[Pkg-privacy-maintainers] Bug#1011900: monkeysphere: FTBFS: ...Could not chdir to home directory /home/user42: No such file or directory

Lucas Nussbaum lucas at debian.org
Thu May 26 20:09:27 BST 2022


Source: monkeysphere
Version: 0.43-3.1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas at debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/keytrans
> MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/basic
> MONKEYSPHERE_TEST_NO_EXAMINE=true MONKEYSPHERE_TEST_USE_ED25519=true ./tests/basic
> ##################################################
> ### generating openpgp key...
> gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/pubring.kbx' created
> improper ownership on '/build': owner ID 109 is neither user42 (ID 1001) nor the superuser
> 
> !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!!
>  Permissions on testing directory '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs' are
>  too loose to do proper strict permissions checking.  Some tests 
>  will be disabled or ignored.
> 
>  To avoid this warning (and to make sure that all tests are run
>  properly), please run these tests within a directory that meets
>  sshd's standards for "StrictModes yes" -- the directory (and every
>  one of its parents) should be owned only be the user running this
>  test or root, and should not be writable by group or other.
> !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!!
> 
> 
> ##################################################
> ### configuring testuser home...
> 2 blocks
> improper ownership on '/build': owner ID 109 is neither user42 (ID 1001) nor the superuser
> 
> !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!!
>  Permissions on testing directory '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX' are
>  too loose to do proper strict permissions checking.  Some tests 
>  will be disabled or ignored.
> 
>  To avoid this warning (and to make sure that all tests are run
>  properly), please run these tests within a directory that meets
>  sshd's standards for "StrictModes yes" -- the directory (and every
>  one of its parents) should be owned only be the user running this
>  test or root, and should not be writable by group or other.
> !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!!
> 
> 
> ##################################################
> ### configuring testuser home...
> 2 blocks
> gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.gnupg/pubring.kbx' created
> gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key
> gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.gnupg/trustdb.gpg: trustdb created
> gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>" imported
> gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.gnupg/pubring.kbx' created
> gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key
> gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.gnupg/trustdb.gpg: trustdb created
> gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>" imported
> gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/trustdb.gpg: trustdb created
> gpg: directory '/<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/openpgp-revocs.d' created
> gpg: revocation certificate stored as '/<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/openpgp-revocs.d/6AA8476AE1AD0B547ADDBB27459592CD4B20082A.rev'
> gpg: done
> ##################################################
> ### retrieving key timestamp...
> gpg: checking the trustdb
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> ##################################################
> ### exporting key to ssh file...
> gpg: key E00B5EEEBA79B482: secret key imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg:       secret keys read: 1
> gpg:   secret keys imported: 1
> gpg: no ultimately trusted keys found
> gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key
> gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>" not changed
> gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" imported
> gpg: Total number processed: 2
> gpg:               imported: 1
> gpg:              unchanged: 1
> gpg: no ultimately trusted keys found
> gpg: inserting ownertrust of 6
> gpg: inserting ownertrust of 5
> 
> ##################################################
> ### configuring admin home...
> gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/admin/.gnupg/pubring.kbx' created
> gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/admin/.gnupg/trustdb.gpg: trustdb created
> gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" imported
> gpg: key 36FF78B37005D3BE: secret key imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg:       secret keys read: 1
> gpg:   secret keys imported: 1
> gpg: key E00B5EEEBA79B482: secret key imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg:       secret keys read: 1
> gpg:   secret keys imported: 1
> gpg: no ultimately trusted keys found
> gpg: key E00B5EEEBA79B482: 1 signature not checked due to a missing key
> gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>" not changed
> gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" not changed
> gpg: Total number processed: 1
> gpg:              unchanged: 1
> gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" imported
> gpg: inserting ownertrust of 6
> gpg: Total number processed: 2
> gpg:               imported: 1
> gpg:              unchanged: 1
> 
> gpg: no ultimately trusted keys found
> ##################################################
> ### configuring sshd...
> gpg: inserting ownertrust of 6
> gpg: inserting ownertrust of 5
> 
> ##################################################
> ### configuring admin home...
> 
> ##################################################
> ### import host key...
> gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/admin/.gnupg/pubring.kbx' created
> gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/admin/.gnupg/trustdb.gpg: trustdb created
> gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" imported
> gpg: key 36FF78B37005D3BE: secret key imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg:       secret keys read: 1
> gpg:   secret keys imported: 1
> gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>" not changed
> gpg: Total number processed: 1
> gpg:              unchanged: 1
> gpg: inserting ownertrust of 6
> 
> ##################################################
> ### configuring sshd...
> 
> ##################################################
> ### import host key...
> ##################################################
> ### reconvert key, and compare to key in gpg keyring...
> conversions look good!
> Now working with key 459592CD4B20082A at time 1653513605
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/pubring.kbx
> -------------------------------------------------------------------------
> pub   rsa3072 2022-05-25 [SC]
>       6AA8476AE1AD0B547ADDBB27459592CD4B20082A
> uid           [ultimate] testtest
> 
> ##################################################
> ### test User ID addition...
> Generating public/private rsa key pair.
> Your identification has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh_host_rsa_key
> Your public key has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh_host_rsa_key.pub
> The key fingerprint is:
> SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo user42 at ip-10-84-234-202
> The key's randomart image is:
> +---[RSA 3072]----+
> |.=o.. . o= ...  .|
> |+.+o o +. +*.. + |
> |ooo = *   o = + .|
> |+oo. O = . . . o |
> |o+..  = S . . .  |
> |.E.    + . . .   |
> |.     .     .    |
> |                 |
> |                 |
> +----[SHA256]-----+
> using keyserver: example.org
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host/importlock'.
> ms: importing RSA key from file '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh_host_rsa_key'...
> Identity added: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh_host_rsa_key (user42 at ip-10-84-234-202)
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host/importlock'.
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host_keys.pub.pgp'...
> ms: host key imported:
> pub   rsa3072 2022-05-25 [CA]
>       7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> uid           [ unknown] ssh://testhost.example
> OpenPGP fingerprint: 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> ssh fingerprint: 3072 SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo . (RSA)
> 
> ##################################################
> ### getting host key fingerprint...
