mirror of
				https://github.com/PowerShell/Win32-OpenSSH.git
				synced 2025-10-31 11:44:38 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			76 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			76 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| #	$OpenBSD: integrity.sh,v 1.16 2015/03/24 20:22:17 markus Exp $
 | |
| #	Placed in the Public Domain.
 | |
| 
 | |
| tid="integrity"
 | |
| cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
 | |
| 
 | |
| # start at byte 2900 (i.e. after kex) and corrupt at different offsets
 | |
| # XXX the test hangs if we modify the low bytes of the packet length
 | |
| # XXX and ssh tries to read...
 | |
| tries=10
 | |
| startoffset=2900
 | |
| macs=`${SSH} -Q mac`
 | |
| # The following are not MACs, but ciphers with integrated integrity. They are
 | |
| # handled specially below.
 | |
| macs="$macs `${SSH} -Q cipher-auth`"
 | |
| 
 | |
| # avoid DH group exchange as the extra traffic makes it harder to get the
 | |
| # offset into the stream right.
 | |
| echo "KexAlgorithms diffie-hellman-group14-sha1,diffie-hellman-group1-sha1" \
 | |
| 	>> $OBJ/ssh_proxy
 | |
| 
 | |
| # sshd-command for proxy (see test-exec.sh)
 | |
| cmd="$SUDO sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy"
 | |
| 
 | |
| for m in $macs; do
 | |
| 	trace "test $tid: mac $m"
 | |
| 	elen=0
 | |
| 	epad=0
 | |
| 	emac=0
 | |
| 	ecnt=0
 | |
| 	skip=0
 | |
| 	for off in `jot $tries $startoffset`; do
 | |
| 		skip=`expr $skip - 1`
 | |
| 		if [ $skip -gt 0 ]; then
 | |
| 			# avoid modifying the high bytes of the length
 | |
| 			continue
 | |
| 		fi
 | |
| 		cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
 | |
| 		# modify output from sshd at offset $off
 | |
| 		pxy="proxycommand=$cmd | $OBJ/modpipe -wm xor:$off:1"
 | |
| 		if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
 | |
| 			echo "Ciphers=$m" >> $OBJ/sshd_proxy
 | |
| 			macopt="-c $m"
 | |
| 		else
 | |
| 			echo "Ciphers=aes128-ctr" >> $OBJ/sshd_proxy
 | |
| 			echo "MACs=$m" >> $OBJ/sshd_proxy
 | |
| 			macopt="-m $m -c aes128-ctr"
 | |
| 		fi
 | |
| 		verbose "test $tid: $m @$off"
 | |
| 		${SSH} $macopt -2F $OBJ/ssh_proxy -o "$pxy" \
 | |
| 		    -oServerAliveInterval=1 -oServerAliveCountMax=30 \
 | |
| 		    999.999.999.999 'printf "%4096s" " "' >/dev/null
 | |
| 		if [ $? -eq 0 ]; then
 | |
| 			fail "ssh -m $m succeeds with bit-flip at $off"
 | |
| 		fi
 | |
| 		ecnt=`expr $ecnt + 1`
 | |
| 		out=$(tail -2 $TEST_SSH_LOGFILE | egrep -v "^debug" | \
 | |
| 		     tr -s '\r\n' '.')
 | |
| 		case "$out" in
 | |
| 		Bad?packet*)	elen=`expr $elen + 1`; skip=3;;
 | |
| 		Corrupted?MAC* | *message?authentication?code?incorrect*)
 | |
| 				emac=`expr $emac + 1`; skip=0;;
 | |
| 		padding*)	epad=`expr $epad + 1`; skip=0;;
 | |
| 		*)		fail "unexpected error mac $m at $off: $out";;
 | |
| 		esac
 | |
| 	done
 | |
| 	verbose "test $tid: $ecnt errors: mac $emac padding $epad length $elen"
 | |
| 	if [ $emac -eq 0 ]; then
 | |
| 		fail "$m: no mac errors"
 | |
| 	fi
 | |
| 	expect=`expr $ecnt - $epad - $elen`
 | |
| 	if [ $emac -ne $expect ]; then
 | |
| 		fail "$m: expected $expect mac errors, got $emac"
 | |
| 	fi
 | |
| done
 |