Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751408AbeACFfW (ORCPT + 1 other); Wed, 3 Jan 2018 00:35:22 -0500 Received: from mail-it0-f65.google.com ([209.85.214.65]:37537 "EHLO mail-it0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751036AbeACFfU (ORCPT ); Wed, 3 Jan 2018 00:35:20 -0500 X-Google-Smtp-Source: ACJfBouJC27fcLbC5ynC7DHpCb5qxaiyHy/b7egVz8eeDsva8sEFIhiwg8IY51jlXMGYQo7MCwUdeg== Date: Tue, 2 Jan 2018 21:35:16 -0800 From: Jonathan Nieder To: Bryan Turner Cc: Junio C Hamano , Brandon Williams , Ben Humphreys , Git Users , Linux Kernel , git-packagers@googlegroups.com Subject: Re: [ANNOUNCE] Git v2.16.0-rc0 Message-ID: <20180103053516.GB87855@aiede.mtv.corp.google.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: Hi, A few more notes. Bryan Turner wrote: > bturner@ubuntu:~$ ssh -V > OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8, OpenSSL 1.0.1f 6 Jan 2014 > > bturner@ubuntu:~$ ssh -G -p 7999 localhost > unknown option -- G > usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [...] > Is it possible to adjust the check, somehow, so it doesn't impact > older OpenSSH versions like this? As it stands, it seems likely a fair > number of users who have an SSH command that does support -4, -6 and > -p are going to end up getting "penalized" because it doesn't also > support -G, and have to manually set their SSH variant to "ssh" (or > something other than "auto") to avoid the automatic detection. > > I'd love to say I have a brilliant idea for how to work around this, > oh and here's a patch, but I don't. One option might be trying to > actually review the output, and another might be to run "ssh -V", but > both of those have their own flaws (and the extra process forks aren't > "free"). I have tomorrow off, so I've filed https://crbug.com/git/7 to make sure I remember to follow up the day after. Of course I'll be happy if someone updates that bug saying they've fixed it in the meantime. One possibility would be to use -V as a fallback when -G fails, or even as a replacement for this usage of -G. To avoid misdetecting PuTTY and other ssh variants that also implement -V as OpenSSH, we would have to parse the output. This would also misdetect a script that does host=$1; shift ssh "$host" -- "$@" as supporting OpenSSH options, when the use of -- ensures it doesn't. Another possibility is to parse the output when -G fails. That's hacky, but I think it would work well! We would not have to be too clever, since we can look for the exact output produced by the versions of OpenSSH that we care about. This still has issues with scripts that forward arguments to OpenSSH, but at least those issues would go away once the user updates their copy of ssh. ;-) Another possibility is to pass options *before* -V: ssh -p 7999 -V Since OpenSSH parses its arguments left-to-right, this gives similar information to what we did with -G, and scripts like host=$1; shift ssh "$host" -- "$@" would even be correctly detected as not supporting OpenSSH options. We still would need to parse the output to distinguish OpenSSH from other ssh implementations like putty (unlike OpenSSH, putty saves up argument errors in an 'error' variable and forgets about them once it sees -V). Trying -G and falling back to -V seems like the simplest detection mechanism to me at the moment. I'm hoping I'm missing something simple (another ssh option?) that allows avoiding this mess. Regardless, I think we should do something like [1] first to get rid of the regression. Thanks again for reporting it. Sincerely, Jonathan [1] https://public-inbox.org/git/20180103050730.GA87855@aiede.mtv.corp.google.com/