> using keyserver: example.org
> ms: listing primary fingerprints from /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host_keys.pub.pgp
> ms: obtained the following fingerprints: 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> ms: publishing all keys
> ms: using keys: 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> ms: invoking show_key 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> 
> ##################################################
> ### setting host key expiration...
> using keyserver: example.org
> ms: extending without prompting.
> ms: setting key expiration to 1.
> ms: executing key expire script...
> Generating public/private rsa key pair.
> Your identification has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh_host_rsa_key
> Your public key has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh_host_rsa_key.pub
> The key fingerprint is:
> SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk user42 at ip-10-84-234-202
> The key's randomart image is:
> +---[RSA 3072]----+
> |                 |
> |                 |
> |                 |
> |.                |
> | o   .  S        |
> |..= E. . .       |
> |.oo&.+B *        |
> |B+X==Xo* .       |
> |*OOXX o.         |
> +----[SHA256]-----+
> using keyserver: example.org
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host/importlock'.
> ms: importing RSA key from file '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh_host_rsa_key'...
> gpg: key 459592CD4B20082A: "monkeymonkey" 1 new user ID
> gpg: key 459592CD4B20082A: "monkeymonkey" 1 new signature
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/pubring.kbx
> -------------------------------------------------------------------------
> pub   rsa3072 2022-05-25 [SC]
>       6AA8476AE1AD0B547ADDBB27459592CD4B20082A
> uid           [ultimate] monkeymonkey
> uid           [ultimate] testtest
> 
> ##################################################
> ### sleeping to avoid test suite breakage on fast
> ### processors (see https://bugs.debian.org/591118)
> Identity added: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh_host_rsa_key (user42 at ip-10-84-234-202)
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host/importlock'.
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host_keys.pub.pgp'...
> ms: host key imported:
> pub   rsa3072 2022-05-25 [CA]
>       BF28659B79DDCBC2ED22686D09A1AC58399BC116
> uid           [ unknown] ssh://testhost.example
> OpenPGP fingerprint: BF28659B79DDCBC2ED22686D09A1AC58399BC116
> ssh fingerprint: 3072 SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk . (RSA)
> 
> ##################################################
> ### getting host key fingerprint...
> using keyserver: example.org
> ms: listing primary fingerprints from /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host_keys.pub.pgp
> ms: obtained the following fingerprints: BF28659B79DDCBC2ED22686D09A1AC58399BC116
> ms: publishing all keys
> ms: using keys: BF28659B79DDCBC2ED22686D09A1AC58399BC116
> ms: invoking show_key BF28659B79DDCBC2ED22686D09A1AC58399BC116
> BF28659B79DDCBC2ED22686D09A1AC58399BC116
> 
> ##################################################
> ### setting host key expiration...
> using keyserver: example.org
> ms: extending without prompting.
> ms: setting key expiration to 1.
> ms: executing key expire script...
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host_keys.pub.pgp'...
> ms: Key 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D now expires at 2022-05-26 21:20:07
> ms: NOTE: Key expiration date adjusted, but not yet published.
> ms: Run 'monkeysphere-host publish-key' to publish the new expiration date.
> 
> ##################################################
> ### certifying server host key...
> gpg: key F0EAA4ED95B71C9D: public key "ssh://testhost.example" imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg: checking the trustdb
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> 
> ##################################################
> ### setup monkeysphere authentication...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 
> ms: setting up Monkeysphere authentication trust core...
> ms: generating monkeysphere authentication trust core key:
> ms: size: 3072 bits
> ms: uid: 'Monkeysphere authentication trust core UID (random string: n678/qdNjq74KWnuL76E5GjKn0bC)'
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host_keys.pub.pgp'...
> ms: Key BF28659B79DDCBC2ED22686D09A1AC58399BC116 now expires at 2022-05-26 21:20:07
> ms: NOTE: Key expiration date adjusted, but not yet published.
> ms: Run 'monkeysphere-host publish-key' to publish the new expiration date.
> 
> ##################################################
> ### certifying server host key...
> gpg: key 09A1AC58399BC116: public key "ssh://testhost.example" imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg: checking the trustdb
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> 
> ##################################################
> ### setup monkeysphere authentication...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 
> ms: setting up Monkeysphere authentication trust core...
> ms: generating monkeysphere authentication trust core key:
> ms: size: 3072 bits
> ms: uid: 'Monkeysphere authentication trust core UID (random string: 1WTGVT6mnJ4XK0V4CSKzfaJXtvb3)'
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> 
> ##################################################
> ### adding admin as certifier...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: reading key from stdin...
> ms: checking keys in file...
> ms: loading key into core keyring...
> ms: executing core ltsign script...
> ms: exporting core local sigs to sphere...
> ms: updating sphere trustdb...
> ms: Identity certifier added.
> 
> ##################################################
> ### list certifiers...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: determining core key fingerprint...
> ms: exporting core pub key to sphere keyring...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: exporting core pub key to sphere keyring...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: sphere trust model: 1:3:1
> ms: finding trusted keys...
> ms: checking trust model for authentication ...
> ms: determining core key fingerprint...
> ms: sphere trust model: 1:3:1
> 4275279C9512E14BDD14098A36FF78B37005D3BE:
>  :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>:1:120:
> 
> ##################################################
> ### generating ed25519 key for testuser...
> 
> ##################################################
> ### adding admin as certifier...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ##################################################
> ### test User ID revocation ... 
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: reading key from stdin...
> ms: checking keys in file...
> ms: loading key into core keyring...
> ms: executing core ltsign script...
> ms: exporting core local sigs to sphere...
> ms: updating sphere trustdb...
> ms: Identity certifier added.
> 
> ##################################################
> ### list certifiers...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:09 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: finding trusted keys...
> ms: determining core key fingerprint...
> 4275279C9512E14BDD14098A36FF78B37005D3BE:
>  :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) <fakeadmin at example.net>:1:120:
> 
> ##################################################
> ### generating standard monkeysphere key for testuser...
> ms: creating password fifo...
> ms: Prompting for passphrase
> ms: Launching "/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/askpass"
> ms: (with prompt "Please enter your passphrase for E00B5EEEBA79B482: ")
> ms: Generating subkey.  This may take a long time...
