2019-11-04 23:33:17 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, ... }:
|
2014-06-27 07:34:59 +01:00
|
|
|
|
2018-02-28 21:55:00 +00:00
|
|
|
let inherit (import ./ssh-keys.nix pkgs)
|
2024-04-28 12:50:45 +01:00
|
|
|
snakeOilPrivateKey snakeOilPublicKey snakeOilEd25519PrivateKey snakeOilEd25519PublicKey;
|
2014-06-27 07:34:59 +01:00
|
|
|
in {
|
2014-06-28 15:04:49 +01:00
|
|
|
name = "openssh";
|
2021-01-10 19:08:30 +00:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2024-04-21 08:15:22 +01:00
|
|
|
maintainers = [ aszlig ];
|
2015-07-12 11:09:40 +01:00
|
|
|
};
|
2010-03-18 13:07:56 +00:00
|
|
|
|
|
|
|
nodes = {
|
2011-09-14 19:20:50 +01:00
|
|
|
|
|
|
|
server =
|
2018-07-20 21:56:59 +01:00
|
|
|
{ ... }:
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-03-18 13:07:56 +00:00
|
|
|
{
|
|
|
|
services.openssh.enable = true;
|
2013-10-17 14:37:08 +01:00
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 00:55:42 +01:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2014-06-27 07:34:59 +01:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
2010-05-27 11:05:17 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2024-04-23 13:31:51 +01:00
|
|
|
server-allowed-users =
|
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = { enable = true; settings.AllowUsers = [ "alice" "bob" ]; };
|
|
|
|
users.groups = { alice = { }; bob = { }; carol = { }; };
|
|
|
|
users.users = {
|
|
|
|
alice = { isNormalUser = true; group = "alice"; openssh.authorizedKeys.keys = [ snakeOilPublicKey ]; };
|
|
|
|
bob = { isNormalUser = true; group = "bob"; openssh.authorizedKeys.keys = [ snakeOilPublicKey ]; };
|
|
|
|
carol = { isNormalUser = true; group = "carol"; openssh.authorizedKeys.keys = [ snakeOilPublicKey ]; };
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-10-24 13:24:10 +01:00
|
|
|
server-lazy =
|
2018-07-20 21:56:59 +01:00
|
|
|
{ ... }:
|
2016-12-29 14:49:43 +00:00
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = { enable = true; startWhenNeeded = true; };
|
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 00:55:42 +01:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2016-12-29 14:49:43 +00:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2024-01-03 18:36:51 +00:00
|
|
|
server-lazy-socket = {
|
|
|
|
virtualisation.vlans = [ 1 2 ];
|
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
|
|
|
startWhenNeeded = true;
|
|
|
|
ports = [ 2222 ];
|
|
|
|
listenAddresses = [ { addr = "0.0.0.0"; } ];
|
|
|
|
};
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2023-10-24 13:24:10 +01:00
|
|
|
server-localhost-only =
|
2019-02-24 23:48:01 +00:00
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-10-24 13:24:10 +01:00
|
|
|
server-localhost-only-lazy =
|
2019-02-24 23:48:01 +00:00
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; startWhenNeeded = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-10-24 13:24:10 +01:00
|
|
|
server-match-rule =
|
2023-09-19 12:05:59 +01:00
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
2023-09-27 21:59:13 +01:00
|
|
|
enable = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } { addr = "[::]"; port = 22; } ];
|
2023-09-19 12:05:59 +01:00
|
|
|
extraConfig = ''
|
|
|
|
# Combined test for two (predictable) Match criterias
|
|
|
|
Match LocalAddress 127.0.0.1 LocalPort 22
|
|
|
|
PermitRootLogin yes
|
|
|
|
|
|
|
|
# Separate tests for Match criterias
|
|
|
|
Match User root
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match Group root
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match Host nohost.example
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match LocalAddress 127.0.0.1
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match LocalPort 22
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match RDomain nohost.example
|
|
|
|
PermitRootLogin yes
|
|
|
|
Match Address 127.0.0.1
|
|
|
|
PermitRootLogin yes
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-04-28 12:50:45 +01:00
|
|
|
server-no-openssl =
|
|
|
|
{ ... }:
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
2024-05-04 14:02:53 +01:00
|
|
|
package = pkgs.opensshPackages.openssh.override {
|
|
|
|
linkOpenssl = false;
|
|
|
|
};
|
2024-04-28 12:50:45 +01:00
|
|
|
hostKeys = [
|
|
|
|
{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }
|
|
|
|
];
