summaryrefslogtreecommitdiff
path: root/test
Commit message (Collapse)AuthorAgeFilesLines
* Integration test for Curve25519Sha256Keysint-test-curve25519sha256Miklos Fazekas2019-09-162-0/+85
|
* Add Curve25519Sha256Florian Wininger2019-09-102-5/+169
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Disable by default unsecure algorithmFlorian Wininger2019-09-021-27/+37
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Rubocop : fix parenthesesFlorian Wininger2019-08-236-14/+14
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Refactoring style unlesselse.Florian Wininger2019-08-231-8/+3
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Rubocop solve : Layout/IndentationWidthFlorian Wininger2019-08-231-6/+6
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Fix Layout/IndentHeredocFlorian Wininger2019-08-236-196/+196
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Fix Layout/IndentAssignmentFlorian Wininger2019-08-234-4/+4
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Fix Layout/ClosingHeredocIndentationFlorian Wininger2019-08-233-4/+4
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Remove defined?(OpenSSL::PKey::EC) and defined?(OpenSSL::Digest::SHA256)Florian Wininger2019-08-229-664/+623
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Merge pull request #692 from zeos90/masterMiklós Fazekas2019-08-222-0/+22
|\ | | | | Consider ProxyCommand and ProxyJump together
| * Fix style violationsJoshua Morgan2019-08-201-1/+1
| |
| * Consider ProxyCommand and ProxyJump togeatherJoshua Morgan2019-08-182-0/+22
| | | | | | | | | | ProxyCommand and ProxyJump override each other so they need to be tracked together so the first one set takes precedence
* | Update vagrant fileFazekas Miklos2019-08-202-2/+4
|/
* Expose StrictHostKeyChecking from SSH configMichael Smith2019-06-201-2/+6
| | | | | | | | Make this setting available so it can be used when deciding how to configure `verify_host_key` so that users of this library can enable behavior consistent with `ssh`. Resolves #678.
* Merge pull request #671 from jmutkawoa/masterMiklós Fazekas2019-05-293-255/+6
|\ | | | | Deprecating RC4 as per https://tools.ietf.org/html/draft-ietf-curdle-rc4-die-die-die-10
| * fix formatting issue to test_algorithms.rbjmutkawoa2019-03-231-2/+1
| |
| * removing arcfour in test_packet_streamjmutkawoa2019-03-231-192/+0
| |
| * Delete RC4 test in test_algorithmsjmutkawoa2019-03-231-6/+6
| |
| * Delete RC4 test in test_cipher_factoryjmutkawoa2019-03-231-56/+0
| |
* | TestKimmo Lehto2019-03-221-0/+6
|/
* Remove translated globals and only set check_host_ip if not already setMiklos Fazekas2019-03-071-2/+6
|
* Read check host ip from config if presentMiklos Fazekas2019-03-061-0/+10
|
* Add support for hostnames matchingRomain Tartière2019-02-142-0/+25
| | | | | | The known_hosts file can contain pattern for matching hosts. When looking for a known host, match the user provided hostname with the patterns found in the known_hosts file.
* Merge pull request #656 from smortex/fix-host-key-checkingMiklós Fazekas2019-02-142-1/+50
|\ | | | | Fix host key checking
| * Fix host key checkingRomain Tartière2019-02-112-0/+49
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The known_hosts file may contain keys associated with a hostname, an ip-address, or both. When validating a key, the net-ssh gem ensure that both the hostname and the ip-address match beforce adding that key. Thus, if the known_hosts file only contains one of these two pieces of information, the host key verification fails. Instead of adding keys when both the hostname and the ip-address match, add them when the user-supplied identification of the remote host match an entry in the known_hosts file. Optionaly, if `check_host_ip` is set to true, the resolved IP address of the remote host is also checked.
| * Fix #path methodRomain Tartière2019-02-111-1/+1
| | | | | | | | | | | | This method is supposed to transform a relative path into an absolute one, but ignrore the provided path and always return the full path to the same fixture file.
