- djm@cvs.openbsd.org 2012/12/02 20:47:48
[Makefile regress/forward-control.sh] regress for AllowTcpForwarding local/remote; ok markus@
This commit is contained in:
parent
771c43cee6
commit
999bd2d259
|
@ -27,6 +27,9 @@
|
||||||
- djm@cvs.openbsd.org 2012/11/22 22:49:30
|
- djm@cvs.openbsd.org 2012/11/22 22:49:30
|
||||||
[regress/Makefile regress/keys-command.sh]
|
[regress/Makefile regress/keys-command.sh]
|
||||||
regress for AuthorizedKeysCommand; hints from markus@
|
regress for AuthorizedKeysCommand; hints from markus@
|
||||||
|
- djm@cvs.openbsd.org 2012/12/02 20:47:48
|
||||||
|
[Makefile regress/forward-control.sh]
|
||||||
|
regress for AllowTcpForwarding local/remote; ok markus@
|
||||||
|
|
||||||
20121114
|
20121114
|
||||||
- (djm) OpenBSD CVS Sync
|
- (djm) OpenBSD CVS Sync
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# $OpenBSD: Makefile,v 1.59 2012/11/22 22:49:30 djm Exp $
|
# $OpenBSD: Makefile,v 1.60 2012/12/02 20:47:48 djm Exp $
|
||||||
|
|
||||||
REGRESS_TARGETS= t1 t2 t3 t4 t5 t6 t7 t8 t9 t-exec
|
REGRESS_TARGETS= t1 t2 t3 t4 t5 t6 t7 t8 t9 t-exec
|
||||||
tests: $(REGRESS_TARGETS)
|
tests: $(REGRESS_TARGETS)
|
||||||
|
@ -58,7 +58,8 @@ LTESTS= connect \
|
||||||
cert-hostkey \
|
cert-hostkey \
|
||||||
cert-userkey \
|
cert-userkey \
|
||||||
host-expand \
|
host-expand \
|
||||||
keys-command
|
keys-command \
|
||||||
|
forward-control
|
||||||
|
|
||||||
INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
||||||
#INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
|
#INTEROP_TESTS+=ssh-com ssh-com-client ssh-com-keygen ssh-com-sftp
|
||||||
|
@ -78,7 +79,9 @@ CLEANFILES= t2.out t3.out t6.out1 t6.out2 t7.out t7.out.pub copy.1 copy.2 \
|
||||||
known_hosts-cert host_ca_key* cert_host_key* \
|
known_hosts-cert host_ca_key* cert_host_key* \
|
||||||
putty.rsa2 sshd_proxy_orig ssh_proxy_bak \
|
putty.rsa2 sshd_proxy_orig ssh_proxy_bak \
|
||||||
key.rsa-* key.dsa-* key.ecdsa-* \
|
key.rsa-* key.dsa-* key.ecdsa-* \
|
||||||
authorized_principals_${USER} expect actual
|
authorized_principals_${USER} expect actual ready \
|
||||||
|
sshd_proxy.* authorized_keys_${USER}.*
|
||||||
|
|
||||||
|
|
||||||
# Enable all malloc(3) randomisations and checks
|
# Enable all malloc(3) randomisations and checks
|
||||||
TEST_ENV= "MALLOC_OPTIONS=AFGJPRX"
|
TEST_ENV= "MALLOC_OPTIONS=AFGJPRX"
|
||||||
|
|
|
@ -0,0 +1,168 @@
|
||||||
|
# $OpenBSD: forward-control.sh,v 1.1 2012/12/02 20:47:48 djm Exp $
|
||||||
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
|
tid="sshd control of local and remote forwarding"
|
||||||
|
|
||||||
|
LFWD_PORT=3320
|
||||||
|
RFWD_PORT=3321
|
||||||
|
CTL=$OBJ/ctl-sock
|
||||||
|
READY=$OBJ/ready
|
||||||
|
|
||||||
|
wait_for_file_to_appear() {
|
||||||
|
_path=$1
|
||||||
|
_n=0
|
||||||
|
while test ! -e $_path ; do
|
||||||
|
test $_n -eq 1 && trace "waiting for $_path to appear"
|
||||||
|
_n=`expr $_n + 1`
|
||||||
|
test $_n -ge 5 && return 1
|
||||||
|
sleep 1
|
||||||
|
done
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
wait_for_process_to_exit() {
|
||||||
|
_pid=$1
|
||||||
|
_n=0
|
||||||
|
while kill -0 $_pid 2>/dev/null ; do
|
||||||
|
test $_n -eq 1 && trace "waiting for $_pid to exit"
|
||||||
|
_n=`expr $_n + 1`
|
||||||
|
test $_n -ge 5 && return 1
|
||||||
|
sleep 1
|
||||||
|
done
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
# usage: check_lfwd protocol Y|N message
|
||||||
|
check_lfwd() {
|
||||||
|
_proto=$1
|
||||||
|
_expected=$2
|
||||||
|
_message=$3
|
||||||
|
rm -f $READY
|
||||||
|
${SSH} -oProtocol=$_proto -F $OBJ/ssh_proxy \
|
||||||
|
-L$LFWD_PORT:127.0.0.1:$PORT \
|
||||||
|
-o ExitOnForwardFailure=yes \
|
||||||
|
-n host "sleep 60 & echo \$! > $READY ; wait " \
|
||||||
|
>/dev/null 2>&1 &
|
||||||
|
_sshpid=$!
