2024-09-22 20:56:21 +08:00
|
|
|
/* $OpenBSD: monitor.c,v 1.245 2024/09/22 12:56:21 jsg Exp $ */
|
2002-03-22 10:30:41 +08:00
|
|
|
/*
|
|
|
|
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
|
|
|
|
* Copyright 2002 Markus Friedl <markus@openbsd.org>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
2006-03-15 08:29:24 +08:00
|
|
|
|
|
|
|
#include <sys/types.h>
|
2006-07-10 19:08:03 +08:00
|
|
|
#include <sys/socket.h>
|
2006-03-15 08:29:24 +08:00
|
|
|
#include <sys/wait.h>
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2006-07-12 20:22:46 +08:00
|
|
|
#include <errno.h>
|
2006-07-10 19:13:46 +08:00
|
|
|
#include <fcntl.h>
|
2016-05-02 16:49:03 +08:00
|
|
|
#include <limits.h>
|
2006-03-15 11:42:54 +08:00
|
|
|
#ifdef HAVE_PATHS_H
|
2006-03-15 08:16:59 +08:00
|
|
|
#include <paths.h>
|
2006-03-15 11:42:54 +08:00
|
|
|
#endif
|
2006-07-10 18:53:08 +08:00
|
|
|
#include <pwd.h>
|
2006-03-15 08:52:09 +08:00
|
|
|
#include <signal.h>
|
2015-02-24 06:04:32 +08:00
|
|
|
#ifdef HAVE_STDINT_H
|
2019-10-09 06:06:35 +08:00
|
|
|
# include <stdint.h>
|
2015-02-24 06:04:32 +08:00
|
|
|
#endif
|
2006-08-05 09:34:19 +08:00
|
|
|
#include <stdlib.h>
|
2006-07-24 12:13:33 +08:00
|
|
|
#include <string.h>
|
2014-07-02 13:28:02 +08:00
|
|
|
#include <stdarg.h>
|
|
|
|
#include <stdio.h>
|
2006-09-01 13:48:19 +08:00
|
|
|
#include <unistd.h>
|
2011-06-20 12:42:23 +08:00
|
|
|
#ifdef HAVE_POLL_H
|
|
|
|
#include <poll.h>
|
|
|
|
#else
|
|
|
|
# ifdef HAVE_SYS_POLL_H
|
|
|
|
# include <sys/poll.h>
|
|
|
|
# endif
|
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2014-05-15 12:24:09 +08:00
|
|
|
#ifdef WITH_OPENSSL
|
2006-03-15 08:16:59 +08:00
|
|
|
#include <openssl/dh.h>
|
2014-05-15 12:24:09 +08:00
|
|
|
#endif
|
2006-03-15 08:16:59 +08:00
|
|
|
|
2018-09-13 10:13:50 +08:00
|
|
|
#include "openbsd-compat/sys-tree.h"
|
2008-05-19 13:05:07 +08:00
|
|
|
#include "openbsd-compat/sys-queue.h"
|
2018-09-13 10:13:50 +08:00
|
|
|
#include "openbsd-compat/openssl-compat.h"
|
|
|
|
|
2011-06-20 12:42:23 +08:00
|
|
|
#include "atomicio.h"
|
2006-08-05 10:39:39 +08:00
|
|
|
#include "xmalloc.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "ssh.h"
|
2018-07-12 02:53:29 +08:00
|
|
|
#include "sshkey.h"
|
2018-07-10 05:53:45 +08:00
|
|
|
#include "sshbuf.h"
|
2006-08-05 10:39:39 +08:00
|
|
|
#include "hostfile.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "auth.h"
|
2006-08-05 10:39:39 +08:00
|
|
|
#include "cipher.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "kex.h"
|
|
|
|
#include "dh.h"
|
2016-07-18 07:33:25 +08:00
|
|
|
#include "auth-pam.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "packet.h"
|
|
|
|
#include "auth-options.h"
|
|
|
|
#include "sshpty.h"
|
|
|
|
#include "channels.h"
|
|
|
|
#include "session.h"
|
|
|
|
#include "sshlogin.h"
|
|
|
|
#include "canohost.h"
|
|
|
|
#include "log.h"
|
2014-07-18 12:11:24 +08:00
|
|
|
#include "misc.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "servconf.h"
|
|
|
|
#include "monitor.h"
|
2006-08-05 10:39:39 +08:00
|
|
|
#ifdef GSSAPI
|
|
|
|
#include "ssh-gss.h"
|
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
#include "monitor_wrap.h"
|
|
|
|
#include "monitor_fdpass.h"
|
|
|
|
#include "compat.h"
|
|
|
|
#include "ssh2.h"
|
2013-07-20 11:21:52 +08:00
|
|
|
#include "authfd.h"
|
2015-01-13 15:39:19 +08:00
|
|
|
#include "match.h"
|
2015-01-15 04:05:27 +08:00
|
|
|
#include "ssherr.h"
|
2019-11-25 08:52:46 +08:00
|
|
|
#include "sk-api.h"
|
2024-09-15 09:09:40 +08:00
|
|
|
#include "srclimit.h"
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2003-08-26 09:49:55 +08:00
|
|
|
#ifdef GSSAPI
|
|
|
|
static Gssctxt *gsscontext = NULL;
|
|
|
|
#endif
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
/* Imports */
|
|
|
|
extern ServerOptions options;
|
|
|
|
extern u_int utmp_len;
|
2024-10-14 09:57:50 +08:00
|
|
|
extern struct sshbuf *cfg;
|
2018-07-10 05:26:02 +08:00
|
|
|
extern struct sshbuf *loginmsg;
|
2024-10-14 09:57:50 +08:00
|
|
|
extern struct include_list includes;
|
2018-03-03 11:15:51 +08:00
|
|
|
extern struct sshauthopt *auth_opts; /* XXX move to permanent ssh->authctxt? */
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* State exported from the child */
|
2015-01-20 03:52:16 +08:00
|
|
|
static struct sshbuf *child_state;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2003-06-18 18:25:33 +08:00
|
|
|
/* Functions on the monitor that answer unprivileged requests */
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
int mm_answer_moduli(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_sign(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pwnamallow(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_auth2_read_banner(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_authserv(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_authpassword(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_bsdauthquery(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_bsdauthrespond(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_keyallowed(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_keyverify(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pty(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pty_cleanup(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_term(struct ssh *, int, struct sshbuf *);
|
2024-10-14 09:57:50 +08:00
|
|
|
int mm_answer_state(struct ssh *, int, struct sshbuf *);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2002-04-23 18:28:48 +08:00
|
|
|
#ifdef USE_PAM
|
2019-01-20 05:43:07 +08:00
|
|
|
int mm_answer_pam_start(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pam_account(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pam_init_ctx(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pam_query(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pam_respond(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_pam_free_ctx(struct ssh *, int, struct sshbuf *);
|
2002-04-23 18:28:48 +08:00
|
|
|
#endif
|
|
|
|
|
2003-08-26 09:49:55 +08:00
|
|
|
#ifdef GSSAPI
|
2019-01-20 05:43:07 +08:00
|
|
|
int mm_answer_gss_setup_ctx(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_gss_accept_ctx(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_gss_userok(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_gss_checkmic(struct ssh *, int, struct sshbuf *);
|
2003-08-26 09:49:55 +08:00
|
|
|
#endif
|
2002-09-12 07:47:29 +08:00
|
|
|
|
2005-02-08 18:52:47 +08:00
|
|
|
#ifdef SSH_AUDIT_EVENTS
|
2019-01-20 05:43:07 +08:00
|
|
|
int mm_answer_audit_event(struct ssh *, int, struct sshbuf *);
|
|
|
|
int mm_answer_audit_command(struct ssh *, int, struct sshbuf *);
|
2005-02-02 21:20:53 +08:00
|
|
|
#endif
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
static Authctxt *authctxt;
|
2014-05-15 12:24:09 +08:00
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
/* local state for key verify */
|
|
|
|
static u_char *key_blob = NULL;
|
2018-07-10 05:53:45 +08:00
|
|
|
static size_t key_bloblen = 0;
|
2021-03-04 06:41:49 +08:00
|
|
|
static u_int key_blobtype = MM_NOKEY;
|
2018-03-03 11:15:51 +08:00
|
|
|
static struct sshauthopt *key_opts = NULL;
|
2002-09-12 07:49:15 +08:00
|
|
|
static char *hostbased_cuser = NULL;
|
|
|
|
static char *hostbased_chost = NULL;
|
2002-03-22 10:30:41 +08:00
|
|
|
static char *auth_method = "unknown";
|
2012-12-03 06:53:20 +08:00
|
|
|
static char *auth_submethod = NULL;
|
2003-06-28 10:38:01 +08:00
|
|
|
static u_int session_id2_len = 0;
|
2002-06-07 04:58:19 +08:00
|
|
|
static u_char *session_id2 = NULL;
|
2003-05-14 17:31:12 +08:00
|
|
|
static pid_t monitor_child_pid;
|
upstream: Add a facility to sshd(8) to penalise particular
problematic client behaviours, controlled by two new sshd_config(5) options:
PerSourcePenalties and PerSourcePenaltyExemptList.
When PerSourcePenalties are enabled, sshd(8) will monitor the exit
status of its child pre-auth session processes. Through the exit
status, it can observe situations where the session did not
authenticate as expected. These conditions include when the client
repeatedly attempted authentication unsucessfully (possibly indicating
an attack against one or more accounts, e.g. password guessing), or
when client behaviour caused sshd to crash (possibly indicating
attempts to exploit sshd).
When such a condition is observed, sshd will record a penalty of some
duration (e.g. 30 seconds) against the client's address. If this time
is above a minimum threshold specified by the PerSourcePenalties, then
connections from the client address will be refused (along with any
others in the same PerSourceNetBlockSize CIDR range).
Repeated offenses by the same client address will accrue greater
penalties, up to a configurable maximum. A PerSourcePenaltyExemptList
option allows certain address ranges to be exempt from all penalties.
We hope these options will make it significantly more difficult for
attackers to find accounts with weak/guessable passwords or exploit
bugs in sshd(8) itself.
PerSourcePenalties is off by default, but we expect to enable it
automatically in the near future.
