specify an algorithm for ssh-keyscan, otherwise it will make
authordjm <djm@openbsd.org>
Fri, 14 Jun 2024 00:23:55 +0000 (00:23 +0000)
committerdjm <djm@openbsd.org>
Fri, 14 Jun 2024 00:23:55 +0000 (00:23 +0000)
multiple attempts simultaneously and confuse the test

regress/usr.bin/ssh/penalty.sh

index 5ac7ef6..ae37aae 100644 (file)
@@ -44,8 +44,8 @@ sleep 8
 ${SSH} -F $OBJ/ssh_config somehost true || fail "authfail not expired"
 
 verbose "penalty for no authentication"
-${SSHKEYSCAN} -p $PORT 127.0.0.1 >/dev/null 2>&1 || fatal "keyscan failed"
+${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null 2>&1 || fatal "keyscan failed"
 
 # Repeat attempt should be penalised
-${SSHKEYSCAN} -p $PORT 127.0.0.1 >/dev/null 2>&1 && fail "keyscan not rejected"
+${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null 2>&1 && fail "keyscan not rejected"