2006-07-24 05:31:41 +00:00
|
|
|
# $OpenBSD: forcecommand.sh,v 1.1 2006/07/19 13:09:28 dtucker Exp $
|
|
|
|
# Placed in the Public Domain.
|
|
|
|
|
|
|
|
tid="forced command"
|
|
|
|
|
|
|
|
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
|
|
|
|
|
2006-07-24 13:50:23 +00:00
|
|
|
echon 'command="true" ' >$OBJ/authorized_keys_$USER
|
2006-07-24 05:31:41 +00:00
|
|
|
cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER
|
2006-07-24 13:50:23 +00:00
|
|
|
echon 'command="true" ' >>$OBJ/authorized_keys_$USER
|
2006-07-24 05:31:41 +00:00
|
|
|
cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER
|
|
|
|
|
|
|
|
for p in 1 2; do
|
|
|
|
trace "forced command in key option proto $p"
|
|
|
|
${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
|
|
|
|
fail "forced command in key proto $p"
|
|
|
|
done
|
|
|
|
|
2006-07-24 13:50:23 +00:00
|
|
|
echon 'command="false" ' >$OBJ/authorized_keys_$USER
|
2006-07-24 05:31:41 +00:00
|
|
|
cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER
|
2006-07-24 13:50:23 +00:00
|
|
|
echon 'command="false" ' >>$OBJ/authorized_keys_$USER
|
2006-07-24 05:31:41 +00:00
|
|
|
cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER
|
|
|
|
|
|
|
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
|
|
|
echo "ForceCommand true" >> $OBJ/sshd_proxy
|
|
|
|
|
|
|
|
for p in 1 2; do
|
|
|
|
trace "forced command in sshd_config overrides key option proto $p"
|
|
|
|
${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
|
|
|
|
fail "forced command in key proto $p"
|
|
|
|
done
|
|
|
|
|
|
|
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
|
|
|
echo "ForceCommand false" >> $OBJ/sshd_proxy
|
|
|
|
echo "Match User $USER" >> $OBJ/sshd_proxy
|
|
|
|
echo " ForceCommand true" >> $OBJ/sshd_proxy
|
|
|
|
|
|
|
|
for p in 1 2; do
|
|
|
|
trace "forced command with match proto $p"
|
|
|
|
${SSH} -$p -F $OBJ/ssh_proxy somehost false \ ||
|
|
|
|
fail "forced command in key proto $p"
|
|
|
|
done
|