mirror of
				https://github.com/PowerShell/Win32-OpenSSH.git
				synced 2025-10-31 03:34:16 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			129 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			129 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| #	$OpenBSD: hostkey-rotate.sh,v 1.4 2015/07/10 06:23:25 markus Exp $
 | |
| #	Placed in the Public Domain.
 | |
| 
 | |
| tid="hostkey rotate"
 | |
| 
 | |
| # Need full names here since they are used in HostKeyAlgorithms
 | |
| HOSTKEY_TYPES="ecdsa-sha2-nistp256 ssh-ed25519 ssh-rsa ssh-dss"
 | |
| 
 | |
| rm -f $OBJ/hkr.* $OBJ/ssh_proxy.orig
 | |
| 
 | |
| grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig
 | |
| echo "UpdateHostkeys=yes" >> $OBJ/ssh_proxy
 | |
| rm $OBJ/known_hosts
 | |
| 
 | |
| trace "prepare hostkeys"
 | |
| nkeys=0
 | |
| all_algs=""
 | |
| for k in `${SSH} -Q key-plain` ; do
 | |
| 	${SSHKEYGEN} -qt $k -f $OBJ/hkr.$k -N '' || fatal "ssh-keygen $k"
 | |
| 	echo "Hostkey $OBJ/hkr.${k}" >> $OBJ/sshd_proxy.orig
 | |
| 	nkeys=`expr $nkeys + 1`
 | |
| 	test "x$all_algs" = "x" || all_algs="${all_algs},"
 | |
| 	all_algs="${all_algs}$k"
 | |
| done
 | |
| 
 | |
| dossh() {
 | |
| 	# All ssh should succeed in this test
 | |
| 	${SSH} -F $OBJ/ssh_proxy "$@" x true || fail "ssh $@ failed"
 | |
| }
 | |
| 
 | |
| expect_nkeys() {
 | |
| 	_expected=$1
 | |
| 	_message=$2
 | |
| 	_n=`wc -l $OBJ/known_hosts | awk '{ print $1 }'` || fatal "wc failed"
 | |
| 	[ "x$_n" = "x$_expected" ] || fail "$_message (got $_n wanted $_expected)"
 | |
| }
 | |
| 
 | |
| check_key_present() {
 | |
| 	_type=$1
 | |
| 	_kfile=$2
 | |
| 	test "x$_kfile" = "x" && _kfile="$OBJ/hkr.${_type}.pub"
 | |
| 	_kpub=`awk "/$_type /"' { print $2 }' < $_kfile` || \
 | |
| 		fatal "awk failed"
 | |
| 	fgrep "$_kpub" $OBJ/known_hosts > /dev/null
 | |
| }
 | |
| 
 | |
| cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
 | |
| 
 | |
| # Connect to sshd with StrictHostkeyChecking=no
 | |
| verbose "learn hostkey with StrictHostKeyChecking=no"
 | |
| >$OBJ/known_hosts
 | |
| dossh -oHostKeyAlgorithms=ssh-ed25519 -oStrictHostKeyChecking=no
 | |
| # Verify no additional keys learned
 | |
| expect_nkeys 1 "unstrict connect keys"
 | |
| check_key_present ssh-ed25519 || fail "unstrict didn't learn key"
 | |
| 
 | |
| # Connect to sshd as usual
 | |
| verbose "learn additional hostkeys"
 | |
| dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=$all_algs
 | |
| # Check that other keys learned
 | |
| expect_nkeys $nkeys "learn hostkeys"
 | |
| check_key_present ssh-rsa || fail "didn't learn keys"
 | |
| 
 | |
| # Check each key type
 | |
| for k in `${SSH} -Q key-plain` ; do
 | |
| 	verbose "learn additional hostkeys, type=$k"
 | |
| 	dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=$k,$all_algs
 | |
| 	expect_nkeys $nkeys "learn hostkeys $k"
 | |
| 	check_key_present $k || fail "didn't learn $k"
 | |
| done
 | |
| 
 | |
| # Change one hostkey (non primary) and relearn
 | |
| verbose "learn changed non-primary hostkey"
 | |
| mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old
 | |
| rm -f $OBJ/hkr.ssh-rsa
 | |
| ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa -N '' || fatal "ssh-keygen $k"
 | |
| dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=$all_algs
 | |
| # Check that the key was replaced
 | |
| expect_nkeys $nkeys "learn hostkeys"
 | |
| check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present"
 | |
| check_key_present ssh-rsa || fail "didn't learn changed key"
 | |
| 
 | |
| # Add new hostkey (primary type) to sshd and connect
 | |
| verbose "learn new primary hostkey"
 | |
| ${SSHKEYGEN} -qt ssh-rsa -f $OBJ/hkr.ssh-rsa-new -N '' || fatal "ssh-keygen $k"
 | |
| ( cat $OBJ/sshd_proxy.orig ; echo HostKey $OBJ/hkr.ssh-rsa-new ) \
 | |
|     > $OBJ/sshd_proxy
 | |
| # Check new hostkey added
 | |
| dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=ssh-rsa,$all_algs
 | |
| expect_nkeys `expr $nkeys + 1` "learn hostkeys"
 | |
| check_key_present ssh-rsa || fail "current key missing"
 | |
| check_key_present ssh-rsa $OBJ/hkr.ssh-rsa-new.pub || fail "new key missing"
 | |
| 
 | |
| # Remove old hostkey (primary type) from sshd
 | |
| verbose "rotate primary hostkey"
 | |
| cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
 | |
| mv $OBJ/hkr.ssh-rsa.pub $OBJ/hkr.ssh-rsa.pub.old
 | |
| mv $OBJ/hkr.ssh-rsa-new.pub $OBJ/hkr.ssh-rsa.pub
 | |
| mv $OBJ/hkr.ssh-rsa-new $OBJ/hkr.ssh-rsa
 | |
| # Check old hostkey removed
 | |
| dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=ssh-rsa,$all_algs
 | |
| expect_nkeys $nkeys "learn hostkeys"
 | |
| check_key_present ssh-rsa $OBJ/hkr.ssh-rsa.pub.old && fail "old key present"
 | |
| check_key_present ssh-rsa || fail "didn't learn changed key"
 | |
| 
 | |
| # Connect again, forcing rotated key
 | |
| verbose "check rotate primary hostkey"
 | |
| dossh -oStrictHostKeyChecking=yes -oHostKeyAlgorithms=ssh-rsa
 | |
| expect_nkeys 1 "learn hostkeys"
 | |
| check_key_present ssh-rsa || fail "didn't learn changed key"
 | |
| 
 | |
| #	$OpenBSD: hostkey-rotate.sh,v 1.4 2015/07/10 06:23:25 markus Exp $
 | |
| #	Placed in the Public Domain.
 | |
| 
 | |
| tid="hostkey rotate"
 | |
| 
 | |
| # Prepare hostkeys file with one key
 | |
| 
 | |
| # Connect to sshd
 | |
| 
 | |
| # Check that other keys learned
 | |
| 
 | |
| # Change one hostkey (non primary)
 | |
| 
 | |
| # Connect to sshd
 | |
| 
 | |
| # Check that the key was replaced
 | |
| 
 |