> gpg: key 459592CD4B20082A: "monkeymonkey" 1 new signature
> gpg: Total number processed: 1
> gpg:         new signatures: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
> /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/pubring.kbx
> -------------------------------------------------------------------------
> pub   rsa3072 2022-05-25 [SC]
>       6AA8476AE1AD0B547ADDBB27459592CD4B20082A
> uid           [ultimate] monkeymonkey
> uid           [ revoked] testtest
> 
> ##################################################
> ### test working with two primary keys ... 
> Generating public/private rsa key pair.
> Your identification has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/newkey
> Your public key has been saved in /<<PKGBUILDDIR>>/tests/tmp/ms.Ls7/newkey.pub
> The key fingerprint is:
> SHA256:PUjNOyHwVoOx1QJnGYkjp1M6nfi43NJn6WzUII4Mk+o user42 at ip-10-84-234-202
> The key's randomart image is:
> +---[RSA 3072]----+
> |      . o=B=     |
> |      .o*O+..    |
> |     . O*o+.     |
> |    + *o++.o     |
> |   . + BS.=o     |
> |  .   + o .o.    |
> | .   . + . .     |
> |  E   + o.=      |
> |       . =o      |
> +----[SHA256]-----+
> 
> ##################################################
> ### export server key to testuser...
> gpg: key F0EAA4ED95B71C9D: public key "ssh://testhost.example" imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> 
> ##################################################
> ### export testuser key to server...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:10 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> 
> ##################################################
> ### update server authorized_keys file for this testuser...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:10 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:10 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### testing monkeysphere keys-for-userid ...
> ms: processing: ssh://testhost.example
> ms: key file: -
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: key line: ssh-rsa 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
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> gpg: key 6FF3860C7FA89992: public key "fubar" imported
> gpg: key 6FF3860C7FA89992: secret key imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg:       secret keys read: 1
> gpg:   secret keys imported: 1
> gpg: key 459592CD4B20082A: "monkeymonkey" 1 new user ID
> gpg: key 459592CD4B20082A: "monkeymonkey" 1 new signature
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 1
> test: diff expected gpg list output
> test: diff expected keytrans listfpr output
> ms: done.
> 
> ##################################################
> ### export server key to testuser...
> gpg: key 09A1AC58399BC116: public key "ssh://testhost.example" imported
> gpg: Total number processed: 1
> gpg:               imported: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> 
> ##################################################
> ### export testuser key to server...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:11 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> 
> ##################################################
> ### update server authorized_keys file for this testuser...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:11 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ##################################################
>  Monkeysphere keytrans test completed successfully!
> ##################################################
> ### removing temp dir...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ##### starting ssh client...
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:11 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### testing monkeysphere keys-for-userid ...
> ms: processing: ssh://testhost.example
> ms: key file: -
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: key line: ssh-rsa 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
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.5RMCjs
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC8qHVq8ZjRMY+WyE2jgQkT9YuQG7PpKZ2xHTRd+fj8dwuGrooe+BYEyEg00ieQZzNFZmMGOXS0OrUE99s6R1dVYz19eZ6cUSFRsQ0ZhfP6gBj5MQ2E9kS0EAOCQQm1WXGsIlY7nV77u7IYD8uVwPxzWJOXIX9qdicpW+T9t2SdtieI8dXRUpfbnbTJFPXJNCmLfn514T2VlBTUv1UvEj0CpCY157hK3eJWhV4tBNoOyqez/bim758mBxVFmzWcHT1RN8+3WhZJ5my4wYffJxQlLcX1HicH1UamVGpLwPa88wxuLOCTJcKJNpaO5FQXyOWTkPMgcIot3mdKBbuU6s5cnW/ktt6SynxHnPkAD3E8WzY3rLA9C9P4KbAI40uXp+ozyJncBeK1xcfMTZzpEWreIQ8IJhjF0bA3Mzw+V3CicrTrr1/o1rDa8yVLLsju+HSsxtfJjGDWqZAMS0AVs2IFSpvD+mcziiw+0+FiIB/A36gkxxb6rF3WOAMG9ElHc4s= MonkeySphere2022-05-25T21:20:12
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 673700.2, received 796903.3
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (727216) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### testing functionality in the face of unusual gpg.conf settings...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.W0DUxf
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCKuMVwTklSRNHWBTJnaW6WGmHLcp+gWiGRqT/qvPGaJr1l1A5D0/DjXnRWXwXdUQUdV00wmFLw+BstOKBYRCmcUjBYmJuu1Op+w5+hRtjD88vKRS1Ljwfyj52qts8t/4cu72KivNsROuhjNymYOSpWWUq9Oo6jF7B9Gbhpxq/ej3mxFlUiufkKz325HfWJXxHnDmy1uhxjExiwGOeOEz5P39nlPlTuyWyw5Is5DXV528FoVGzwhU2lhI9CnIetHSPdFssX6Ji+pU4Bvsy4jvWRR1WC7DLxmkmdLBqd48h3JAmB684QgGT4yozMPrMaf5s3uWZ+VfHN7/euqQtlNHlyHXVpvfzX8R1ynrj53NTdIJ3Qb10utDynPCL/5aIeWUpiYPl085RS8zexlBn1cdaMdpmXHyNgb218EV3UvTgV+qU8MH2PU6qm7vRR9YaJjf1pGlKA9aGHjTXYyeK46aTrT7Iu0KTarOAjqZg44lVO7HnDmBDE2vYkNphogG/Nv90= MonkeySphere2022-05-25T21:20:13
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 1280141.9, received 1285458.1
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### testing functionality in the face of unusual gpg.conf settings...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.n4IBF0
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:14
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 500711.0, received 592278.6
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### removing testuser authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:14 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: empty or absent authorized_user_ids file.
> 
> ##################################################
> ### ssh connection test for failure...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.CGjra2
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:15
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 884201.2, received 887873.2
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### removing testuser authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ##### starting ssh client...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:15 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: empty or absent authorized_user_ids file.
> 
> ##################################################
> ### ssh connection test for failure...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.NVxB05
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:16
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Trying private key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity
> 
> no such identity: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity: No such file or directory
> 
> debug1: No more authentication methods to try.
> 
> user42 at testhost.example: Permission denied (publickey).
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### setting group writability on authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:16 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:16 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### setting other writability on authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ##### starting ssh client...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:16 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:16 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:17 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:16 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### setup for symlink tests...