much feedback markus@ and others, ok markus@
OpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca
2024-06-07 01:15:25 +08:00
|
|
|
int auth_attempted = 0;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
struct mon_table {
|
|
|
|
enum monitor_reqtype type;
|
|
|
|
int flags;
|
2019-01-20 05:43:07 +08:00
|
|
|
int (*f)(struct ssh *, int, struct sshbuf *);
|
2002-03-22 10:30:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#define MON_ISAUTH 0x0004 /* Required for Authentication */
|
|
|
|
#define MON_AUTHDECIDE 0x0008 /* Decides Authentication */
|
|
|
|
#define MON_ONCE 0x0010 /* Disable after calling */
|
2006-03-31 20:14:23 +08:00
|
|
|
#define MON_ALOG 0x0020 /* Log auth attempt without authenticating */
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
#define MON_AUTH (MON_ISAUTH|MON_AUTHDECIDE)
|
|
|
|
|
|
|
|
#define MON_PERMIT 0x1000 /* Request is permitted */
|
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
static int monitor_read(struct ssh *, struct monitor *, struct mon_table *,
|
|
|
|
struct mon_table **);
|
|
|
|
static int monitor_read_log(struct monitor *);
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
struct mon_table mon_dispatch_proto20[] = {
|
2024-10-14 09:57:50 +08:00
|
|
|
{MONITOR_REQ_STATE, MON_ONCE, mm_answer_state},
|
2014-05-15 12:24:09 +08:00
|
|
|
#ifdef WITH_OPENSSL
|
2002-03-22 10:30:41 +08:00
|
|
|
{MONITOR_REQ_MODULI, MON_ONCE, mm_answer_moduli},
|
2014-05-15 12:24:09 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
{MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign},
|
|
|
|
{MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow},
|
|
|
|
{MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv},
|
2002-05-13 09:07:41 +08:00
|
|
|
{MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner},
|
2002-03-22 10:30:41 +08:00
|
|
|
{MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword},
|
2002-04-23 18:28:48 +08:00
|
|
|
#ifdef USE_PAM
|
|
|
|
{MONITOR_REQ_PAM_START, MON_ONCE, mm_answer_pam_start},
|
2003-08-25 11:08:49 +08:00
|
|
|
{MONITOR_REQ_PAM_ACCOUNT, 0, mm_answer_pam_account},
|
2016-08-29 09:47:07 +08:00
|
|
|
{MONITOR_REQ_PAM_INIT_CTX, MON_ONCE, mm_answer_pam_init_ctx},
|
|
|
|
{MONITOR_REQ_PAM_QUERY, 0, mm_answer_pam_query},
|
|
|
|
{MONITOR_REQ_PAM_RESPOND, MON_ONCE, mm_answer_pam_respond},
|
2003-05-10 17:28:02 +08:00
|
|
|
{MONITOR_REQ_PAM_FREE_CTX, MON_ONCE|MON_AUTHDECIDE, mm_answer_pam_free_ctx},
|
2002-04-02 02:04:35 +08:00
|
|
|
#endif
|
2005-02-08 18:52:47 +08:00
|
|
|
#ifdef SSH_AUDIT_EVENTS
|
2005-03-06 19:31:35 +08:00
|
|
|
{MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event},
|
2005-02-02 21:20:53 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
#ifdef BSD_AUTH
|
|
|
|
{MONITOR_REQ_BSDAUTHQUERY, MON_ISAUTH, mm_answer_bsdauthquery},
|
2006-03-15 08:20:03 +08:00
|
|
|
{MONITOR_REQ_BSDAUTHRESPOND, MON_AUTH, mm_answer_bsdauthrespond},
|
2002-03-22 10:30:41 +08:00
|
|
|
#endif
|
|
|
|
{MONITOR_REQ_KEYALLOWED, MON_ISAUTH, mm_answer_keyallowed},
|
|
|
|
{MONITOR_REQ_KEYVERIFY, MON_AUTH, mm_answer_keyverify},
|
2003-08-26 09:49:55 +08:00
|
|
|
#ifdef GSSAPI
|
|
|
|
{MONITOR_REQ_GSSSETUP, MON_ISAUTH, mm_answer_gss_setup_ctx},
|
2016-09-05 21:57:31 +08:00
|
|
|
{MONITOR_REQ_GSSSTEP, 0, mm_answer_gss_accept_ctx},
|
|
|
|
{MONITOR_REQ_GSSUSEROK, MON_ONCE|MON_AUTHDECIDE, mm_answer_gss_userok},
|
|
|
|
{MONITOR_REQ_GSSCHECKMIC, MON_ONCE, mm_answer_gss_checkmic},
|
2003-05-14 11:47:37 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
{0, 0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
struct mon_table mon_dispatch_postauth20[] = {
|
2024-10-14 09:57:50 +08:00
|
|
|
{MONITOR_REQ_STATE, MON_ONCE, mm_answer_state},
|
2014-05-15 12:24:09 +08:00
|
|
|
#ifdef WITH_OPENSSL
|
2002-03-22 10:30:41 +08:00
|
|
|
{MONITOR_REQ_MODULI, 0, mm_answer_moduli},
|
2014-05-15 12:24:09 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
{MONITOR_REQ_SIGN, 0, mm_answer_sign},
|
|
|
|
{MONITOR_REQ_PTY, 0, mm_answer_pty},
|
|
|
|
{MONITOR_REQ_PTYCLEANUP, 0, mm_answer_pty_cleanup},
|
|
|
|
{MONITOR_REQ_TERM, 0, mm_answer_term},
|
2005-02-08 18:52:47 +08:00
|
|
|
#ifdef SSH_AUDIT_EVENTS
|
2005-02-02 21:20:53 +08:00
|
|
|
{MONITOR_REQ_AUDIT_EVENT, MON_PERMIT, mm_answer_audit_event},
|
|
|
|
{MONITOR_REQ_AUDIT_COMMAND, MON_PERMIT, mm_answer_audit_command},
|
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
{0, 0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
struct mon_table *mon_dispatch;
|
|
|
|
|
|
|
|
/* Specifies if a certain message is allowed at the moment */
|
|
|
|
static void
|
|
|
|
monitor_permit(struct mon_table *ent, enum monitor_reqtype type, int permit)
|
|
|
|
{
|
|
|
|
while (ent->f != NULL) {
|
|
|
|
if (ent->type == type) {
|
|
|
|
ent->flags &= ~MON_PERMIT;
|
|
|
|
ent->flags |= permit ? MON_PERMIT : 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ent++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
monitor_permit_authentications(int permit)
|
|
|
|
{
|
|
|
|
struct mon_table *ent = mon_dispatch;
|
|
|
|
|
|
|
|
while (ent->f != NULL) {
|
|
|
|
if (ent->flags & MON_AUTH) {
|
|
|
|
ent->flags &= ~MON_PERMIT;
|
|
|
|
ent->flags |= permit ? MON_PERMIT : 0;
|
|
|
|
}
|
|
|
|
ent++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-10-02 14:12:36 +08:00
|
|
|
void
|
2019-01-20 05:43:07 +08:00
|
|
|
monitor_child_preauth(struct ssh *ssh, struct monitor *pmonitor)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
struct mon_table *ent;
|
2012-12-03 06:53:20 +08:00
|
|
|
int authenticated = 0, partial = 0;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
debug3("preauth child monitor started");
|
|
|
|
|
2018-02-05 13:37:46 +08:00
|
|
|
if (pmonitor->m_recvfd >= 0)
|
|
|
|
close(pmonitor->m_recvfd);
|
|
|
|
if (pmonitor->m_log_sendfd >= 0)
|
|
|
|
close(pmonitor->m_log_sendfd);
|
2011-06-20 12:42:23 +08:00
|
|
|
pmonitor->m_log_sendfd = pmonitor->m_recvfd = -1;
|
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
authctxt = (Authctxt *)ssh->authctxt;
|
2003-10-02 14:12:36 +08:00
|
|
|
memset(authctxt, 0, sizeof(*authctxt));
|
2018-03-03 11:15:51 +08:00
|
|
|
ssh->authctxt = authctxt;
|
2003-10-02 14:12:36 +08:00
|
|
|
|
2018-07-10 17:39:52 +08:00
|
|
|
authctxt->loginmsg = loginmsg;
|
2005-03-31 21:52:04 +08:00
|
|
|
|
2016-08-14 01:47:40 +08:00
|
|
|
mon_dispatch = mon_dispatch_proto20;
|
2024-10-14 09:57:50 +08:00
|
|
|
/* Permit requests for state, moduli and signatures */
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_STATE, 1);
|
2016-08-14 01:47:40 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_MODULI, 1);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_SIGN, 1);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* The first few requests do not require asynchronous access */
|
|
|
|
while (!authenticated) {
|
2012-12-03 06:53:20 +08:00
|
|
|
partial = 0;
|
2006-03-31 20:14:23 +08:00
|
|
|
auth_method = "unknown";
|
2012-12-03 06:53:20 +08:00
|
|
|
auth_submethod = NULL;
|
2017-06-24 14:34:38 +08:00
|
|
|
auth2_authctxt_reset_info(authctxt);
|
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
authenticated = (monitor_read(ssh, pmonitor,
|
|
|
|
mon_dispatch, &ent) == 1);
|
2012-11-04 20:21:40 +08:00
|
|
|
|
upstream: Add a facility to sshd(8) to penalise particular
problematic client behaviours, controlled by two new sshd_config(5) options:
PerSourcePenalties and PerSourcePenaltyExemptList.
When PerSourcePenalties are enabled, sshd(8) will monitor the exit
status of its child pre-auth session processes. Through the exit
status, it can observe situations where the session did not
authenticate as expected. These conditions include when the client
repeatedly attempted authentication unsucessfully (possibly indicating
an attack against one or more accounts, e.g. password guessing), or
when client behaviour caused sshd to crash (possibly indicating
attempts to exploit sshd).
When such a condition is observed, sshd will record a penalty of some
duration (e.g. 30 seconds) against the client's address. If this time
is above a minimum threshold specified by the PerSourcePenalties, then
connections from the client address will be refused (along with any
others in the same PerSourceNetBlockSize CIDR range).
Repeated offenses by the same client address will accrue greater
penalties, up to a configurable maximum. A PerSourcePenaltyExemptList
option allows certain address ranges to be exempt from all penalties.
We hope these options will make it significantly more difficult for
attackers to find accounts with weak/guessable passwords or exploit
bugs in sshd(8) itself.
PerSourcePenalties is off by default, but we expect to enable it
automatically in the near future.
much feedback markus@ and others, ok markus@
OpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca
2024-06-07 01:15:25 +08:00
|
|
|
/* Record that auth was attempted to set exit status later */
|
|
|
|
if ((ent->flags & MON_AUTH) != 0)
|
|
|
|
auth_attempted = 1;
|
|
|
|
|
2012-11-04 20:21:40 +08:00
|
|
|
/* Special handling for multiple required authentications */
|
|
|
|
if (options.num_auth_methods != 0) {
|
|
|
|
if (authenticated &&
|
|
|
|
!auth2_update_methods_lists(authctxt,
|
2013-04-23 13:18:10 +08:00
|
|
|
auth_method, auth_submethod)) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("method %s: partial", auth_method);
|
2012-11-04 20:21:40 +08:00
|
|
|
authenticated = 0;
|
2012-12-03 06:53:20 +08:00
|
|
|
partial = 1;
|
2012-11-04 20:21:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
if (authenticated) {
|
|
|
|
if (!(ent->flags & MON_AUTHDECIDE))
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("unexpected authentication from %d",
|
|
|
|
ent->type);
|
2002-03-22 10:30:41 +08:00
|
|
|
if (authctxt->pw->pw_uid == 0 &&
|
2018-03-03 11:15:51 +08:00
|
|
|
!auth_root_allowed(ssh, auth_method))
|
2002-03-22 10:30:41 +08:00
|
|
|
authenticated = 0;
|
2003-08-25 11:08:49 +08:00
|
|
|
#ifdef USE_PAM
|
|
|
|
/* PAM needs to perform account checks after auth */
|
2003-11-18 07:45:20 +08:00
|
|
|
if (options.use_pam && authenticated) {
|
2018-07-10 17:39:52 +08:00
|
|
|
struct sshbuf *m;
|
2003-08-25 11:08:49 +08:00
|
|
|
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((m = sshbuf_new()) == NULL)
|
|
|
|
fatal("%s: sshbuf_new failed",
|
|
|
|
__func__);
|
2003-11-21 20:48:55 +08:00
|
|
|
mm_request_receive_expect(pmonitor->m_sendfd,
|
2018-07-10 17:39:52 +08:00
|
|
|
MONITOR_REQ_PAM_ACCOUNT, m);
|
|
|
|
authenticated = mm_answer_pam_account(
|
2019-01-20 05:43:07 +08:00
|
|
|
ssh, pmonitor->m_sendfd, m);
|
2018-07-10 17:39:52 +08:00
|
|
|
sshbuf_free(m);
|
2003-08-25 11:08:49 +08:00
|
|
|
}
|
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
2006-03-31 20:14:23 +08:00
|
|
|
if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) {
|
2019-01-20 05:41:18 +08:00
|
|
|
auth_log(ssh, authenticated, partial,
|
2013-06-02 05:41:51 +08:00
|
|
|
auth_method, auth_submethod);
|
2015-06-23 07:42:16 +08:00
|
|
|
if (!partial && !authenticated)
|
2002-03-22 10:30:41 +08:00
|
|
|
authctxt->failures++;
|
2017-06-24 14:34:38 +08:00
|
|
|
if (authenticated || partial) {
|
|
|
|
auth2_update_session_info(authctxt,
|
|
|
|
auth_method, auth_submethod);
|
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
2023-08-17 00:14:11 +08:00
|
|
|
if (authctxt->failures > options.max_authtries) {
|
|
|
|
/* Shouldn't happen */
|
|
|
|
fatal_f("privsep child made too many authentication "
|
|
|
|
"attempts");
|
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!authctxt->valid)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("authenticated invalid user");
|
2006-03-31 20:14:23 +08:00
|
|
|
if (strcmp(auth_method, "unknown") == 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("authentication method name unknown");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("user %s authenticated by privileged process", authctxt->user);
|
upstream: Add a facility to sshd(8) to penalise particular
problematic client behaviours, controlled by two new sshd_config(5) options:
PerSourcePenalties and PerSourcePenaltyExemptList.
When PerSourcePenalties are enabled, sshd(8) will monitor the exit
status of its child pre-auth session processes. Through the exit
status, it can observe situations where the session did not
authenticate as expected. These conditions include when the client
repeatedly attempted authentication unsucessfully (possibly indicating
an attack against one or more accounts, e.g. password guessing), or
when client behaviour caused sshd to crash (possibly indicating
attempts to exploit sshd).
When such a condition is observed, sshd will record a penalty of some
duration (e.g. 30 seconds) against the client's address. If this time
is above a minimum threshold specified by the PerSourcePenalties, then
connections from the client address will be refused (along with any
others in the same PerSourceNetBlockSize CIDR range).
Repeated offenses by the same client address will accrue greater
penalties, up to a configurable maximum. A PerSourcePenaltyExemptList
option allows certain address ranges to be exempt from all penalties.
We hope these options will make it significantly more difficult for
attackers to find accounts with weak/guessable passwords or exploit
bugs in sshd(8) itself.
PerSourcePenalties is off by default, but we expect to enable it
automatically in the near future.
