mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
* [ptxdist] [PATCH 0/1] openssh/rc-once: iterate over configured hostkeys
@ 2020-08-21 11:29 Christian Hermann
  2020-08-21 11:29 ` [ptxdist] [PATCH 1/1] " Christian Hermann
  0 siblings, 1 reply; 3+ messages in thread
From: Christian Hermann @ 2020-08-21 11:29 UTC (permalink / raw)
  To: ptxdist

As requested by Michael Olbrich, this is a cleaned subset of the
previous RFC patch.

Christian Hermann (1):
  openssh/rc-once: iterate over configured hostkeys

 projectroot/etc/rc.once.d/openssh | 50 +++++++++++++------------------
 1 file changed, 20 insertions(+), 30 deletions(-)

-- 
2.28.0


_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
To unsubscribe, send a mail with subject "unsubscribe" to ptxdist-request@pengutronix.de

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [ptxdist] [PATCH 1/1] openssh/rc-once: iterate over configured hostkeys
  2020-08-21 11:29 [ptxdist] [PATCH 0/1] openssh/rc-once: iterate over configured hostkeys Christian Hermann
@ 2020-08-21 11:29 ` Christian Hermann
  2020-10-06  8:18   ` [ptxdist] [APPLIED] " Michael Olbrich
  0 siblings, 1 reply; 3+ messages in thread
From: Christian Hermann @ 2020-08-21 11:29 UTC (permalink / raw)
  To: ptxdist

...instead of relying on a hardcoded list of keytypes.

Some cleanup was performed as well:
* merge key gathering functions
* absence of sshd_config was tested but properly progagated and
therefore not properly handled.

Tested with sed implementations of busybox-1.31.1, toybox-0.8.3 and GNU.

Signed-off-by: Christian Hermann <christian.hermann@hytera.de>
---
 projectroot/etc/rc.once.d/openssh | 50 +++++++++++++------------------
 1 file changed, 20 insertions(+), 30 deletions(-)

diff --git a/projectroot/etc/rc.once.d/openssh b/projectroot/etc/rc.once.d/openssh
index fe8b00691..7535aa4ba 100644
--- a/projectroot/etc/rc.once.d/openssh
+++ b/projectroot/etc/rc.once.d/openssh
@@ -3,43 +3,33 @@
 PATH=/sbin:/bin:/usr/sbin:/usr/bin
 
 get_hostkeys() {
-	[ -f /etc/ssh/sshd_config ] || return
-	sed -n 's/^HostKey[ \t][ \t]*\(.*\)/\1/p' /etc/ssh/sshd_config
-}
-
-host_keys_required() {
-	hostkeys="$(get_hostkeys)"
-	if [ "$hostkeys" ]; then
-		echo "$hostkeys"
-	else
-		# No HostKey directives found, so we pick secure defaults
-		echo /etc/ssh/ssh_host_ed25519_key
-	fi
+	hostkeys="$(sed -E -n -e 's/^HostKey[[:space:]]+(.*)/\1/p' /etc/ssh/sshd_config)" || return
+	# pick secure defaults if no HostKey directives are found
+	: "${hostkeys:=/etc/ssh/ssh_host_ed25519_key}"
+	echo "$hostkeys"
 }
 
 create_key() {
-	keytype="$1"
-	shift
-	hostkeys="$1"
-	shift
-
-	file="/etc/ssh/ssh_host_${keytype}_key"
-
-	if echo "$hostkeys" | grep -x -F "$file" >/dev/null; then
-		echo "Create $keytype key; this may take some time ..."
-		rm -f $file &&
-		ssh-keygen -q -f "$file" -N '' -t "$keytype" "$@" || return
-		echo "Created $keytype key."
-	fi
+	keyfile="$1"
+	keytype="$(echo "$keyfile" | sed -E -e 's/.*ssh_host_(.*)_key$/\1/')"
+
+	keygen_args=
+	case "$keytype" in
+		rsa) keygen_args="-b 4096" ;;
+	esac
+
+	echo "Create $keytype key; this may take some time ..."
+	rm -f "$keyfile" &&
+	ssh-keygen -q -f "$keyfile" -N '' -t "$keytype" $keygen_args || return
+	echo "Created $keytype key."
 }
 
 create_keys() {
-	hostkeys="$(host_keys_required)"
+	hostkeys="$(get_hostkeys)" || return
 
-	create_key "dsa" "$hostkeys" &&
-	create_key "ecdsa" "$hostkeys" &&
-	create_key "ed25519" "$hostkeys" &&
-	create_key "rsa" "$hostkeys" -b 4096
+	for keyfile in $hostkeys; do
+		create_key "$keyfile" || return
+	done
 }
 
 if ! create_keys; then
-- 
2.28.0


_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
To unsubscribe, send a mail with subject "unsubscribe" to ptxdist-request@pengutronix.de

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [ptxdist] [APPLIED] openssh/rc-once: iterate over configured hostkeys
  2020-08-21 11:29 ` [ptxdist] [PATCH 1/1] " Christian Hermann
@ 2020-10-06  8:18   ` Michael Olbrich
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Olbrich @ 2020-10-06  8:18 UTC (permalink / raw)
  To: ptxdist; +Cc: Christian Hermann

Thanks, applied as cf2b6aa24e21431186e255312b7c4f6691ad367a.

