1*a0ee8cc6SDag-Erling Smørgrav# $OpenBSD: dhgex.sh,v 1.2 2014/04/21 22:15:37 djm Exp $ 2b83788ffSDag-Erling Smørgrav# Placed in the Public Domain. 3b83788ffSDag-Erling Smørgrav 4b83788ffSDag-Erling Smørgravtid="dhgex" 5b83788ffSDag-Erling Smørgrav 6b83788ffSDag-Erling SmørgravLOG=${TEST_SSH_LOGFILE} 7b83788ffSDag-Erling Smørgravrm -f ${LOG} 8*a0ee8cc6SDag-Erling Smørgravcp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak 9b83788ffSDag-Erling Smørgrav 10b83788ffSDag-Erling Smørgravkexs=`${SSH} -Q kex | grep diffie-hellman-group-exchange` 11b83788ffSDag-Erling Smørgrav 12b83788ffSDag-Erling Smørgravssh_test_dhgex() 13b83788ffSDag-Erling Smørgrav{ 14b83788ffSDag-Erling Smørgrav bits="$1"; shift 15b83788ffSDag-Erling Smørgrav cipher="$1"; shift 16b83788ffSDag-Erling Smørgrav kex="$1"; shift 17b83788ffSDag-Erling Smørgrav 18*a0ee8cc6SDag-Erling Smørgrav cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy 19*a0ee8cc6SDag-Erling Smørgrav echo "KexAlgorithms=$kex" >> $OBJ/sshd_proxy 20*a0ee8cc6SDag-Erling Smørgrav echo "Ciphers=$cipher" >> $OBJ/sshd_proxy 21b83788ffSDag-Erling Smørgrav rm -f ${LOG} 22b83788ffSDag-Erling Smørgrav opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 23b83788ffSDag-Erling Smørgrav groupsz="1024<$bits<8192" 24b83788ffSDag-Erling Smørgrav verbose "$tid bits $bits $kex $cipher" 25b83788ffSDag-Erling Smørgrav ${SSH} ${opts} $@ -vvv -F ${OBJ}/ssh_proxy somehost true 26b83788ffSDag-Erling Smørgrav if [ $? -ne 0 ]; then 27b83788ffSDag-Erling Smørgrav fail "ssh failed ($@)" 28b83788ffSDag-Erling Smørgrav fi 29b83788ffSDag-Erling Smørgrav # check what we request 30b83788ffSDag-Erling Smørgrav grep "SSH2_MSG_KEX_DH_GEX_REQUEST($groupsz) sent" ${LOG} >/dev/null 31b83788ffSDag-Erling Smørgrav if [ $? != 0 ]; then 32b83788ffSDag-Erling Smørgrav got=`egrep "SSH2_MSG_KEX_DH_GEX_REQUEST(.*) sent" ${LOG}` 33b83788ffSDag-Erling Smørgrav fail "$tid unexpected GEX sizes, expected $groupsz, got $got" 34b83788ffSDag-Erling Smørgrav fi 35b83788ffSDag-Erling Smørgrav # check what we got (depends on contents of system moduli file) 36b83788ffSDag-Erling Smørgrav gotbits="`awk '/bits set:/{print $4}' ${LOG} | head -1 | cut -f2 -d/`" 37b83788ffSDag-Erling Smørgrav if [ "$gotbits" -lt "$bits" ]; then 38b83788ffSDag-Erling Smørgrav fatal "$tid expected $bits bit group, got $gotbits" 39b83788ffSDag-Erling Smørgrav fi 40b83788ffSDag-Erling Smørgrav} 41b83788ffSDag-Erling Smørgrav 42b83788ffSDag-Erling Smørgravcheck() 43b83788ffSDag-Erling Smørgrav{ 44b83788ffSDag-Erling Smørgrav bits="$1"; shift 45b83788ffSDag-Erling Smørgrav 46b83788ffSDag-Erling Smørgrav for c in $@; do 47b83788ffSDag-Erling Smørgrav for k in $kexs; do 48b83788ffSDag-Erling Smørgrav ssh_test_dhgex $bits $c $k 49b83788ffSDag-Erling Smørgrav done 50b83788ffSDag-Erling Smørgrav done 51b83788ffSDag-Erling Smørgrav} 52b83788ffSDag-Erling Smørgrav 53b83788ffSDag-Erling Smørgrav#check 2048 3des-cbc 54b83788ffSDag-Erling Smørgravcheck 3072 `${SSH} -Q cipher | grep 128` 55b83788ffSDag-Erling Smørgravcheck 3072 arcfour blowfish-cbc 56b83788ffSDag-Erling Smørgravcheck 7680 `${SSH} -Q cipher | grep 192` 57b83788ffSDag-Erling Smørgravcheck 8192 `${SSH} -Q cipher | grep 256` 58b83788ffSDag-Erling Smørgravcheck 8192 rijndael-cbc@lysator.liu.se chacha20-poly1305@openssh.com 59