-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HPN-SSH not present in EPEL builds #108
Comments
@ellert, do you know? I took a brief look through the Fedora Koji but didn't find anything obvious in the changelog or the build logs. |
Looking back at the thread starting with https://mailman.egi.eu/pipermail/discuss/2017-November/000100.html (and the later one starting https://mailman.egi.eu/pipermail/discuss/2018-September/000172.html), it looks like the EPEL version never had the HPN patch, only the globus-toolkit version did. Following the thread: when we started with the gridcf we decided to go with the EPEL versions and therefore also drop the HPN patch for the (now) gct. I have no idea how much work it would be to adapt it to work with the EPEL version. |
Thanks for the updates. I've made a half-baked attempt at getting the HPN patch into the GCT gsi-openssh package. I added the HPN-SSH patch for OpenSSH 7.4p1 as the last patch applied and modified the patch to work with the other patches in the source package. It compiles but I get a segfault in cipher-ctr-mt.c when attempting data transfers, so something is broken. I'm not very experienced in C, so if someone else wants to give it a try I would be grateful. The modified patch is attached. |
Hi, I am the developer of HPN-SSH. One of my old colleagues who is now at NOAA just contacted me today about gsi-openssh. First I want to start by saying that I had let the hpn-ssh patches fall way behind for various budget and life related issues. However, I've seen ported everything up to OpenSSH 8.1p1. I've also fixed some problems with the multithreading aes-ctr cipher, server logging, and few of formatting issues. I've back ported that fix to 7.6p1 - 8.1p1 inclusive. I'm very interested in ensuring the hpn-ssh remains a part of gis-openssh and would like to help in the process if anyone would like. I have grabbed the package files for gsissh from the fedora sources and applied my patches. Of course, it's not building because of some issue with LDAP. That said, not even the unpatched version is building because of the same LDAP issues. Probably my environment. Anyway, I'm happy to answer questions, take feature requests, and deal with bugs. Just let me know what I can do to help out. |
@adorsey-NOAA, @msalle |
That's great news @rapier1 and very welcome!
CentOS 6 and 7 (and I assume RHEL and Scientific Linux 6 and 7) have OpenSSL 1.0.1[...] and 1.0.2[...] and (GSI-)OpenSSH 5.3p1 and 7.4p1 respectively.
Ok, just again had a look on SourceForge and the files there have been updated recently. Reading this:
...on SourceForge I conclude that the above mentioned problems were not affecting older versions of the HPN-Patches (meaning specifically the patches for OpenSSH 5.3p1 and 7.4p1)? BTW, I'm in the process of creating GSI-OpenSSH packages for SUSE. I started with packages for OpenSUSE Leap 15.0 which uses OpenSSH 7.6p1 and will also try to integrate the HPN-Patches for OpenSSH 7.6p1 there now. Much obliged for providing these. |
Hm, OpenSUSE Leap 15.0 has OpenSSL 1.1.0[...]. Should the patches from https://sourceforge.net/projects/hpnssh/files/Patches/HPN-SSH%2014v15%207.6p1/ then work at all there? The summary on SourceForge says:
...so maybe not? |
@fscheiner Also, it turns out that the SRPM I grabbed from https://kojipkgs.fedoraproject.org//packages/gsi-openssh for 8.1p1 fails when you try to do a globus auth. Note: this is after I applied the hpn-ssh patch so there might be a weird interaction that I'm not understanding. That said, the hpn-ssh patch doesn't touch the buf. Anyway, it crashes in sshbuf.c at Program terminated with signal 11, Segmentation fault. |
Also, is there a canonical set of patches, source code, srpms, etc that I should focus on? I'm largely focused on providing support to CentOS because that's what my community generally uses. However, I'm game for helping out on any of these but I need a clue as to where to start. Thanks! |
I understand. Seems like I have to switch to Leap 15.1 (which has OpenSSH 7.9p1) anyhow according to their lifetime page I just checked. It was convenient to start building a GSI-OpenSSH package on Leap 15.0 as I already had a VM running it. I have to look into how to upgrade this installation to Leap 15.1.
Just to be sure, with "globus auth" you mean with GSI proxy credential, because there's also a service from Globus called Globus Auth? And what failed, the gsisshd or gsissh? And does the authentication work for the untouched package at all - as it's pretty new?
