mirror of git://anongit.mindrot.org/openssh.git
upstream: test the correct configuration option name
OpenBSD-Regress-ID: 492279ea9f65657f97a970e0e7c7fd0b339fee23
This commit is contained in:
parent
6d41815e20
commit
57379dbd01
|
@ -1,4 +1,4 @@
|
|||
# $OpenBSD: forward-control.sh,v 1.6 2018/06/06 18:25:33 djm Exp $
|
||||
# $OpenBSD: forward-control.sh,v 1.7 2018/06/07 14:29:43 djm Exp $
|
||||
# Placed in the Public Domain.
|
||||
|
||||
tid="sshd control of local and remote forwarding"
|
||||
|
@ -210,20 +210,20 @@ rperm_tests() {
|
|||
cp ${OBJ}/authorized_keys_${USER}.bak ${OBJ}/authorized_keys_${USER}
|
||||
_prefix="AllowTcpForwarding=$_tcpfwd"
|
||||
|
||||
# PermitRemoteOpen via sshd_config that doesn't match
|
||||
# PermitListen via sshd_config that doesn't match
|
||||
( cat ${OBJ}/sshd_proxy.bak ;
|
||||
echo "AllowTcpForwarding $_tcpfwd" ;
|
||||
echo "PermitRemoteOpen $_badfwd1 $_badfwd2" ) \
|
||||
echo "PermitListen $_badfwd1 $_badfwd2" ) \
|
||||
> ${OBJ}/sshd_proxy
|
||||
check_lfwd $_nopermit_lfwd "$_prefix, !PermitRemoteOpen"
|
||||
check_rfwd $_nopermit_rfwd "$_prefix, !PermitRemoteOpen"
|
||||
# PermitRemoteOpen via sshd_config that does match
|
||||
check_lfwd $_nopermit_lfwd "$_prefix, !PermitListen"
|
||||
check_rfwd $_nopermit_rfwd "$_prefix, !PermitListen"
|
||||
# PermitListen via sshd_config that does match
|
||||
( cat ${OBJ}/sshd_proxy.bak ;
|
||||
echo "AllowTcpForwarding $_tcpfwd" ;
|
||||
echo "PermitRemoteOpen $_badfwd1 $_goodfwd $_badfwd2" ) \
|
||||
echo "PermitListen $_badfwd1 $_goodfwd $_badfwd2" ) \
|
||||
> ${OBJ}/sshd_proxy
|
||||
check_lfwd $_plain_lfwd "$_prefix, PermitRemoteOpen"
|
||||
check_rfwd $_plain_rfwd "$_prefix, PermitRemoteOpen"
|
||||
check_lfwd $_plain_lfwd "$_prefix, PermitListen"
|
||||
check_rfwd $_plain_rfwd "$_prefix, PermitListen"
|
||||
}
|
||||
|
||||
# permit-remote-open none mismatch match
|
||||
|
|
Loading…
Reference in New Issue