much feedback markus@ and others, ok markus@
OpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca
2024-06-07 01:15:25 +08:00
|
|
|
auth_attempted = 0;
|
2018-03-03 11:15:51 +08:00
|
|
|
ssh->authctxt = NULL;
|
2017-02-04 07:05:57 +08:00
|
|
|
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-01-20 05:43:56 +08:00
|
|
|
mm_get_keystate(ssh, pmonitor);
|
2011-06-20 12:42:23 +08:00
|
|
|
|
2012-12-12 07:44:38 +08:00
|
|
|
/* Drain any buffered messages from the child */
|
|
|
|
while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0)
|
|
|
|
;
|
|
|
|
|
2018-02-05 13:37:46 +08:00
|
|
|
if (pmonitor->m_recvfd >= 0)
|
|
|
|
close(pmonitor->m_recvfd);
|
|
|
|
if (pmonitor->m_log_sendfd >= 0)
|
|
|
|
close(pmonitor->m_log_sendfd);
|
2011-06-20 12:42:23 +08:00
|
|
|
pmonitor->m_sendfd = pmonitor->m_log_recvfd = -1;
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
2003-05-14 17:31:12 +08:00
|
|
|
static void
|
|
|
|
monitor_set_child_handler(pid_t pid)
|
|
|
|
{
|
|
|
|
monitor_child_pid = pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2004-06-22 10:56:01 +08:00
|
|
|
monitor_child_handler(int sig)
|
2003-05-14 17:31:12 +08:00
|
|
|
{
|
2004-06-22 10:56:01 +08:00
|
|
|
kill(monitor_child_pid, sig);
|
2003-05-14 17:31:12 +08:00
|
|
|
}
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
void
|
2019-01-20 05:43:07 +08:00
|
|
|
monitor_child_postauth(struct ssh *ssh, struct monitor *pmonitor)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2011-06-20 12:42:23 +08:00
|
|
|
close(pmonitor->m_recvfd);
|
|
|
|
pmonitor->m_recvfd = -1;
|
|
|
|
|
2003-05-14 17:31:12 +08:00
|
|
|
monitor_set_child_handler(pmonitor->m_pid);
|
2020-01-23 15:10:22 +08:00
|
|
|
ssh_signal(SIGHUP, &monitor_child_handler);
|
|
|
|
ssh_signal(SIGTERM, &monitor_child_handler);
|
|
|
|
ssh_signal(SIGINT, &monitor_child_handler);
|
2014-08-27 02:11:55 +08:00
|
|
|
#ifdef SIGXFSZ
|
2020-01-23 15:10:22 +08:00
|
|
|
ssh_signal(SIGXFSZ, SIG_IGN);
|
2014-08-27 02:11:55 +08:00
|
|
|
#endif
|
2003-05-14 17:31:12 +08:00
|
|
|
|
2016-08-14 01:47:40 +08:00
|
|
|
mon_dispatch = mon_dispatch_postauth20;
|
|
|
|
|
|
|
|
/* Permit requests for moduli and signatures */
|
2024-10-14 09:57:50 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_STATE, 1);
|
2016-08-14 01:47:40 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_MODULI, 1);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_SIGN, 1);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_TERM, 1);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-03-03 11:15:51 +08:00
|
|
|
if (auth_opts->permit_pty_flag) {
|
2002-03-22 10:30:41 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (;;)
|
2019-01-20 05:43:07 +08:00
|
|
|
monitor_read(ssh, pmonitor, mon_dispatch, NULL);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
2011-06-20 12:42:23 +08:00
|
|
|
static int
|
|
|
|
monitor_read_log(struct monitor *pmonitor)
|
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
struct sshbuf *logmsg;
|
2021-04-16 00:24:31 +08:00
|
|
|
u_int len, level, forced;
|
|
|
|
char *msg;
|
2018-07-10 05:53:45 +08:00
|
|
|
u_char *p;
|
|
|
|
int r;
|
2011-06-20 12:42:23 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((logmsg = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new");
|
2011-06-20 12:42:23 +08:00
|
|
|
|
|
|
|
/* Read length */
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_reserve(logmsg, 4, &p)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "reserve len");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (atomicio(read, pmonitor->m_log_recvfd, p, 4) != 4) {
|
2011-06-20 12:42:23 +08:00
|
|
|
if (errno == EPIPE) {
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_free(logmsg);
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("child log fd closed");
|
2011-06-20 12:42:23 +08:00
|
|
|
close(pmonitor->m_log_recvfd);
|
|
|
|
pmonitor->m_log_recvfd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("log fd read: %s", strerror(errno));
|
2011-06-20 12:42:23 +08:00
|
|
|
}
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u32(logmsg, &len)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse len");
|
2011-06-20 12:42:23 +08:00
|
|
|
if (len <= 4 || len > 8192)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("invalid log message length %u", len);
|
2011-06-20 12:42:23 +08:00
|
|
|
|
|
|
|
/* Read severity, message */
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(logmsg);
|
|
|
|
if ((r = sshbuf_reserve(logmsg, len, &p)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "reserve msg");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (atomicio(read, pmonitor->m_log_recvfd, p, len) != len)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("log fd read: %s", strerror(errno));
|
2021-04-16 00:24:31 +08:00
|
|
|
if ((r = sshbuf_get_u32(logmsg, &level)) != 0 ||
|
|
|
|
(r = sshbuf_get_u32(logmsg, &forced)) != 0 ||
|
2018-07-10 05:53:45 +08:00
|
|
|
(r = sshbuf_get_cstring(logmsg, &msg, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2011-06-20 12:42:23 +08:00
|
|
|
|
|
|
|
/* Log it */
|
|
|
|
if (log_level_name(level) == NULL)
|
2020-10-18 19:21:59 +08:00
|
|
|
fatal_f("invalid log level %u (corrupted message?)", level);
|
2024-10-14 09:57:50 +08:00
|
|
|
sshlogdirect(level, forced, "%s [%s]", msg,
|
|
|
|
mon_dispatch == mon_dispatch_postauth20 ? "postauth" : "preauth");
|
2011-06-20 12:42:23 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_free(logmsg);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(msg);
|
2011-06-20 12:42:23 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
static int
|
|
|
|
monitor_read(struct ssh *ssh, struct monitor *pmonitor, struct mon_table *ent,
|
2002-03-22 10:30:41 +08:00
|
|
|
struct mon_table **pent)
|
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
struct sshbuf *m;
|
|
|
|
int r, ret;
|
2002-03-22 10:30:41 +08:00
|
|
|
u_char type;
|
2011-06-20 12:42:23 +08:00
|
|
|
struct pollfd pfd[2];
|
|
|
|
|
|
|
|
for (;;) {
|
2014-02-04 08:18:20 +08:00
|
|
|
memset(&pfd, 0, sizeof(pfd));
|
2011-06-20 12:42:23 +08:00
|
|
|
pfd[0].fd = pmonitor->m_sendfd;
|
|
|
|
pfd[0].events = POLLIN;
|
|
|
|
pfd[1].fd = pmonitor->m_log_recvfd;
|
|
|
|
pfd[1].events = pfd[1].fd == -1 ? 0 : POLLIN;
|
2011-08-06 04:15:15 +08:00
|
|
|
if (poll(pfd, pfd[1].fd == -1 ? 1 : 2, -1) == -1) {
|
|
|
|
if (errno == EINTR || errno == EAGAIN)
|
|
|
|
continue;
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("poll: %s", strerror(errno));
|
2011-08-06 04:15:15 +08:00
|
|
|
}
|
2011-06-20 12:42:23 +08:00
|
|
|
if (pfd[1].revents) {
|
|
|
|
/*
|
|
|
|
* Drain all log messages before processing next
|
|
|
|
* monitor request.
|
|
|
|
*/
|
|
|
|
monitor_read_log(pmonitor);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (pfd[0].revents)
|
|
|
|
break; /* Continues below */
|
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((m = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
mm_request_receive(pmonitor->m_sendfd, m);
|
|
|
|
if ((r = sshbuf_get_u8(m, &type)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse type");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("checking request %d", type);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
while (ent->f != NULL) {
|
|
|
|
if (ent->type == type)
|
|
|
|
break;
|
|
|
|
ent++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ent->f != NULL) {
|
|
|
|
if (!(ent->flags & MON_PERMIT))
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("unpermitted request %d", type);
|
2019-01-20 05:43:07 +08:00
|
|
|
ret = (*ent->f)(ssh, pmonitor->m_sendfd, m);
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_free(m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* The child may use this request only once, disable it */
|
|
|
|
if (ent->flags & MON_ONCE) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug2_f("%d used once, disabling now", type);
|
2002-03-22 10:30:41 +08:00
|
|
|
ent->flags &= ~MON_PERMIT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pent != NULL)
|
|
|
|
*pent = ent;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("unsupported request: %d", type);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* NOTREACHED */
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* allowed key state */
|
|
|
|
static int
|
2019-11-25 08:52:46 +08:00
|
|
|
monitor_allowed_key(const u_char *blob, u_int bloblen)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
/* make sure key is allowed */
|
|
|
|
if (key_blob == NULL || key_bloblen != bloblen ||
|
2010-07-16 11:58:37 +08:00
|
|
|
timingsafe_bcmp(key_blob, blob, key_bloblen))
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
monitor_reset_key_state(void)
|
|
|
|
{
|
|
|
|
/* reset state */
|
2013-06-02 05:31:17 +08:00
|
|
|
free(key_blob);
|
|
|
|
free(hostbased_cuser);
|
|
|
|
free(hostbased_chost);
|
2018-03-03 11:15:51 +08:00
|
|
|
sshauthopt_free(key_opts);
|
2002-03-22 10:30:41 +08:00
|
|
|
key_blob = NULL;
|
|
|
|
key_bloblen = 0;
|
|
|
|
key_blobtype = MM_NOKEY;
|
2018-03-03 11:15:51 +08:00
|
|
|
key_opts = NULL;
|
2002-03-22 10:30:41 +08:00
|
|
|
hostbased_cuser = NULL;
|
|
|
|
hostbased_chost = NULL;
|
|
|
|
}
|
|
|
|
|
2024-10-14 09:57:50 +08:00
|
|
|
int
|
|
|
|
mm_answer_state(struct ssh *ssh, int sock, struct sshbuf *m)
|
|
|
|
{
|
|
|
|
struct sshbuf *inc = NULL, *hostkeys = NULL;
|
|
|
|
struct sshbuf *opts = NULL, *confdata = NULL;
|
|
|
|
struct include_item *item = NULL;
|
|
|
|
int postauth;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
sshbuf_reset(m);
|
|
|
|
|
|
|
|
debug_f("config len %zu", sshbuf_len(cfg));
|
|
|
|
|
|
|
|
if ((m = sshbuf_new()) == NULL ||
|
|
|
|
(inc = sshbuf_new()) == NULL ||
|
|
|
|
(opts = sshbuf_new()) == NULL ||
|
|
|
|
(confdata = sshbuf_new()) == NULL)
|
|
|
|
fatal_f("sshbuf_new failed");
|
|
|
|
|
|
|
|
/* XXX unneccessary? */
|
|
|
|
/* pack includes into a string */
|
|
|
|
TAILQ_FOREACH(item, &includes, entry) {
|
|
|
|
if ((r = sshbuf_put_cstring(inc, item->selector)) != 0 ||
|
|
|
|
(r = sshbuf_put_cstring(inc, item->filename)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(inc, item->contents)) != 0)
|
|
|
|
fatal_fr(r, "compose includes");
|
|
|
|
}
|
|
|
|
|
|
|
|
hostkeys = pack_hostkeys();
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Protocol from monitor to unpriv privsep process:
|
|
|
|
* string configuration
|
|
|
|
* uint64 timing_secret XXX move delays to monitor and remove
|
|
|
|
* string host_keys[] {
|
|
|
|
* string public_key
|
|
|
|
* string certificate
|
|
|
|
* }
|
|
|
|
* string server_banner
|
|
|
|
* string client_banner
|
|
|
|
* string included_files[] {
|
|
|
|
* string selector
|
|
|
|
* string filename
|
|
|
|
* string contents
|
|
|
|
* }
|
|
|
|
* string configuration_data (postauth)
|
|
|
|
* string keystate (postauth)
|
|
|
|
* string authenticated_user (postauth)
|
|
|
|
* string session_info (postauth)
|
|
|
|
* string authopts (postauth)
|
|
|
|
*/
|
|
|
|
if ((r = sshbuf_put_stringb(m, cfg)) != 0 ||
|
|
|
|
(r = sshbuf_put_u64(m, options.timing_secret)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(m, hostkeys)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(m, ssh->kex->server_version)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(m, ssh->kex->client_version)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(m, inc)) != 0)
|
|
|
|
fatal_fr(r, "compose config");
|
|
|
|
|
|
|
|
postauth = (authctxt && authctxt->pw && authctxt->authenticated);
|
|
|
|
if (postauth) {
|
|
|
|
/* XXX shouldn't be reachable */
|
|
|
|
fatal_f("internal error: called in postauth");
|
|
|
|
}
|
|
|
|
|
|
|
|
sshbuf_free(inc);
|
|
|
|
sshbuf_free(opts);
|
|
|
|
sshbuf_free(confdata);
|
|
|
|
|
|
|
|
mm_request_send(sock, MONITOR_ANS_STATE, m);
|
|
|
|
|
|
|
|
debug3_f("done");
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2014-05-15 12:24:09 +08:00
|
|
|
#ifdef WITH_OPENSSL
|
2002-03-22 10:30:41 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_moduli(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
DH *dh;
|
2018-09-13 10:08:33 +08:00
|
|
|
const BIGNUM *dh_p, *dh_g;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
|
|
|
u_int min, want, max;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u32(m, &min)) != 0 ||
|
|
|
|
(r = sshbuf_get_u32(m, &want)) != 0 ||
|
|
|
|
(r = sshbuf_get_u32(m, &max)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("got parameters: %d %d %d", min, want, max);
|
2002-03-22 10:30:41 +08:00
|
|
|
/* We need to check here, too, in case the child got corrupted */
|
|
|
|
if (max < min || want < min || max < want)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("bad parameters: %d %d %d", min, want, max);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
dh = choose_dh(min, want, max);
|
|
|
|
if (dh == NULL) {
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u8(m, 0)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble empty");
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
} else {
|
|
|
|
/* Send first bignum */
|
2018-09-13 10:08:33 +08:00
|
|
|
DH_get0_pqg(dh, &dh_p, NULL, &dh_g);
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u8(m, 1)) != 0 ||
|
2018-09-13 10:08:33 +08:00
|
|
|
(r = sshbuf_put_bignum2(m, dh_p)) != 0 ||
|
|
|
|
(r = sshbuf_put_bignum2(m, dh_g)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
DH_free(dh);
|
|
|
|
}
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_MODULI, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
}
|
2014-05-15 12:24:09 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_sign(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2015-01-15 04:05:27 +08:00
|
|
|
extern int auth_sock; /* XXX move to state struct? */
|
2024-10-14 09:57:50 +08:00
|
|
|
struct sshkey *pubkey, *key;
|
2016-02-16 07:32:37 +08:00
|
|
|
struct sshbuf *sigbuf = NULL;
|
|
|
|
u_char *p = NULL, *signature = NULL;
|
|
|
|
char *alg = NULL;
|
2024-10-14 09:57:50 +08:00
|
|
|
size_t datlen, siglen;
|
|
|
|
int r, is_proof = 0, keyid;
|
|
|
|
u_int compat;
|
2015-02-21 06:17:21 +08:00
|
|
|
const char proof_req[] = "hostkeys-prove-00@openssh.com";
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("entering");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2024-10-14 09:57:50 +08:00
|
|
|
if ((r = sshkey_froms(m, &pubkey)) != 0 ||
|
2015-12-05 00:41:28 +08:00
|
|
|
(r = sshbuf_get_string(m, &p, &datlen)) != 0 ||
|
2024-10-14 09:57:50 +08:00
|
|
|
(r = sshbuf_get_cstring(m, &alg, NULL)) != 0 ||
|
2018-07-12 02:53:29 +08:00
|
|
|
(r = sshbuf_get_u32(m, &compat)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2024-10-14 09:57:50 +08:00
|
|
|
|
|
|
|
if ((keyid = get_hostkey_index(pubkey, 1, ssh)) == -1)
|
|
|
|
fatal_f("unknown hostkey");
|
|
|
|
debug_f("hostkey %s index %d", sshkey_ssh_name(pubkey), keyid);
|
|
|
|
sshkey_free(pubkey);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2006-03-15 09:08:28 +08:00
|
|
|
/*
|
2010-09-10 09:23:34 +08:00
|
|
|
* Supported KEX types use SHA1 (20 bytes), SHA256 (32 bytes),
|
|
|
|
* SHA384 (48 bytes) and SHA512 (64 bytes).