Adding @ellert here, as he should know best. AFAICT for EPEL/Fedora there's only the GSI enabling patch that's shipped with the GSI-OpenSSH source RPMS (available from the above mentioned URL for example). I also use this patch for the SUSE packages (with some reordering). I assume with HPN patches available for the currently maintained RHEL 6, 7 and 8 compatible OSes, for the future you only need to follow up on the most current Fedora versions of GSI-OpenSSH which seems to be always based on the most recent OpenSSH version. This should also provide us with patches for the future RHEL compatible OSes, as we should be able to just reuse the HPN patch(es) from Fedora's GSI-OpenSSH that will match the (GSI-)OpenSSH used in future RHEL compatible OSes. @matyasselmeci @msalle: What's your opinion on that? |
I'm helping@rapier1 with testing. The following is just for clarification, as he is working on another approach that I hope to test later today. CentOS 7.6
@rapier1 is working on an HPN-SSH patch for a gsi-openssh source RPM from https://kojipkgs.fedoraproject.org//packages/gsi-openssh/7.6p1/5.fc28.1/src/ . I've already built this package on CentOS 7.6 and successfully tested GSI authentication. |
I'll write more soon but @adorsey-NOAA just told me that he was able to successfully build, deploy, and use the hpn-ssh patches for OpenSSH 7.6p1 under Centos 7. I'm including a link to the rpms and srpm for this. This was built under OpenSSL 1.0.2k. You'll find openssh-7.6p1-hpnssh.patch in the SOURCES directory of the srpm. I apply this patch after all of the other patches as it seemed easiest to do it that way. I'll start working on 7.7p1 and 7.8p1 shortly. As for 7.9p1 and later I'll need to update my globus environment and start poking at what's going on in sshbuf.c. I think that's some sort of weird interaction with the openssh-8.0p1-gssapi-keyex.patch. Also, I really don't know anything about globus so I am sorry if I use the wrong terms for things at times. As I move forward I expect I'll be picking a lot of this up. https://www.dropbox.com/sh/odv0rv58x8tgeou/AADyZMqHW77O3ZopdSv96MRca?dl=0 |
We deployed the packages that @rapier1 built for us onto our data transfer nodes earlier this week. This solved a large part of the data transfer performance issues that our users were complaining about. I (and the users of our data transfer systems) would love to see this work end up in the EPEL packages if that's at all possible. I'm not great at C, but please let me know if I can help in other ways like testing packages on our test environment. |
@adorsey-NOAA @rapier1
So you and your users were able to successfully test both HPN enabled GSI-OpenSSH server and client. That's good to hear. If at all possible, I'd recommend to use the (GSI-)OpenSSH version of the respective EPEL version for your OS - EPEL7, right? - as that version is still maintained in EPEL and you'll benefit from any (security) updates that are issued - after rebuilding the package.
Testing new packages will surely be helpful. I think for EPEL we would need the HPN patches for the respective (GSI-)OpenSSH versions:
I think EPEL7 would be most important ATM. @rapier1 |
@fscheiner |
@fscheiner I may want to back port some of the changes I made to the multithreaded cipher as well but this should be a good start. |
@rapier1 I patched the openSUSE Leap 15.1 OpenSSH 7.9p1 package with GSI and HPN patches. The resulting For HPN I used https://sourceforge.net/projects/hpnssh/files/Patches/HPN-SSH%2014v18%207.9p1/openssh-7_9_P1-hpn-14.18.diff/download. From looking into the RPM source package on https://www.dropbox.com/sh/odv0rv58x8tgeou/AADyZMqHW77O3ZopdSv96MRca?dl=0 this patch came close to the one you used. But as there are other patches as well and all together are much bigger than the one I used, I'd like to ask if that was the correct patch to use? And is there a quick way to determine that the HPN features are working? From:
..I assume it's sufficient to have an HPN enabled client to at least test the multithreaded AES-CTR cipher. |
@fscheiner There are multiple patches on sourceforge so I should probably explain that each of them implements a different set of features. So the AES-CTR only provides the multithreaded cipher, the Server Logging patch only includes the extended server logging, etc. The one you downloaded incorporates all available features in to a single patch, so that include the non cipher switch, the dynamic window scaling, server logging, multithreaded aes-ctr, and a patch to the scp progressmeter to show the 1 sec throughput as well as the averaged throughput. So if you want to include everything just use the patch you used. As for functional testing - I keep meaning to build a script for that. Anyway, you can test the multithreaded cipher from the client side since the outbound encrypted data is the identical to the nonthreaded aes-ctr cipher. If you increase the verbosity you should get a quick rundown on the number of hits and waits in the keystream threads. Likewise if the verbosity is increased even more you'll see receive buffer adjustments - that increases pretty quickly though so you it will help to be on a high BDP path. To test the none-switch you do need to have that enabled on both ends of the connection. You'll get a warning once the none cipher is engaged but the only way to really test it is to do a raw packet capture and see if you can read the payload. Also, I should have a version of 7.4 for CentOS 7 up shortly. I am having some problems with building 7.8 for CentOS 7 but I'm not going to spend a lot of time on that. Once I have a functional CentOS 8 environment I'll start working on 7.8 there. A lot of the delay is just getting the environments set up. I have a coworker who generally does that but between SC19 and TechEx and Thanksgiving and etc he's been a little oversubscribed. Lastly, is there anyone else I should be talking to about hpn-ssh? I'd like to do whatever is necessary to maintain its value for the community. |
