1 |
|
|
/* $OpenBSD: monitor.c,v 1.174 2017/10/02 19:33:20 djm Exp $ */ |
2 |
|
|
/* |
3 |
|
|
* Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 |
|
|
* Copyright 2002 Markus Friedl <markus@openbsd.org> |
5 |
|
|
* All rights reserved. |
6 |
|
|
* |
7 |
|
|
* Redistribution and use in source and binary forms, with or without |
8 |
|
|
* modification, are permitted provided that the following conditions |
9 |
|
|
* are met: |
10 |
|
|
* 1. Redistributions of source code must retain the above copyright |
11 |
|
|
* notice, this list of conditions and the following disclaimer. |
12 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
13 |
|
|
* notice, this list of conditions and the following disclaimer in the |
14 |
|
|
* documentation and/or other materials provided with the distribution. |
15 |
|
|
* |
16 |
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
17 |
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
18 |
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
19 |
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
20 |
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
21 |
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
22 |
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
23 |
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
24 |
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
25 |
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
26 |
|
|
*/ |
27 |
|
|
|
28 |
|
|
#include <sys/types.h> |
29 |
|
|
#include <sys/wait.h> |
30 |
|
|
#include <sys/socket.h> |
31 |
|
|
#include <sys/tree.h> |
32 |
|
|
#include <sys/queue.h> |
33 |
|
|
|
34 |
|
|
#ifdef WITH_OPENSSL |
35 |
|
|
#include <openssl/dh.h> |
36 |
|
|
#endif |
37 |
|
|
|
38 |
|
|
#include <errno.h> |
39 |
|
|
#include <fcntl.h> |
40 |
|
|
#include <limits.h> |
41 |
|
|
#include <paths.h> |
42 |
|
|
#include <poll.h> |
43 |
|
|
#include <pwd.h> |
44 |
|
|
#include <signal.h> |
45 |
|
|
#include <stdarg.h> |
46 |
|
|
#include <stdint.h> |
47 |
|
|
#include <stdio.h> |
48 |
|
|
#include <stdlib.h> |
49 |
|
|
#include <string.h> |
50 |
|
|
|
51 |
|
|
#include "atomicio.h" |
52 |
|
|
#include "xmalloc.h" |
53 |
|
|
#include "ssh.h" |
54 |
|
|
#include "key.h" |
55 |
|
|
#include "buffer.h" |
56 |
|
|
#include "hostfile.h" |
57 |
|
|
#include "auth.h" |
58 |
|
|
#include "cipher.h" |
59 |
|
|
#include "kex.h" |
60 |
|
|
#include "dh.h" |
61 |
|
|
#include <zlib.h> |
62 |
|
|
#include "packet.h" |
63 |
|
|
#include "auth-options.h" |
64 |
|
|
#include "sshpty.h" |
65 |
|
|
#include "channels.h" |
66 |
|
|
#include "session.h" |
67 |
|
|
#include "sshlogin.h" |
68 |
|
|
#include "canohost.h" |
69 |
|
|
#include "log.h" |
70 |
|
|
#include "misc.h" |
71 |
|
|
#include "servconf.h" |
72 |
|
|
#include "monitor.h" |
73 |
|
|
#ifdef GSSAPI |
74 |
|
|
#include "ssh-gss.h" |
75 |
|
|
#endif |
76 |
|
|