|
2015-02-17 06:13:32 +08:00
|
|
|
*
|
|
|
|
* Otherwise, verify the signature request is for a hostkey
|
|
|
|
* proof.
|
|
|
|
*
|
|
|
|
* XXX perform similar check for KEX signature requests too?
|
|
|
|
* it's not trivial, since what is signed is the hash, rather
|
|
|
|
* than the full kex structure...
|
2006-03-15 09:08:28 +08:00
|
|
|
*/
|
2015-02-17 06:13:32 +08:00
|
|
|
if (datlen != 20 && datlen != 32 && datlen != 48 && datlen != 64) {
|
|
|
|
/*
|
|
|
|
* Construct expected hostkey proof and compare it to what
|
|
|
|
* the client sent us.
|
|
|
|
*/
|
|
|
|
if (session_id2_len == 0) /* hostkeys is never first */
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("bad data length: %zu", datlen);
|
2015-02-17 06:13:32 +08:00
|
|
|
if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("no hostkey for index %d", keyid);
|
2015-02-17 06:13:32 +08:00
|
|
|
if ((sigbuf = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new");
|
2015-02-21 06:17:21 +08:00
|
|
|
if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 ||
|
|
|
|
(r = sshbuf_put_string(sigbuf, session_id2,
|
2015-09-02 15:51:12 +08:00
|
|
|
session_id2_len)) != 0 ||
|
2015-02-17 06:13:32 +08:00
|
|
|
(r = sshkey_puts(key, sigbuf)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble private key proof");
|
2015-02-17 06:13:32 +08:00
|
|
|
if (datlen != sshbuf_len(sigbuf) ||
|
|
|
|
memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("bad data length: %zu, hostkey proof len %zu",
|
|
|
|
datlen, sshbuf_len(sigbuf));
|
2015-02-17 06:13:32 +08:00
|
|
|
sshbuf_free(sigbuf);
|
|
|
|
is_proof = 1;
|
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2002-06-07 04:58:19 +08:00
|
|
|
/* save session id, it will be passed on the first call */
|
|
|
|
if (session_id2_len == 0) {
|
|
|
|
session_id2_len = datlen;
|
|
|
|
session_id2 = xmalloc(session_id2_len);
|
|
|
|
memcpy(session_id2, p, session_id2_len);
|
|
|
|
}
|
|
|
|
|
2013-07-20 11:21:52 +08:00
|
|
|
if ((key = get_hostkey_by_index(keyid)) != NULL) {
|
2015-12-05 00:41:28 +08:00
|
|
|
if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg,
|
2020-08-27 09:06:18 +08:00
|
|
|
options.sk_provider, NULL, compat)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "sign");
|
2015-02-17 06:13:32 +08:00
|
|
|
} else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL &&
|
2015-01-15 04:05:27 +08:00
|
|
|
auth_sock > 0) {
|
|
|
|
if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen,
|
2020-10-18 19:32:01 +08:00
|
|
|
p, datlen, alg, compat)) != 0)
|
|
|
|
fatal_fr(r, "agent sign");
|
2013-07-20 11:21:52 +08:00
|
|
|
} else
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("no hostkey from index %d", keyid);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2021-08-11 13:20:17 +08:00
|
|
|
debug3_f("%s %s signature len=%zu", alg,
|
|
|
|
is_proof ? "hostkey proof" : "KEX", siglen);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2015-01-15 04:05:27 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_string(m, signature, siglen)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-02-16 07:32:37 +08:00
|
|
|
free(alg);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(p);
|
|
|
|
free(signature);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_SIGN, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* Turn on permissions for getpwnam */
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PWNAM, 1);
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2020-11-27 08:37:10 +08:00
|
|
|
#define PUTPW(b, id) \
|
|
|
|
do { \
|
|
|
|
if ((r = sshbuf_put_string(b, \
|
|
|
|
&pwent->id, sizeof(pwent->id))) != 0) \
|
|
|
|
fatal_fr(r, "assemble %s", #id); \
|
|
|
|
} while (0)
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2024-05-17 08:30:23 +08:00
|
|
|
void
|
|
|
|
mm_encode_server_options(struct sshbuf *m)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
u_int i;
|
|
|
|
|
|
|
|
/* XXX this leaks raw pointers to the unpriv child processes */
|
|
|
|
if ((r = sshbuf_put_string(m, &options, sizeof(options))) != 0)
|
|
|
|
fatal_fr(r, "assemble options");
|
|
|
|
|
|
|
|
#define M_CP_STROPT(x) do { \
|
|
|
|
if (options.x != NULL && \
|
|
|
|
(r = sshbuf_put_cstring(m, options.x)) != 0) \
|
|
|
|
fatal_fr(r, "assemble %s", #x); \
|
|
|
|
} while (0)
|
|
|
|
#define M_CP_STRARRAYOPT(x, nx) do { \
|
|
|
|
for (i = 0; i < options.nx; i++) { \
|
|
|
|
if ((r = sshbuf_put_cstring(m, options.x[i])) != 0) \
|
|
|
|
fatal_fr(r, "assemble %s", #x); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
/* See comment in servconf.h */
|
|
|
|
COPY_MATCH_STRING_OPTS();
|
|
|
|
#undef M_CP_STROPT
|
|
|
|
#undef M_CP_STRARRAYOPT
|
|
|
|
}
|
|
|
|
|
2020-11-27 08:37:10 +08:00
|
|
|
/* Retrieves the password entry and also checks if the user is permitted */
|
2002-03-22 10:30:41 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pwnamallow(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
struct passwd *pwent;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r, allowed = 0;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("entering");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
if (authctxt->attempt++ != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("multiple attempts for getpwnam");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2022-02-25 10:09:27 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &authctxt->user, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2022-02-25 10:09:27 +08:00
|
|
|
pwent = getpwnamallow(ssh, authctxt->user);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2022-02-25 10:09:27 +08:00
|
|
|
setproctitle("%s [priv]", pwent ? authctxt->user : "unknown");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
if (pwent == NULL) {
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u8(m, 0)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble fakepw");
|
2003-11-18 19:01:48 +08:00
|
|
|
authctxt->pw = fakepw();
|
2002-03-22 10:30:41 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
allowed = 1;
|
|
|
|
authctxt->pw = pwent;
|
|
|
|
authctxt->valid = 1;
|
|
|
|
|
2020-11-27 08:37:10 +08:00
|
|
|
/* XXX send fake class/dir/shell, etc. */
|
|
|
|
if ((r = sshbuf_put_u8(m, 1)) != 0)
|
|
|
|
fatal_fr(r, "assemble ok");
|
|
|
|
PUTPW(m, pw_uid);
|
|
|
|
PUTPW(m, pw_gid);
|
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_CHANGE
|
|
|
|
PUTPW(m, pw_change);
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_EXPIRE
|
|
|
|
PUTPW(m, pw_expire);
|
|
|
|
#endif
|
|
|
|
if ((r = sshbuf_put_cstring(m, pwent->pw_name)) != 0 ||
|
2018-07-10 05:53:45 +08:00
|
|
|
(r = sshbuf_put_cstring(m, "*")) != 0 ||
|
2013-04-23 12:25:52 +08:00
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_GECOS
|
2018-07-10 05:53:45 +08:00
|
|
|
(r = sshbuf_put_cstring(m, pwent->pw_gecos)) != 0 ||
|
2013-04-23 12:25:52 +08:00
|
|
|
#endif
|
|
|
|
#ifdef HAVE_STRUCT_PASSWD_PW_CLASS
|
2018-07-10 05:53:45 +08:00
|
|
|
(r = sshbuf_put_cstring(m, pwent->pw_class)) != 0 ||
|
2002-03-23 02:07:17 +08:00
|
|
|
#endif
|
2018-07-10 05:53:45 +08:00
|
|
|
(r = sshbuf_put_cstring(m, pwent->pw_dir)) != 0 ||
|
|
|
|
(r = sshbuf_put_cstring(m, pwent->pw_shell)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble pw");
|
2007-12-02 20:02:15 +08:00
|
|
|
|
|
|
|
out:
|
2017-02-04 07:05:57 +08:00
|
|
|
ssh_packet_set_log_preamble(ssh, "%suser %s",
|
|
|
|
authctxt->valid ? "authenticating" : "invalid ", authctxt->user);
|
2011-05-20 17:04:14 +08:00
|
|
|
|
2024-09-15 09:09:40 +08:00
|
|
|
if (options.refuse_connection) {
|
|
|
|
logit("administratively prohibited connection for "
|
|
|
|
"%s%s from %.128s port %d",
|
|
|
|
authctxt->valid ? "" : "invalid user ",
|
|
|
|
authctxt->user, ssh_remote_ipaddr(ssh),
|
|
|
|
ssh_remote_port(ssh));
|
|
|
|
cleanup_exit(EXIT_CONFIG_REFUSED);
|
|
|
|
}
|
|
|
|
|
2024-05-17 08:30:23 +08:00
|
|
|
/* Send active options to unpriv */
|
|
|
|
mm_encode_server_options(m);
|
2012-11-04 20:21:40 +08:00
|
|
|
|
|
|
|
/* Create valid auth method lists */
|
2016-08-14 01:47:40 +08:00
|
|
|
if (auth2_setup_methods_lists(authctxt) != 0) {
|
2012-11-04 20:21:40 +08:00
|
|
|
/*
|
|
|
|
* The monitor will continue long enough to let the child
|
2022-01-28 14:18:42 +08:00
|
|
|
* run to its packet_disconnect(), but it must not allow any
|
2012-11-04 20:21:40 +08:00
|
|
|
* authentication to succeed.
|
|
|
|
*/
|
2020-10-18 19:32:01 +08:00
|
|
|
debug_f("no valid authentication method lists");
|
2012-11-04 20:21:40 +08:00
|
|
|
}
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("sending MONITOR_ANS_PWNAM: %d", allowed);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PWNAM, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-08-14 01:47:40 +08:00
|
|
|
/* Allow service/style information on the auth context */
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1);
|
|
|
|
|
2002-05-08 10:24:42 +08:00
|
|
|
#ifdef USE_PAM
|
2003-05-14 13:11:48 +08:00
|
|
|
if (options.use_pam)
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_START, 1);
|
2002-05-08 10:24:42 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
int mm_answer_auth2_read_banner(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-05-13 09:07:41 +08:00
|
|
|
{
|
|
|
|
char *banner;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
2002-05-13 09:07:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
2002-05-13 09:07:41 +08:00
|
|
|
banner = auth2_read_banner();
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_cstring(m, banner != NULL ? banner : "")) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(banner);
|
2002-05-13 09:07:41 +08:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_authserv(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
monitor_permit_authentications(1);
|
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &authctxt->service, NULL)) != 0 ||
|
|
|
|
(r = sshbuf_get_cstring(m, &authctxt->style, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
|
|
|
debug3_f("service=%s, style=%s", authctxt->service, authctxt->style);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
if (strlen(authctxt->style) == 0) {
|
2013-06-02 05:31:17 +08:00
|
|
|
free(authctxt->style);
|
2002-03-22 10:30:41 +08:00
|
|
|
authctxt->style = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2018-11-16 10:43:56 +08:00
|
|
|
/*
|
|
|
|
* Check that the key type appears in the supplied pattern list, ignoring
|
|
|
|
* mismatches in the signature algorithm. (Signature algorithm checks are
|
|
|
|
* performed in the unprivileged authentication code).
