0s autopkgtest [15:44:13]: starting date and time: 2024-03-18 15:44:13+0000 0s autopkgtest [15:44:13]: git checkout: b506e79c ssh-setup/nova: fix ARCH having two lines of data 0s autopkgtest [15:44:13]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.2k2lfy1r/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:openssl --apt-upgrade openfortivpn --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=openssl/3.0.13-0ubuntu2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos02-arm64-14.secgroup --name adt-noble-arm64-openfortivpn-20240318-154411-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 675s autopkgtest [15:55:28]: testbed dpkg architecture: arm64 675s autopkgtest [15:55:28]: testbed apt version: 2.7.12 675s autopkgtest [15:55:28]: @@@@@@@@@@@@@@@@@@@@ test bed setup 677s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 678s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [52.0 kB] 678s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [485 kB] 679s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [6540 B] 679s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [3728 kB] 682s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 Packages [654 kB] 683s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 c-n-f Metadata [3144 B] 683s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 Packages [33.6 kB] 683s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 c-n-f Metadata [116 B] 683s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 Packages [4102 kB] 686s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 c-n-f Metadata [8528 B] 686s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 Packages [55.5 kB] 686s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 c-n-f Metadata [116 B] 696s Fetched 9246 kB in 10s (902 kB/s) 697s Reading package lists... 707s Reading package lists... 708s Building dependency tree... 708s Reading state information... 709s Calculating upgrade... 711s The following packages will be REMOVED: 711s libssl3 711s The following NEW packages will be installed: 711s libssl3t64 711s The following packages will be upgraded: 711s openssl 711s 1 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 711s Need to get 2777 kB of archives. 711s After this operation, 139 kB of additional disk space will be used. 711s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 openssl arm64 3.0.13-0ubuntu2 [985 kB] 712s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libssl3t64 arm64 3.0.13-0ubuntu2 [1793 kB] 714s Fetched 2777 kB in 1s (2393 kB/s) 715s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 75850 files and directories currently installed.) 715s Preparing to unpack .../openssl_3.0.13-0ubuntu2_arm64.deb ... 715s Unpacking openssl (3.0.13-0ubuntu2) over (3.0.10-1ubuntu4) ... 715s dpkg: libssl3:arm64: dependency problems, but removing anyway as you requested: 715s wget depends on libssl3 (>= 3.0.0). 715s u-boot-tools depends on libssl3 (>= 3.0.0). 715s tnftp depends on libssl3 (>= 3.0.0). 715s tcpdump depends on libssl3 (>= 3.0.0). 715s systemd-resolved depends on libssl3 (>= 3.0.0). 715s systemd depends on libssl3 (>= 3.0.0). 715s sudo depends on libssl3 (>= 3.0.0). 715s sbsigntool depends on libssl3 (>= 3.0.0). 715s rsync depends on libssl3 (>= 3.0.0). 715s python3-cryptography depends on libssl3 (>= 3.0.0). 715s openssh-server depends on libssl3 (>= 3.0.10). 715s openssh-client depends on libssl3 (>= 3.0.10). 715s mtd-utils depends on libssl3 (>= 3.0.0). 715s mokutil depends on libssl3 (>= 3.0.0). 715s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 715s libsystemd-shared:arm64 depends on libssl3 (>= 3.0.0). 715s libssh-4:arm64 depends on libssl3 (>= 3.0.0). 715s libsasl2-modules:arm64 depends on libssl3 (>= 3.0.0). 715s libsasl2-2:arm64 depends on libssl3 (>= 3.0.0). 715s libpython3.12-minimal:arm64 depends on libssl3 (>= 3.0.0). 715s libpython3.11-minimal:arm64 depends on libssl3 (>= 3.0.0). 715s libnvme1 depends on libssl3 (>= 3.0.0). 715s libkrb5-3:arm64 depends on libssl3 (>= 3.0.0). 715s libkmod2:arm64 depends on libssl3 (>= 3.0.0). 715s libfido2-1:arm64 depends on libssl3 (>= 3.0.0). 715s libcurl4:arm64 depends on libssl3 (>= 3.0.0). 715s libcryptsetup12:arm64 depends on libssl3 (>= 3.0.0). 715s kmod depends on libssl3 (>= 3.0.0). 715s dhcpcd-base depends on libssl3 (>= 3.0.0). 715s bind9-libs:arm64 depends on libssl3 (>= 3.0.0). 715s 715s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 75850 files and directories currently installed.) 715s Removing libssl3:arm64 (3.0.10-1ubuntu4) ... 716s Selecting previously unselected package libssl3t64:arm64. 716s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 75839 files and directories currently installed.) 716s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu2_arm64.deb ... 716s Unpacking libssl3t64:arm64 (3.0.13-0ubuntu2) ... 716s Setting up libssl3t64:arm64 (3.0.13-0ubuntu2) ... 716s Setting up openssl (3.0.13-0ubuntu2) ... 