#include "monitor_wrap.h" |
77 |
|
|
#include "monitor_fdpass.h" |
78 |
|
|
#include "compat.h" |
79 |
|
|
#include "ssh2.h" |
80 |
|
|
#include "authfd.h" |
81 |
|
|
#include "match.h" |
82 |
|
|
#include "ssherr.h" |
83 |
|
|
|
84 |
|
|
#ifdef GSSAPI |
85 |
|
|
static Gssctxt *gsscontext = NULL; |
86 |
|
|
#endif |
87 |
|
|
|
88 |
|
|
/* Imports */ |
89 |
|
|
extern ServerOptions options; |
90 |
|
|
extern u_int utmp_len; |
91 |
|
|
extern u_char session_id[]; |
92 |
|
|
extern Buffer auth_debug; |
93 |
|
|
extern int auth_debug_init; |
94 |
|
|
extern Buffer loginmsg; |
95 |
|
|
|
96 |
|
|
/* State exported from the child */ |
97 |
|
|
static struct sshbuf *child_state; |
98 |
|
|
|
99 |
|
|
/* Functions on the monitor that answer unprivileged requests */ |
100 |
|
|
|
101 |
|
|
int mm_answer_moduli(int, Buffer *); |
102 |
|
|
int mm_answer_sign(int, Buffer *); |
103 |
|
|
int mm_answer_pwnamallow(int, Buffer *); |
104 |
|
|
int mm_answer_auth2_read_banner(int, Buffer *); |
105 |
|
|
int mm_answer_authserv(int, Buffer *); |
106 |
|
|
int mm_answer_authpassword(int, Buffer *); |
107 |
|
|
int mm_answer_bsdauthquery(int, Buffer *); |
108 |
|
|
int mm_answer_bsdauthrespond(int, Buffer *); |
109 |
|
|
int mm_answer_skeyquery(int, Buffer *); |
110 |
|
|
int mm_answer_skeyrespond(int, Buffer *); |
111 |
|
|
int mm_answer_keyallowed(int, Buffer *); |
112 |
|
|
int mm_answer_keyverify(int, Buffer *); |
113 |
|
|
int mm_answer_pty(int, Buffer *); |
114 |
|
|
int mm_answer_pty_cleanup(int, Buffer *); |
115 |
|
|
int mm_answer_term(int, Buffer *); |
116 |
|
|
int mm_answer_rsa_keyallowed(int, Buffer *); |
117 |
|
|
int mm_answer_rsa_challenge(int, Buffer *); |
118 |
|
|
int mm_answer_rsa_response(int, Buffer *); |
119 |
|
|
int mm_answer_sesskey(int, Buffer *); |
120 |
|
|
int mm_answer_sessid(int, Buffer *); |
121 |
|
|
|
122 |
|
|
#ifdef GSSAPI |
123 |
|
|
int mm_answer_gss_setup_ctx(int, Buffer *); |
124 |
|
|
int mm_answer_gss_accept_ctx(int, Buffer *); |
125 |
|
|
int mm_answer_gss_userok(int, Buffer *); |
126 |
|
|
int mm_answer_gss_checkmic(int, Buffer *); |
127 |
|
|
#endif |
128 |
|
|
|
129 |
|
|
static int monitor_read_log(struct monitor *); |
130 |
|
|
|
131 |
|
|
static Authctxt *authctxt; |
132 |
|
|
|
133 |
|
|
/* local state for key verify */ |
134 |
|
|
static u_char *key_blob = NULL; |
135 |
|
|
static u_int key_bloblen = 0; |
136 |
|
|
static int key_blobtype = MM_NOKEY; |
137 |
|
|
static char *hostbased_cuser = NULL; |
138 |
|
|
static char *hostbased_chost = NULL; |
139 |
|
|
static char *auth_method = "unknown"; |
140 |
|
|
static char *auth_submethod = NULL; |
141 |
|
|
static u_int session_id2_len = 0; |
142 |
|
|
static u_char *session_id2 = NULL; |
143 |
|
|
static pid_t monitor_child_pid; |
144 |
|
|
|
145 |
|
|
struct mon_table { |
146 |
|
|
enum monitor_reqtype type; |
147 |
|
|
int flags; |
148 |
|
|
