wok view dropbear/stuff/sshx @ rev 19839

dropbear/sshx: allow localhost connection
author Pascal Bellard <pascal.bellard@slitaz.org>
date Sun Mar 12 10:07:24 2017 +0100 (2017-03-12)
parents 035492d51952
children 2c28bb804604
line source
1 #!/bin/sh
3 xdbclient()
4 {
5 read host data
6 svr=${DISPLAY#*:}
7 n=$((10+($RANDOM % 90))); dpy=localhost:$n
8 scr=${DISPLAY/${DISPLAY%.*}/$dpy}
9 r=""
10 while true; do
11 a="$1"
12 r="$r $1"; shift
13 case "$a" in
14 -[piIlLRWKBJ]) r="$r $1"; shift;;
15 -*) ;;
16 *) break ;;
17 esac
18 done
19 xhost +localhost > /dev/null 2>&1
20 [ -n "$1" ] || set -- "${TERM:-xterm} -ls || ${TERM:-sakura} -l || xterm -ls"
21 exec dbclient -y -f -R $((6000+$n)):localhost:$((6000+${svr%.*})) $r \
22 "xauth add $dpy $data; export DISPLAY=$scr; $@ ; xauth remove $dpy" \
23 </dev/null >/dev/null
24 }
26 pppssh()
27 {
28 ssh="dbclient -y"
29 $ssh $1 true || {
30 [ -z "$DROPBEAR_PASSWORD" ] && echo -n "ssh password: " &&
31 read -s -t 30 DROPBEAR_PASSWORD && export DROPBEAR_PASSWORD
32 $ssh $1 true || exit 1
33 }
34 extra="$(route -n | awk -vd=$(nslookup ${1#*@} | sed '/::/d' | \
35 sed '$!d;s/.*: \([^ ]*\).*/\1/') \
36 '$1=="0.0.0.0"{ print d " gw " $2 " dev " $8 }')"
37 for i in ${4/default/128.0.0.0/1 0.0.0.0/1} ; do
38 echo "route add -net $i dev \$1"
39 done > /etc/ppp/ip-up.d/pppssh$$
40 [ "$4" ] && echo "route add $extra" >> /etc/ppp/ip-up.d/pppssh$$
41 chmod +x /etc/ppp/ip-up.d/pppssh$$
42 n=10.$(($$%256)).$(($$/256))
43 n="${2:-$n.1:$n.2} passive"
44 ppp="/usr/sbin/pppd local noauth nodetach"
45 arg="$n pty '$ssh $1 $ppp ${3:-proxyarp} notty'"
46 pppsvr="$ppp $n ${3:-proxyarp} notty >/dev/null"
47 sshcmd="nc -ulp $5 -e $pppsvr"
48 udpcmd="nc -u ${1#*@} $5"
49 [ "$6" == "test" ] && sshcmd="nc -ulp $5 -e nc localhost 22" &&
50 udpcmd="dbclient -J \"nc -u ${1#*@} $5\" ${1%@*}@localhost $pppsvr"
51 [ -n "$5" ] && arg="noipdefault pty '$udpcmd'" && $ssh -f $1 "$sshcmd"
52 eval $ppp $arg ipparam pppssh$$
53 [ "$4" ] && route del $extra
54 rm -f /etc/ppp/ip-up.d/pppssh$$ 2> /dev/null
55 }
57 xfbvnc()
58 {
59 p=5900
60 while netstat -tln | grep -q ":$p " ; do p=$(($p+1)); done
61 [ -r /dev/input/mice ] || echo "Warning: Cannot read mouse input." 1>&2
62 svr=${1#*/}; [ "$svr" == "$1" ] && svr=127.0.0.1
63 dbclient -f -N -L $p:$svr:${2:-5900} ${1%/*}
64 fbvnc 127.0.0.1 $p
65 kill $(netstat -tlnp 2> /dev/null | \
66 sed "/:$p /!d;s|.* \\([0-9]*\\)/[^ ]*|\\1|")
67 }
69 case "$(basename $0)" in
70 *vnc) [ -z "$1" ] && cat <<EOT || xfbvnc "$@" ;;
71 Usage: $0 '[sshargs] user@remote[/lanip]' [vncport]
72 $(fbvnc --help 2>&1 | sed '1,/Usage:/d')
73 EOT
74 ppp*) [ -z "$1" ] && cat <<EOT || pppssh "$@" ;;
75 Usage: $0 '[sshargs] user@remote' '[localip:remoteip] [localpppargs]' 'remotepppargs' 'routes' [udp-port]
76 Example: $0 tux@slitaz.org '' '' '192.168.1.0/24 10.1.2.0/24'
77 EOT
78 *) [ -z "$DISPLAY" ] && exec dbclient "$@"
79 xauth list $DISPLAY | xdbclient "$@"
80 esac