-# $OpenBSD: cert-hostkey.sh,v 1.20 2019/11/26 23:43:10 djm Exp $
+# $OpenBSD: cert-hostkey.sh,v 1.21 2019/12/11 18:47:14 djm Exp $
# Placed in the Public Domain.
tid="certified host keys"
}
# Basic connect and revocation tests.
-for privsep in yes sandbox ; do
+for privsep in yes ; do
for ktype in $PLAIN_TYPES ; do
verbose "$tid: host ${ktype} cert connect privsep $privsep"
(
kh_revoke cert_host_key_${ktype}.pub >> $OBJ/known_hosts-cert.orig
done
cp $OBJ/known_hosts-cert.orig $OBJ/known_hosts-cert
-for privsep in yes sandbox ; do
+for privsep in yes ; do
for ktype in $PLAIN_TYPES ; do
verbose "$tid: host ${ktype} revoked cert privsep $privsep"
(
-# $OpenBSD: cert-userkey.sh,v 1.23 2019/11/26 23:43:10 djm Exp $
+# $OpenBSD: cert-userkey.sh,v 1.24 2019/12/11 18:47:14 djm Exp $
# Placed in the Public Domain.
tid="certified user keys"
# Test explicitly-specified principals
for ktype in $EXTRA_TYPES $PLAIN_TYPES ; do
t=$(kname $ktype)
- for privsep in yes sandbox ; do
+ for privsep in yes ; do
_prefix="${ktype} privsep $privsep"
# Setup for AuthorizedPrincipalsFile
for ktype in $PLAIN_TYPES ; do
t=$(kname $ktype)
- for privsep in yes no ; do
+ for privsep in yes ; do
_prefix="${ktype} privsep $privsep $auth"
# Simple connect
verbose "$tid: ${_prefix} connect"
-# $OpenBSD: hostkey-agent.sh,v 1.9 2019/11/26 23:43:10 djm Exp $
+# $OpenBSD: hostkey-agent.sh,v 1.10 2019/12/11 18:47:14 djm Exp $
# Placed in the Public Domain.
tid="hostkey agent"
unset SSH_AUTH_SOCK
-for ps in no yes; do
+for ps in yes; do
for k in `${SSH} -Q key-plain | filter_sk` ; do
verbose "key type $k privsep=$ps"
cp $OBJ/sshd_proxy.orig $OBJ/sshd_proxy
-# $OpenBSD: multipubkey.sh,v 1.2 2018/10/31 11:09:27 dtucker Exp $
+# $OpenBSD: multipubkey.sh,v 1.3 2019/12/11 18:47:14 djm Exp $
# Placed in the Public Domain.
tid="multiple pubkey"
opts="-oProtocol=2 -F $OBJ/ssh_proxy -oIdentitiesOnly=yes"
opts="$opts -i $OBJ/cert_user_key1 -i $OBJ/user_key1 -i $OBJ/user_key2"
-for privsep in yes sandbox ; do
+for privsep in yes ; do
(
grep -v "Protocol" $OBJ/sshd_proxy.orig
echo "Protocol 2"
-# $OpenBSD: principals-command.sh,v 1.8 2019/11/01 01:55:41 djm Exp $
+# $OpenBSD: principals-command.sh,v 1.10 2019/12/11 18:47:14 djm Exp $
# Placed in the Public Domain.
tid="authorized principals command"
if [ -x $PRINCIPALS_COMMAND ]; then
# Test explicitly-specified principals
- for privsep in yes sandbox ; do
+ for privsep in yes ; do
_prefix="privsep $privsep"
# Setup for AuthorizedPrincipalsCommand