sh:		login with different key exchange algorithms
cert-hostkey.sh		certified host keys
cert-userkey.sh:	certified user keys
host-expand.sh:		expand %h and %n
keys-command.sh:	authorized keys from command
forward-control.sh:	sshd control of local and remote forwarding
integrity.sh:		integrity
krl.sh:			key revocation lists
multipubkey.sh:		multiple pubkey
limit-keytype.sh:	restrict pubkey type
hostkey-agent.sh:	hostkey agent
keygen-knownhosts.sh:	ssh-keygen known_hosts
hostkey-rotate.sh:	hostkey rotate
principals-command.sh:	authorized principals command
cert-file.sh:		ssh with certificates
cfginclude.sh:		config include
allow-deny-users.sh:	AllowUsers/DenyUsers
authinfo.sh:		authinfo


Problems?

Run the failing test with shell tracing (-x) turned on:
$ PATH=`pwd`/..:$PATH:. sh -x test-exec.sh `pwd` agent-timeout.sh

Failed tests can be difficult to diagnose. Suggestions:
- run the individual test via ./test-exec.sh `pwd` [testname]
- set LogLevel to VERBOSE in test-exec.sh and enable syslogging of
  auth.debug (eg to /var/log/authlog).


Known Issues.

- Similarly, if you do not have "scp" in your system's $PATH then the
  multiplex scp tests will fail (since the system's shell startup scripts
  will determine where the shell started by sshd will look for scp).

- Recent GNU coreutils deprecate "head -[n]": this will cause the yes-head
  test to fail.  The old behaviour can be restored by setting (and
  exporting) _POSIX2_VERSION=199209 before running the tests.