2014-05-15 05:07:53 +00:00
|
|
|
# $OpenBSD: dhgex.sh,v 1.2 2014/04/21 22:15:37 djm Exp $
|
2014-02-27 23:21:26 +00:00
|
|
|
# Placed in the Public Domain.
|
|
|
|
|
|
|
|
tid="dhgex"
|
|
|
|
|
|
|
|
LOG=${TEST_SSH_LOGFILE}
|
|
|
|
rm -f ${LOG}
|
2014-05-15 05:07:53 +00:00
|
|
|
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
|
2014-02-27 23:21:26 +00:00
|
|
|
|
|
|
|
kexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange`
|
|
|
|
|
|
|
|
ssh_test_dhgex()
|
|
|
|
{
|
|
|
|
bits="$1"; shift
|
|
|
|
cipher="$1"; shift
|
|
|
|
kex="$1"; shift
|
|
|
|
|
2014-05-15 05:07:53 +00:00
|
|
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
|
|
|
echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy
|
|
|
|
echo "Ciphers=$cipher" >> $OBJ/sshd_proxy
|
2014-02-27 23:21:26 +00:00
|
|
|
rm -f ${LOG}
|
|
|
|
opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
|
|
|
|
groupsz="1024<$bits<8192"
|
|
|
|
verbose "$tid bits $bits $kex $cipher"
|
|
|
|
${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
fail "ssh failed ($@)"
|
|
|
|
fi
|
|
|
|
# check what we request
|
|
|
|
grep "SSH2_MSG_KEX_DH_GEX_REQUEST($groupsz) sent" ${LOG} >/dev/null
|
|
|
|
if [ $? != 0 ]; then
|
|
|
|
got=`egrep "SSH2_MSG_KEX_DH_GEX_REQUEST(.*) sent" ${LOG}`
|
|
|
|
fail "$tid unexpected GEX sizes, expected $groupsz, got $got"
|
|
|
|
fi
|
|
|
|
# check what we got (depends on contents of system moduli file)
|
|
|
|
gotbits="`awk '/bits set:/{print $4}' ${LOG} | head -1 | cut -f2 -d/`"
|
|
|
|
if [ "$gotbits" -lt "$bits" ]; then
|
|
|
|
fatal "$tid expected $bits bit group, got $gotbits"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
check()
|
|
|
|
{
|
|
|
|
bits="$1"; shift
|
|
|
|
|
|
|
|
for c in $@; do
|
|
|
|
for k in $kexs; do
|
|
|
|
ssh_test_dhgex $bits $c $k
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#check 2048 3des-cbc
|
|
|
|
check 3072 `${SSH} -Q cipher | grep 128`
|
|
|
|
check 3072 arcfour blowfish-cbc
|
|
|
|
check 7680 `${SSH} -Q cipher | grep 192`
|
|
|
|
check 8192 `${SSH} -Q cipher | grep 256`
|
|
|
|
check 8192 rijndael-cbc@lysator.liu.se chacha20-poly1305@openssh.com
|