-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenSSH 8.4: Add remaining algorithms #91
Comments
So by working this issue, we decided to postpone #89. Now, when following the build-and-test instructions in the documentation,
--> Looking at Also "irritating" is that no OQS tests get executed when doing as documented:
Again, is this a case of missing documentation update @xvzcf ? I'm now operating on branch "mb-v8test" in case you'd like to correct the updates regarding documentation and tests that I'm making so I'm not chasing wrong goals when moving to Ubuntu 20 and extending the algorithm list... Edit: The tests Surprising: Then: Should the description in the README (for "manual" SSH setup and execution) work OK? Already on the unchanged code, if I try it for "dilithium2", it fails:
--> Do I have to dig deeper into the openssh-8 logic or are these issues for you expected/easy to rectify, @xvzcf ? |
Yes this does look like a known failure. Does
Yes this is a case of missing documentation. The current (incomplete) set of test commands can be found in the config.yml, and I can update the README in
Yes, this is intentional (so that the python script does not have to set up the
I'm not sure off the top of my head what's going on here, but it seems like there's a good lead |
No longer :-) If you give it a parameter, it iterates through all alg combinations.
OK, will debug into it. |
A potential problem here is that we'd be taking ~2 hours to run the tests, just like before. I avoided doing all the combinations for that reason. My preference would be to augment the built-in regression tests first before looking at |
I'd also prefer that for regular (CI) operations. But this parameter delivers a fast way to check end-to-end if everything works: I wasn't exactly anxiously looking forward to diving into understanding the openssh test suite logic.... |
@xvzcf FYI an update:
Edit: Found a limiting constant: Line 268 in 371c2e5
Increasing that fixes the latest problem. Do you see any reason why we should refrain from doing so? |
Answering my own question: Yes, this switch alone makes more than 64 (maybe only 32 for small platforms?) signature algorithms a bad idea: Lines 800 to 802 in 371c2e5
--> Adding sig-algorithm en/disablement logic into the code generator (YML and logic). But even then, basic tests on simple algorithms begin to fail after only adding half the algorithms... Quite some more debugging required.... Edit: And this debugging isn't fun:
--> Does this look familiar? This is going "deeper" than I'm comfortable with (and wanted to spend time on). |
Closed by #97 |
8.4 only has a few OQS algorithms at the moment. We should add the rest in once we deal with #89 and #90
The text was updated successfully, but these errors were encountered: