mirror of
https://gitlab.redox-os.org/CoffeeCode/redox-ssh.git
synced 2025-12-28 15:02:18 +01:00
485 lines
15 KiB
Rust
485 lines
15 KiB
Rust
use std::collections::VecDeque;
|
|
use std::io::{self, BufReader, Read, Write};
|
|
use std::net::TcpStream;
|
|
use std::sync::Arc;
|
|
|
|
use encryption::{AesCtr, Decryptor, Encryption};
|
|
use error::{ConnectionError, ConnectionResult as Result};
|
|
use key_exchange::{KexResult, KeyExchange};
|
|
use mac::{Hmac, MacAlgorithm};
|
|
use message::MessageType;
|
|
use packet::{Packet, ReadPacketExt, WritePacketExt};
|
|
use server::ServerConfig;
|
|
|
|
#[derive(PartialEq)]
|
|
enum ConnectionState {
|
|
Initial,
|
|
KeyExchange,
|
|
Established,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
pub enum ConnectionType {
|
|
Server(Arc<ServerConfig>),
|
|
}
|
|
|
|
#[derive(Default, Debug)]
|
|
pub struct HashData {
|
|
pub client_id: Option<String>,
|
|
pub server_id: Option<String>,
|
|
pub client_kexinit: Option<Vec<u8>>,
|
|
pub server_kexinit: Option<Vec<u8>>,
|
|
}
|
|
|
|
pub struct Connection {
|
|
pub conn_type: ConnectionType,
|
|
pub hash_data: HashData,
|
|
state: ConnectionState,
|
|
key_exchange: Option<Box<KeyExchange>>,
|
|
session_id: Option<Vec<u8>>,
|
|
encryption: Option<(Box<Encryption>, Box<Encryption>)>,
|
|
mac: Option<(Box<MacAlgorithm>, Box<MacAlgorithm>)>,
|
|
seq: (u32, u32),
|
|
tx_queue: VecDeque<Packet>,
|
|
}
|
|
|
|
impl<'a> Connection {
|
|
pub fn new(conn_type: ConnectionType) -> Connection {
|
|
Connection {
|
|
conn_type: conn_type,
|
|
hash_data: HashData::default(),
|
|
state: ConnectionState::Initial,
|
|
key_exchange: None,
|
|
session_id: None,
|
|
encryption: None,
|
|
mac: None,
|
|
seq: (0, 0),
|
|
tx_queue: VecDeque::new(),
|
|
}
|
|
}
|
|
|
|
pub fn run(&mut self, mut stream: TcpStream) -> Result<()> {
|
|
self.send_id(&mut stream)?;
|
|
self.read_id(&stream)?;
|
|
|
|
let mut reader = BufReader::new(&stream);
|
|
|
|
loop {
|
|
let packet = self.recv(&mut reader)?;
|
|
let response = self.process(packet)?;
|
|
|
|
let mut stream = reader.get_mut();
|
|
|
|
if let Some(packet) = response {
|
|
self.send(&mut stream, packet)?;
|
|
}
|
|
|
|
// Send additional packets from the queue
|
|
let mut packets: Vec<Packet> = self.tx_queue.drain(..).collect();
|
|
for packet in packets.drain(..) {
|
|
self.send(&mut stream, packet)?;
|
|
}
|
|
}
|
|
}
|
|
|
|
fn recv(&mut self, mut stream: &mut Read) -> Result<Packet> {
|
|
let packet = if let Some((ref mut c2s, _)) = self.encryption {
|
|
let mut decryptor = Decryptor::new(&mut **c2s, &mut stream);
|
|
Packet::read_from(&mut decryptor)?
|
|
}
|
|
else {
|
|
Packet::read_from(&mut stream)?
|
|
};
|
|
|
|
if let Some((ref mut mac, _)) = self.mac {
|
|
let mut sig = vec![0; mac.size()];
|
|
stream.read_exact(&mut sig)?;
|
|
|
|
let mut sig_cmp = vec![0; mac.size()];
|
|
mac.sign(packet.data(), self.seq.0, sig_cmp.as_mut_slice());
|
|
|
|
if sig != sig_cmp {
|
|
return Err(ConnectionError::IntegrityError);
|
|
}
|
|
}
|
|
|
|
trace!("Packet {} received: {:?}", self.seq.0, packet);
|
|
|
|
// Count up the received packet sequence number
|
|
self.seq.0 = self.seq.0.wrapping_add(1);
|
|
|
|
Ok(packet)
|
|
}
|
|
|
|
fn send(&mut self, mut stream: &mut Write, packet: Packet)
|
|
-> io::Result<()> {
|
|
trace!("Sending packet {}: {:?}", self.seq.1, packet);
|
|
|
|
let packet = packet.to_raw()?;
|
|
|
|
if let Some((_, ref mut s2c)) = self.encryption {
|
|
let mut encrypted = vec![0; packet.data().len()];
|
|
s2c.encrypt(packet.data(), encrypted.as_mut_slice());
|
|
|
|
// Sending encrypted packet
|
|
stream.write_all(encrypted.as_slice())?;
|
|
}
|
|
else {
|
|
packet.write_to(&mut stream)?;
|
|
}
|
|
|
|
if let Some((_, ref mut mac)) = self.mac {
|
|
let mut sig = vec![0; mac.size()];
|
|
mac.sign(packet.data(), self.seq.1, sig.as_mut_slice());
|
|
stream.write_all(sig.as_slice())?;
|
|
}
|
|
|
|
self.seq.1 = self.seq.1.wrapping_add(1);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn send_id(&mut self, stream: &mut TcpStream) -> io::Result<()> {
|
|
let id = format!("SSH-2.0-RedoxSSH_{}", env!("CARGO_PKG_VERSION"));
|
|
info!("Identifying as {:?}", id);
|
|
|
|
stream.write(id.as_bytes())?;
|
|
stream.write(b"\r\n")?;
|
|
stream.flush()?;
|
|
|
|
self.hash_data.server_id = Some(id);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn read_id(&mut self, stream: &TcpStream) -> io::Result<()> {
|
|
use std::ascii::AsciiExt;
|
|
|
|
let mut id = String::new();
|
|
|
|
for byte in stream.take(255).bytes() {
|
|
match byte
|
|
{
|
|
Ok(b'\n') => break,
|
|
Ok(b) if b.is_ascii() => id.push(b as char),
|
|
Ok(_) => {}
|
|
Err(_) => break,
|
|
}
|
|
}
|
|
|
|
let id = id.trim().to_owned();
|
|
|
|
if id.starts_with("SSH-") {
|
|
info!("Peer identifies as {:?}", id);
|
|
self.hash_data.client_id = Some(id);
|
|
Ok(())
|
|
}
|
|
else {
|
|
Err(io::Error::new(io::ErrorKind::InvalidData, "invalid id"))
|
|
}
|
|
}
|
|
|
|
fn generate_key(&mut self, id: &[u8], len: usize) -> Result<Vec<u8>> {
|
|
use self::ConnectionError::KeyGenerationError;
|
|
|
|
let kex = self.key_exchange.take().ok_or(KeyGenerationError)?;
|
|
|
|
let key = kex.hash(
|
|
&[
|
|
kex.shared_secret().ok_or(KeyGenerationError)?,
|
|
kex.exchange_hash().ok_or(KeyGenerationError)?,
|
|
id,
|
|
self.session_id
|
|
.as_ref()
|
|
.ok_or(KeyGenerationError)?
|
|
.as_slice(),
|
|
],
|
|
);
|
|
|
|
self.key_exchange = Some(kex);
|
|
|
|
Ok(key)
|
|
}
|
|
|
|
pub fn process(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
match packet.msg_type()
|
|
{
|
|
MessageType::KexInit => self.kex_init(packet),
|
|
MessageType::NewKeys => self.new_keys(packet),
|
|
MessageType::ServiceRequest => self.service_request(packet),
|
|
MessageType::UserAuthRequest => self.user_auth_request(packet),
|
|
MessageType::ChannelOpen => self.channel_open(packet),
|
|
MessageType::ChannelRequest => self.channel_request(packet),
|
|
MessageType::ChannelData => self.channel_data(packet),
|
|
MessageType::KeyExchange(_) => self.key_exchange(packet),
|
|
_ => {
|
|
error!("Unhandled packet: {:?}", packet);
|
|
Err(ConnectionError::ProtocolError)
|
|
}
|
|
}
|
|
}
|
|
|
|
fn new_keys(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
debug!("Switching to new keys");
|
|
|
|
let iv_c2s = self.generate_key(b"A", 256)?;
|
|
let iv_s2c = self.generate_key(b"B", 256)?;
|
|
let enc_c2s = self.generate_key(b"C", 256)?;
|
|
let enc_s2c = self.generate_key(b"D", 256)?;
|
|
let mac_c2s = self.generate_key(b"E", 256)?;
|
|
let mac_s2c = self.generate_key(b"F", 256)?;
|
|
|
|
self.encryption =
|
|
Some((
|
|
