upstream: Fix up whitespace left by previous

change removing privsep.  No other changes.

OpenBSD-Regress-ID: 87adec225d8afaee4d6a91b2b71203f52bf14b15
This commit is contained in:
dtucker@openbsd.org 2021-09-30 05:26:26 +00:00 committed by Darren Tucker
parent ddcb53b7a7
commit 76a398edfb
3 changed files with 296 additions and 296 deletions

View File

@ -1,4 +1,4 @@
# $OpenBSD: cert-hostkey.sh,v 1.26 2021/09/30 05:20:08 dtucker Exp $
# $OpenBSD: cert-hostkey.sh,v 1.27 2021/09/30 05:26:26 dtucker Exp $
# Placed in the Public Domain.
tid="certified host keys"
@ -131,7 +131,7 @@ attempt_connect() {
}
# Basic connect and revocation tests.
for ktype in $PLAIN_TYPES ; do
for ktype in $PLAIN_TYPES ; do
verbose "$tid: host ${ktype} cert connect"
(
cat $OBJ/sshd_proxy_bak
@ -157,7 +157,7 @@ attempt_connect() {
-oRevokedHostKeys=$OBJ/host_revoked_cert
attempt_connect "$ktype CA plaintext revocation" "no" \
-oRevokedHostKeys=$OBJ/host_revoked_ca
done
done
# Revoked certificates with key present
kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig
@ -166,7 +166,7 @@ for ktype in $PLAIN_TYPES ; do
kh_revoke cert_host_key_${ktype}.pub >> $OBJ/known_hosts-cert.orig
done
cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
for ktype in $PLAIN_TYPES ; do
for ktype in $PLAIN_TYPES ; do
verbose "$tid: host ${ktype} revoked cert"
(
cat $OBJ/sshd_proxy_bak
@ -181,7 +181,7 @@ cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
done
done
# Revoked CA
kh_ca host_ca_key.pub host_ca_key2.pub > $OBJ/known_hosts-cert.orig

View File

@ -1,4 +1,4 @@
# $OpenBSD: cert-userkey.sh,v 1.27 2021/09/30 05:20:08 dtucker Exp $
# $OpenBSD: cert-userkey.sh,v 1.28 2021/09/30 05:26:26 dtucker Exp $
# Placed in the Public Domain.
tid="certified user keys"

View File

@ -1,4 +1,4 @@
# $OpenBSD: principals-command.sh,v 1.13 2021/09/30 05:20:08 dtucker Exp $
# $OpenBSD: principals-command.sh,v 1.14 2021/09/30 05:26:26 dtucker Exp $
# Placed in the Public Domain.
tid="authorized principals command"
@ -64,105 +64,105 @@ if [ ! -x $PRINCIPALS_COMMAND ]; then
"(/var/run mounted noexec?)"
fi
#Test explicitly-specified principals
# Setup for AuthorizedPrincipalsCommand
rm -f $OBJ/authorized_keys_$USER
(
# Test explicitly-specified principals
# Setup for AuthorizedPrincipalsCommand
rm -f $OBJ/authorized_keys_$USER
(
cat $OBJ/sshd_proxy_bak
echo "AuthorizedKeysFile none"
echo "AuthorizedPrincipalsCommand $PRINCIPALS_COMMAND" \
"%u %t %T %i %s %F %f %k %K"
echo "AuthorizedPrincipalsCommandUser ${LOGNAME}"
echo "TrustedUserCAKeys $OBJ/user_ca_key.pub"
) > $OBJ/sshd_proxy
) > $OBJ/sshd_proxy
# XXX test missing command
# XXX test failing command
# XXX test missing command
# XXX test failing command
# Empty authorized_principals
verbose "$tid: empty authorized_principals"
echo > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
# Empty authorized_principals
verbose "$tid: empty authorized_principals"
echo > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -eq 0 ]; then
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
fi
# Wrong authorized_principals
verbose "$tid: wrong authorized_principals"
echo gregorsamsa > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
# Wrong authorized_principals
verbose "$tid: wrong authorized_principals"
echo gregorsamsa > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -eq 0 ]; then
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
fi
# Correct authorized_principals
verbose "$tid: correct authorized_principals"
echo mekmitasdigoat > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
# Correct authorized_principals
verbose "$tid: correct authorized_principals"
echo mekmitasdigoat > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -ne 0 ]; then
if [ $? -ne 0 ]; then
fail "ssh cert connect failed"
fi
fi
# authorized_principals with bad key option
verbose "$tid: authorized_principals bad key opt"
echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
# authorized_principals with bad key option
verbose "$tid: authorized_principals bad key opt"
echo 'blah mekmitasdigoat' > $OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -eq 0 ]; then
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
fi
# authorized_principals with command=false
verbose "$tid: authorized_principals command=false"
echo 'command="false" mekmitasdigoat' > \
# authorized_principals with command=false
verbose "$tid: authorized_principals command=false"
echo 'command="false" mekmitasdigoat' > \
$OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -eq 0 ]; then
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
fi
# authorized_principals with command=true
verbose "$tid: authorized_principals command=true"
echo 'command="true" mekmitasdigoat' > \
# authorized_principals with command=true
verbose "$tid: authorized_principals command=true"
echo 'command="true" mekmitasdigoat' > \
$OBJ/authorized_principals_$USER
${SSH} -i $OBJ/cert_user_key \
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost false >/dev/null 2>&1
if [ $? -ne 0 ]; then
if [ $? -ne 0 ]; then
fail "ssh cert connect failed"
fi
fi
# Setup for principals= key option
# TODO: remove?
rm -f $OBJ/authorized_principals_$USER
(
# Setup for principals= key option
# TODO: remove?
rm -f $OBJ/authorized_principals_$USER
(
cat $OBJ/sshd_proxy_bak
) > $OBJ/sshd_proxy
) > $OBJ/sshd_proxy
# Wrong principals list
verbose "$tid: wrong principals key option"
(
# Wrong principals list
verbose "$tid: wrong principals key option"
(
printf 'cert-authority,principals="gregorsamsa" '
cat $OBJ/user_ca_key.pub
) > $OBJ/authorized_keys_$USER
${SSH} -i $OBJ/cert_user_key \
) > $OBJ/authorized_keys_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -eq 0 ]; then
if [ $? -eq 0 ]; then
fail "ssh cert connect succeeded unexpectedly"
fi
fi
# Correct principals list
verbose "$tid: correct principals key option"
(
# Correct principals list
verbose "$tid: correct principals key option"
(
printf 'cert-authority,principals="mekmitasdigoat" '
cat $OBJ/user_ca_key.pub
) > $OBJ/authorized_keys_$USER
${SSH} -i $OBJ/cert_user_key \
) > $OBJ/authorized_keys_$USER
${SSH} -i $OBJ/cert_user_key \
-F $OBJ/ssh_proxy somehost true >/dev/null 2>&1
if [ $? -ne 0 ]; then
if [ $? -ne 0 ]; then
fail "ssh cert connect failed"
fi
fi