No issue at all. I'm just happy that you found the time to continue the work on the HPN patches. That's greatly appreciated. :-)
Thank you, that's useful information. I also made progress with packages for SUSE: Lightly tested packages including the HPN and GSI patches for OpenSSH 7.9p1 are now available for SLES15 (SP1) and OpenSUSE Leap 15.1 (https://build.opensuse.org/package/show/home:frank_scheiner:gct/gsi-openssh).
Ok, I'll have a look into this.
Yeah, supporting a 7.8 on CentOS 7 would anyhow require constant "backporting" of patches from CentOS 8 instead of just using the patches for the 7.4 maintained in CentOS 7.
I don't know of any specific party, but maybe a mail to our [email protected] mailing list would possibly reach a good portion of interested people. Posts to the list are moderated until you subscribe (details on gridcf.org, archive on https://mailman.egi.eu/pipermail/discuss/). I can approve both. Because of the upcoming holidays, you maybe should not post before after the holidays. BTW, nice holiday time and - if we don't hear from each other earlier - until next year. :-) |
I hope everyone is doing well currently with the ongoing chaos. I was wondering if there had been any progress on this issue, and if there was anything I could do to help. EDIT: @rapier1 We've just noticed an issue with the test set of packages that you built for us a while ago. We're seeing messages like the following:
It looks like the IP that's supposed to be in that message is malformed somehow. Please let me know if I can provide more information. |
I don't think that's specifically from the hpn-ssh code but I can give it a look and see what might be happening. My guess is that there is a malformed printf somewhere. |
Hi, |
Sorry I didn't get back to you sooner. I let this slide off of my plate because I wasn't able to replicate the problem on my end - which doesn't mean it's not real. How often do you run into this issue? Is it every time? Frequently? Occasionally? Does it happen with a specific remote host or have you seen it on multiple hosts? Lastly, do you know if this is via IPV4 or IPv6? As an aside - I got new funding to develop hpn-ssh so I will have more time to focus on these issues and roll out improvements. |
The issue occurs every time a user disconnects from a DTN, so every time that "DIsconnected from..." message is printed, the output is garbled. The DTNs are IPv4 only. This is happening with the gsi-openssh-7.6p1-5 RPMs you gave me in November 2019. If you have a different or newer set of RPMs, I could test those on our test system and see if they have this issue as well. You mentioned in an earlier comment on this issue that you had packages based on OpenSSH 7.4 as well. |
Let me go back and check something. I was talking to the gsi people and I think they picked up the hpn-ssh stuff again but let me see what I can find. Is this for CentOS? |
Yes, we're running CentOS 7.7 on the DTNs. |
Sorry @rapier1, the HPN patches weren't yet included in the GSI-OpenSSH packages for EPEL and Fedora AFAICT. I am currently re-enabling them for SUSE packages and need to test them afterwards. An issue with the GSI patch and missing time kept me from continuing this earlier. I'll then see into how the HPN patches can be included in the GSI-OpenSSH packages for EPEL and Fedora - if possible. @ellert, @matyasselmeci, @msalle: So what do you think about starting to include the HPN patches in the EPEL/Fedora packages? |
If we (you (-; ) can test them and show them to work, then I certainly think it would be a very valuable addition. I personally probably won't have many cycles for it the coming month. |
@fscheiner @ellert Thanks for that, I'll test those packages ASAP. |
@fscheiner @ellert @rapier1 I tested the GSI-OpenSSH packages provided at https://koji.fedoraproject.org/koji/buildinfo?buildID=1635832 on our test DTN systems. I immediately ran into the previously mentioned issue with the segfaults, but setting Transfer speeds with gsiscp are around 195MB/s, which is what I'm expecting from this remote site. Transfer speeds with rsync are worse (~30MB/s) than gsiscp, but also within the range we've come to expect. Every so often rsync performance will spike up to par with gsiscp, I'm not sure why but I don't think it's an issue with gsi-openssh because it happens with normal SSH servers as well. The issue I described in my comment from April 7 is no longer present. With these packages, I no longer see the corrupted log messages when users disconnect. I'm also no longer seeing the issue where child gsisshd processes are hanging around after a user disconnects. The packages that @fscheiner provided fix all of the issues I was seeing. I'm excited to see these get into EPEL (and hopefully get this ticket closed finally). |
@adorsey-NOAA
Actually that should be already active after installation because this setting is included in the shipped And just to be sure, you saw these segfaults only for the 7.4p1 version, right?