716s Processing triggers for man-db (2.12.0-3) ... 718s Processing triggers for libc-bin (2.39-0ubuntu2) ... 720s Reading package lists... 721s Building dependency tree... 721s Reading state information... 723s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 724s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 724s Hit:2 http://ftpmaster.internal/ubuntu noble InRelease 724s Hit:3 http://ftpmaster.internal/ubuntu noble-updates InRelease 724s Hit:4 http://ftpmaster.internal/ubuntu noble-security InRelease 731s Reading package lists... 731s Reading package lists... 732s Building dependency tree... 732s Reading state information... 734s Calculating upgrade... 735s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 735s Reading package lists... 736s Building dependency tree... 736s Reading state information... 738s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 743s autopkgtest [15:56:36]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 14 02:53:31 UTC 2024 743s autopkgtest [15:56:36]: @@@@@@@@@@@@@@@@@@@@ apt-source openfortivpn 749s Get:1 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (dsc) [2093 B] 749s Get:2 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (tar) [169 kB] 749s Get:3 http://ftpmaster.internal/ubuntu noble/universe openfortivpn 1.21.0-2 (diff) [5908 B] 750s gpgv: Signature made Wed Nov 22 02:14:51 2023 UTC 750s gpgv: using RSA key D0D085B169C3BFD9404858FA21FC29504B5230DB 750s gpgv: issuer "epsilon@debian.org" 750s gpgv: Can't check signature: No public key 750s dpkg-source: warning: cannot verify inline signature for ./openfortivpn_1.21.0-2.dsc: no acceptable signature found 750s autopkgtest [15:56:43]: testing package openfortivpn version 1.21.0-2 751s autopkgtest [15:56:44]: build not needed 751s autopkgtest [15:56:44]: test command1: preparing testbed 755s Reading package lists... 756s Building dependency tree... 756s Reading state information... 757s Starting pkgProblemResolver with broken count: 0 757s Starting 2 pkgProblemResolver with broken count: 0 757s Done 760s The following additional packages will be installed: 760s openfortivpn ppp 760s The following NEW packages will be installed: 760s autopkgtest-satdep openfortivpn ppp 760s 0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded. 760s Need to get 416 kB/417 kB of archives. 760s After this operation, 2033 kB of additional disk space will be used. 760s Get:1 /tmp/autopkgtest.tCGF9H/1-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [704 B] 760s Get:2 http://ftpmaster.internal/ubuntu noble/main arm64 ppp arm64 2.4.9-1+1.1ubuntu1 [360 kB] 761s Get:3 http://ftpmaster.internal/ubuntu noble/universe arm64 openfortivpn arm64 1.21.0-2 [56.0 kB] 762s Fetched 416 kB in 1s (498 kB/s) 762s Selecting previously unselected package ppp. 762s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 75852 files and directories currently installed.) 762s Preparing to unpack .../ppp_2.4.9-1+1.1ubuntu1_arm64.deb ... 764s Unpacking ppp (2.4.9-1+1.1ubuntu1) ... 764s Selecting previously unselected package openfortivpn. 764s Preparing to unpack .../openfortivpn_1.21.0-2_arm64.deb ... 764s Unpacking openfortivpn (1.21.0-2) ... 764s Selecting previously unselected package autopkgtest-satdep. 764s Preparing to unpack .../1-autopkgtest-satdep.deb ... 764s Unpacking autopkgtest-satdep (0) ... 765s Setting up ppp (2.4.9-1+1.1ubuntu1) ... 765s Setting up openfortivpn (1.21.0-2) ... 765s Setting up autopkgtest-satdep (0) ... 765s Processing triggers for man-db (2.12.0-3) ... 776s (Reading database ... 75980 files and directories currently installed.) 776s Removing autopkgtest-satdep (0) ... 777s autopkgtest [15:57:10]: test command1: openfortivpn -h 777s autopkgtest [15:57:10]: test command1: [----------------------- 777s Usage: openfortivpn [[:]] [-u ] [-p ] 777s [--cookie=] [--cookie-on-stdin] 777s [--otp=] [--otp-delay=] [--otp-prompt=] 777s [--pinentry=] [--realm=] 777s [--ifname=] [--set-routes=<0|1>] 777s [--half-internet-routes=<0|1>] [--set-dns=<0|1>] 777s [--pppd-use-peerdns=<0|1>] [--pppd-log=] 777s [--pppd-ifname=] [--pppd-ipparam=] 777s [--pppd-call=] [--pppd-plugin=] 777s [--pppd-accept-remote=<0|1>] 777s [--use-resolvconf=<0|1>] [--ca-file=] 777s [--user-cert=] [--user-key=] 777s [--use-syslog] [--trusted-cert=] 777s [--persistent=] [-c ] [-v|-q] 777s openfortivpn --help 777s openfortivpn --version 777s 777s Client for PPP+SSL VPN tunnel services. 777s openfortivpn connects to a VPN by setting up a tunnel to the gateway at 777s :. It spawns a pppd process and operates the communication between 777s the gateway and this process. 777s 777s Options: 777s -h --help Show this help message and exit. 777s --version Show version and exit. 777s -c , --config= Specify a custom configuration file (default: 777s /etc/openfortivpn/config). 777s -u , --username= VPN account username. 777s -p , --password= VPN account password. 777s --cookie= A valid session cookie (SVPNCOOKIE). 