> 
> ##################################################
> ### make authorized_user_ids an absolute symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:17 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms:   * acceptable sub key.
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:17 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.mJea5M
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> ms:  primary key found: 09A1AC58399BC116
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:17
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Trying private key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity
> 
> no such identity: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity: No such file or directory
> 
> debug1: No more authentication methods to try.
> 
> user42 at testhost.example: Permission denied (publickey).
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### setting group writability on authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:17 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:17 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### setting other writability on authorized_user_ids and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:17 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:17 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:17 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDTYDfCn9IDhhf3g2l7kJzLPBievdeKQNlqT28Am0FMwAoyi3EXedCj6ALgk9y9a95ueVdh9hf7ppkxC/xpf2WecV+TIS+8KHwS5NHt3AioP79sVZYyt+coJGVaNy79YmaYJexK8Eadq166bXfC5dL4TNog4mWycVDgYd4h/Ns+G8xgYUCe0XyiGJPRWynK1a8k756E1OrP/GrHlLxFDtOUN1Vg2FbzRWlL+UoxZ82iAx4LB7AVHBgH0cgEHtgqmLO7Xu/BLB9Mzi31NuA7OPXerTlnmKkOE1OFiF/tCAJPKaNVA/DTdqmX2iZsI1/x6okMJ9CkaJlyPj6HVLUgB7vH8XYzm1/pfKt+J3L4Jbqz8swD02x51APiVtUzzMT0Z5nmS3IFgJ97AX4hDBI1HDf/pTlG/BuDO7LK3EcX+SNFw8hlbLqS6eenXrk5pchLPGtPb1Cfg7+chBuncjk5KBx0MjMBpmmPtlNiDm5NGjzzSWQCBPENOxhD0zyuZncnxFU= MonkeySphere2022-05-25T21:20:17 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### setup for symlink tests...
> 
> ##################################################
> ### make authorized_user_ids an absolute symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:18 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:18 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.t60TQl
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:18
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 663173.2, received 784451.2
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:19 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ##### starting ssh client...
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:19 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make authorized_user_ids a relative symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:19 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:19 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.r990qv
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:19
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 822737.5, received 826154.2
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:20 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:20 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make authorized_user_ids a relative symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:20 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ##### starting ssh client...
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:20 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.8TsU4Z
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:21
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 629551.8, received 744681.3
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (730505) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:21 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:21 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make .monkeysphere directory an absolute symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ##### starting ssh client...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:21 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:21 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.L8NtrY
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:22
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 859387.1, received 862956.0
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:22 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:22 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make .monkeysphere directory an absolute symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:22 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:22 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.ZO4pts
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:23
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 586120.0, received 693306.8
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (731462) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:23 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ##### starting ssh client...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:23 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make .monkeysphere directory a relative symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:23 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:23 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.jR01yl
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCKuMVwTklSRNHWBTJnaW6WGmHLcp+gWiGRqT/qvPGaJr1l1A5D0/DjXnRWXwXdUQUdV00wmFLw+BstOKBYRCmcUjBYmJuu1Op+w5+hRtjD88vKRS1Ljwfyj52qts8t/4cu72KivNsROuhjNymYOSpWWUq9Oo6jF7B9Gbhpxq/ej3mxFlUiufkKz325HfWJXxHnDmy1uhxjExiwGOeOEz5P39nlPlTuyWyw5Is5DXV528FoVGzwhU2lhI9CnIetHSPdFssX6Ji+pU4Bvsy4jvWRR1WC7DLxmkmdLBqd48h3JAmB684QgGT4yozMPrMaf5s3uWZ+VfHN7/euqQtlNHlyHXVpvfzX8R1ynrj53NTdIJ3Qb10utDynPCL/5aIeWUpiYPl085RS8zexlBn1cdaMdpmXHyNgb218EV3UvTgV+qU8MH2PU6qm7vRR9YaJjf1pGlKA9aGHjTXYyeK46aTrT7Iu0KTarOAjqZg44lVO7HnDmBDE2vYkNphogG/Nv90= MonkeySphere2022-05-25T21:20:24
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 899561.9, received 903297.7
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (731888) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:24 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:24 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### make .monkeysphere directory a relative symlink and updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:24 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:24 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.5OhC4J
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:25
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 1129267.4, received 1335782.5
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (732419) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:26 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:26 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### making sure we are back to normal...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:26 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:26 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> ##### starting ssh server...
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.iitSCe
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCKuMVwTklSRNHWBTJnaW6WGmHLcp+gWiGRqT/qvPGaJr1l1A5D0/DjXnRWXwXdUQUdV00wmFLw+BstOKBYRCmcUjBYmJuu1Op+w5+hRtjD88vKRS1Ljwfyj52qts8t/4cu72KivNsROuhjNymYOSpWWUq9Oo6jF7B9Gbhpxq/ej3mxFlUiufkKz325HfWJXxHnDmy1uhxjExiwGOeOEz5P39nlPlTuyWyw5Is5DXV528FoVGzwhU2lhI9CnIetHSPdFssX6Ji+pU4Bvsy4jvWRR1WC7DLxmkmdLBqd48h3JAmB684QgGT4yozMPrMaf5s3uWZ+VfHN7/euqQtlNHlyHXVpvfzX8R1ynrj53NTdIJ3Qb10utDynPCL/5aIeWUpiYPl085RS8zexlBn1cdaMdpmXHyNgb218EV3UvTgV+qU8MH2PU6qm7vRR9YaJjf1pGlKA9aGHjTXYyeK46aTrT7Iu0KTarOAjqZg44lVO7HnDmBDE2vYkNphogG/Nv90= MonkeySphere2022-05-25T21:20:26
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 927506.9, received 931358.7
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (732842) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### create bad permissions on link dir updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:26 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:26 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for failure...
> WARNING!!! Test SKIPPED because we are running in an unsafe working directory.