Box::new(AesCtr::new(enc_c2s.as_slice(), iv_c2s.as_slice())),
|
|
Box::new(AesCtr::new(enc_s2c.as_slice(), iv_s2c.as_slice())),
|
|
));
|
|
|
|
self.mac = Some((
|
|
Box::new(Hmac::new(mac_c2s.as_slice())),
|
|
Box::new(Hmac::new(mac_s2c.as_slice())),
|
|
));
|
|
|
|
Ok(None)
|
|
}
|
|
|
|
fn service_request(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut reader = packet.reader();
|
|
let name = reader.read_string()?;
|
|
|
|
trace!("{:?}", ::std::str::from_utf8(&name.as_slice()).unwrap());
|
|
|
|
let mut res = Packet::new(MessageType::ServiceAccept);
|
|
res.with_writer(&|w| {
|
|
w.write_bytes(name.as_slice())?;
|
|
Ok(())
|
|
})?;
|
|
|
|
Ok(Some(res))
|
|
}
|
|
|
|
fn user_auth_request(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut reader = packet.reader();
|
|
let name = reader.read_utf8()?;
|
|
let service = reader.read_utf8()?;
|
|
let method = reader.read_utf8()?;
|
|
|
|
let success = if method == "password" {
|
|
assert!(reader.read_bool()? == false);
|
|
let pass = reader.read_utf8()?;
|
|
pass == "hunter2"
|
|
}
|
|
else {
|
|
false
|
|
};
|
|
|
|
debug!("User Auth {:?}, {:?}, {:?}", name, service, method);
|
|
|
|
if success {
|
|
Ok(Some(Packet::new(MessageType::UserAuthSuccess)))
|
|
}
|
|
else {
|
|
let mut res = Packet::new(MessageType::UserAuthFailure);
|
|
res.with_writer(&|w| {
|
|
w.write_string("password")?;
|
|
w.write_bool(false)?;
|
|
Ok(())
|
|
})?;
|
|
Ok(Some(res))
|
|
}
|
|
}
|
|
|
|
fn channel_open(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut reader = packet.reader();
|
|
let channel_type = reader.read_utf8()?;
|
|
let sender_channel = reader.read_uint32()?;
|
|
let window_size = reader.read_uint32()?;
|
|
let max_packet_size = reader.read_uint32()?;
|
|
|
|
let mut res = Packet::new(MessageType::ChannelOpenConfirmation);
|
|
res.with_writer(&|w| {
|
|
w.write_uint32(sender_channel)?;
|
|
w.write_uint32(0)?;
|
|
w.write_uint32(window_size)?;
|
|
w.write_uint32(max_packet_size)?;
|
|
Ok(())
|
|
})?;
|
|
|
|
debug!(
|
|
"Channel Open {:?}, {:?}, {:?}, {:?}",
|
|
channel_type,
|
|
sender_channel,
|
|
window_size,
|
|
max_packet_size
|
|
);
|
|
|
|
Ok(Some(res))
|
|
}
|
|
|
|
fn channel_request(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut reader = packet.reader();
|
|
let channel = reader.read_uint32()?;
|
|
let request = reader.read_utf8()?;
|
|
let want_reply = reader.read_bool()?;
|
|
|
|
debug!(
|
|
"Channel Request {:?}, {:?}, {:?}",
|
|
channel,
|
|
request,
|
|
want_reply
|
|
);
|
|
|
|
if request == "pty-req" {
|
|
let term = reader.read_utf8()?;
|
|
let char_width = reader.read_uint32()?;
|
|
let row_height = reader.read_uint32()?;
|
|
let pixel_width = reader.read_uint32()?;
|
|
let pixel_height = reader.read_uint32()?;
|
|
let modes = reader.read_string()?;
|
|
|
|
debug!(
|
|
"PTY request: {:?} {:?} {:?} {:?} {:?} {:?}",
|
|
term,
|
|
char_width,
|
|
row_height,
|
|
pixel_width,
|
|
pixel_height,
|
|
modes
|
|
);
|
|
}
|
|
|
|
if request == "shell" {
|
|
debug!("Shell request");
|
|
}
|
|
|
|
if want_reply {
|
|
let mut res = Packet::new(MessageType::ChannelSuccess);
|
|
res.with_writer(&|w| w.write_uint32(0))?;
|
|
Ok(Some(res))
|
|
}
|
|
else {
|
|
Ok(None)
|
|
}
|
|
}
|
|
|
|
fn channel_data(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut reader = packet.reader();
|
|
let channel = reader.read_uint32()?;
|
|
let data = reader.read_string()?;
|
|
|
|
let mut res = Packet::new(MessageType::ChannelData);
|
|
res.with_writer(&|w| {
|
|
w.write_uint32(0)?;
|
|
w.write_bytes(data.as_slice())?;
|
|
Ok(())
|
|
})?;
|
|
|
|
debug!(
|
|
"Channel {} Data ({} bytes): {:?}",
|
|
channel,
|
|
data.len(),
|
|
data
|
|
);
|
|
|
|
Ok(Some(res))
|
|
}
|
|
|
|
fn kex_init(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
use algorithm::*;
|
|
|
|
let (kex_algo, srv_host_key_algo, enc_algo, mac_algo, comp_algo) = {
|
|
let mut reader = packet.reader();
|
|
let _ = reader.read_bytes(16)?; // Cookie. Throw it away.
|
|
|
|
let kex_algos = reader.read_enum_list::<KeyExchangeAlgorithm>()?;
|
|
let srv_host_key_algos =
|
|
reader.read_enum_list::<PublicKeyAlgorithm>()?;
|
|
|
|
let enc_algos_c2s = reader.read_enum_list::<EncryptionAlgorithm>()?;
|
|
let enc_algos_s2c = reader.read_enum_list::<EncryptionAlgorithm>()?;
|
|
|
|
let mac_algos_c2s = reader.read_enum_list::<MacAlgorithm>()?;
|
|
let mac_algos_s2c = reader.read_enum_list::<MacAlgorithm>()?;
|
|
|
|
let comp_algos_c2s = reader
|
|
.read_enum_list::<CompressionAlgorithm>()?;
|
|
let comp_algos_s2c = reader
|
|
.read_enum_list::<CompressionAlgorithm>()?;
|
|
|
|
(
|
|
negotiate(KEY_EXCHANGE, kex_algos.as_slice())?,
|
|
negotiate(HOST_KEY, srv_host_key_algos.as_slice())?,
|
|
negotiate(ENCRYPTION, enc_algos_s2c.as_slice())?,
|
|
negotiate(MAC, mac_algos_s2c.as_slice())?,
|
|
negotiate(COMPRESSION, comp_algos_s2c.as_slice())?,
|
|
)
|
|
};
|
|
|
|
debug!("Negotiated Kex Algorithm: {:?}", kex_algo);
|
|
debug!("Negotiated Host Key Algorithm: {:?}", srv_host_key_algo);
|
|
debug!("Negotiated Encryption Algorithm: {:?}", enc_algo);
|
|
debug!("Negotiated Mac Algorithm: {:?}", mac_algo);
|
|
debug!("Negotiated Comp Algorithm: {:?}", comp_algo);
|
|
|
|
// Save payload for hash generation
|
|
self.hash_data.client_kexinit = Some(packet.payload());
|
|
|
|
// Create a random 16 byte cookie
|
|
use rand::{self, Rng};
|
|
let mut rng = rand::thread_rng();
|
|
let cookie: Vec<u8> = rng.gen_iter::<u8>().take(16).collect();
|
|
|
|
let mut packet = Packet::new(MessageType::KexInit);
|
|
packet.with_writer(&|w| {
|
|
w.write_raw_bytes(cookie.as_slice())?;
|
|
w.write_list(KEY_EXCHANGE)?;
|
|
w.write_list(HOST_KEY)?;
|
|
w.write_list(ENCRYPTION)?;
|
|
w.write_list(ENCRYPTION)?;
|
|
w.write_list(MAC)?;
|
|
w.write_list(MAC)?;
|
|
w.write_list(COMPRESSION)?;
|
|
w.write_list(COMPRESSION)?;
|
|
w.write_string("")?;
|
|
w.write_string("")?;
|
|
w.write_bool(false)?;
|
|
w.write_uint32(0)?;
|
|
Ok(())
|
|
})?;
|
|
|
|
self.state = ConnectionState::KeyExchange;
|
|
self.key_exchange = kex_algo.instance();
|
|
|
|
// Save payload for hash generation
|
|
self.hash_data.server_kexinit = Some(packet.data().to_vec());
|
|
|
|
Ok(Some(packet))
|
|
}
|
|
|
|
fn key_exchange(&mut self, packet: Packet) -> Result<Option<Packet>> {
|
|
let mut kex = self.key_exchange.take().ok_or(
|
|
ConnectionError::KeyExchangeError,
|
|
)?;
|
|
|
|
let result = match kex.process(self, packet)
|
|
{
|
|
KexResult::Done(packet) => {
|
|
self.state = ConnectionState::Established;
|
|
|
|
if self.session_id.is_none() {
|
|
self.session_id = kex.exchange_hash().map(|h| h.to_vec());
|
|
}
|
|
|
|
self.tx_queue.push_back(Packet::new(MessageType::NewKeys));
|
|
|
|
Ok(Some(packet))
|
|
}
|
|
KexResult::Ok(packet) => Ok(Some(packet)),
|
|
KexResult::Error => Err(ConnectionError::KeyExchangeError),
|
|
};
|
|
|
|
|
|
self.key_exchange = Some(kex);
|
|
result
|
|
}
|
|
}
|