I wonder if it could make a difference if you would also disable the AES-CTR-MT cipher for the client (in
Maybe this makes a difference for your use case. |
Correct; I had an existing customized config file so I had to add that entry directly. It was present in
Also correct.
Thanks, I'll give that a try. That issue doesn't have to hold up resolving this issue, but I really appreciate the pointer. EDIT: Looks like the performance issues with rsync were on the client, related to checksumming; adding the |
Hi, May I please ask you a question about the HPN-SSH ? Thank you in advance. |
You're welcome! Also many thanks go to @adorsey-NOAA for creating that very issue here - which actually kicked all that off - and even more thanks go to @rapier1 for keeping the HPN patches and @ellert for keeping the GSI patch going the whole time.
I can't speak for all of the GridCF, but I'd say, as long as @rapier1 can provide us with updated HPN patches and - again not to forget - also @ellert can provide us with updated GSI patches, GSI-OpenSSH w/HPN can exist in EPEL/Fedora and for SUSE. |
@adorsey-NOAA
Great that you found a solution. I only wonder, why not using |
Honestly @fscheiner I'm not sure. It might have been my test method and whether I cleaned up the destination filesystem first - supposedly rsync will use -W implicitly if the remote file doesn't exist. However, I didn't pay that much attention to the destination filesystem while I was testing before. |
Thank you for your reply ! |
Hey all, just wanted to report that a new version of HPN-SSH (15v1) is now available. There are two major changes in this one. 1) The internal buffer sizes have all been normalized to 32k. This reduces the number of memcopys and read/write syscalls. My tests indicate that this gives a small but noticeable improvement. On my systems that was around 5%. 2) For those using the None cipher switch you'll now have the option of disabling HMAC as well. On my testbed this resulted, under optimal conditions, a 50% improvement in throughput in comparison to None with HMAC (500MB/s to 900MB/s). Obviously this is a use at your own risk thing, don't use for sensitive data, etc. I don't have a patch for GSI yet but it shouldn't be overly difficult. No promises on when I will get to it but I will. |
Great news, saw that already last week on SourceForge. :-)
I'm already on it and prepared GSI-OpenSSH 8.4p1 w/HPN packages for Fedora 33 . But there seems to be an issue with at least GSI-OpenSSH 8.3p1 and 8.4p1 (w/ and w/o HPN!) that break a successful GSI authentication for me. I'll look at 8.2p1 and 8.1p1 to see if these are also affected. At least the clients are working - assumingly - up to 8.3p1 according to my earlier testing. |
I just noticed that the updated packages have landed in EPEL, and I am seeing those now in our local EPEL mirror. From my perspective, this issue can be closed, unless you want to keep it open to handle the newest update. Thank you all again for the hard work to get HPN-SSH back into the EPEL.version of gsi-openssh. |
Thanks for all the work to get HPN into gsi-openssh! I'm more than happy to know that my work is helping other people. If any issues come up again please contact me and I'll do what is necessary to get things working. Also, please join the hpnssh community mailing list at [email protected]. We'll also have a dedicated website "real soon now" |
I'm referencing openssh-gsskex/openssh-gsskex#18 here. To make it short: The GSS key exchange (KEX) - and therefore also GSI authentication - is broken since (GSI-)OpenSSH 8.0p1 with the exception of the SHA1 based GSS group exchange (GEX). Until now I wasn't able to find the exact error and so far this was not taken up by the maintainers of the GSS KEX patches for OpenSSH (used by both Fedora and Debian). So I'd be happy for any support or "publicity". E.g. if you consider that as important as I do, comment on the above referenced issue appropriately. More details in the above mentioned issue. I detected this when integrating the HPN patches into the more recent GSI-OpenSSH versions for currently supported Fedora distributions and testing the resulting binaries. CCing to @msalle @ellert @matyasselmeci @rapier1 @adorsey-NOAA @e-sakane just to be sure you're informed. |
