connect-privsep.sh 1.0 KB

123456789101112131415161718192021222324252627282930313233343536
  1. # $OpenBSD: connect-privsep.sh,v 1.9 2017/04/30 23:34:55 djm Exp $
  2. # Placed in the Public Domain.
  3. tid="proxy connect with privsep"
  4. cp $OBJ/sshd_proxy $OBJ/sshd_proxy.orig
  5. echo 'UsePrivilegeSeparation yes' >> $OBJ/sshd_proxy
  6. ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
  7. if [ $? -ne 0 ]; then
  8. fail "ssh privsep+proxyconnect failed"
  9. fi
  10. cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
  11. echo 'UsePrivilegeSeparation sandbox' >> $OBJ/sshd_proxy
  12. ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
  13. if [ $? -ne 0 ]; then
  14. # XXX replace this with fail once sandbox has stabilised
  15. warn "ssh privsep/sandbox+proxyconnect failed"
  16. fi
  17. # Because sandbox is sensitive to changes in libc, especially malloc, retest
  18. # with every malloc.conf option (and none).
  19. if [ -z "$TEST_MALLOC_OPTIONS" ]; then
  20. mopts="C F G J R S U X < >"
  21. else
  22. mopts=$(echo $TEST_MALLOC_OPTIONS | sed 's/./& /g')
  23. fi
  24. for m in '' $mopts; do
  25. env MALLOC_OPTIONS="$m" ${SSH} -F $OBJ/ssh_proxy 999.999.999.999 true
  26. if [ $? -ne 0 ]; then
  27. fail "ssh privsep/sandbox+proxyconnect mopt '$m' failed"
  28. fi
  29. done