| # $OpenBSD: dhgex.sh,v 1.2 2014/04/21 22:15:37 djm Exp $ |
| # Placed in the Public Domain. |
| |
| tid="dhgex" |
| |
| LOG=${TEST_SSH_LOGFILE} |
| rm -f ${LOG} |
| cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak |
| |
| kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange` |
| |
| ssh_test_dhgex() |
| { |
| bits="$1"; shift |
| cipher="$1"; shift |
| kex="$1"; shift |
| |
| cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy |
| echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy |
| echo "Ciphers=$cipher" >> $OBJ/sshd_proxy |
| rm -f ${LOG} |
| opts="-oKexAlgorithms=$kex -oCiphers=$cipher" |
| groupsz="1024<$bits<8192" |
| verbose "$tid bits $bits $kex $cipher" |
| ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true |
| if [ $? -ne 0 ]; then |
| fail "ssh failed ($@)" |
| fi |
| # check what we request |
| grep "SSH2_MSG_KEX_DH_GEX_REQUEST($groupsz) sent" ${LOG} >/dev/null |
| if [ $? != 0 ]; then |
| got=`egrep "SSH2_MSG_KEX_DH_GEX_REQUEST(.*) sent" ${LOG}` |
| fail "$tid unexpected GEX sizes, expected $groupsz, got $got" |
| fi |
| # check what we got (depends on contents of system moduli file) |
| gotbits="`awk '/bits set:/{print $4}' ${LOG} | head -1 | cut -f2 -d/`" |
| if [ "$gotbits" -lt "$bits" ]; then |
| fatal "$tid expected $bits bit group, got $gotbits" |
| fi |
| } |
| |
| check() |
| { |
| bits="$1"; shift |
| |
| for c in $@; do |
| for k in $kexs; do |
| ssh_test_dhgex $bits $c $k |
| done |
| done |
| } |
| |
| #check 2048 3des-cbc |
| check 3072 `${SSH} -Q cipher | grep 128` |
| check 3072 arcfour blowfish-cbc |
| check 7680 `${SSH} -Q cipher | grep 192` |
| check 8192 `${SSH} -Q cipher | grep 256` |
| check 8192 rijndael-cbc@lysator.liu.se chacha20-poly1305@openssh.com |