|
|
|
|
* Returns 1 on success, 0 otherwise.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
key_base_type_match(const char *method, const struct sshkey *key,
|
|
|
|
const char *list)
|
|
|
|
{
|
|
|
|
char *s, *l, *ol = xstrdup(list);
|
|
|
|
int found = 0;
|
|
|
|
|
|
|
|
l = ol;
|
|
|
|
for ((s = strsep(&l, ",")); s && *s != '\0'; (s = strsep(&l, ","))) {
|
|
|
|
if (sshkey_type_from_name(s) == key->type) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!found) {
|
|
|
|
error("%s key type %s is not in permitted list %s", method,
|
|
|
|
sshkey_ssh_name(key), list);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(ol);
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_authpassword(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
static int call_count;
|
|
|
|
char *passwd;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r, authenticated;
|
|
|
|
size_t plen;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.password_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("password authentication not enabled");
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &passwd, &plen)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2002-03-22 10:30:41 +08:00
|
|
|
/* Only authenticate if the context is valid */
|
2002-06-07 04:57:17 +08:00
|
|
|
authenticated = options.password_authentication &&
|
2018-03-03 11:15:51 +08:00
|
|
|
auth_password(ssh, passwd);
|
2020-02-26 21:40:09 +08:00
|
|
|
freezero(passwd, plen);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, authenticated)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2016-07-18 07:33:25 +08:00
|
|
|
#ifdef USE_PAM
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, sshpam_get_maxtries_reached())) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble PAM");
|
2016-07-18 07:33:25 +08:00
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2002-06-07 05:40:51 +08:00
|
|
|
debug3("%s: sending result %d", __func__, authenticated);
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("sending result %d", authenticated);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_AUTHPASSWORD, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
call_count++;
|
|
|
|
if (plen == 0 && call_count == 1)
|
|
|
|
auth_method = "none";
|
|
|
|
else
|
|
|
|
auth_method = "password";
|
|
|
|
|
|
|
|
/* Causes monitor loop to terminate if authenticated */
|
|
|
|
return (authenticated);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef BSD_AUTH
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_bsdauthquery(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
char *name, *infotxt;
|
2018-07-10 05:53:45 +08:00
|
|
|
u_int numprompts, *echo_on, success;
|
2002-03-22 10:30:41 +08:00
|
|
|
char **prompts;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.kbd_interactive_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("kbd-int authentication not enabled");
|
2003-02-24 08:55:46 +08:00
|
|
|
success = bsdauth_query(authctxt, &name, &infotxt, &numprompts,
|
|
|
|
&prompts, &echo_on) < 0 ? 0 : 1;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, success)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (success) {
|
|
|
|
if ((r = sshbuf_put_cstring(m, prompts[0])) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble prompt");
|
2018-07-10 05:53:45 +08:00
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("sending challenge success: %u", success);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_BSDAUTHQUERY, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2003-02-24 08:55:46 +08:00
|
|
|
if (success) {
|
2013-06-02 05:31:17 +08:00
|
|
|
free(name);
|
|
|
|
free(infotxt);
|
|
|
|
free(prompts);
|
|
|
|
free(echo_on);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_bsdauthrespond(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
char *response;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r, authok;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.kbd_interactive_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("kbd-int authentication not enabled");
|
2015-10-21 07:24:25 +08:00
|
|
|
if (authctxt->as == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("no bsd auth session");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &response, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2021-07-03 17:23:28 +08:00
|
|
|
authok = options.kbd_interactive_authentication &&
|
2002-06-07 04:57:17 +08:00
|
|
|
auth_userresponse(authctxt->as, response, 0);
|
2002-03-22 10:30:41 +08:00
|
|
|
authctxt->as = NULL;
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("<%s> = <%d>", response, authok);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(response);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, authok)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("sending authenticated: %d", authok);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_BSDAUTHRESPOND, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2016-08-14 01:47:40 +08:00
|
|
|
auth_method = "keyboard-interactive";
|
|
|
|
auth_submethod = "bsdauth";
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
return (authok != 0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-04-23 18:28:48 +08:00
|
|
|
#ifdef USE_PAM
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_start(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-04-23 18:28:48 +08:00
|
|
|
{
|
2003-05-14 13:11:48 +08:00
|
|
|
if (!options.use_pam)
|
|
|
|
fatal("UsePAM not set, but ended up in %s anyway", __func__);
|
|
|
|
|
2019-01-20 07:22:18 +08:00
|
|
|
start_pam(ssh);
|
2002-04-23 18:28:48 +08:00
|
|
|
|
2003-08-25 11:08:49 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_ACCOUNT, 1);
|
2016-08-31 08:48:07 +08:00
|
|
|
if (options.kbd_interactive_authentication)
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_INIT_CTX, 1);
|
2003-08-25 11:08:49 +08:00
|
|
|
|
2002-04-23 18:28:48 +08:00
|
|
|
return (0);
|
|
|
|
}
|
2003-05-10 17:28:02 +08:00
|
|
|
|
2003-08-25 11:08:49 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_account(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-08-25 11:08:49 +08:00
|
|
|
{
|
|
|
|
u_int ret;
|
2018-07-10 17:39:52 +08:00
|
|
|
int r;
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2003-08-25 11:08:49 +08:00
|
|
|
if (!options.use_pam)
|
2016-08-31 08:48:07 +08:00
|
|
|
fatal("%s: PAM not enabled", __func__);
|
2003-08-25 11:08:49 +08:00
|
|
|
|
|
|
|
ret = do_pam_account();
|
|
|
|
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, ret)) != 0 ||
|
|
|
|
(r = sshbuf_put_stringb(m, loginmsg)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2003-08-25 11:08:49 +08:00
|
|
|
|
2004-06-22 11:22:50 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PAM_ACCOUNT, m);
|
2003-08-25 11:08:49 +08:00
|
|
|
|
|
|
|
return (ret);
|
|
|
|
}
|
|
|
|
|
2003-05-10 17:28:02 +08:00
|
|
|
static void *sshpam_ctxt, *sshpam_authok;
|
|
|
|
extern KbdintDevice sshpam_device;
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_init_ctx(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-05-10 17:28:02 +08:00
|
|
|
{
|
2018-07-10 17:39:52 +08:00
|
|
|
u_int ok = 0;
|
|
|
|
int r;
|
|
|
|
|
2003-05-10 17:28:02 +08:00
|
|
|
debug3("%s", __func__);
|
2016-08-31 08:48:07 +08:00
|
|
|
if (!options.kbd_interactive_authentication)
|
|
|
|
fatal("%s: kbd-int authentication not enabled", __func__);
|
2016-08-29 09:47:07 +08:00
|
|
|
if (sshpam_ctxt != NULL)
|
|
|
|
fatal("%s: already called", __func__);
|
2003-05-10 17:28:02 +08:00
|
|
|
sshpam_ctxt = (sshpam_device.init_ctx)(authctxt);
|
|
|
|
sshpam_authok = NULL;
|
2018-07-10 17:39:52 +08:00
|
|
|
sshbuf_reset(m);
|
2003-05-10 17:28:02 +08:00
|
|
|
if (sshpam_ctxt != NULL) {
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_FREE_CTX, 1);
|
2016-08-29 09:47:07 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_QUERY, 1);
|
2018-07-10 17:39:52 +08:00
|
|
|
ok = 1;
|
2003-05-10 17:28:02 +08:00
|
|
|
}
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, ok)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2004-06-22 11:22:50 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PAM_INIT_CTX, m);
|
2003-05-10 17:28:02 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_query(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-05-10 17:28:02 +08:00
|
|
|
{
|
2010-08-03 13:50:16 +08:00
|
|
|
char *name = NULL, *info = NULL, **prompts = NULL;
|
|
|
|
u_int i, num = 0, *echo_on = 0;
|
2018-07-10 17:39:52 +08:00
|
|
|
int r, ret;
|
2003-05-10 17:28:02 +08:00
|
|
|
|
|
|
|
debug3("%s", __func__);
|
|
|
|
sshpam_authok = NULL;
|
2016-08-29 09:47:07 +08:00
|
|
|
if (sshpam_ctxt == NULL)
|
|
|
|
fatal("%s: no context", __func__);
|
2016-08-31 08:48:07 +08:00
|
|
|
ret = (sshpam_device.query)(sshpam_ctxt, &name, &info,
|
|
|
|
&num, &prompts, &echo_on);
|
2003-05-10 17:28:02 +08:00
|
|
|
if (ret == 0 && num == 0)
|
|
|
|
sshpam_authok = sshpam_ctxt;
|
|
|
|
if (num > 1 || name == NULL || info == NULL)
|
2016-08-29 09:47:07 +08:00
|
|
|
fatal("sshpam_device.query failed");
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_RESPOND, 1);
|
2018-07-10 17:39:52 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, ret)) != 0 ||
|
|
|
|
(r = sshbuf_put_cstring(m, name)) != 0 ||
|
|
|
|
(r = sshbuf_put_cstring(m, info)) != 0 ||
|
|
|
|
(r = sshbuf_put_u32(m, sshpam_get_maxtries_reached())) != 0 ||
|
|
|
|
(r = sshbuf_put_u32(m, num)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2013-06-02 06:07:31 +08:00
|
|
|
free(name);
|
|
|
|
free(info);
|
2003-05-10 17:28:02 +08:00
|
|
|
for (i = 0; i < num; ++i) {
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_put_cstring(m, prompts[i])) != 0 ||
|
|
|
|
(r = sshbuf_put_u32(m, echo_on[i])) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2013-06-02 06:07:31 +08:00
|
|
|
free(prompts[i]);
|
2003-05-10 17:28:02 +08:00
|
|
|
}
|
2013-06-02 06:07:31 +08:00
|
|
|
free(prompts);
|
|
|
|
free(echo_on);
|
2012-12-03 06:53:20 +08:00
|
|
|
auth_method = "keyboard-interactive";
|
|
|
|
auth_submethod = "pam";
|
2004-06-22 11:22:50 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PAM_QUERY, m);
|
2003-05-10 17:28:02 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_respond(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-05-10 17:28:02 +08:00
|
|
|
{
|
|
|
|
char **resp;
|
2005-07-17 15:53:31 +08:00
|
|
|
u_int i, num;
|
2018-07-10 17:39:52 +08:00
|
|
|
int r, ret;
|
2003-05-10 17:28:02 +08:00
|
|
|
|
|
|
|
debug3("%s", __func__);
|
2016-08-29 09:47:07 +08:00
|
|
|
if (sshpam_ctxt == NULL)
|
|
|
|
fatal("%s: no context", __func__);
|
2003-05-10 17:28:02 +08:00
|
|
|
sshpam_authok = NULL;
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_get_u32(m, &num)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2023-03-09 15:24:54 +08:00
|
|
|
if (num > PAM_MAX_NUM_MSG) {
|
|
|
|
fatal_f("Too many PAM messages, got %u, expected <= %u",
|
|
|
|
num, (unsigned)PAM_MAX_NUM_MSG);
|
|
|
|
}
|
2003-05-10 17:28:02 +08:00
|
|
|
if (num > 0) {
|
2006-05-04 14:24:34 +08:00
|
|
|
resp = xcalloc(num, sizeof(char *));
|
2018-07-10 17:39:52 +08:00
|
|
|
for (i = 0; i < num; ++i) {
|
|
|
|
if ((r = sshbuf_get_cstring(m, &(resp[i]), NULL)) != 0)
|
|
|
|
fatal("%s: buffer error: %s",
|
|
|
|
__func__, ssh_err(r));
|
|
|
|
}
|
2003-05-10 17:28:02 +08:00
|
|
|
ret = (sshpam_device.respond)(sshpam_ctxt, num, resp);
|
|
|
|
for (i = 0; i < num; ++i)
|
2013-06-02 06:07:31 +08:00
|
|
|
free(resp[i]);
|
|
|
|
free(resp);
|
2003-05-10 17:28:02 +08:00
|
|
|
} else {
|
|
|
|
ret = (sshpam_device.respond)(sshpam_ctxt, num, NULL);
|
|
|
|
}
|
2018-07-10 17:39:52 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, ret)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2004-06-22 11:22:50 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PAM_RESPOND, m);
|
2012-12-03 06:53:20 +08:00
|
|
|
auth_method = "keyboard-interactive";
|
|
|
|
auth_submethod = "pam";
|