Hi @fscheiner -san, We encountered the same issue the other day. Taking the past gsi-openssh implementation into consideration, we have addressed the issue and modified the following patches included in the gsi-openssh-8.0p1-6.el8.src.rpm:
I hasten to share the modified patches. Please see the attached. openssh-7.7p1-fips.patch.txt |
@e-sakane |
@e-sakane But the SHA256 based GSS KEX methods are not broken per se - they were working perfectly with GSI-OpenSSH 7.9p1. And I actually would like to make that working again for the future as the SHA1 based methods are going to be phased out sooner or later. My current plan is to patch |
Sort but not entirely related question - has anyone done any work on
porting GSI to OpenSSH 8.4p1 as a of yet? I just built a better package
for CentOS 8.3 (it installs in /opt and uses it's own systemd routines
now) but I'm using the 8.4p1 code base.
Chris
…On 2/15/21 8:36 AM, fscheiner wrote:
@e-sakane <https://github.com/e-sakane>
Small update: I now went through all patches you provided and compared
them to the original ones. The modified patches primarily remove the
SHA256 based GSS KEX methods from the list of default GSS KEX methods
(|GSS_KEX_DEFAULT_KEX| in |ssh-gss.h|) and put the SHA1 based GSS GEX
method to the top. This GSS GEX method definitely works from my testing,
but the also SHA1 based GSS Group14 KEX does not IIRC, because it is
affected by the same issue that also breaks the other SHA256 based GSS
KEX methods. But as the GSS GEX method is used first because of its
position in the defaults list, GSI auth should work again with the
provided patches (as long as the local crypto policies do not enforce
other methods via command line arguments). So I think you can also get
your result by configuring the GSS KEX methods via command line
arguments as I did for my testing here
<openssh-gsskex/openssh-gsskex#18 (comment)>
for example.
But the SHA256 based GSS KEX methods are not broken per se - they were
working perfectly with GSI-OpenSSH 7.9p1. And I actually would like to
make that working again for the future as the SHA1 based methods are
going to be phased out sooner or later.
My current plan is to patch |kexgss_server()| and its dependencies back
to a working state. And maybe the easiest way would be to exchange it
with the functionality used in GSI-OpenSSH 7.9p1.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#108 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAKL66EYX36L4ZGMSUCVRF3S7EPNXANCNFSM4JEZMT3Q>.
|
Hi Chris,
Yes, thanks to @ellert GSI-OpenSSH 8.4p1 is available in Fedora 33, see https://src.fedoraproject.org/rpms/gsi-openssh. I assume it still misses the fixes for openssh-gsskex/openssh-gsskex#18 and I still need to adapt your patches for GSI-OpenSSH 8.3p1 and 8.4p1. Cheers, |
Thank Frank!
Is the gsissh patch limited to the openssh-8.4p1-gsissh.patch file or
are there more dependencies? My goal is to wrap it into the Centos 8.3
package I'm building. That said, before I rush into this I'm thinking it
would be better if I got you patches for HPNSSH for 8.3p1 and 8.4p1
rather than trying to roll my own. Would that work better for you or are
you good with incorporating the newer versions of HPNSSH when you have
time?
…On 3/5/21 2:37 AM, fscheiner wrote:
Hi Chris,
Sort but not entirely related question - has anyone done any work on
porting GSI to OpenSSH 8.4p1 as a of yet?
Yes, thanks to @ellert <https://github.com/ellert> GSI-OpenSSH 8.4p1 is
available in Fedora 33, see
https://src.fedoraproject.org/rpms/gsi-openssh
<https://src.fedoraproject.org/rpms/gsi-openssh>. I assume it still
misses the fixes
<https://github.com/openssh-gsskex/openssh-gsskex/pulls/19> for
openssh-gsskex/openssh-gsskex#18
<openssh-gsskex/openssh-gsskex#18> and I still
need to adapt your patches for GSI-OpenSSH 8.3p1 and 8.4p1.
