openssh/regress/dynamic-forward.sh
djm@openbsd.org 845ceecea2
upstream: regression test for PermitRemoteOpen
OpenBSD-Regress-ID: 8271aafbf5c21950cd5bf966f08e585cebfe630c
2023-01-03 17:53:05 +11:00

110 lines
2.5 KiB
Bash

# $OpenBSD: dynamic-forward.sh,v 1.14 2023/01/02 07:03:57 djm Exp $
# Placed in the Public Domain.
tid="dynamic forwarding"
FWDPORT=`expr $PORT + 1`
cp $OBJ/ssh_config $OBJ/ssh_config.orig
if have_prog nc && nc -h 2>&1 | grep "proxy address" >/dev/null; then
proxycmd="nc -x 127.0.0.1:$FWDPORT -X"
elif have_prog connect; then
proxycmd="connect -S 127.0.0.1:$FWDPORT -"
else
echo "skipped (no suitable ProxyCommand found)"
exit 0
fi
trace "will use ProxyCommand $proxycmd"
start_ssh() {
direction="$1"
arg="$2"
n=0
error="1"
trace "start dynamic -$direction forwarding, fork to background"
(cat $OBJ/ssh_config.orig ; echo "$arg") > $OBJ/ssh_config
while [ "$error" -ne 0 -a "$n" -lt 3 ]; do
n=`expr $n + 1`
${SSH} -F $OBJ/ssh_config -f -$direction $FWDPORT -q \
-oExitOnForwardFailure=yes somehost exec sh -c \
\'"echo \$\$ > $OBJ/remote_pid; exec sleep 444"\'
error=$?
if [ "$error" -ne 0 ]; then
trace "forward failed attempt $n err $error"
sleep $n
fi
done
if [ "$error" -ne 0 ]; then
fatal "failed to start dynamic forwarding"
fi
}
stop_ssh() {
if [ -f $OBJ/remote_pid ]; then
remote=`cat $OBJ/remote_pid`
trace "terminate remote shell, pid $remote"
if [ $remote -gt 1 ]; then
kill -HUP $remote
fi
else
fail "no pid file: $OBJ/remote_pid"
fi
}
check_socks() {
direction=$1
expect_success=$2
for s in 4 5; do
for h in 127.0.0.1 localhost; do
trace "testing ssh socks version $s host $h (-$direction)"
${SSH} -F $OBJ/ssh_config \
-o "ProxyCommand ${proxycmd}${s} $h $PORT 2>/dev/null" \
somehost cat ${DATA} > ${COPY}
r=$?
if [ "x$expect_success" = "xY" ] ; then
if [ $r -ne 0 ] ; then
fail "ssh failed with exit status $r"
fi
test -f ${COPY} || fail "failed copy ${DATA}"
cmp ${DATA} ${COPY} || fail "corrupted copy of ${DATA}"
elif [ $r -eq 0 ] ; then
fail "ssh unexpectedly succeeded"
fi
done
done
}
start_sshd
for d in D R; do
verbose "test -$d forwarding"
start_ssh $d
check_socks $d Y
stop_ssh
test "x$d" = "xR" || continue
# Test PermitRemoteOpen
verbose "PermitRemoteOpen=any"
start_ssh $d PermitRemoteOpen=any
check_socks $d Y
stop_ssh
verbose "PermitRemoteOpen=none"
start_ssh $d PermitRemoteOpen=none
check_socks $d N
stop_ssh
verbose "PermitRemoteOpen=explicit"
start_ssh $d \
PermitRemoteOpen="127.0.0.1:$PORT [::1]:$PORT localhost:$PORT"
check_socks $d Y
stop_ssh
verbose "PermitRemoteOpen=disallowed"
start_ssh $d \
PermitRemoteOpen="127.0.0.1:1 [::1]:1 localhost:1"
check_socks $d N
stop_ssh
done