mirror of
https://github.com/freebsd/freebsd-src
synced 2024-10-15 21:05:08 +00:00
069ac18495
From the release notes, > This release contains a number of security fixes, some small features > and bugfixes. The most significant change in 9.6p1 is a set of fixes for a newly- discovered weakness in the SSH transport protocol. The fix was already merged into FreeBSD and released as FreeBSD-SA-23:19.openssh. Full release notes at https://www.openssh.com/txt/release-9.6 Relnotes: Yes Sponsored by: The FreeBSD Foundation
32 lines
928 B
Bash
32 lines
928 B
Bash
# $OpenBSD: dropbear-kex.sh,v 1.1 2023/10/20 06:56:45 dtucker Exp $
|
|
# Placed in the Public Domain.
|
|
|
|
tid="dropbear kex"
|
|
|
|
if test "x$REGRESS_INTEROP_DROPBEAR" != "xyes" ; then
|
|
skip "dropbear interop tests not enabled"
|
|
fi
|
|
|
|
cat >>$OBJ/sshd_proxy <<EOD
|
|
PubkeyAcceptedAlgorithms +ssh-rsa,ssh-dss
|
|
HostkeyAlgorithms +ssh-rsa,ssh-dss
|
|
EOD
|
|
cp $OBJ/sshd_proxy $OBJ/sshd_proxy.bak
|
|
|
|
kex="curve25519-sha256 curve25519-sha256@libssh.org
|
|
diffie-hellman-group14-sha256 diffie-hellman-group14-sha1"
|
|
|
|
for k in $kex; do
|
|
verbose "$tid: kex $k"
|
|
rm -f ${COPY}
|
|
# dbclient doesn't have switch for kex, so force in server
|
|
(cat $OBJ/sshd_proxy.bak; echo "KexAlgorithms $k") >$OBJ/sshd_proxy
|
|
env HOME=$OBJ dbclient -y -i $OBJ/.dropbear/id_rsa 2>$OBJ/dbclient.log \
|
|
-J "$OBJ/ssh_proxy.sh" somehost cat ${DATA} > ${COPY}
|
|
if [ $? -ne 0 ]; then
|
|
fail "ssh cat $DATA failed"
|
|
fi
|
|
cmp ${DATA} ${COPY} || fail "corrupted copy"
|
|
done
|
|
rm -f ${COPY}
|