diff options
Diffstat (limited to 'regress/hostkey-agent.sh')
-rw-r--r-- | regress/hostkey-agent.sh | 17 |
1 files changed, 7 insertions, 10 deletions
diff --git a/regress/hostkey-agent.sh b/regress/hostkey-agent.sh index 4562f42af..84fb2c2d2 100644 --- a/regress/hostkey-agent.sh +++ b/regress/hostkey-agent.sh | |||
@@ -1,12 +1,9 @@ | |||
1 | # $OpenBSD: hostkey-agent.sh,v 1.1 2015/01/17 18:54:30 djm Exp $ | 1 | # $OpenBSD: hostkey-agent.sh,v 1.2 2015/01/19 06:01:32 djm Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | tid="hostkey agent" | 4 | tid="hostkey agent" |
5 | 5 | ||
6 | # Need full names here since they are used in HostKeyAlgorithms | 6 | rm -f $OBJ/agent.* $OBJ/ssh_proxy.orig $OBJ/known_hosts.orig |
7 | HOSTKEY_TYPES="ecdsa-sha2-nistp256 ssh-ed25519 ssh-rsa ssh-dss" | ||
8 | |||
9 | rm -f $OBJ/agent.* $OBJ/ssh_proxy.orig | ||
10 | 7 | ||
11 | trace "start agent" | 8 | trace "start agent" |
12 | eval `${SSHAGENT} -s` > /dev/null | 9 | eval `${SSHAGENT} -s` > /dev/null |
@@ -15,31 +12,31 @@ r=$? | |||
15 | 12 | ||
16 | grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig | 13 | grep -vi 'hostkey' $OBJ/sshd_proxy > $OBJ/sshd_proxy.orig |
17 | echo "HostKeyAgent $SSH_AUTH_SOCK" >> $OBJ/sshd_proxy.orig | 14 | echo "HostKeyAgent $SSH_AUTH_SOCK" >> $OBJ/sshd_proxy.orig |
18 | echo "LogLevel debug3" >> $OBJ/sshd_proxy.orig | ||
19 | rm $OBJ/known_hosts | ||
20 | 15 | ||
21 | trace "load hostkeys" | 16 | trace "load hostkeys" |
22 | for k in $HOSTKEY_TYPES ; do | 17 | for k in `${SSH} -Q key-plain` ; do |
23 | ${SSHKEYGEN} -qt $k -f $OBJ/agent.$k -N '' || fatal "ssh-keygen $k" | 18 | ${SSHKEYGEN} -qt $k -f $OBJ/agent.$k -N '' || fatal "ssh-keygen $k" |
24 | ( | 19 | ( |
25 | echo -n 'localhost-with-alias,127.0.0.1,::1 ' | 20 | echo -n 'localhost-with-alias,127.0.0.1,::1 ' |
26 | cat $OBJ/agent.$k.pub | 21 | cat $OBJ/agent.$k.pub |
27 | ) >> $OBJ/known_hosts | 22 | ) >> $OBJ/known_hosts.orig |
28 | ${SSHADD} $OBJ/agent.$k >/dev/null 2>&1 || \ | 23 | ${SSHADD} $OBJ/agent.$k >/dev/null 2>&1 || \ |
29 | fatal "couldn't load key $OBJ/agent.$k" | 24 | fatal "couldn't load key $OBJ/agent.$k" |
30 | echo "Hostkey $OBJ/agent.${k}" >> sshd_proxy.orig | 25 | echo "Hostkey $OBJ/agent.${k}" >> sshd_proxy.orig |
31 | # Remove private key so the server can't use it. | 26 | # Remove private key so the server can't use it. |
32 | rm $OBJ/agent.$k || fatal "couldn't rm $OBJ/agent.$k" | 27 | rm $OBJ/agent.$k || fatal "couldn't rm $OBJ/agent.$k" |
33 | done | 28 | done |
29 | cp $OBJ/known_hosts.orig $OBJ/known_hosts | ||
34 | 30 | ||
35 | unset SSH_AUTH_SOCK | 31 | unset SSH_AUTH_SOCK |
36 | 32 | ||
37 | for ps in no yes; do | 33 | for ps in no yes; do |
38 | cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy | 34 | cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy |
39 | echo "UsePrivilegeSeparation $ps" >> $OBJ/sshd_proxy | 35 | echo "UsePrivilegeSeparation $ps" >> $OBJ/sshd_proxy |
40 | for k in $HOSTKEY_TYPES ; do | 36 | for k in `${SSH} -Q key-plain` ; do |
41 | verbose "key type $k privsep=$ps" | 37 | verbose "key type $k privsep=$ps" |
42 | opts="-oHostKeyAlgorithms=$k -F $OBJ/ssh_proxy" | 38 | opts="-oHostKeyAlgorithms=$k -F $OBJ/ssh_proxy" |
39 | cp $OBJ/known_hosts.orig $OBJ/known_hosts | ||
43 | SSH_CONNECTION=`${SSH} $opts host 'echo $SSH_CONNECTION'` | 40 | SSH_CONNECTION=`${SSH} $opts host 'echo $SSH_CONNECTION'` |
44 | if [ $? -ne 0 ]; then | 41 | if [ $? -ne 0 ]; then |
45 | fail "protocol $p privsep=$ps failed" | 42 | fail "protocol $p privsep=$ps failed" |