777s --cookie-on-stdin Read the cookie (SVPNCOOKIE) from standard input. 777s -o , --otp= One-Time-Password. 777s --otp-prompt= Search for the OTP prompt starting with this string. 777s --otp-delay= Wait seconds before sending the OTP. 777s --no-ftm-push Do not use FTM push if the server provides the option. 777s --pinentry= Use the program to supply a secret instead of asking for it. 777s --realm= Use specified authentication realm. 777s --ifname= Bind to interface. 777s --set-routes=[01] Set if openfortivpn should configure routes 777s when tunnel is up. 777s --no-routes Do not configure routes, same as --set-routes=0. 777s --half-internet-routes=[01] Add two 0.0.0.0/1 and 128.0.0.0/1 routes with higher 777s priority instead of replacing the default route. 777s --set-dns=[01] Set if openfortivpn should add DNS name servers 777s and domain search list in /etc/resolv.conf. 777s If installed resolvconf is used for the update. 777s --no-dns Do not reconfigure DNS, same as --set-dns=0. 777s --ca-file= Use specified PEM-encoded certificate bundle 777s instead of system-wide store to verify the gateway 777s certificate. 777s --user-cert= Use specified PEM-encoded certificate if the server 777s requires authentication with a certificate. 777s --user-cert=pkcs11: Use smartcard. Takes also partial or full PKCS11-URI. 777s --user-key= Use specified PEM-encoded key if the server requires 777s authentication with a certificate. 777s --pem-passphrase= Pass phrase for the PEM-encoded key. 777s --use-syslog Log to syslog instead of terminal. 777s --trusted-cert= Trust a given gateway. If classical SSL 777s certificate validation fails, the gateway 777s certificate will be matched against this value. 777s is the X509 certificate's sha256 sum. 777s This option can be used multiple times to trust 777s several certificates. 777s --insecure-ssl Do not disable insecure SSL protocols/ciphers. 777s Also enable TLS v1.0 if applicable. 777s If your server requires a specific cipher or protocol, 777s consider using --cipher-list and/or --min-tls instead. 777s --cipher-list= OpenSSL ciphers to use. If default does not work 777s you can try with the cipher suggested in the output 777s of 'openssl s_client -connect ' 777s (e.g. AES256-GCM-SHA384). Applies to TLS v1.2 or 777s lower only, not to be used with TLS v1.3 ciphers. 777s --min-tls Use minimum TLS version instead of system default. 777s Valid values are 1.0, 1.1, 1.2, 1.3. 777s --seclevel-1 If --cipher-list is not specified, add @SECLEVEL=1 to 777s (compiled in) list of ciphers. This lowers limits on 777s dh key. Applies to TLS v1.2 or lower only. 777s --persistent= Run the vpn persistently in a loop and try to re- 777s connect every seconds when dropping out. 777s -v Increase verbosity. Can be used multiple times 777s to be even more verbose. 777s -q Decrease verbosity. Can be used multiple times 777s to be even less verbose. 777s --pppd-use-peerdns=[01] Whether to ask peer ppp server for DNS server 777s addresses and make pppd rewrite /etc/resolv.conf. 777s --pppd-no-peerdns Same as --pppd-use-peerdns=0. pppd will not 777s modify DNS resolution then. 777s --pppd-log= Set pppd in debug mode and save its logs into 777s . 777s --pppd-plugin= Use specified pppd plugin instead of configuring 777s resolver and routes directly. 777s --pppd-ifname= Set the pppd interface name, if supported by pppd. 777s --pppd-ipparam= Provides an extra parameter to the ip-up, ip-pre-up 777s and ip-down scripts. See man (8) pppd. 777s --pppd-call= Move most pppd options from pppd cmdline to 777s /etc/ppp/peers/ and invoke pppd with 777s 'call '. 777s --pppd-accept-remote=[01] Whether to invoke pppd with 'ipcp-accept-remote'. 777s Disable for pppd < 2.5.0. 777s --use-resolvconf=[01] If possible use resolvconf to update /etc/resolv.conf. 777s 777s Configuration file: 777s Options can be taken from a configuration file. Options passed in the 777s command line will override those from the configuration file, though. The 777s default configuration file is /etc/openfortivpn/config, 777s but this can be set using the -c option. 777s A simple configuration file example looks like: 777s # this is a comment 777s host = vpn-gateway 777s port = 8443 777s username = foo 777s password = bar 777s trusted-cert = certificatedigest4daa8c5fe6c... 777s trusted-cert = othercertificatedigest6631bf... 777s For a full-featured configuration see man openfortivpn(1). 778s autopkgtest [15:57:11]: test command1: -----------------------] 779s command1 PASS (superficial) 779s autopkgtest [15:57:12]: test command1: - - - - - - - - - - results - - - - - - - - - - 780s autopkgtest [15:57:13]: @@@@@@@@@@@@@@@@@@@@ summary 780s command1 PASS (superficial) 795s Creating nova instance adt-noble-arm64-openfortivpn-20240318-154411-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-arm64-server-20240318.img (UUID 7ae91b52-a2f6-4b2b-830b-40f0853811cb)...