Darren Tucker | 56347ef | 2013-05-17 13:28:36 +1000 | [diff] [blame] | 1 | # $OpenBSD: cfgmatch.sh,v 1.8 2013/05/17 00:37:40 dtucker Exp $ |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 2 | # Placed in the Public Domain. |
| 3 | |
| 4 | tid="sshd_config match" |
| 5 | |
| 6 | pidfile=$OBJ/remote_pid |
| 7 | fwdport=3301 |
| 8 | fwd="-L $fwdport:127.0.0.1:$PORT" |
| 9 | |
Tim Rice | bc48157 | 2011-06-02 22:26:19 -0700 | [diff] [blame] | 10 | echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_config |
| 11 | echo "ExitOnForwardFailure=yes" >> $OBJ/ssh_proxy |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 12 | |
| 13 | start_client() |
| 14 | { |
| 15 | rm -f $pidfile |
| 16 | ${SSH} -q -$p $fwd "$@" somehost \ |
| 17 | exec sh -c \'"echo \$\$ > $pidfile; exec sleep 100"\' \ |
Darren Tucker | 7512902 | 2013-05-17 09:19:10 +1000 | [diff] [blame] | 18 | >>$TEST_REGRESS_LOGFILE 2>&1 & |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 19 | client_pid=$! |
| 20 | # Wait for remote end |
| 21 | n=0 |
| 22 | while test ! -f $pidfile ; do |
| 23 | sleep 1 |
| 24 | n=`expr $n + 1` |
| 25 | if test $n -gt 60; then |
| 26 | kill $client_pid |
| 27 | fatal "timeout waiting for background ssh" |
| 28 | fi |
| 29 | done |
| 30 | } |
| 31 | |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 32 | stop_client() |
| 33 | { |
| 34 | pid=`cat $pidfile` |
| 35 | if [ ! -z "$pid" ]; then |
| 36 | kill $pid |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 37 | fi |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 38 | wait |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 39 | } |
| 40 | |
| 41 | cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 42 | echo "PermitOpen 127.0.0.1:1" >>$OBJ/sshd_config |
| 43 | echo "Match Address 127.0.0.1" >>$OBJ/sshd_config |
| 44 | echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_config |
| 45 | |
Darren Tucker | 7f19323 | 2013-05-17 19:02:28 +1000 | [diff] [blame] | 46 | grep -v AuthorizedKeysFile $OBJ/sshd_proxy_bak > $OBJ/sshd_proxy |
| 47 | echo "AuthorizedKeysFile /dev/null" >>$OBJ/sshd_proxy |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 48 | echo "PermitOpen 127.0.0.1:1" >>$OBJ/sshd_proxy |
Darren Tucker | 7f19323 | 2013-05-17 19:02:28 +1000 | [diff] [blame] | 49 | echo "Match user $USER" >>$OBJ/sshd_proxy |
| 50 | echo "AuthorizedKeysFile /dev/null $OBJ/authorized_keys_%u" >>$OBJ/sshd_proxy |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 51 | echo "Match Address 127.0.0.1" >>$OBJ/sshd_proxy |
| 52 | echo "PermitOpen 127.0.0.1:$PORT" >>$OBJ/sshd_proxy |
| 53 | |
| 54 | start_sshd |
| 55 | |
| 56 | #set -x |
| 57 | |
| 58 | # Test Match + PermitOpen in sshd_config. This should be permitted |
| 59 | for p in 1 2; do |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 60 | trace "match permitopen localhost proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 61 | start_client -F $OBJ/ssh_config |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 62 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true || \ |
| 63 | fail "match permitopen permit proto $p" |
| 64 | stop_client |
| 65 | done |
| 66 | |
| 67 | # Same but from different source. This should not be permitted |
| 68 | for p in 1 2; do |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 69 | trace "match permitopen proxy proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 70 | start_client -F $OBJ/ssh_proxy |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 71 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true && \ |
| 72 | fail "match permitopen deny proto $p" |
| 73 | stop_client |
| 74 | done |
| 75 | |
| 76 | # Retry previous with key option, should also be denied. |
Darren Tucker | 56347ef | 2013-05-17 13:28:36 +1000 | [diff] [blame] | 77 | printf 'permitopen="127.0.0.1:'$PORT'" ' >$OBJ/authorized_keys_$USER |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 78 | cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER |
Darren Tucker | 56347ef | 2013-05-17 13:28:36 +1000 | [diff] [blame] | 79 | printf 'permitopen="127.0.0.1:'$PORT'" ' >>$OBJ/authorized_keys_$USER |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 80 | cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER |
| 81 | for p in 1 2; do |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 82 | trace "match permitopen proxy w/key opts proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 83 | start_client -F $OBJ/ssh_proxy |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 84 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true && \ |
| 85 | fail "match permitopen deny w/key opt proto $p" |
| 86 | stop_client |
| 87 | done |
| 88 | |
| 89 | # Test both sshd_config and key options permitting the same dst/port pair. |
| 90 | # Should be permitted. |
| 91 | for p in 1 2; do |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 92 | trace "match permitopen localhost proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 93 | start_client -F $OBJ/ssh_config |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 94 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true || \ |
| 95 | fail "match permitopen permit proto $p" |
| 96 | stop_client |
| 97 | done |
| 98 | |
| 99 | cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy |
| 100 | echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy |
| 101 | echo "Match User $USER" >>$OBJ/sshd_proxy |
| 102 | echo "PermitOpen 127.0.0.1:1 127.0.0.1:2" >>$OBJ/sshd_proxy |
| 103 | |
| 104 | # Test that a Match overrides a PermitOpen in the global section |
| 105 | for p in 1 2; do |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 106 | trace "match permitopen proxy w/key opts proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 107 | start_client -F $OBJ/ssh_proxy |
Damien Miller | 7b1877c | 2006-07-24 15:31:41 +1000 | [diff] [blame] | 108 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true && \ |
| 109 | fail "match override permitopen proto $p" |
| 110 | stop_client |
| 111 | done |
Damien Miller | 80ba130 | 2007-10-26 14:45:13 +1000 | [diff] [blame] | 112 | |
| 113 | cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy |
| 114 | echo "PermitOpen 127.0.0.1:1 127.0.0.1:$PORT 127.0.0.2:2" >>$OBJ/sshd_proxy |
| 115 | echo "Match User NoSuchUser" >>$OBJ/sshd_proxy |
| 116 | echo "PermitOpen 127.0.0.1:1 127.0.0.1:2" >>$OBJ/sshd_proxy |
| 117 | |
| 118 | # Test that a rule that doesn't match doesn't override, plus test a |
| 119 | # PermitOpen entry that's not at the start of the list |
| 120 | for p in 1 2; do |
Damien Miller | 80ba130 | 2007-10-26 14:45:13 +1000 | [diff] [blame] | 121 | trace "nomatch permitopen proxy w/key opts proto $p" |
Damien Miller | 8cb3587 | 2011-05-29 21:59:10 +1000 | [diff] [blame] | 122 | start_client -F $OBJ/ssh_proxy |
Damien Miller | 80ba130 | 2007-10-26 14:45:13 +1000 | [diff] [blame] | 123 | ${SSH} -q -$p -p $fwdport -F $OBJ/ssh_config somehost true || \ |
| 124 | fail "nomatch override permitopen proto $p" |
| 125 | stop_client |
| 126 | done |