> 
> ##################################################
> ### making sure we are back to normal...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:26 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDTYDfCn9IDhhf3g2l7kJzLPBievdeKQNlqT28Am0FMwAoyi3EXedCj6ALgk9y9a95ueVdh9hf7ppkxC/xpf2WecV+TIS+8KHwS5NHt3AioP79sVZYyt+coJGVaNy79YmaYJexK8Eadq166bXfC5dL4TNog4mWycVDgYd4h/Ns+G8xgYUCe0XyiGJPRWynK1a8k756E1OrP/GrHlLxFDtOUN1Vg2FbzRWlL+UoxZ82iAx4LB7AVHBgH0cgEHtgqmLO7Xu/BLB9Mzi31NuA7OPXerTlnmKkOE1OFiF/tCAJPKaNVA/DTdqmX2iZsI1/x6okMJ9CkaJlyPj6HVLUgB7vH8XYzm1/pfKt+J3L4Jbqz8swD02x51APiVtUzzMT0Z5nmS3IFgJ97AX4hDBI1HDf/pTlG/BuDO7LK3EcX+SNFw8hlbLqS6eenXrk5pchLPGtPb1Cfg7+chBuncjk5KBx0MjMBpmmPtlNiDm5NGjzzSWQCBPENOxhD0zyuZncnxFU= MonkeySphere2022-05-25T21:20:26 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.eYWtlY
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:27
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ##### starting ssh client...
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 488474.8, received 577804.7
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (733377) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### checking ssh authorized_key option support...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:28 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:28 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.r6Ls3q
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:28
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 825237.6, received 828664.7
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### checking ssh authorized_key option support...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:29 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: no-X11-forwarding,no-port-forwarding,command="/bin/false" ssh-rsa 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 MonkeySphere2022-05-25T21:20:28 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.pMYTvT
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:29
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Sending command: /bin/true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4428 bytes, in 0.0 seconds
> 
> Bytes per second: sent 286117.8, received 334812.2
> 
> debug1: Exit status 1
> 
> ##### ssh connection test PASSED. returned: 1
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.7d9aKY
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:30
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Sending command: /bin/true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4788 bytes, in 0.0 seconds
> 
> Bytes per second: sent 781785.8, received 777240.6
> 
> debug1: Exit status 1
> 
> ##### ssh connection test PASSED. returned: 1
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.6lSPli
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:31
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Sending command: /bin/false
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3792, received 4428 bytes, in 0.0 seconds
> 
> Bytes per second: sent 1010118.5, received 1179537.1
> 
> debug1: Exit status 1
> 
> ##### ssh connection test PASSED. returned: 1
> 
> ##################################################
> ### making sure we are back to normal...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:32 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:32 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.RttdQy
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:32
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding command pty user-rc
> 
> debug1: Sending command: /bin/false
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4824, received 4788 bytes, in 0.0 seconds
> 
> Bytes per second: sent 801382.7, received 795402.2
> 
> debug1: Exit status 1
> 
> ##### ssh connection test PASSED. returned: 1
> 
> ##################################################
> ### making sure we are back to normal...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:32 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDTYDfCn9IDhhf3g2l7kJzLPBievdeKQNlqT28Am0FMwAoyi3EXedCj6ALgk9y9a95ueVdh9hf7ppkxC/xpf2WecV+TIS+8KHwS5NHt3AioP79sVZYyt+coJGVaNy79YmaYJexK8Eadq166bXfC5dL4TNog4mWycVDgYd4h/Ns+G8xgYUCe0XyiGJPRWynK1a8k756E1OrP/GrHlLxFDtOUN1Vg2FbzRWlL+UoxZ82iAx4LB7AVHBgH0cgEHtgqmLO7Xu/BLB9Mzi31NuA7OPXerTlnmKkOE1OFiF/tCAJPKaNVA/DTdqmX2iZsI1/x6okMJ9CkaJlyPj6HVLUgB7vH8XYzm1/pfKt+J3L4Jbqz8swD02x51APiVtUzzMT0Z5nmS3IFgJ97AX4hDBI1HDf/pTlG/BuDO7LK3EcX+SNFw8hlbLqS6eenXrk5pchLPGtPb1Cfg7+chBuncjk5KBx0MjMBpmmPtlNiDm5NGjzzSWQCBPENOxhD0zyuZncnxFU= MonkeySphere2022-05-25T21:20:32 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.fCh3As
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:33
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 551947.1, received 652884.5
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (735116) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test directly to 'testhost2.example' without new name...
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.mhCO6O
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:34
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 853376.0, received 856919.9
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test directly to 'testhost2.example' without new name...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost2.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.WkxggJ
> ms:  no primary keys found.
> ms: KEYS_PROCESSED=0
> ms: KEYS_VALID=0
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ##### starting ssh client...
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> No RSA host key is known for testhost2.example and you have requested strict checking.
> 
> Host key verification failed.
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### add servicename, certify by admin, import by user...
> using keyserver: example.org
> ms: adding service name without prompting.
> gpg: no need for a trustdb check with 'always' trust model
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host_keys.pub.pgp'...
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
>       7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> uid           [ unknown] ssh://testhost2.example
> uid           [ unknown] ssh://testhost.example
> OpenPGP fingerprint: 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> ssh fingerprint: 3072 SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo . (RSA)
> 
> NOTE: Service name added to key, but key not published.
> Run 'monkeysphere-host publish-key' to publish the new service name.
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost2.example" 1 new user ID
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost2.example" 1 new signature
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 1
> gpg: checking the trustdb
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> 
> ##################################################
> ### ssh connection test with hostname 'testhost2.example' added...
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost2.example" 1 new user ID
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost2.example" 2 new signatures
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 2
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost2.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.J48MV8
> ms:  no primary keys found.
> ms: KEYS_PROCESSED=0
> ms: KEYS_VALID=0
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> No RSA host key is known for testhost2.example and you have requested strict checking.
> 
> Host key verification failed.
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### add servicename, certify by admin, import by user...
> using keyserver: example.org
> ms: adding service name without prompting.
> gpg: no need for a trustdb check with 'always' trust model
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host_keys.pub.pgp'...
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
>       BF28659B79DDCBC2ED22686D09A1AC58399BC116
> uid           [ unknown] ssh://testhost2.example
> uid           [ unknown] ssh://testhost.example
> OpenPGP fingerprint: BF28659B79DDCBC2ED22686D09A1AC58399BC116
> ssh fingerprint: 3072 SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk . (RSA)
> 
> NOTE: Service name added to key, but key not published.
