From: Jameson Rollins Date: Sat, 16 Jan 2010 00:42:42 +0000 (-0500) Subject: Merge remote branch 'dkg/master' X-Git-Tag: monkeysphere_0.28~41 X-Git-Url: https://codewiz.org/gitweb?p=monkeysphere.git;a=commitdiff_plain;h=17315937bc0af145ef7dfb749096faad49f208aa;hp=-c Merge remote branch 'dkg/master' Conflicts: tests/basic --- 17315937bc0af145ef7dfb749096faad49f208aa diff --combined tests/basic index 8cf0933,f808387..15afa77 --- a/tests/basic +++ b/tests/basic @@@ -10,7 -10,7 +10,7 @@@ # Jameson Rollins # Micah Anderson # - # Copyright: 2008-2009 + # Copyright: © 2008-2010 # License: GPL v3 or later # these tests should all be able to run as a non-privileged user. @@@ -133,8 -133,6 +133,8 @@@ export MONKEYSPHERE_SYSCONFIGDIR="$TEMP export MONKEYSPHERE_SYSSHAREDIR="$TESTDIR"/../src/share export MONKEYSPHERE_MONKEYSPHERE_USER=$(whoami) +HOST_KEY_FILE="$MONKEYSPHERE_SYSCONFIGDIR"/host_keys.pub.gpg + export MONKEYSPHERE_CHECK_KEYSERVER=false # example.org does not respond to the HKP port, so this should cause # any keyserver connection attempts that do happen (they shouldn't!) @@@ -257,8 -255,8 +257,8 @@@ monkeysphere-host import-key "$TEMPDIR" echo echo "##################################################" echo "### getting host key fingerprint..." - HOSTKEYID=$( monkeysphere-host show-key | grep '^OpenPGP fingerprint: ' | cut -f3 -d\ ) - echo "$HOSTKEYID" + SSHHOSTKEYID=$( monkeysphere-host show-key | grep '^OpenPGP fingerprint: ' | cut -f3 -d\ ) + echo "$SSHHOSTKEYID" # change host key expiration echo @@@ -272,8 -270,8 +272,8 @@@ monkeysphere-host set-expire echo echo "##################################################" echo "### certifying server host key..." -< "$MONKEYSPHERE_SYSCONFIGDIR"/host_keys.pub.gpg gpgadmin --import +< "$HOST_KEY_FILE" gpgadmin --import - echo y | gpgadmin --command-fd 0 --sign-key "$HOSTKEYID" + echo y | gpgadmin --command-fd 0 --sign-key "$SSHHOSTKEYID" # FIXME: add revoker? @@@ -323,7 -321,7 +323,7 @@@ monkeysphere gen-subke echo echo "##################################################" echo "### export server key to testuser..." - gpgadmin --armor --export "$HOSTKEYID" | gpg --import + gpgadmin --armor --export "$SSHHOSTKEYID" | gpg --import # teach the "server" about the testuser's key echo @@@ -342,6 -340,12 +342,12 @@@ monkeysphere-authentication update-user ###################################################################### ### TESTS + ## see whether keys-for-userid works from the client's perspective: + echo + echo "##################################################" + echo "### testing monkeysphere keys-for-userid ..." + diff -q <( monkeysphere keys-for-userid ssh://testhost ) <( cut -f1,2 -d' ' < "$TEMPDIR"/ssh_host_rsa_key.pub ) + # connect to test sshd, using monkeysphere ssh-proxycommand to verify # the identity before connection. This should work in both directions! echo @@@ -501,39 -505,37 +507,37 @@@ echo "### ssh connection test directly target_hostname=testhost2 ssh_test 255 echo echo "##################################################" - echo "### add hostname, certify by admin, import by user..." - monkeysphere-host add-hostname ssh://testhost2 + echo "### add servicename, certify by admin, import by user..." + monkeysphere-host add-servicename ssh://testhost2 -< "$MONKEYSPHERE_SYSCONFIGDIR"/host_keys.pub.gpg gpgadmin --import +<"$HOST_KEY_FILE" gpgadmin --import - printf "y\ny\n" | gpgadmin --command-fd 0 --sign-key "$HOSTKEYID" + printf "y\ny\n" | gpgadmin --command-fd 0 --sign-key "$SSHHOSTKEYID" echo echo "##################################################" echo "### ssh connection test with hostname 'testhost2' added..." - gpgadmin --export "$HOSTKEYID" | gpg --import + gpgadmin --export "$SSHHOSTKEYID" | gpg --import gpg --check-trustdb ssh_test echo echo "##################################################" echo "### ssh connection test directly to 'testhost2' ..." -gpg --import <"$MONKEYSPHERE_SYSCONFIGDIR"/host_keys.pub.gpg +gpg --import <"$HOST_KEY_FILE" gpg --check-trustdb target_hostname=testhost2 ssh_test echo echo "##################################################" echo "### ssh connection test for failure with 'testhost2' revoked..." - monkeysphere-host revoke-hostname ssh://testhost2 + monkeysphere-host revoke-servicename ssh://testhost2 -gpg --import <"$MONKEYSPHERE_SYSCONFIGDIR"/host_keys.pub.gpg +gpg --import <"$HOST_KEY_FILE" gpg --check-trustdb target_hostname=testhost2 ssh_test 255 # FIXME: addtest: remove admin as id-certifier and check ssh failure # FIXME: addtest: how do we test that set-expire makes sense after new - # hostnames have been added? - - # FIXME: addtest: revoke the host key and check ssh failure + # servicenames have been added? # test to make sure things are OK after the previous tests: echo @@@ -547,7 -549,20 +551,20 @@@ ssh_tes echo echo "##################################################" - echo "### revoking host key..." + echo "### Testing TLS setup..." + + openssl req -config "$TESTDIR"/openssl.cnf -x509 -newkey rsa:1024 -subj '/DC=net/DC=example/DC=testhost/CN=testhost.example.net/' -days 3 -keyout "$TEMPDIR"/tls_key.pem -nodes >"$TEMPDIR"/tls_cert.pem + monkeysphere-host import-key "$TEMPDIR"/tls_key.pem https://testhost + + # FIXME: how can we test this via an https client? + # We don't currently provide one. + + # FIXME: should we test other monkeysphere-host operations somehow now + # that we have more than one key in the host keyring? + + echo + echo "##################################################" + echo "### revoking ssh host key..." # generate the revocation certificate and feed it directly to the test # user's keyring (we're not publishing to the keyservers) monkeysphere-host revoke-key | gpg --import