[connect-privsep.sh]
     test with sandbox enabled; ok djm@
This commit is contained in:
Damien Miller 2011-08-17 12:09:19 +10:00
parent 9231c8bde4
commit faf4d80420
2 changed files with 15 additions and 1 deletions

View File

@ -11,6 +11,9 @@
- dtucker@cvs.openbsd.org 2011/06/03 05:35:10 - dtucker@cvs.openbsd.org 2011/06/03 05:35:10
[regress/cfgmatch.sh] [regress/cfgmatch.sh]
use OBJ to find test configs, patch from Tim Rice use OBJ to find test configs, patch from Tim Rice
- markus@cvs.openbsd.org 2011/06/30 22:44:43
[regress/connect-privsep.sh]
test with sandbox enabled; ok djm@
20110812 20110812
- (dtucker) [openbsd-compat/port-linux.c] Bug 1924: Improve selinux context - (dtucker) [openbsd-compat/port-linux.c] Bug 1924: Improve selinux context

View File

@ -1,8 +1,9 @@
# $OpenBSD: connect-privsep.sh,v 1.1 2002/03/21 21:45:07 markus Exp $ # $OpenBSD: connect-privsep.sh,v 1.2 2011/06/30 22:44:43 markus Exp $
# Placed in the Public Domain. # Placed in the Public Domain.
tid="proxy connect with privsep" tid="proxy connect with privsep"
cp $OBJ/sshd_proxy $OBJ/sshd_proxy.orig
echo 'UsePrivilegeSeparation yes' >> $OBJ/sshd_proxy echo 'UsePrivilegeSeparation yes' >> $OBJ/sshd_proxy
for p in 1 2; do for p in 1 2; do
@ -11,3 +12,13 @@ for p in 1 2; do
fail "ssh privsep+proxyconnect protocol $p failed" fail "ssh privsep+proxyconnect protocol $p failed"
fi fi
done done
cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
for p in 1 2; do
${SSH} -$p -F $OBJ/ssh_proxy 999.999.999.999 true
if [ $? -ne 0 ]; then
fail "ssh privsep/sandbox+proxyconnect protocol $p failed"
fi
done