* | Encrypted openssh keys were not asked for passphraseMiklos Fazekas2019-02-101-1/+28
|/
* Merge pull request #647 from ↵Miklós Fazekas2018-12-121-0/+4
|\ | | | | | | | | aleksandrs-ledovskis/chore/ssh-auth-sock-test-lab-cleanup Clear SSH_AUTH_SOCK for duration of test run
| * Clear SSH_AUTH_SOCK for duration of test runAleksandrs Ļedovskis2018-12-041-0/+4
| | | | | | | | | | | | | | | | Permits per-scenario/test setup in usual `setup/teardown` constructs Issue was spotted on local development machine where `SSH_AUTH_SOCK` was present in ENV list - it messed up with "test/authentication/test_session.rb" tests Signed-off-by: Aleksandrs Ļedovskis <aleksandrs@ledovskis.lv>
* | Merge pull request #641 from pkliczewski/masterMiklós Fazekas2018-12-063-1/+18
|\ \ | |/ |/| Server key signature verification done even if not requested
| * Server key signature verification done even if not requestedPiotr Kliczewski2018-12-063-1/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | In my environment I know that server key verification would fail so I set :verify_host_key to :never I see following error: diffie_hellman_group1_sha1.rb:211:in `verify_signature': could not verify server signature (Net::SSH::Exception) This PR updates the Verifiers to provide key verification as well as key signature so when setting that this oprtation should never be run it works fine. We change an interface of Verifiers. User could provide its own object responding to :verify with this change there is new method (:verify_signature) which is needed.
* | Improve processing of ssh_config Match conditionsAleksandrs Ļedovskis2018-11-281-1/+127
| | | | | | | | | | | | | | | | | | | | | | | | Previously wasn't correctly handling quoted and `=` delimited values. Also, fixes logic that unsupported `Match` conditions result in subsequent declarations to be applied for configuration. OpenSSH implementation details: - https://github.com/openssh/openssh-portable/blob/624d19ac2d56fa86a22417c35536caceb3be346f/readconf.c#L599 - https://github.com/openssh/openssh-portable/blob/624d19ac2d56fa86a22417c35536caceb3be346f/misc.c#L284-L285 Signed-off-by: Aleksandrs Ļedovskis <aleksandrs@ledovskis.lv>
* | Fix travis ci errors and rubocop issuesMiklos Fazekas2018-11-285-10/+11
| |
* | Support new private key format for other than ed25519 keysMiklos Fazekas2018-11-272-5/+5
| |
* | Merge pull request #629 from mmb/next-packet-timeoutMiklós Fazekas2018-11-272-2/+13
|\ \ | | | | | | Add timeout to blocking next_packet IO.select
| * | Add timeout to blocking next_packet IO.selectMatthew M. Boedicker2018-09-052-2/+13
| |/ | | | | | | | | | | | | If the socket isn't closed properly for some reason this select will block forever. Fixes #550
* | Merge pull request #636 from unit193/masterMiklós Fazekas2018-11-271-0/+1
|\ \ | | | | | | Add missing 'logger' in test_session.rb.
| * | Add missing 'logger' in test_session.rb.Unit 1932018-10-021-0/+1
| |/ | | | | | | Otherwise there is an intermittent test failure depending on which order tests are loaded in.
* | Merge pull request #637 from torrancew/bugfix/modern-cryptographyMiklós Fazekas2018-11-271-39/+45
|\ \ | | | | | | Prefer more modern cryptographic algorithms
| * | Prefer more modern cryptographic algorithms -- fixes #627Tray Torrance2018-10-121-39/+45
| |/ | | | | | | | | This commit modifies Net::SSH to prefer strong encryption for HMAC, Cipher, Host Key Authentication and Key Exchange operations.
* | Skip identities that provide invalid keyChris Roberts2018-11-061-0/+18
|/
* Implement to_blob on OpenSSL::PKey::EC::PointAdam Grare2018-07-241-0/+8
| | | | | | | Fix an issue where writing an ECDSA public_key out to a Net::SSH::Buffer fails when calling to_blob on the key due to the method being undefined. Fixes https://github.com/net-ssh/net-ssh/issues/619
* load default public keyMiklos Fazekas2018-06-031-8/+8
|
* Provide empty config when testing default userChris2018-05-301-1/+1
| | | | | | - The goal of this test is to confirm that the current user's name is used when ssh-ing. It breaks when ~/.ssh/config contains User directives.
* Added test for host_key_formatcert-type-fixMiklos Fazekas2018-05-301-0/+6
|
* Fix issue for ecdh_sha2_nistp256 kex tooMiklos Fazekas2018-05-301-1/+1
|
* Use host_key_fomrmat to compare sig_type as format can be different from algMiklos Fazekas2018-05-261-1/+1
|
* New options for :verify_host_keyJared Beck2018-04-042-15/+64
| | | | | | | | | | | | | | | | | Deprecate some existing values, replacing them with a set of words that match the classes in the `Net::SSH::Verifiers` module. Values would be replaced as follows: - `false` becomes `:never`, - `true` becomes `:accept_new_or_local_tunnel`, - `:very` becomes `:accept_new`, and - `:secure` becomes `:always`. This is a nice improvement, improving data type consistency (they're all symbols) and expressiveness (they reveal the underlying classes). This change was preliminarily approved in https://github.com/net-ssh/net-ssh/issues/532
* Add support for Host in Match config blocksMiklos Fazekas2018-03-232-4/+49
|