Cheers,
Frank
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#108 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAKL66GHAISHT2W4IXHCBKLTCCC2ZANCNFSM4JEZMT3Q>.
|
It also needs everthing related to GSS IIC.
The latter would work perfectly for me, as I did it that way already for the GSI-OpenSSH versions in EPEL 7 and EPEL 8. I was just held back for Fedora by the GSS KEX problems mentioned earlier - which are fortunately solved now. I usually took the HPN patches from Sourceforge and adapted them - which became easier with every new version - to GSI-OpenSSH. So if you continue to provide them there, I'll pick them up next week or so. There's no need to to adapt them yourself. |
On 3/5/21 11:09 AM, fscheiner wrote:
The latter would work perfectly for me, as I did it that way already for
the GSI-OpenSSH versions in EPEL 7 and EPEL 8. I was just held back for
Fedora by the GSS KEX problems mentioned earlier - which are fortunately
solved now. I usually took the HPN patches from Sourceforge and adapted
them - which became easier with every new version - to GSI-OpenSSH. So
if you continue to provide them there, I'll pick them up next week or
so. There's no need to to adapt them yourself.
So there is source RPM up there for 8.4p1 (HPNSSH 15v1) at
https://sourceforge.net/projects/hpnssh/files/RPMS/HPN-SSH%2015v1%208.4p1/SRC%20RPM/
I don't have the one for 8.3p1 up there but give me a few and I'll try
to find it and build it for you.
We also have the patchfiles for 8.4 and 8.3 at
https://sourceforge.net/projects/hpnssh/files/Patches/
Alternatively there are the github sources but I can understand that
being a pain in the butt.
Let me know if you have any issues and when you get your rpms built. I'd
like to roll them out to PSC soon.
Thanks!
Chris
|
No worries, it's OK for me to just use the patches, as I have to "adapt" (piece of cake since a while) each HPN patch anyhow to the GSI-OpenSSH sources no matter if I download them from Sourceforge or fetch them from the OpenSSH source RPMs on SourceForge.
Indeed, I would prefer to use the patches instead of the GitHub sources. :-)
I have GSI-OpenSSH 8.3p1 (for Fedora 32) and GSI-OpenSSH 8.4p1 (for Fedora 33) w/HPN ready in the meantime - 8.3p1 got patched already last year, but because of openssh-gsskex/openssh-gsskex#18 it didn't work until I applied the patches from openssh-gsskex/openssh-gsskex#19. With these patches both of them work successfully with all available GSS KEX/GEX methods:
I still need to create the PR for GSI-OpenSSH 8.4p1 over at Fedora and @ellert needs to decide (1) if we wait for Fedora to pick up the patches from openssh-gsskex/openssh-gsskex#19 or (2) if we create separate bugs for GSI-OpenSSH and patch them on our own until Fedora updates their OpenSSH packages. Either way, IIC it will take at least two weeks in addition until the resulting RPMs will reach the "standard" package sources, but they will be available from "[...][-updates]-testing" package sources in the meantime. For the time being here are the source RPMs I created w/HPN and fixes for openssh-gsskex/openssh-gsskex#18 included (zipped to allow upload to GitHub): |
I have added the proposed changes from openssh-gsskex/openssh-gsskex#19 to the Fedora/EPEL builds:
Please test and give karma if they work. Mattias. |
Hi @ellert, already on it. :-) Will report the results here later on. |
Works for me:
Works for me:
Works for me:
Works for me:
Test script source at https://gist.github.com/fscheiner/92ea125c72cd70283a712585206c1015. |
@ellert: @rapier1 @adorsey-NOAA @e-sakane |
Apologies in advance if you guys don't do the builds for EPEL. I have a question that I hope you can answer.
We recently deployed some data transfer nodes on CentOS 7.6 using the (at the time) latest available GCT packages in EPEL. It appears the gsi-openssh-server package that was installed (gsi-openssh-7.4p1-4.el7.x86_64) doesn't include the HPN patch - attempting to enable the feature in /etc/gsissh/sshd_config results in an error from gsisshd and the service refusing to start.
I found #72 that references a discussion about dropping the HPN patch, but I can't find anything stating that this change was definitely made, and on what date that change was implemented.
Do you have any information on when HPN was removed from the EPEL package builds, and/or what was the last version that included HPN support?
The text was updated successfully, but these errors were encountered: