2019-12-16 02:39:05 +00:00
|
|
|
# $OpenBSD: keytype.sh,v 1.10 2019/12/16 02:39:05 djm Exp $
|
2010-11-05 07:19:15 +00:00
|
|
|
# Placed in the Public Domain.
|
|
|
|
|
|
|
|
tid="login with different key types"
|
|
|
|
|
|
|
|
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
|
|
|
|
cp $OBJ/ssh_proxy $OBJ/ssh_proxy_bak
|
|
|
|
|
2019-07-23 13:49:14 +00:00
|
|
|
# Construct list of key types based on what the built binaries support.
|
|
|
|
ktypes=""
|
|
|
|
for i in ${SSH_KEYTYPES}; do
|
2013-11-10 09:25:22 +00:00
|
|
|
case "$i" in
|
2019-07-23 13:49:14 +00:00
|
|
|
ssh-dss) ktypes="$ktypes dsa-1024" ;;
|
|
|
|
ssh-rsa) ktypes="$ktypes rsa-2048 rsa-3072" ;;
|
|
|
|
ssh-ed25519) ktypes="$ktypes ed25519-512" ;;
|
2013-12-21 06:02:39 +00:00
|
|
|
ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
|
|
|
|
ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
|
|
|
|
ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
|
2019-11-26 23:43:10 +00:00
|
|
|
sk-ssh-ed25519*) ktypes="$ktypes ed25519-sk" ;;
|
|
|
|
sk-ecdsa-sha2-nistp256*) ktypes="$ktypes ecdsa-sk" ;;
|
2013-11-10 09:25:22 +00:00
|
|
|
esac
|
|
|
|
done
|
2010-11-05 07:19:15 +00:00
|
|
|
|
2017-10-30 22:01:52 +00:00
|
|
|
for kt in $ktypes; do
|
2010-11-05 07:19:15 +00:00
|
|
|
rm -f $OBJ/key.$kt
|
2019-11-26 23:43:10 +00:00
|
|
|
xbits=`echo ${kt} | awk -F- '{print $2}'`
|
|
|
|
xtype=`echo ${kt} | awk -F- '{print $1}'`
|
|
|
|
case "$kt" in
|
|
|
|
*sk) type="$kt"; bits="n/a"; bits_arg="";;
|
|
|
|
*) type=$xtype; bits=$xbits; bits_arg="-b $bits";;
|
|
|
|
esac
|
2017-03-20 22:08:06 +00:00
|
|
|
verbose "keygen $type, $bits bits"
|
2019-11-26 23:43:10 +00:00
|
|
|
${SSHKEYGEN} $bits_arg -q -N '' -t $type -f $OBJ/key.$kt || \
|
2010-11-05 07:19:15 +00:00
|
|
|
fail "ssh-keygen for type $type, $bits bits failed"
|
|
|
|
done
|
|
|
|
|
2019-11-26 23:43:10 +00:00
|
|
|
kname_to_ktype() {
|
|
|
|
case $1 in
|
|
|
|
dsa-1024) echo ssh-dss;;
|
|
|
|
ecdsa-256) echo ecdsa-sha2-nistp256;;
|
|
|
|
ecdsa-384) echo ecdsa-sha2-nistp384;;
|
|
|
|
ecdsa-521) echo ecdsa-sha2-nistp521;;
|
|
|
|
ed25519-512) echo ssh-ed25519;;
|
|
|
|
rsa-*) echo rsa-sha2-512,rsa-sha2-256,ssh-rsa;;
|
|
|
|
ed25519-sk) echo sk-ssh-ed25519@openssh.com;;
|
|
|
|
ecdsa-sk) echo sk-ecdsa-sha2-nistp256@openssh.com;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2010-11-05 07:19:15 +00:00
|
|
|
tries="1 2 3"
|
2017-10-30 22:01:52 +00:00
|
|
|
for ut in $ktypes; do
|
2019-11-26 23:43:10 +00:00
|
|
|
user_type=`kname_to_ktype "$ut"`
|
2019-12-16 02:39:05 +00:00
|
|
|
htypes="$ut"
|
2010-11-05 07:19:15 +00:00
|
|
|
#htypes=$ktypes
|
2017-10-30 22:01:52 +00:00
|
|
|
for ht in $htypes; do
|
2019-11-26 23:43:10 +00:00
|
|
|
host_type=`kname_to_ktype "$ht"`
|
2010-11-05 07:19:15 +00:00
|
|
|
trace "ssh connect, userkey $ut, hostkey $ht"
|
|
|
|
(
|
|
|
|
grep -v HostKey $OBJ/sshd_proxy_bak
|
2017-10-30 22:01:52 +00:00
|
|
|
echo HostKey $OBJ/key.$ht
|
2019-11-26 23:43:10 +00:00
|
|
|
echo PubkeyAcceptedKeyTypes $user_type
|
|
|
|
echo HostKeyAlgorithms $host_type
|
2010-11-05 07:19:15 +00:00
|
|
|
) > $OBJ/sshd_proxy
|
|
|
|
(
|
|
|
|
grep -v IdentityFile $OBJ/ssh_proxy_bak
|
2017-10-30 22:01:52 +00:00
|
|
|
echo IdentityFile $OBJ/key.$ut
|
2019-11-26 23:43:10 +00:00
|
|
|
echo PubkeyAcceptedKeyTypes $user_type
|
|
|
|
echo HostKeyAlgorithms $host_type
|
2010-11-05 07:19:15 +00:00
|
|
|
) > $OBJ/ssh_proxy
|
|
|
|
(
|
2013-05-17 03:28:36 +00:00
|
|
|
printf 'localhost-with-alias,127.0.0.1,::1 '
|
2010-11-05 07:19:15 +00:00
|
|
|
cat $OBJ/key.$ht.pub
|
|
|
|
) > $OBJ/known_hosts
|
|
|
|
cat $OBJ/key.$ut.pub > $OBJ/authorized_keys_$USER
|
|
|
|
for i in $tries; do
|
2017-03-20 22:08:06 +00:00
|
|
|
verbose "userkey $ut, hostkey ${ht}"
|
|
|
|
${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
|
2010-11-05 07:19:15 +00:00
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
fail "ssh userkey $ut, hostkey $ht failed"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|