2003-05-10 17:28:02 +08:00
|
|
|
if (ret == 0)
|
|
|
|
sshpam_authok = sshpam_ctxt;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pam_free_ctx(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-05-10 17:28:02 +08:00
|
|
|
{
|
2015-08-11 11:34:12 +08:00
|
|
|
int r = sshpam_authok != NULL && sshpam_authok == sshpam_ctxt;
|
2003-05-10 17:28:02 +08:00
|
|
|
|
|
|
|
debug3("%s", __func__);
|
2016-08-29 09:47:07 +08:00
|
|
|
if (sshpam_ctxt == NULL)
|
|
|
|
fatal("%s: no context", __func__);
|
2003-05-10 17:28:02 +08:00
|
|
|
(sshpam_device.free_ctx)(sshpam_ctxt);
|
2015-08-11 11:34:12 +08:00
|
|
|
sshpam_ctxt = sshpam_authok = NULL;
|
2018-07-10 17:39:52 +08:00
|
|
|
sshbuf_reset(m);
|
2004-06-22 11:22:50 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PAM_FREE_CTX, m);
|
2016-08-29 09:47:07 +08:00
|
|
|
/* Allow another attempt */
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PAM_INIT_CTX, 1);
|
2012-12-03 06:53:20 +08:00
|
|
|
auth_method = "keyboard-interactive";
|
|
|
|
auth_submethod = "pam";
|
2015-08-11 11:34:12 +08:00
|
|
|
return r;
|
2003-05-10 17:28:02 +08:00
|
|
|
}
|
2002-04-23 18:28:48 +08:00
|
|
|
#endif
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_keyallowed(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
struct sshkey *key = NULL;
|
2002-09-12 07:49:15 +08:00
|
|
|
char *cuser, *chost;
|
2018-07-10 05:53:45 +08:00
|
|
|
u_int pubkey_auth_attempt;
|
2021-03-04 06:41:49 +08:00
|
|
|
u_int type = 0;
|
2018-03-03 11:15:51 +08:00
|
|
|
int r, allowed = 0;
|
|
|
|
struct sshauthopt *opts = NULL;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("entering");
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u32(m, &type)) != 0 ||
|
|
|
|
(r = sshbuf_get_cstring(m, &cuser, NULL)) != 0 ||
|
|
|
|
(r = sshbuf_get_cstring(m, &chost, NULL)) != 0 ||
|
|
|
|
(r = sshkey_froms(m, &key)) != 0 ||
|
|
|
|
(r = sshbuf_get_u32(m, &pubkey_auth_attempt)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2003-11-17 18:13:40 +08:00
|
|
|
if (key != NULL && authctxt->valid) {
|
2005-03-14 20:08:12 +08:00
|
|
|
switch (type) {
|
2002-03-22 10:30:41 +08:00
|
|
|
case MM_USERKEY:
|
2006-03-31 20:14:23 +08:00
|
|
|
auth_method = "publickey";
|
2018-03-03 11:15:51 +08:00
|
|
|
if (!options.pubkey_authentication)
|
|
|
|
break;
|
|
|
|
if (auth2_key_already_used(authctxt, key))
|
|
|
|
break;
|
2018-11-16 10:43:56 +08:00
|
|
|
if (!key_base_type_match(auth_method, key,
|
2021-01-22 10:44:58 +08:00
|
|
|
options.pubkey_accepted_algos))
|
2018-03-03 11:15:51 +08:00
|
|
|
break;
|
2022-06-16 00:08:25 +08:00
|
|
|
allowed = user_key_allowed(ssh, authctxt->pw, key,
|
|
|
|
pubkey_auth_attempt, &opts);
|
2002-03-22 10:30:41 +08:00
|
|
|
break;
|
|
|
|
case MM_HOSTKEY:
|
2018-03-03 11:15:51 +08:00
|
|
|
auth_method = "hostbased";
|
|
|
|
if (!options.hostbased_authentication)
|
|
|
|
break;
|
|
|
|
if (auth2_key_already_used(authctxt, key))
|
|
|
|
break;
|
2018-11-16 10:43:56 +08:00
|
|
|
if (!key_base_type_match(auth_method, key,
|
2021-01-26 13:32:21 +08:00
|
|
|
options.hostbased_accepted_algos))
|
2018-03-03 11:15:51 +08:00
|
|
|
break;
|
2019-01-20 05:43:56 +08:00
|
|
|
allowed = hostbased_key_allowed(ssh, authctxt->pw,
|
2002-03-22 10:30:41 +08:00
|
|
|
cuser, chost, key);
|
2017-06-24 14:34:38 +08:00
|
|
|
auth2_record_info(authctxt,
|
2013-07-18 14:10:09 +08:00
|
|
|
"client user \"%.100s\", client host \"%.100s\"",
|
|
|
|
cuser, chost);
|
2002-03-22 10:30:41 +08:00
|
|
|
break;
|
|
|
|
default:
|
2021-03-04 06:41:49 +08:00
|
|
|
fatal_f("unknown key type %u", type);
|
2002-03-22 10:30:41 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2016-07-22 11:39:13 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("%s authentication%s: %s key is %s", auth_method,
|
|
|
|
pubkey_auth_attempt ? "" : " test",
|
2018-03-03 11:15:51 +08:00
|
|
|
(key == NULL || !authctxt->valid) ? "invalid" : sshkey_type(key),
|
|
|
|
allowed ? "allowed" : "not allowed");
|
2016-07-22 11:39:13 +08:00
|
|
|
|
2017-06-24 14:34:38 +08:00
|
|
|
auth2_record_key(authctxt, 0, key);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* clear temporarily storage (used by verify) */
|
|
|
|
monitor_reset_key_state();
|
|
|
|
|
|
|
|
if (allowed) {
|
|
|
|
/* Save temporarily for comparison in verify */
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshkey_to_blob(key, &key_blob, &key_bloblen)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "sshkey_to_blob");
|
2002-03-22 10:30:41 +08:00
|
|
|
key_blobtype = type;
|
2018-03-03 11:15:51 +08:00
|
|
|
key_opts = opts;
|
2002-03-22 10:30:41 +08:00
|
|
|
hostbased_cuser = cuser;
|
|
|
|
hostbased_chost = chost;
|
2006-03-26 11:01:54 +08:00
|
|
|
} else {
|
2006-03-31 20:14:23 +08:00
|
|
|
/* Log failed attempt */
|
2019-01-20 05:41:18 +08:00
|
|
|
auth_log(ssh, 0, 0, auth_method, NULL);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(cuser);
|
|
|
|
free(chost);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
2018-07-10 05:53:45 +08:00
|
|
|
sshkey_free(key);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, allowed)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2018-03-03 11:15:51 +08:00
|
|
|
if (opts != NULL && (r = sshauthopt_serialise(opts, m, 1)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "sshauthopt_serialise");
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-03-03 11:15:51 +08:00
|
|
|
if (!allowed)
|
|
|
|
sshauthopt_free(opts);
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2021-01-27 17:26:53 +08:00
|
|
|
monitor_valid_userblob(struct ssh *ssh, const u_char *data, u_int datalen)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
struct sshbuf *b;
|
2021-12-20 06:12:30 +08:00
|
|
|
struct sshkey *hostkey = NULL;
|
2018-07-10 05:53:45 +08:00
|
|
|
const u_char *p;
|
2016-05-02 16:49:03 +08:00
|
|
|
char *userstyle, *cp;
|
2018-07-10 05:53:45 +08:00
|
|
|
size_t len;
|
|
|
|
u_char type;
|
2021-12-20 06:12:30 +08:00
|
|
|
int hostbound = 0, r, fail = 0;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
if ((b = sshbuf_from(data, datalen)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_from");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2021-01-27 17:26:53 +08:00
|
|
|
if (ssh->compat & SSH_OLD_SESSIONID) {
|
2018-07-10 05:53:45 +08:00
|
|
|
p = sshbuf_ptr(b);
|
|
|
|
len = sshbuf_len(b);
|
2002-06-07 04:58:19 +08:00
|
|
|
if ((session_id2 == NULL) ||
|
|
|
|
(len < session_id2_len) ||
|
2010-07-16 11:58:37 +08:00
|
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
|
2002-06-07 04:58:19 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_consume(b, session_id2_len)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "consume");
|
2002-03-22 10:30:41 +08:00
|
|
|
} else {
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_string_direct(b, &p, &len)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse sessionid");
|
2002-06-07 04:58:19 +08:00
|
|
|
if ((session_id2 == NULL) ||
|
|
|
|
(len != session_id2_len) ||
|
2010-07-16 11:58:37 +08:00
|
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
|
|
|
}
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u8(b, &type)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse type");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (type != SSH2_MSG_USERAUTH_REQUEST)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse userstyle");
|
2013-04-23 13:17:52 +08:00
|
|
|
xasprintf(&userstyle, "%s%s%s", authctxt->user,
|
|
|
|
authctxt->style ? ":" : "",
|
|
|
|
authctxt->style ? authctxt->style : "");
|
2016-05-02 16:49:03 +08:00
|
|
|
if (strcmp(userstyle, cp) != 0) {
|
|
|
|
logit("wrong user name passed to monitor: "
|
|
|
|
"expected %s != %.100s", userstyle, cp);
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
|
|
|
}
|
2013-06-02 05:31:17 +08:00
|
|
|
free(userstyle);
|
2016-05-02 16:49:03 +08:00
|
|
|
free(cp);
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_skip_string(b)) != 0 || /* service */
|
|
|
|
(r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse method");
|
2021-12-20 06:12:30 +08:00
|
|
|
if (strcmp("publickey", cp) != 0) {
|
|
|
|
if (strcmp("publickey-hostbound-v00@openssh.com", cp) == 0)
|
|
|
|
hostbound = 1;
|
|
|
|
else
|
|
|
|
fail++;
|
|
|
|
}
|
2018-01-23 13:27:21 +08:00
|
|
|
free(cp);
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u8(b, &type)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse pktype");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (type == 0)
|
2018-01-23 13:27:21 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_skip_string(b)) != 0 || /* pkalg */
|
2021-12-20 06:12:30 +08:00
|
|
|
(r = sshbuf_skip_string(b)) != 0 || /* pkblob */
|
|
|
|
(hostbound && (r = sshkey_froms(b, &hostkey)) != 0))
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse pk");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (sshbuf_len(b) != 0)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_free(b);
|
2021-12-20 06:12:30 +08:00
|
|
|
if (hostkey != NULL) {
|
|
|
|
/*
|
|
|
|
* Ensure this is actually one of our hostkeys; unfortunately
|
|
|
|
* can't check ssh->kex->initial_hostkey directly at this point
|
|
|
|
* as packet state has not yet been exported to monitor.
|
|
|
|
*/
|
|
|
|
if (get_hostkey_index(hostkey, 1, ssh) == -1)
|
|
|
|
fatal_f("hostbound hostkey does not match");
|
|
|
|
sshkey_free(hostkey);
|
|
|
|
}
|
2002-03-22 10:30:41 +08:00
|
|
|
return (fail == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-11-25 08:52:46 +08:00
|
|
|
monitor_valid_hostbasedblob(const u_char *data, u_int datalen,
|
|
|
|
const char *cuser, const char *chost)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2018-07-10 05:53:45 +08:00
|
|
|
struct sshbuf *b;
|
|
|
|
const u_char *p;
|
|
|
|
char *cp, *userstyle;
|
|
|
|
size_t len;
|
|
|
|
int r, fail = 0;
|
|
|
|
u_char type;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
if ((b = sshbuf_from(data, datalen)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new");
|
2019-11-25 08:52:46 +08:00
|
|
|
if ((r = sshbuf_get_string_direct(b, &p, &len)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse sessionid");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2002-06-07 04:58:19 +08:00
|
|
|
if ((session_id2 == NULL) ||
|
|
|
|
(len != session_id2_len) ||
|
2010-07-16 11:58:37 +08:00
|
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2002-06-07 04:58:19 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_u8(b, &type)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse type");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (type != SSH2_MSG_USERAUTH_REQUEST)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse userstyle");
|
2013-04-23 13:17:52 +08:00
|
|
|
xasprintf(&userstyle, "%s%s%s", authctxt->user,
|
|
|
|
authctxt->style ? ":" : "",
|
|
|
|
authctxt->style ? authctxt->style : "");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (strcmp(userstyle, cp) != 0) {
|
|
|
|
logit("wrong user name passed to monitor: "
|
|
|
|
"expected %s != %.100s", userstyle, cp);
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
|
|
|
}
|
2013-04-23 13:17:52 +08:00
|
|
|
free(userstyle);
|
2018-07-10 05:53:45 +08:00
|
|
|
free(cp);
|
|
|
|
if ((r = sshbuf_skip_string(b)) != 0 || /* service */
|
|
|
|
(r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse method");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (strcmp(cp, "hostbased") != 0)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
free(cp);
|
|
|
|
if ((r = sshbuf_skip_string(b)) != 0 || /* pkalg */
|
|
|
|
(r = sshbuf_skip_string(b)) != 0) /* pkblob */
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse pk");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* verify client host, strip trailing dot if necessary */
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse host");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (((len = strlen(cp)) > 0) && cp[len - 1] == '.')
|
|
|
|
cp[len - 1] = '\0';
|
|
|
|
if (strcmp(cp, chost) != 0)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
free(cp);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* verify client user */
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(b, &cp, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse ruser");
|
2018-07-10 05:53:45 +08:00
|
|
|
if (strcmp(cp, cuser) != 0)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
free(cp);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if (sshbuf_len(b) != 0)
|
2002-03-22 10:30:41 +08:00
|
|
|
fail++;
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_free(b);
|
2002-03-22 10:30:41 +08:00
|
|
|
return (fail == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_keyverify(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2017-05-30 16:52:19 +08:00
|
|
|
struct sshkey *key;
|
2019-11-25 08:52:46 +08:00
|
|
|
const u_char *signature, *data, *blob;
|
|
|
|
char *sigalg = NULL, *fp = NULL;
|
2017-05-30 22:10:53 +08:00
|
|
|
size_t signaturelen, datalen, bloblen;
|
2020-08-27 09:07:09 +08:00
|
|
|
int r, ret, req_presence = 0, req_verify = 0, valid_data = 0;
|
|
|
|
int encoded_ret;
|
2019-11-25 08:51:37 +08:00
|
|
|
struct sshkey_sig_details *sig_details = NULL;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
if ((r = sshbuf_get_string_direct(m, &blob, &bloblen)) != 0 ||
|
|
|
|
(r = sshbuf_get_string_direct(m, &signature, &signaturelen)) != 0 ||
|
|
|
|
(r = sshbuf_get_string_direct(m, &data, &datalen)) != 0 ||
|
2017-12-18 10:25:15 +08:00
|
|
|
(r = sshbuf_get_cstring(m, &sigalg, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
if (hostbased_cuser == NULL || hostbased_chost == NULL ||
|
2002-03-28 02:00:59 +08:00
|
|
|
!monitor_allowed_key(blob, bloblen))
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("bad key, not previously allowed");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2017-12-21 08:00:28 +08:00
|
|
|
/* Empty signature algorithm means NULL. */
|
|
|
|
if (*sigalg == '\0') {
|
|
|
|
free(sigalg);
|
|
|
|
sigalg = NULL;
|
|
|
|
}
|
|
|
|
|
2017-05-30 22:10:53 +08:00
|
|
|
/* XXX use sshkey_froms here; need to change key_blob, etc. */
|
|
|
|
if ((r = sshkey_from_blob(blob, bloblen, &key)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse key");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
switch (key_blobtype) {
|
|
|
|
case MM_USERKEY:
|
2021-01-27 17:26:53 +08:00
|
|
|
valid_data = monitor_valid_userblob(ssh, data, datalen);
|
2017-06-24 14:34:38 +08:00
|
|
|
auth_method = "publickey";
|
2002-03-22 10:30:41 +08:00
|
|
|
break;
|
|
|
|
case MM_HOSTKEY:
|
|
|
|
valid_data = monitor_valid_hostbasedblob(data, datalen,
|
|
|
|
hostbased_cuser, hostbased_chost);
|
2017-06-24 14:34:38 +08:00
|
|
|
auth_method = "hostbased";
|
2002-03-22 10:30:41 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
valid_data = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!valid_data)
|
2021-01-27 18:05:28 +08:00
|
|
|
fatal_f("bad %s signature data blob",
|
|
|
|
key_blobtype == MM_USERKEY ? "userkey" :
|
|
|
|
(key_blobtype == MM_HOSTKEY ? "hostkey" : "unknown"));
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
if ((fp = sshkey_fingerprint(key, options.fingerprint_hash,
|
|
|
|
SSH_FP_DEFAULT)) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshkey_fingerprint failed");
|
2019-11-25 08:52:46 +08:00
|
|
|
|
2017-05-30 22:10:53 +08:00
|
|
|
ret = sshkey_verify(key, signature, signaturelen, data, datalen,
|
2019-11-25 08:51:37 +08:00
|
|
|
sigalg, ssh->compat, &sig_details);
|
2022-01-07 06:03:59 +08:00
|
|
|
debug3_f("%s %s signature using %s %s%s%s", auth_method,
|
|
|
|
sshkey_type(key), sigalg == NULL ? "default" : sigalg,
|
2019-11-20 06:21:15 +08:00
|
|
|
(ret == 0) ? "verified" : "unverified",
|
|
|
|
(ret != 0) ? ": " : "", (ret != 0) ? ssh_err(ret) : "");
|
2014-12-22 15:51:30 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
if (ret == 0 && key_blobtype == MM_USERKEY && sig_details != NULL) {
|
|
|
|
req_presence = (options.pubkey_auth_options &
|
2019-11-25 08:54:23 +08:00
|
|
|
PUBKEYAUTH_TOUCH_REQUIRED) ||
|
|
|
|
!key_opts->no_require_user_presence;
|
2019-11-25 08:52:46 +08:00
|
|
|
if (req_presence &&
|
|
|
|
(sig_details->sk_flags & SSH_SK_USER_PRESENCE_REQD) == 0) {
|
|
|
|
error("public key %s %s signature for %s%s from %.128s "
|
2020-02-07 06:30:54 +08:00
|
|
|
"port %d rejected: user presence "
|
|
|
|
"(authenticator touch) requirement not met ",
|
|
|
|
sshkey_type(key), fp,
|
2019-11-25 08:52:46 +08:00
|
|
|
authctxt->valid ? "" : "invalid user ",
|
|
|
|
authctxt->user, ssh_remote_ipaddr(ssh),
|
|
|
|
ssh_remote_port(ssh));
|
|
|
|
ret = SSH_ERR_SIGNATURE_INVALID;
|
|
|
|
}
|
2020-08-27 09:07:09 +08:00
|
|
|
req_verify = (options.pubkey_auth_options &
|
|
|
|
PUBKEYAUTH_VERIFY_REQUIRED) || key_opts->require_verify;
|
|
|
|
if (req_verify &&
|
|
|
|
(sig_details->sk_flags & SSH_SK_USER_VERIFICATION_REQD) == 0) {
|
|
|
|
error("public key %s %s signature for %s%s from %.128s "
|
|
|
|
"port %d rejected: user verification requirement "
|
|
|
|
"not met ", sshkey_type(key), fp,
|
|
|
|
authctxt->valid ? "" : "invalid user ",
|
|
|
|
authctxt->user, ssh_remote_ipaddr(ssh),
|
|
|
|
ssh_remote_port(ssh));
|
|
|
|
ret = SSH_ERR_SIGNATURE_INVALID;
|
|
|
|
}
|
2019-11-25 08:52:46 +08:00
|
|
|
}
|
|
|
|
auth2_record_key(authctxt, ret == 0, key);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2024-09-15 08:41:18 +08:00
|
|
|
if (key_blobtype == MM_USERKEY && ret == 0)
|
2018-03-03 11:15:51 +08:00
|
|
|
auth_activate_options(ssh, key_opts);
|
2002-03-22 10:30:41 +08:00
|
|
|
monitor_reset_key_state();
|
|
|
|
|
2017-05-30 22:10:53 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
|
|
|
|
/* encode ret != 0 as positive integer, since we're sending u32 */
|
|
|
|
encoded_ret = (ret != 0);
|
2019-11-25 08:51:37 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, encoded_ret)) != 0 ||
|
2019-11-25 18:23:36 +08:00
|
|
|
(r = sshbuf_put_u8(m, sig_details != NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2019-11-25 08:51:37 +08:00
|
|
|
if (sig_details != NULL) {
|
|
|
|
if ((r = sshbuf_put_u32(m, sig_details->sk_counter)) != 0 ||
|
|
|
|
(r = sshbuf_put_u8(m, sig_details->sk_flags)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble sk");
|
2019-11-25 08:51:37 +08:00
|
|
|
}
|
|
|
|
sshkey_sig_details_free(sig_details);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_KEYVERIFY, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-11-25 08:52:46 +08:00
|
|
|
free(sigalg);
|
|
|
|
free(fp);
|
|
|
|
sshkey_free(key);
|
|
|
|
|
2017-05-30 22:10:53 +08:00
|
|
|
return ret == 0;
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_record_login(struct ssh *ssh, Session *s, struct passwd *pw)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
socklen_t fromlen;
|
|
|
|
struct sockaddr_storage from;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get IP address of client. If the connection is not a socket, let
|
|
|
|
* the address be 0.0.0.0.
|
|
|
|
*/
|
|
|
|
memset(&from, 0, sizeof(from));
|
2002-09-04 14:45:09 +08:00
|
|
|
fromlen = sizeof(from);
|
2019-01-20 05:43:07 +08:00
|
|
|
if (ssh_packet_connection_is_on_socket(ssh)) {
|
|
|
|
if (getpeername(ssh_packet_get_connection_in(ssh),
|
2019-06-28 21:35:04 +08:00
|
|
|
(struct sockaddr *)&from, &fromlen) == -1) {
|
2002-03-22 10:30:41 +08:00
|
|
|
debug("getpeername: %.100s", strerror(errno));
|
2003-10-02 14:12:36 +08:00
|
|
|
cleanup_exit(255);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Record that there was a login on that tty from the remote host. */
|
|
|
|
record_login(s->pid, s->tty, pw->pw_name, pw->pw_uid,
|
2016-03-08 03:02:43 +08:00
|
|
|
session_get_remote_name_or_ip(ssh, utmp_len, options.use_dns),
|
2002-09-04 14:45:09 +08:00
|
|
|
(struct sockaddr *)&from, fromlen);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
mm_session_close(Session *s)
|
|
|
|
{
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("session %d pid %ld", s->self, (long)s->pid);
|
2002-03-22 10:30:41 +08:00
|
|
|
if (s->ttyfd != -1) {
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("tty %s ptyfd %d", s->tty, s->ptyfd);
|
2002-03-22 10:30:41 +08:00
|
|
|
session_pty_cleanup2(s);
|
|
|
|
}
|
2008-05-19 13:34:50 +08:00
|
|
|
session_unused(s->self);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pty(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2002-05-16 00:25:01 +08:00
|
|
|
extern struct monitor *pmonitor;
|
2002-03-22 10:30:41 +08:00
|
|
|
Session *s;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r, res, fd0;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("entering");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
2002-03-22 10:30:41 +08:00
|
|
|
s = session_new();
|
|
|
|
if (s == NULL)
|
|
|
|
goto error;
|
|
|
|
s->authctxt = authctxt;
|
|
|
|
s->pw = authctxt->pw;
|
2002-05-16 00:25:01 +08:00
|
|
|
s->pid = pmonitor->m_pid;
|
2002-03-22 10:30:41 +08:00
|
|
|
res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty));
|
|
|
|
if (res == 0)
|
|
|
|
goto error;
|
|
|
|
pty_setowner(authctxt->pw, s->tty);
|
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, 1)) != 0 ||
|
|
|
|
(r = sshbuf_put_cstring(m, s->tty)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* We need to trick ttyslot */
|
|
|
|
if (dup2(s->ttyfd, 0) == -1)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("dup2");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_record_login(ssh, s, authctxt->pw);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* Now we can close the file descriptor again */
|
|
|
|
close(0);
|
|
|
|
|
2004-07-17 15:05:14 +08:00
|
|
|
/* send messages generated by record_login */
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_stringb(m, loginmsg)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble loginmsg");
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(loginmsg);
|
2004-07-17 15:05:14 +08:00
|
|
|
|
|
|
|
mm_request_send(sock, MONITOR_ANS_PTY, m);
|
|
|
|
|
2007-09-17 10:04:08 +08:00
|
|
|
if (mm_send_fd(sock, s->ptyfd) == -1 ||
|
|
|
|
mm_send_fd(sock, s->ttyfd) == -1)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("send fds failed");
|
2004-07-17 15:05:14 +08:00
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
/* make sure nothing uses fd 0 */
|
2019-06-28 21:35:04 +08:00
|
|
|
if ((fd0 = open(_PATH_DEVNULL, O_RDONLY)) == -1)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("open(/dev/null): %s", strerror(errno));
|
2002-03-22 10:30:41 +08:00
|
|
|
if (fd0 != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
error_f("fd0 %d != 0", fd0);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-07-07 10:47:21 +08:00
|
|
|
/* slave side of pty is not needed */
|
2002-03-22 10:30:41 +08:00
|
|
|
close(s->ttyfd);
|
|
|
|
s->ttyfd = s->ptyfd;
|
|
|
|
/* no need to dup() because nobody closes ptyfd */
|
|
|
|
s->ptymaster = s->ptyfd;
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("tty %s ptyfd %d", s->tty, s->ttyfd);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
error:
|
|
|
|
if (s != NULL)
|
|
|
|
mm_session_close(s);
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_put_u32(m, 0)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble 0");
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_PTY, m);
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_pty_cleanup(struct ssh *ssh, int sock, struct sshbuf *m)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
|
|
|
Session *s;
|
|
|
|
char *tty;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("entering");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &tty, NULL)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse tty");
|
2002-03-22 10:30:41 +08:00
|
|
|
if ((s = session_by_tty(tty)) != NULL)
|
|
|
|
mm_session_close(s);
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(tty);
|
2002-03-22 10:30:41 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_term(struct ssh *ssh, int sock, struct sshbuf *req)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2002-05-16 00:25:01 +08:00
|
|
|
extern struct monitor *pmonitor;
|
2002-03-22 10:30:41 +08:00
|
|
|
int res, status;
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("tearing down sessions");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
/* The child is terminating */
|
2017-09-12 14:32:07 +08:00
|
|
|
session_destroy_all(ssh, &mm_session_close);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2008-03-11 19:58:25 +08:00
|
|
|
#ifdef USE_PAM
|
|
|
|
if (options.use_pam)
|
|
|
|
sshpam_cleanup();
|
|
|
|
#endif
|
|
|
|
|
2002-05-16 00:25:01 +08:00
|
|
|
while (waitpid(pmonitor->m_pid, &status, 0) == -1)
|
2002-04-03 04:48:19 +08:00
|
|
|
if (errno != EINTR)
|
|
|
|
exit(1);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
res = WIFEXITED(status) ? WEXITSTATUS(status) : 1;
|
|
|
|
|
|
|
|
/* Terminate process */
|
2004-05-13 14:39:33 +08:00
|
|
|
exit(res);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
2005-02-08 18:52:47 +08:00
|
|
|
#ifdef SSH_AUDIT_EVENTS
|
2005-02-02 21:20:53 +08:00
|
|
|
/* Report that an audit event occurred */
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_audit_event(struct ssh *ssh, int socket, struct sshbuf *m)
|
2005-02-02 21:20:53 +08:00
|
|
|
{
|
2018-07-10 17:39:52 +08:00
|
|
|
u_int n;
|
2005-02-02 21:20:53 +08:00
|
|
|
ssh_audit_event_t event;
|
2018-07-10 17:39:52 +08:00
|
|
|
int r;
|
2005-02-02 21:20:53 +08:00
|
|
|
|
|
|
|
debug3("%s entering", __func__);
|
|
|
|
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_get_u32(m, &n)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
|
|
|
event = (ssh_audit_event_t)n;
|
|
|
|
switch (event) {
|
2005-02-08 18:52:47 +08:00
|
|
|
case SSH_AUTH_FAIL_PUBKEY:
|
|
|
|
case SSH_AUTH_FAIL_HOSTBASED:
|
|
|
|
case SSH_AUTH_FAIL_GSSAPI:
|
|
|
|
case SSH_LOGIN_EXCEED_MAXTRIES:
|
|
|
|
case SSH_LOGIN_ROOT_DENIED:
|
|
|
|
case SSH_CONNECTION_CLOSE:
|
|
|
|
case SSH_INVALID_USER:
|
2019-01-20 11:55:27 +08:00
|
|
|
audit_event(ssh, event);
|
2005-02-02 21:20:53 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fatal("Audit event type %d not permitted", event);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_audit_command(struct ssh *ssh, int socket, struct sshbuf *m)
|
2005-02-02 21:20:53 +08:00
|
|
|
{
|
|
|
|
char *cmd;
|
2018-07-10 17:39:52 +08:00
|
|
|
int r;
|
2005-02-02 21:20:53 +08:00
|
|
|
|
|
|
|
debug3("%s entering", __func__);
|
2018-07-10 17:39:52 +08:00
|
|
|
if ((r = sshbuf_get_cstring(m, &cmd, NULL)) != 0)
|
|
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
2005-02-02 21:20:53 +08:00
|
|
|
/* sanity check command, if so how? */
|
|
|
|
audit_run_command(cmd);
|
2013-06-02 06:07:31 +08:00
|
|
|
free(cmd);
|
2005-02-02 21:20:53 +08:00
|
|
|
return (0);
|
|
|
|
}
|
2005-02-08 18:52:47 +08:00
|
|
|
#endif /* SSH_AUDIT_EVENTS */
|
2005-02-02 21:20:53 +08:00
|
|
|
|
2017-05-31 16:09:45 +08:00
|
|
|
void
|
2019-01-20 05:43:07 +08:00
|
|
|
monitor_clear_keystate(struct ssh *ssh, struct monitor *pmonitor)
|
2017-05-31 16:09:45 +08:00
|
|
|
{
|
|
|
|
ssh_clear_newkeys(ssh, MODE_IN);
|
|
|
|
ssh_clear_newkeys(ssh, MODE_OUT);
|
|
|
|
sshbuf_free(child_state);
|
|
|
|
child_state = NULL;
|
|
|
|
}
|
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
void
|
2019-01-20 05:43:07 +08:00
|
|
|
monitor_apply_keystate(struct ssh *ssh, struct monitor *pmonitor)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2015-01-20 03:52:16 +08:00
|
|
|
struct kex *kex;
|
|
|
|
int r;
|
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("packet_set_state");
|
2015-01-20 03:52:16 +08:00
|
|
|
if ((r = ssh_packet_set_state(ssh, child_state)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "packet_set_state");
|
2015-01-20 03:52:16 +08:00
|
|
|
sshbuf_free(child_state);
|
|
|
|
child_state = NULL;
|
2021-01-27 18:05:28 +08:00
|
|
|
if ((kex = ssh->kex) == NULL)
|
|
|
|
fatal_f("internal error: ssh->kex == NULL");
|
|
|
|
if (session_id2_len != sshbuf_len(ssh->kex->session_id)) {
|
|
|
|
fatal_f("incorrect session id length %zu (expected %u)",
|
|
|
|
sshbuf_len(ssh->kex->session_id), session_id2_len);
|
|
|
|
}
|
|
|
|
if (memcmp(sshbuf_ptr(ssh->kex->session_id), session_id2,
|
|
|
|
session_id2_len) != 0)
|
|
|
|
fatal_f("session ID mismatch");
|
|
|
|
/* XXX set callbacks */
|
2015-01-30 20:10:17 +08:00
|
|
|
#ifdef WITH_OPENSSL
|
2021-01-27 18:05:28 +08:00
|
|
|
kex->kex[KEX_DH_GRP1_SHA1] = kex_gen_server;
|
|
|
|
kex->kex[KEX_DH_GRP14_SHA1] = kex_gen_server;
|
|
|
|
kex->kex[KEX_DH_GRP14_SHA256] = kex_gen_server;
|
|
|
|
kex->kex[KEX_DH_GRP16_SHA512] = kex_gen_server;
|
|
|
|
kex->kex[KEX_DH_GRP18_SHA512] = kex_gen_server;
|
|
|
|
kex->kex[KEX_DH_GEX_SHA1] = kexgex_server;
|
|
|
|
kex->kex[KEX_DH_GEX_SHA256] = kexgex_server;
|
2015-02-23 02:04:21 +08:00
|
|
|
# ifdef OPENSSL_HAS_ECC
|
2021-01-27 18:05:28 +08:00
|
|
|
kex->kex[KEX_ECDH_SHA2] = kex_gen_server;
|
2015-02-23 02:04:21 +08:00
|
|
|
# endif
|
2015-01-30 20:10:17 +08:00
|
|
|
#endif /* WITH_OPENSSL */
|
2021-01-27 18:05:28 +08:00
|
|
|
kex->kex[KEX_C25519_SHA256] = kex_gen_server;
|
|
|
|
kex->kex[KEX_KEM_SNTRUP761X25519_SHA512] = kex_gen_server;
|
2024-09-02 20:13:56 +08:00
|
|
|
kex->kex[KEX_KEM_MLKEM768X25519_SHA256] = kex_gen_server;
|
2021-01-27 18:05:28 +08:00
|
|
|
kex->load_host_public_key=&get_hostkey_public_by_type;
|
|
|
|
kex->load_host_private_key=&get_hostkey_private_by_type;
|
|
|
|
kex->host_key_index=&get_hostkey_index;
|
|
|
|
kex->sign = sshd_hostkey_sign;
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
2020-03-13 11:17:07 +08:00
|
|
|
/* This function requires careful sanity checking */
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
void
|
2019-01-20 05:43:56 +08:00
|
|
|
mm_get_keystate(struct ssh *ssh, struct monitor *pmonitor)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("Waiting for new keys");
|
2002-03-22 10:30:41 +08:00
|
|
|
|
2015-01-20 03:52:16 +08:00
|
|
|
if ((child_state = sshbuf_new()) == NULL)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("sshbuf_new failed");
|
2015-01-20 03:52:16 +08:00
|
|
|
mm_request_receive_expect(pmonitor->m_sendfd, MONITOR_REQ_KEYEXPORT,
|
|
|
|
child_state);
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("GOT new keys");
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* XXX */
|
|
|
|
|
|
|
|
#define FD_CLOSEONEXEC(x) do { \
|
2011-05-20 17:02:47 +08:00
|
|
|
if (fcntl(x, F_SETFD, FD_CLOEXEC) == -1) \
|
2002-03-22 10:30:41 +08:00
|
|
|
fatal("fcntl(%d, F_SETFD)", x); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
static void
|
2011-06-20 12:42:23 +08:00
|
|
|
monitor_openfds(struct monitor *mon, int do_logfds)
|
2002-03-22 10:30:41 +08:00
|
|
|
{
|
2011-06-20 12:42:23 +08:00
|
|
|
int pair[2];
|
2017-05-31 18:04:29 +08:00
|
|
|
#ifdef SO_ZEROIZE
|
|
|
|
int on = 1;
|
|
|
|
#endif
|
2011-06-20 12:42:23 +08:00
|
|
|
|
2002-03-22 10:30:41 +08:00
|
|
|
if (socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == -1)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("socketpair: %s", strerror(errno));
|
2017-05-31 18:04:29 +08:00
|
|
|
#ifdef SO_ZEROIZE
|
2019-06-28 21:35:04 +08:00
|
|
|
if (setsockopt(pair[0], SOL_SOCKET, SO_ZEROIZE, &on, sizeof(on)) == -1)
|
2017-05-31 18:04:29 +08:00
|
|
|
error("setsockopt SO_ZEROIZE(0): %.100s", strerror(errno));
|
2019-06-28 21:35:04 +08:00
|
|
|
if (setsockopt(pair[1], SOL_SOCKET, SO_ZEROIZE, &on, sizeof(on)) == -1)
|
2017-05-31 18:04:29 +08:00
|
|
|
error("setsockopt SO_ZEROIZE(1): %.100s", strerror(errno));
|
|
|
|
#endif
|
2002-03-22 10:30:41 +08:00
|
|
|
FD_CLOSEONEXEC(pair[0]);
|
|
|
|
FD_CLOSEONEXEC(pair[1]);
|
2011-06-20 12:42:23 +08:00
|
|
|
mon->m_recvfd = pair[0];
|
|
|
|
mon->m_sendfd = pair[1];
|
|
|
|
|
|
|
|
if (do_logfds) {
|
|
|
|
if (pipe(pair) == -1)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("pipe: %s", strerror(errno));
|
2011-06-20 12:42:23 +08:00
|
|
|
FD_CLOSEONEXEC(pair[0]);
|
|
|
|
FD_CLOSEONEXEC(pair[1]);
|
|
|
|
mon->m_log_recvfd = pair[0];
|
|
|
|
mon->m_log_sendfd = pair[1];
|
|
|
|
} else
|
|
|
|
mon->m_log_recvfd = mon->m_log_sendfd = -1;
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
struct monitor *
|
|
|
|
monitor_init(void)
|
|
|
|
{
|
|
|
|
struct monitor *mon;
|
|
|
|
|
2006-03-26 11:19:21 +08:00
|
|
|
mon = xcalloc(1, sizeof(*mon));
|
2011-06-20 12:42:23 +08:00
|
|
|
monitor_openfds(mon, 1);
|
2002-03-22 10:30:41 +08:00
|
|
|
|
|
|
|
return mon;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
monitor_reinit(struct monitor *mon)
|
|
|
|
{
|
2011-06-20 12:42:23 +08:00
|
|
|
monitor_openfds(mon, 0);
|
2002-03-22 10:30:41 +08:00
|
|
|
}
|
2003-08-26 09:49:55 +08:00
|
|
|
|
|
|
|
#ifdef GSSAPI
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_gss_setup_ctx(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-08-26 09:49:55 +08:00
|
|
|
{
|
2004-06-22 10:56:01 +08:00
|
|
|
gss_OID_desc goid;
|
2003-08-26 09:49:55 +08:00
|
|
|
OM_uint32 major;
|
2018-07-10 05:53:45 +08:00
|
|
|
size_t len;
|
2018-07-10 17:13:30 +08:00
|
|
|
u_char *p;
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.gss_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("GSSAPI authentication not enabled");
|
2016-08-30 15:50:21 +08:00
|
|
|
|
2018-07-10 17:13:30 +08:00
|
|
|
if ((r = sshbuf_get_string(m, &p, &len)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "parse");
|
2018-07-10 17:13:30 +08:00
|
|
|
goid.elements = p;
|
2004-06-22 10:56:01 +08:00
|
|
|
goid.length = len;
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2004-06-22 10:56:01 +08:00
|
|
|
major = ssh_gssapi_server_ctx(&gsscontext, &goid);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2013-06-02 05:31:17 +08:00
|
|
|
free(goid.elements);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, major)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2005-11-05 12:07:05 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_GSSSETUP, m);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
|
|
|
/* Now we have a context, enable the step */
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSSTEP, 1);
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_gss_accept_ctx(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-08-26 09:49:55 +08:00
|
|
|
{
|
|
|
|
gss_buffer_desc in;
|
|
|
|
gss_buffer_desc out = GSS_C_EMPTY_BUFFER;
|
2005-11-05 12:07:05 +08:00
|
|
|
OM_uint32 major, minor;
|
2003-08-26 09:49:55 +08:00
|
|
|
OM_uint32 flags = 0; /* GSI needs this */
|
2018-07-10 05:53:45 +08:00
|
|
|
int r;
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.gss_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("GSSAPI authentication not enabled");
|
2016-08-30 15:50:21 +08:00
|
|
|
|
2018-07-10 17:13:30 +08:00
|
|
|
if ((r = ssh_gssapi_get_buffer_desc(m, &in)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "ssh_gssapi_get_buffer_desc");
|
2003-08-26 09:49:55 +08:00
|
|
|
major = ssh_gssapi_accept_ctx(gsscontext, &in, &out, &flags);
|
2013-06-02 05:31:17 +08:00
|
|
|
free(in.value);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, major)) != 0 ||
|
|
|
|
(r = sshbuf_put_string(m, out.value, out.length)) != 0 ||
|
|
|
|
(r = sshbuf_put_u32(m, flags)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_GSSSTEP, m);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
|
|
|
gss_release_buffer(&minor, &out);
|
|
|
|
|
2005-11-05 12:07:05 +08:00
|
|
|
if (major == GSS_S_COMPLETE) {
|
2003-08-26 09:49:55 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSSTEP, 0);
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSUSEROK, 1);
|
2003-11-17 19:18:21 +08:00
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSCHECKMIC, 1);
|
2003-08-26 09:49:55 +08:00
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2003-11-17 19:18:21 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_gss_checkmic(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-11-17 19:18:21 +08:00
|
|
|
{
|
|
|
|
gss_buffer_desc gssbuf, mic;
|
|
|
|
OM_uint32 ret;
|
2018-07-10 17:13:30 +08:00
|
|
|
int r;
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.gss_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("GSSAPI authentication not enabled");
|
2016-08-30 15:50:21 +08:00
|
|
|
|
2018-07-10 17:13:30 +08:00
|
|
|
if ((r = ssh_gssapi_get_buffer_desc(m, &gssbuf)) != 0 ||
|
|
|
|
(r = ssh_gssapi_get_buffer_desc(m, &mic)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "ssh_gssapi_get_buffer_desc");
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2003-11-17 19:18:21 +08:00
|
|
|
ret = ssh_gssapi_checkmic(gsscontext, &gssbuf, &mic);
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2013-06-02 05:31:17 +08:00
|
|
|
free(gssbuf.value);
|
|
|
|
free(mic.value);
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, ret)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_GSSCHECKMIC, m);
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2003-11-17 19:18:21 +08:00
|
|
|
if (!GSS_ERROR(ret))
|
|
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSUSEROK, 1);
|
2003-11-21 20:56:47 +08:00
|
|
|
|
2003-11-17 19:18:21 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2003-08-26 09:49:55 +08:00
|
|
|
int
|
2019-01-20 05:43:07 +08:00
|
|
|
mm_answer_gss_userok(struct ssh *ssh, int sock, struct sshbuf *m)
|
2003-08-26 09:49:55 +08:00
|
|
|
{
|
2018-07-10 17:13:30 +08:00
|
|
|
int r, authenticated;
|
2017-06-24 14:34:38 +08:00
|
|
|
const char *displayname;
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2016-08-30 15:50:21 +08:00
|
|
|
if (!options.gss_authentication)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_f("GSSAPI authentication not enabled");
|
2016-08-30 15:50:21 +08:00
|
|
|
|
2003-08-26 09:49:55 +08:00
|
|
|
authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user);
|
|
|
|
|
2018-07-10 05:53:45 +08:00
|
|
|
sshbuf_reset(m);
|
|
|
|
if ((r = sshbuf_put_u32(m, authenticated)) != 0)
|
2020-10-18 19:32:01 +08:00
|
|
|
fatal_fr(r, "assemble");
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2020-10-18 19:32:01 +08:00
|
|
|
debug3_f("sending result %d", authenticated);
|
2004-06-22 10:56:01 +08:00
|
|
|
mm_request_send(sock, MONITOR_ANS_GSSUSEROK, m);
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2005-11-05 12:07:05 +08:00
|
|
|
auth_method = "gssapi-with-mic";
|
2003-08-26 09:49:55 +08:00
|
|
|
|
2017-06-24 14:34:38 +08:00
|
|
|
if ((displayname = ssh_gssapi_displayname()) != NULL)
|
|
|
|
auth2_record_info(authctxt, "%s", displayname);
|
|
|
|
|
2003-08-26 09:49:55 +08:00
|
|
|
/* Monitor loop will terminate if authenticated */
|
|
|
|
return (authenticated);
|
|
|
|
}
|
|
|
|
#endif /* GSSAPI */
|
2008-11-05 13:20:46 +08:00
|
|
|
|