> Run 'monkeysphere-host publish-key' to publish the new service name.
> gpg: key 09A1AC58399BC116: "ssh://testhost2.example" 1 new user ID
> gpg: key 09A1AC58399BC116: "ssh://testhost2.example" 1 new signature
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 1
> gpg: checking the trustdb
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> 
> ##################################################
> ### ssh connection test with hostname 'testhost2.example' added...
> gpg: key 09A1AC58399BC116: "ssh://testhost2.example" 1 new user ID
> gpg: key 09A1AC58399BC116: "ssh://testhost2.example" 2 new signatures
> gpg: Total number processed: 1
> gpg:           new user IDs: 1
> gpg:         new signatures: 2
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.OhVfvq
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:37
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ##### starting ssh client...
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 592095.1, received 700374.7
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (735950) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test directly to 'testhost2.example' ...
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost2.example" not changed
> gpg: Total number processed: 1
> gpg:              unchanged: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.4nAr5U
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:38
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 851316.0, received 854851.3
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test directly to 'testhost2.example' ...
> gpg: key 09A1AC58399BC116: "ssh://testhost2.example" not changed
> gpg: Total number processed: 1
> gpg:              unchanged: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost2.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.PHue6P
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:39
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ##### starting ssh client...
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost2.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:2
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost2.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 269842.6, received 319190.2
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test for failure with 'testhost2.example' revoked...
> using keyserver: example.org
> ms: revoking service name without prompting.
> gpg: no need for a trustdb check with 'always' trust model
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/host_keys.pub.pgp'...
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
>       7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> uid           [ unknown] ssh://testhost.example
> uid           [ revoked] ssh://testhost2.example
> OpenPGP fingerprint: 7D293E6F4E186D6A402AE740F0EAA4ED95B71C9D
> ssh fingerprint: 3072 SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo . (RSA)
> 
> NOTE: Service name revoked, but revocation not published.
> Run 'monkeysphere-host publish-key' to publish the revocation.
> gpg: key F0EAA4ED95B71C9D: "ssh://testhost.example" 1 new signature
> gpg: Total number processed: 1
> gpg:         new signatures: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost2.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.5xA8NU
> ms:  primary key found: 09A1AC58399BC116
> ms:   * acceptable primary key.
> ms: key line: testhost2.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:40
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost2.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:2
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> Authenticated to testhost2.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 545890.1, received 548157.1
> 
> debug1: Exit status 0
> 
> ./tests/basic: line 81: kill: (736428) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### ssh connection test for failure with 'testhost2.example' revoked...
> using keyserver: example.org
> ms: revoking service name without prompting.
> gpg: no need for a trustdb check with 'always' trust model
> ms: updating openpgp public key file '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/host_keys.pub.pgp'...
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
>       BF28659B79DDCBC2ED22686D09A1AC58399BC116
> uid           [ unknown] ssh://testhost.example
> uid           [ revoked] ssh://testhost2.example
> OpenPGP fingerprint: BF28659B79DDCBC2ED22686D09A1AC58399BC116
> ssh fingerprint: 3072 SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk . (RSA)
> 
> NOTE: Service name revoked, but revocation not published.
> Run 'monkeysphere-host publish-key' to publish the revocation.
> gpg: key 09A1AC58399BC116: "ssh://testhost.example" 1 new signature
> gpg: Total number processed: 1
> gpg:         new signatures: 1
> gpg: marginals needed: 3  completes needed: 1  trust model: pgp
> gpg: depth: 0  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 1u
> gpg: depth: 1  valid:   1  signed:   1  trust: 0-, 0q, 0n, 0m, 1f, 0u
> gpg: depth: 2  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
> gpg: next trustdb check due at 2022-05-26
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ##### starting ssh client...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost2.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.BjwZIX
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   - unacceptable user ID validity (r).
> ms:   - unacceptable primary key.
> ms: removing matching key lines...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=0
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: output ssh marginal ui...
> -------------------- Monkeysphere warning -------------------
> Monkeysphere found OpenPGP keys for this hostname, but none had full validity.
> Could not retrieve RSA host key from testhost2.example.
> The following keys were found with marginal validity:
> gpg: 2 good signatures
> 
> 
> Other user IDs on this key:
> uid           [  full  ] ssh://testhost.example
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
> RSA key fingerprint is SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo.
> Run the following command for more info about the found keys:
> gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example
> -------------------- ssh continues below --------------------
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> No RSA host key is known for testhost2.example and you have requested strict checking.
> 
> Host key verification failed.
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### testing monkeysphere authentication keys-for-user
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:42 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:41 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: outputting keys to stdout...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost2.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> 
> ##################################################
> ### settings reset, updating...
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ms: checking authentication directory structure...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: writing core gpg.conf...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: writing sphere gpg.conf...
> ms: processing: ssh://testhost2.example
> ms: fixing sphere gnupg home ownership...
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.KweYZ2
> ms: determining core key fingerprint...
> ms:  primary key found: 09A1AC58399BC116
> ms: core fingerprint: 35A4240E36E129AA8D94E95A418545E92ABD4660
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms:   - unacceptable user ID validity (r).
> ms:   - unacceptable primary key.
> ms: removing matching key lines...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:42 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 35A4240E36E129AA8D94E95A418545E92ABD4660:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=0
> ms: checking trust model for authentication ...
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: sphere trust model: 1:3:1
> ms: known_hosts file updated.
> ms: ----- user: user42 -----
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ms: output ssh marginal ui...
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> -------------------- Monkeysphere warning -------------------
> Monkeysphere found OpenPGP keys for this hostname, but none had full validity.
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> Could not retrieve RSA host key from testhost2.example.
> ms: key file: -
> The following keys were found with marginal validity:
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzQv0qU/m1b3lRVVTnKbN9qKj3N1O0peqoALvILqQPe MonkeySphere2022-05-25T21:20:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> gpg: 2 good signatures
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42...
> 
> 
> Other user IDs on this key:
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> uid           [  full  ] ssh://testhost.example
> pub   rsa3072 2022-05-25 [CA] [expires: 2022-05-26]
> RSA key fingerprint is SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk.
