| # $OpenBSD: forcecommand.sh,v 1.4 2017/04/30 23:34:55 djm Exp $ |
| # Placed in the Public Domain. |
| |
| tid="forced command" |
| |
| cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak |
| |
| cp /dev/null $OBJ/authorized_keys_$USER |
| for t in ${SSH_KEYTYPES}; do |
| printf 'command="true" ' >>$OBJ/authorized_keys_$USER |
| cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER |
| done |
| |
| trace "forced command in key option" |
| ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key" |
| |
| cp /dev/null $OBJ/authorized_keys_$USER |
| for t in ${SSH_KEYTYPES}; do |
| printf 'command="false" ' >> $OBJ/authorized_keys_$USER |
| cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER |
| done |
| |
| cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy |
| echo "ForceCommand true" >> $OBJ/sshd_proxy |
| |
| trace "forced command in sshd_config overrides key option" |
| ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key" |
| |
| cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy |
| echo "ForceCommand false" >> $OBJ/sshd_proxy |
| echo "Match User $USER" >> $OBJ/sshd_proxy |
| echo " ForceCommand true" >> $OBJ/sshd_proxy |
| |
| trace "forced command with match" |
| ${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key" |