|
||||||
|
wait_for_file_to_appear $READY || \
|
||||||
|
fatal "check_lfwd ssh fail: $_message"
|
||||||
|
${SSH} -F $OBJ/ssh_config -p $LFWD_PORT \
|
||||||
|
-oConnectionAttempts=4 host true >/dev/null 2>&1
|
||||||
|
_result=$?
|
||||||
|
kill $_sshpid `cat $READY` 2>/dev/null
|
||||||
|
wait_for_process_to_exit $_sshpid
|
||||||
|
if test "x$_expected" = "xY" -a $_result -ne 0 ; then
|
||||||
|
fail "check_lfwd failed (expecting success): $_message"
|
||||||
|
elif test "x$_expected" = "xN" -a $_result -eq 0 ; then
|
||||||
|
fail "check_lfwd succeeded (expecting failure): $_message"
|
||||||
|
elif test "x$_expected" != "xY" -a "x$_expected" != "xN" ; then
|
||||||
|
fatal "check_lfwd invalid argument \"$_expected\""
|
||||||
|
else
|
||||||
|
verbose "check_lfwd done (expecting $_expected): $_message"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# usage: check_rfwd protocol Y|N message
|
||||||
|
check_rfwd() {
|
||||||
|
_proto=$1
|
||||||
|
_expected=$2
|
||||||
|
_message=$3
|
||||||
|
rm -f $READY
|
||||||
|
${SSH} -oProtocol=$_proto -F $OBJ/ssh_proxy \
|
||||||
|
-R$RFWD_PORT:127.0.0.1:$PORT \
|
||||||
|
-o ExitOnForwardFailure=yes \
|
||||||
|
-n host "sleep 60 & echo \$! > $READY ; wait " \
|
||||||
|
>/dev/null 2>&1 &
|
||||||
|
_sshpid=$!
|
||||||
|
wait_for_file_to_appear $READY
|
||||||
|
_result=$?
|
||||||
|
if test $_result -eq 0 ; then
|
||||||
|
${SSH} -F $OBJ/ssh_config -p $RFWD_PORT \
|
||||||
|
-oConnectionAttempts=4 host true >/dev/null 2>&1
|
||||||
|
_result=$?
|
||||||
|
kill $_sshpid `cat $READY` 2>/dev/null
|
||||||
|
wait_for_process_to_exit $_sshpid
|
||||||
|
fi
|
||||||
|
if test "x$_expected" = "xY" -a $_result -ne 0 ; then
|
||||||
|
fail "check_rfwd failed (expecting success): $_message"
|
||||||
|
elif test "x$_expected" = "xN" -a $_result -eq 0 ; then
|
||||||
|
fail "check_rfwd succeeded (expecting failure): $_message"
|
||||||
|
elif test "x$_expected" != "xY" -a "x$_expected" != "xN" ; then
|
||||||
|
fatal "check_rfwd invalid argument \"$_expected\""
|
||||||
|
else
|
||||||
|
verbose "check_rfwd done (expecting $_expected): $_message"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
start_sshd
|
||||||
|
cp ${OBJ}/sshd_proxy ${OBJ}/sshd_proxy.bak
|
||||||
|
cp ${OBJ}/authorized_keys_${USER} ${OBJ}/authorized_keys_${USER}.bak
|
||||||
|
|
||||||
|
# Sanity check: ensure the default config allows forwarding
|
||||||
|
for p in 1 2 ; do
|
||||||
|
check_lfwd $p Y "proto $p, default configuration"
|
||||||
|
check_rfwd $p Y "proto $p, default configuration"
|
||||||
|
done
|
||||||
|
|
||||||
|
# Usage: all_tests yes|local|remote|no Y|N Y|N Y|N Y|N Y|N Y|N
|
||||||
|
all_tests() {
|
||||||
|
_tcpfwd=$1
|
||||||
|
_plain_lfwd=$2
|
||||||
|
_plain_rfwd=$3
|
||||||
|
_nopermit_lfwd=$4
|
||||||
|
_nopermit_rfwd=$5
|
||||||
|
_permit_lfwd=$6
|
||||||
|
_permit_rfwd=$7
|
||||||
|
_badfwd=127.0.0.1:22
|
||||||
|
_goodfwd=127.0.0.1:${PORT}
|
||||||
|
for _proto in 1 2 ; do
|
||||||
|
cp ${OBJ}/authorized_keys_${USER}.bak \
|
||||||
|
${OBJ}/authorized_keys_${USER}
|
||||||
|
_prefix="proto $_proto, AllowTcpForwarding=$_tcpfwd"
|
||||||
|
# No PermitOpen
|
||||||
|
( cat ${OBJ}/sshd_proxy.bak ;
|
||||||
|
echo "AllowTcpForwarding $_tcpfwd" ) \
|
||||||
|
> ${OBJ}/sshd_proxy
|
||||||
|
check_lfwd $_proto $_plain_lfwd "$_prefix"
|
||||||
|
check_rfwd $_proto $_plain_rfwd "$_prefix"
|
||||||
|
# PermitOpen via sshd_config that doesn't match
|
||||||
|
( cat ${OBJ}/sshd_proxy.bak ;
|
||||||
|
echo "AllowTcpForwarding $_tcpfwd" ;
|
||||||
|
echo "PermitOpen $_badfwd" ) \
|
||||||
|
> ${OBJ}/sshd_proxy
|
||||||
|
check_lfwd $_proto $_nopermit_lfwd "$_prefix, !PermitOpen"
|
||||||
|
check_rfwd $_proto $_nopermit_rfwd "$_prefix, !PermitOpen"
|
||||||
|
# PermitOpen via sshd_config that does match
|
||||||
|
( cat ${OBJ}/sshd_proxy.bak ;
|
||||||
|
echo "AllowTcpForwarding $_tcpfwd" ;
|
||||||
|
echo "PermitOpen $_badfwd $_goodfwd" ) \
|
||||||
|
> ${OBJ}/sshd_proxy
|
||||||
|
# NB. permitopen via authorized_keys should have same
|
||||||
|
# success/fail as via sshd_config
|
||||||
|
# permitopen via authorized_keys that doesn't match
|
||||||
|
sed "s/^/permitopen=\"$_badfwd\" /" \
|
||||||
|
< ${OBJ}/authorized_keys_${USER}.bak \
|
||||||
|
> ${OBJ}/authorized_keys_${USER} || fatal "sed 1 fail"
|
||||||
|
( cat ${OBJ}/sshd_proxy.bak ;
|
||||||
|
echo "AllowTcpForwarding $_tcpfwd" ) \
|
||||||
|
> ${OBJ}/sshd_proxy
|
||||||
|
check_lfwd $_proto $_nopermit_lfwd "$_prefix, !permitopen"
|
||||||
|
check_rfwd $_proto $_nopermit_rfwd "$_prefix, !permitopen"
|
||||||
|
# permitopen via authorized_keys that does match
|
||||||
|
sed "s/^/permitopen=\"$_badfwd\",permitopen=\"$_goodfwd\" /" \
|
||||||
|
< ${OBJ}/authorized_keys_${USER}.bak \
|
||||||
|
> ${OBJ}/authorized_keys_${USER} || fatal "sed 2 fail"
|
||||||
|
( cat ${OBJ}/sshd_proxy.bak ;
|
||||||
|
echo "AllowTcpForwarding $_tcpfwd" ) \
|
||||||
|
> ${OBJ}/sshd_proxy
|
||||||
|
check_lfwd $_proto $_permit_lfwd "$_prefix, permitopen"
|
||||||
|
check_rfwd $_proto $_permit_rfwd "$_prefix, permitopen"
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# no-permitopen mismatch-permitopen match-permitopen
|
||||||
|
# AllowTcpForwarding local remote local remote local remote
|
||||||
|
all_tests yes Y Y N Y Y Y
|
||||||
|
all_tests local Y N N N Y N
|
||||||
|
all_tests remote N Y N Y N Y
|
||||||
|
all_tests no N N N N N N
|
Loading…
Reference in New Issue