> Run the following command for more info about the found keys:
> gpg --check-sigs --list-options show-uid-validity =ssh://testhost2.example
> -------------------- ssh continues below --------------------
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost2.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> No RSA host key is known for testhost2.example and you have requested strict checking.
> 
> Host key verification failed.
> 
> ##### ssh connection test PASSED. returned: 255
> 
> ##################################################
> ### testing monkeysphere authentication keys-for-user
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:42 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa 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 MonkeySphere2022-05-25T21:20:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: outputting keys to stdout...
> 
> ##################################################
> ### settings reset, updating...
> ms: checking authentication directory structure...
> ms: writing core gpg.conf...
> ms: writing sphere gpg.conf...
> ms: fixing sphere gnupg home ownership...
> ms: determining core key fingerprint...
> ms: core fingerprint: 6B4D107F266EDEE9BF047C28CECAC8B597D98347
> ms: Monkeysphere authentication trust core already exists.
> ms: exporting core pub key to sphere keyring...
> ms: setting ultimate owner trust on core key in gpg_sphere...
> ms: # List of assigned trustvalues, created Wed May 25 21:20:42 2022 UTC
> ms: # (Use "gpg --import-ownertrust" to restore them)
> ms: 6B4D107F266EDEE9BF047C28CECAC8B597D98347:6:
> ms: checking gpg_sphere owner trust set properly...
> ms: checking trust model for authentication ...
> ms: sphere trust model: 1:3:1
> ms: ----- user: user42 -----
> ms: checking for authorized_user_ids...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.monkeysphere/authorized_user_ids' because STRICT_MODES is false...
> ms: processing authorized_user_ids...
> ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: key file: -
> ms:  primary key found: E00B5EEEBA79B482
> ms:   - unacceptable primary key.
> ms:   * acceptable sub key.
> ms: key line: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDTYDfCn9IDhhf3g2l7kJzLPBievdeKQNlqT28Am0FMwAoyi3EXedCj6ALgk9y9a95ueVdh9hf7ppkxC/xpf2WecV+TIS+8KHwS5NHt3AioP79sVZYyt+coJGVaNy79YmaYJexK8Eadq166bXfC5dL4TNog4mWycVDgYd4h/Ns+G8xgYUCe0XyiGJPRWynK1a8k756E1OrP/GrHlLxFDtOUN1Vg2FbzRWlL+UoxZ82iAx4LB7AVHBgH0cgEHtgqmLO7Xu/BLB9Mzi31NuA7OPXerTlnmKkOE1OFiF/tCAJPKaNVA/DTdqmX2iZsI1/x6okMJ9CkaJlyPj6HVLUgB7vH8XYzm1/pfKt+J3L4Jbqz8swD02x51APiVtUzzMT0Z5nmS3IFgJ97AX4hDBI1HDf/pTlG/BuDO7LK3EcX+SNFw8hlbLqS6eenXrk5pchLPGtPb1Cfg7+chBuncjk5KBx0MjMBpmmPtlNiDm5NGjzzSWQCBPENOxhD0zyuZncnxFU= MonkeySphere2022-05-25T21:20:42 Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net>
> ms: KEYS_PROCESSED=2
> ms: KEYS_VALID=1
> ms: moving new file to /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42...
> 
> ##################################################
> ### ssh connection test for success...
> ##### starting ssh server...
> ##### starting ssh client...
> debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/ssh-socket
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> /<<PKGBUILDDIR>>/tests/../src/monkeysphere
> ##### starting ssh client...
> ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: processing: ssh://testhost.example
> ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts.monkeysphere.HVwSBL
> ms:  primary key found: F0EAA4ED95B71C9D
> ms:   * acceptable primary key.
> ms: removing matching key lines...
> ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:43
> ms: adding key line to file...
> ms: KEYS_PROCESSED=1
> ms: KEYS_VALID=1
> ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> ms: known_hosts file updated.
> ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts'.
> debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:WsjwB2NpZdnMHd5HmguM2b4giVAChpjOZY8qMLdEzOo
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/known_hosts:1
> 
> debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> debug1: Authentications that can continue: publickey
> 
> debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> ED25519 SHA256:JRKlYZ/XzsDjwCajdEE+o2xkQliRZCYpv92Mu50AsoY agent
> 
> Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.oCX/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> Could not chdir to home directory /home/user42: No such file or directory
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 3784, received 4476 bytes, in 0.0 seconds
> 
> Bytes per second: sent 735507.2, received 870013.3
> 
> debug1: Exit status 0
> 
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### Testing TLS setup...
> Can't load /sbuild-nonexistent/.rnd into RNG
> 4074FEC0D37F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd
> ....+..+.+..+..........+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*......+.+......+........+....+......+..+....+.....+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+.......+........+.+..+...+.+......+..................+.........+........+.........+......+...+....+.....+............+....+..............+...+.........+.+...+............+...+.....+....+......debug1: Executing proxy command: exec /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/proxy-command testhost.example 22 /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/ssh-socket
> 
> .debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity type -1
> 
> debug1: identity file /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity-cert type -1
> 
> debug1: Local version string SSH-2.0-OpenSSH_9.0p1 Debian-1+b1
> 
> .+..../<<PKGBUILDDIR>>/tests/../src/monkeysphere
> +.....+...............+..........+.........ms: skipping path permission check for '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts' because STRICT_MODES is false...
> .....+.+...+ms: lock created on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ......+ms: processing: ssh://testhost.example
> .....+ms: key file: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts.monkeysphere.xddUIB
> .+.....+.+..ms:  primary key found: 09A1AC58399BC116
> .......+.....+...+.............+ms:   * acceptable primary key.
> ..+....ms: removing matching key lines...
> ...ms: key line: testhost.example ssh-rsa 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 MonkeySphere2022-05-25T21:20:44
> ms: adding key line to file...
> ..ms: KEYS_PROCESSED=1
> ..ms: KEYS_VALID=1
> .........ms: lock touched on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> .+.........ms: known_hosts file updated.
> .+....ms: lock removed on '/<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts'.