Michael

[sent from post-receive hook]

On Tue, 06 Oct 2020 10:18:20 +0200, Christian Hermann <christian.hermann@hytera.de> wrote:
> ...instead of relying on a hardcoded list of keytypes.
> 
> Some cleanup was performed as well:
> * merge key gathering functions
> * absence of sshd_config was tested but properly progagated and
> therefore not properly handled.
> 
> Tested with sed implementations of busybox-1.31.1, toybox-0.8.3 and GNU.
> 
> Signed-off-by: Christian Hermann <christian.hermann@hytera.de>
> Message-Id: <20200821112902.17281-2-christian.hermann@hytera.de>
> Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
> 
> diff --git a/projectroot/etc/rc.once.d/openssh b/projectroot/etc/rc.once.d/openssh
> index fe8b00691122..545586f07629 100644
> --- a/projectroot/etc/rc.once.d/openssh
> +++ b/projectroot/etc/rc.once.d/openssh
> @@ -3,43 +3,32 @@
>  PATH=/sbin:/bin:/usr/sbin:/usr/bin
>  
>  get_hostkeys() {
> -	[ -f /etc/ssh/sshd_config ] || return
> -	sed -n 's/^HostKey[ \t][ \t]*\(.*\)/\1/p' /etc/ssh/sshd_config
> -}
> -
> -host_keys_required() {
> -	hostkeys="$(get_hostkeys)"
> -	if [ "$hostkeys" ]; then
> -		echo "$hostkeys"
> -	else
> -		# No HostKey directives found, so we pick secure defaults
> -		echo /etc/ssh/ssh_host_ed25519_key
> -	fi
> +	hostkeys="$(sed -E -n -e 's/^HostKey[[:space:]]+(.*)/\1/p' /etc/ssh/sshd_config)" || return
> +	# pick secure defaults if no HostKey directives are found
> +	echo "${hostkeys:-/etc/ssh/ssh_host_ed25519_key}"
>  }
>  
>  create_key() {
> -	keytype="$1"
> -	shift
> -	hostkeys="$1"
> -	shift
> -
> -	file="/etc/ssh/ssh_host_${keytype}_key"
> -
> -	if echo "$hostkeys" | grep -x -F "$file" >/dev/null; then
> -		echo "Create $keytype key; this may take some time ..."
> -		rm -f $file &&
> -		ssh-keygen -q -f "$file" -N '' -t "$keytype" "$@" || return
> -		echo "Created $keytype key."
> -	fi
> +	keyfile="$1"
> +	keytype="$(echo "$keyfile" | sed -E -e 's/.*ssh_host_(.*)_key$/\1/')"
> +
> +	keygen_args=
> +	case "$keytype" in
> +		rsa) keygen_args="-b 4096" ;;
> +	esac
> +
> +	echo "Create $keytype key; this may take some time ..."
> +	rm -f "$keyfile" &&
> +	ssh-keygen -q -f "$keyfile" -N '' -t "$keytype" $keygen_args || return
> +	echo "Created $keytype key."
>  }
>  
>  create_keys() {
> -	hostkeys="$(host_keys_required)"
> +	hostkeys="$(get_hostkeys)" || return
>  
> -	create_key "dsa" "$hostkeys" &&
> -	create_key "ecdsa" "$hostkeys" &&
> -	create_key "ed25519" "$hostkeys" &&
> -	create_key "rsa" "$hostkeys" -b 4096
> +	for keyfile in $hostkeys; do
> +		create_key "$keyfile" || return
> +	done
>  }
>  
>  if ! create_keys; then

_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
To unsubscribe, send a mail with subject "unsubscribe" to ptxdist-request@pengutronix.de

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-10-06  8:18 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-08-21 11:29 [ptxdist] [PATCH 0/1] openssh/rc-once: iterate over configured hostkeys Christian Hermann
2020-08-21 11:29 ` [ptxdist] [PATCH 1/1] " Christian Hermann
2020-10-06  8:18   ` [ptxdist] [APPLIED] " Michael Olbrich

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox