upstream: Ensure that address/mask mismatches are flagged at
config-check time. ok djm@ OpenBSD-Regress-ID: 8f5f4c2c0bf00e6ceae7a1755a444666de0ea5c2
This commit is contained in:
parent
c767735241
commit
9afe2a1508
|
@ -1,4 +1,4 @@
|
||||||
# $OpenBSD: addrmatch.sh,v 1.5 2020/03/13 03:18:45 djm Exp $
|
# $OpenBSD: addrmatch.sh,v 1.6 2020/08/28 03:17:13 dtucker Exp $
|
||||||
# Placed in the Public Domain.
|
# Placed in the Public Domain.
|
||||||
|
|
||||||
tid="address match"
|
tid="address match"
|
||||||
|
@ -52,5 +52,17 @@ run_trial user ::5 somehost ::1 1234 match3 "IP6 localaddress"
|
||||||
run_trial user ::5 somehost ::2 5678 match4 "IP6 localport"
|
run_trial user ::5 somehost ::2 5678 match4 "IP6 localport"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
#
|
||||||
|
# Check that we catch invalid address/mask in Match Address/Localaddress
|
||||||
|
#
|
||||||
|
for i in 10.0.1.0/8 10.0.0.1/24 2000:aa:bb:01::/56; do
|
||||||
|
for a in address localaddress; do
|
||||||
|
verbose "test invalid Match $a $i"
|
||||||
|
echo "Match $a $i" > $OBJ/sshd_proxy
|
||||||
|
${SUDO} ${SSHD} -f $OBJ/sshd_proxy -t >/dev/null 2>&1 && \
|
||||||
|
fail "accepted invalid match $a $i"
|
||||||
|
done
|
||||||
|
done
|
||||||
|
|
||||||
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
||||||
rm $OBJ/sshd_proxy_bak
|
rm $OBJ/sshd_proxy_bak
|
||||||
|
|
Loading…
Reference in New Issue