> ..+debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Debian-1+b1
> 
> debug1: compat_banner: match: OpenSSH_9.0p1 Debian-1+b1 pat OpenSSH* compat 0x04000000
> 
> debug1: Authenticating to testhost.example:22 as 'user42'
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: SSH2_MSG_KEXINIT sent
> 
> .debug1: SSH2_MSG_KEXINIT received
> 
> debug1: kex: algorithm: sntrup761x25519-sha512 at openssh.com
> 
> debug1: kex: host key algorithm: rsa-sha2-512
> 
> debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none
> 
> ....+......+.......+........+....+...+..+.+...+.....+............+...+.......+............+..+...............+....+....debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 
> .............+...+.........+.+..debug1: SSH2_MSG_KEX_ECDH_REPLY received
> 
> debug1: Server host key: ssh-rsa SHA256:iyfGmuCBPnOLz+PHet2YLqk1I4sqEb8WL3Fy6iIyXWk
> 
> .debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
> 
> debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
> 
> debug1: Host 'testhost.example' is known and matches the RSA host key.
> 
> debug1: Found key in /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/known_hosts:1
> 
> ......+......+...........+................+..+.debug1: rekey out after 134217728 blocks
> 
> debug1: SSH2_MSG_NEWKEYS sent
> 
> debug1: expecting SSH2_MSG_NEWKEYS
> 
> .debug1: SSH2_MSG_NEWKEYS received
> 
> debug1: rekey in after 134217728 blocks
> 
> debug1: get_agent_identities: bound agent to hostkey
> 
> .debug1: get_agent_identities: agent returned 1 keys
> 
> debug1: Will attempt key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> debug1: Will attempt key: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/testuser/.ssh/no-such-identity  explicit
> 
> debug1: SSH2_MSG_EXT_INFO received
> 
> debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519 at openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256 at openssh.com,webauthn-sk-ecdsa-sha2-nistp256 at openssh.com>
> 
> debug1: kex_input_ext_info: publickey-hostbound at openssh.com=<0>
> 
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> 
> +...+.......debug1: Authentications that can continue: publickey
> 
> .debug1: Next authentication method: publickey
> 
> debug1: Offering public key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> ..debug1: Server accepts key: Monkeysphere Test Suite Test User (DO NOT USE!!!) <testuser at example.net> RSA SHA256:+idw+L1Qn5lk46YY9R2rDcsIPscURzXzF5huAPL/wIs agent
> 
> ..+.......+........+....Authenticated to testhost.example (via proxy) using "publickey".
> 
> debug1: channel 0: new [client-session]
> 
> debug1: Requesting no-more-sessions at openssh.com
> 
> debug1: Entering interactive session.
> 
> debug1: pledge: proc
> 
> ...+debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Remote: /<<PKGBUILDDIR>>/tests/tmp/ms.lvs/authorized_keys/user42:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
> 
> debug1: Sending command: true
> 
> ...Could not chdir to home directory /home/user42: No such file or directory
> ...debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 
> debug1: channel 0: free: client-session, nchannels 1
> 
> Transferred: sent 4816, received 4836 bytes, in 0.0 seconds
> 
> Bytes per second: sent 801524.4, received 804853.0
> 
> .debug1: Exit status 0
> 
> .+./tests/basic: line 81: kill: (737938) - No such process
> ##### ssh connection test PASSED. returned: 0
> 
> ##################################################
> ### Testing TLS setup...
> ....+.Can't load /sbuild-nonexistent/.rnd into RNG
> 405493927D7F0000:error:12000079:random number generator:RAND_load_file:Cannot open file:../crypto/rand/randfile.c:106:Filename=/sbuild-nonexistent/.rnd
> ....+.+++.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*........+....+++++++++++++++++++++++++++++++.+++++++++++++++++.+++++++++++++++++*.......+.............+..+......+..................+.........+....++....+.......+.........+.+...........++.........++.............+.....+...+..........+.................................+.....+.+..........++...............+.......+....++.....+.....+..................+........+...+...+....+.............+.....+..+.+.+.............++...+.+.................+.......................++................++......+...+................+...+...+...........+.+................+..............+........+.+.........++.......................+...+..+..........+.......+...........+.............+.+++...+..++++.++++.+..+..+..+..++++..+..+..++++..+.++..+++.+..+...+.+++..+.+++..+..+..+..+..+..+..+++.+..+.+.+...+.+..+.+.++.+.+++.+..+.+.+..+..+..+..+..+.+++
> .....+...++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*......+....+...+...++.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+....+..+..+..++.+++..+..+.++.+++...+..+...++.+....+...+..+++..+.++..+..+.++..+..+...+++..+.++.+.++.+..+..+..+++..+...+...+..+.++...+++..+..++.+..+...+++.+..+..++.++.+..+..+++...+++
> .+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+......+..+.........+..........+.........+.....+++++++++.+++++++++++++++++++++++++++++++++++.+++++++++++++++++++++*................+.+......+........+..+.+........+...............+................+......................++..............+......+............................+.....+.......+......+.............+.+...+.......+..........................++...........................+.....+...+.+..+...................+...+......+.+.....+.........+.........++.............+..............+............+...................++......+.+.........+............++........+.+...........+.........+.......+....+............+...................+.+.+.........+..+.+....++.....++...........+.......+.....+.......+..............+.....+...+.......+........+........+......+....+...+...+......+.......................+........+......++.....+.....+....................................+..+++..+...+..+..+..+..+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> ++++++++
> -----
> Cannot write random bytes:
> 405493927D7F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd
> FAILED!
> ### removing temp dir...
> -----
> [1]+  Done                    socat EXEC:"/usr/sbin/sshd -f ${SSHD_CONFIG} -i -D -e" "UNIX-LISTEN:${SOCKET},unlink-early" 2> "$TEMPDIR"/sshd.log
> make[1]: *** [Makefile:113: test-basic] Error 1
> make[1]: *** Waiting for unfinished jobs....
> Cannot write random bytes:
> 4074FEC0D37F0000:error:12000079:random number generator:RAND_write_file:Cannot open file:../crypto/rand/randfile.c:240:Filename=/sbuild-nonexistent/.rnd
> FAILED!
> ### removing temp dir...
> make[1]: *** [Makefile:116: test-ed25519] Error 1
> make[1]: Leaving directory '/<<PKGBUILDDIR>>'
> dh_auto_test: error: make -j8 test returned exit code 2


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/monkeysphere_0.43-3.1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.



More information about the Pkg-privacy-maintainers mailing list