|
|
|
|
settings = {
|
2024-06-06 14:06:29 +01:00
|
|
|
# Since this test is against an OpenSSH-without-OpenSSL,
|
|
|
|
# we have to override NixOS's defaults ciphers (which require OpenSSL)
|
|
|
|
# and instead set these to null, which will mean OpenSSH uses its defaults.
|
|
|
|
# Expectedly, OpenSSH's defaults don't require OpenSSL when it's compiled
|
|
|
|
# without OpenSSL.
|
|
|
|
Ciphers = null;
|
|
|
|
KexAlgorithms = null;
|
|
|
|
Macs = null;
|
2024-04-28 12:50:45 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
|
|
snakeOilEd25519PublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2024-04-21 13:51:02 +01:00
|
|
|
server-no-pam =
|
|
|
|
{ pkgs, ... }:
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true;
|
2024-05-04 14:02:53 +01:00
|
|
|
package = pkgs.opensshPackages.openssh.override {
|
|
|
|
withPAM = false;
|
|
|
|
};
|
2024-04-21 13:51:02 +01:00
|
|
|
settings = {
|
|
|
|
UsePAM = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2011-09-14 19:20:50 +01:00
|
|
|
client =
|
2024-01-03 18:36:51 +00:00
|
|
|
{ ... }: {
|
|
|
|
virtualisation.vlans = [ 1 2 ];
|
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2010-03-18 13:07:56 +00:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2011-01-12 17:36:15 +00:00
|
|
|
testScript = ''
|
2019-11-04 23:33:17 +00:00
|
|
|
start_all()
|
|
|
|
|
2023-10-09 19:54:14 +01:00
|
|
|
server.wait_for_unit("sshd", timeout=30)
|
2024-04-23 13:31:51 +01:00
|
|
|
server_allowed_users.wait_for_unit("sshd", timeout=30)
|
2023-10-09 19:54:14 +01:00
|
|
|
server_localhost_only.wait_for_unit("sshd", timeout=30)
|
|
|
|
server_match_rule.wait_for_unit("sshd", timeout=30)
|
2024-04-28 12:50:45 +01:00
|
|
|
server_no_openssl.wait_for_unit("sshd", timeout=30)
|
2024-04-21 13:51:02 +01:00
|
|
|
server_no_pam.wait_for_unit("sshd", timeout=30)
|
2023-10-09 19:54:14 +01:00
|
|
|
|
|
|
|
server_lazy.wait_for_unit("sshd.socket", timeout=30)
|
|
|
|
server_localhost_only_lazy.wait_for_unit("sshd.socket", timeout=30)
|
2024-01-03 18:36:51 +00:00
|
|
|
server_lazy_socket.wait_for_unit("sshd.socket", timeout=30)
|
2019-11-04 23:33:17 +00:00
|
|
|
|
|
|
|
with subtest("manual-authkey"):
|
|
|
|
client.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
client.succeed(
|
|
|
|
'${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f /root/.ssh/id_ed25519 -N ""'
|
|
|
|
)
|
|
|
|
public_key = client.succeed(
|
|
|
|
"${pkgs.openssh}/bin/ssh-keygen -y -f /root/.ssh/id_ed25519"
|
|
|
|
)
|
|
|
|
public_key = public_key.strip()
|
|
|
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
|
|
|
|
|
|
|
server.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
server.succeed("echo '{}' > /root/.ssh/authorized_keys".format(public_key))
|
|
|
|
server_lazy.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
server_lazy.succeed("echo '{}' > /root/.ssh/authorized_keys".format(public_key))
|
|
|
|
|
|
|
|
client.wait_for_unit("network.target")
|
|
|
|
client.succeed(
|
2022-05-04 05:58:52 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2",
|
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
client.succeed(
|
2022-05-04 05:58:52 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024",
|
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
client.succeed(
|
2023-10-24 13:24:10 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server-lazy 'echo hello world' >&2",
|
2022-05-04 05:58:52 +01:00
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
client.succeed(
|
2023-10-24 13:24:10 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server-lazy 'ulimit -l' | grep 1024",
|
2022-05-04 05:58:52 +01:00
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
|
2024-01-03 18:36:51 +00:00
|
|
|
with subtest("socket activation on a non-standard port"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
2024-04-23 13:31:51 +01:00
|
|
|
# The final segment in this IP is allocated according to the alphabetical order of machines in this test.
|
2024-01-03 18:36:51 +00:00
|
|
|
client.succeed(
|
2024-04-23 13:31:51 +01:00
|
|
|
"ssh -p 2222 -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil root@192.168.2.5 true",
|
2024-01-03 18:36:51 +00:00
|
|
|
timeout=30
|
|
|
|
)
|
|
|
|
|
2019-11-04 23:33:17 +00:00
|
|
|
with subtest("configured-authkey"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
|
|
client.succeed(
|
2022-05-04 05:58:52 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server true",
|
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
client.succeed(
|
2023-10-24 13:24:10 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server-lazy true",
|
2022-05-04 05:58:52 +01:00
|
|
|
timeout=30
|
2019-11-04 23:33:17 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
with subtest("localhost-only"):
|
|
|
|
server_localhost_only.succeed("ss -nlt | grep '127.0.0.1:22'")
|
|
|
|
server_localhost_only_lazy.succeed("ss -nlt | grep '127.0.0.1:22'")
|
2023-09-19 12:05:59 +01:00
|
|
|
|
|
|
|
with subtest("match-rules"):
|
|
|
|
server_match_rule.succeed("ss -nlt | grep '127.0.0.1:22'")
|
2023-10-08 22:23:51 +01:00
|
|
|
|
|
|
|
with subtest("allowed-users"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
|
|
client.succeed(
|
2024-04-23 13:31:51 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil alice@server-allowed-users true",
|
2023-10-08 22:23:51 +01:00
|
|
|
timeout=30
|
|
|
|
)
|
|
|
|
client.succeed(
|
2024-04-23 13:31:51 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil bob@server-allowed-users true",
|
2023-10-08 22:23:51 +01:00
|
|
|
timeout=30
|
|
|
|
)
|
|
|
|
client.fail(
|
2024-04-23 13:31:51 +01:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil carol@server-allowed-users true",
|
2023-10-08 22:23:51 +01:00
|
|
|
timeout=30
|
|
|
|
)
|
2024-04-21 13:51:02 +01:00
|
|
|
|
2024-04-28 12:50:45 +01:00
|
|
|
with subtest("no-openssl"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilEd25519PrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
|
|
client.succeed(
|
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server-no-openssl true",
|
|
|
|
timeout=30
|
|
|
|
)
|
|
|
|
|
2024-04-21 13:51:02 +01:00
|
|
|
with subtest("no-pam"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
|
|
client.succeed(
|
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server-no-pam true",
|
|
|
|
timeout=30
|
|
|
|
)
|
2010-03-18 13:07:56 +00:00
|
|
|
'';
|
2014-04-14 13:02:44 +01:00
|
|
|
})
|