int (*f)(int, Buffer *); |
149 |
|
|
}; |
150 |
|
|
|
151 |
|
|
#define MON_ISAUTH 0x0004 /* Required for Authentication */ |
152 |
|
|
#define MON_AUTHDECIDE 0x0008 /* Decides Authentication */ |
153 |
|
|
#define MON_ONCE 0x0010 /* Disable after calling */ |
154 |
|
|
#define MON_ALOG 0x0020 /* Log auth attempt without authenticating */ |
155 |
|
|
|
156 |
|
|
#define MON_AUTH (MON_ISAUTH|MON_AUTHDECIDE) |
157 |
|
|
|
158 |
|
|
#define MON_PERMIT 0x1000 /* Request is permitted */ |
159 |
|
|
|
160 |
|
|
struct mon_table mon_dispatch_proto20[] = { |
161 |
|
|
#ifdef WITH_OPENSSL |
162 |
|
|
{MONITOR_REQ_MODULI, MON_ONCE, mm_answer_moduli}, |
163 |
|
|
#endif |
164 |
|
|
{MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, |
165 |
|
|
{MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, |
166 |
|
|
{MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, |
167 |
|
|
{MONITOR_REQ_AUTH2_READ_BANNER, MON_ONCE, mm_answer_auth2_read_banner}, |
168 |
|
|
{MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, |
169 |
|
|
{MONITOR_REQ_BSDAUTHQUERY, MON_ISAUTH, mm_answer_bsdauthquery}, |
170 |
|
|
{MONITOR_REQ_BSDAUTHRESPOND, MON_AUTH, mm_answer_bsdauthrespond}, |
171 |
|
|
{MONITOR_REQ_KEYALLOWED, MON_ISAUTH, mm_answer_keyallowed}, |
172 |
|
|
{MONITOR_REQ_KEYVERIFY, MON_AUTH, mm_answer_keyverify}, |
173 |
|
|
#ifdef GSSAPI |
174 |
|
|
{MONITOR_REQ_GSSSETUP, MON_ISAUTH, mm_answer_gss_setup_ctx}, |
175 |
|
|
{MONITOR_REQ_GSSSTEP, 0, mm_answer_gss_accept_ctx}, |
176 |
|
|
{MONITOR_REQ_GSSUSEROK, MON_ONCE|MON_AUTHDECIDE, mm_answer_gss_userok}, |
177 |
|
|
{MONITOR_REQ_GSSCHECKMIC, MON_ONCE, mm_answer_gss_checkmic}, |
178 |
|
|
#endif |
179 |
|
|
{0, 0, NULL} |
180 |
|
|
}; |
181 |
|
|
|
182 |
|
|
struct mon_table mon_dispatch_postauth20[] = { |
183 |
|
|
#ifdef WITH_OPENSSL |
184 |
|
|
{MONITOR_REQ_MODULI, 0, mm_answer_moduli}, |
185 |
|
|
#endif |
186 |
|
|
{MONITOR_REQ_SIGN, 0, mm_answer_sign}, |
187 |
|
|
{MONITOR_REQ_PTY, 0, mm_answer_pty}, |
188 |
|
|
{MONITOR_REQ_PTYCLEANUP, 0, mm_answer_pty_cleanup}, |
189 |
|
|
{MONITOR_REQ_TERM, 0, mm_answer_term}, |
190 |
|
|
{0, 0, NULL} |
191 |
|
|
}; |
192 |
|
|
|
193 |
|
|
struct mon_table *mon_dispatch; |
194 |
|
|
|
195 |
|
|
/* Specifies if a certain message is allowed at the moment */ |
196 |
|
|
|
197 |
|
|
static void |
198 |
|
|
monitor_permit(struct mon_table *ent, enum monitor_reqtype type, int permit) |
199 |
|
|
{ |
200 |
|
|
while (ent->f != NULL) { |
201 |
|
|
if (ent->type == type) { |
202 |
|
|
ent->flags &= ~MON_PERMIT; |
203 |
|
|
ent->flags |= permit ? MON_PERMIT : 0; |
204 |
|
|
return; |
205 |
|
|
} |
206 |
|
|
ent++; |
207 |
|
|
} |
208 |
|
|
} |
209 |
|
|
|
210 |
|
|
static void |
211 |
|
|
monitor_permit_authentications(int permit) |
212 |
|
|
{ |
213 |
|
|
struct mon_table *ent = mon_dispatch; |
214 |
|
|
|
215 |
|
|
while (ent->f != NULL) { |
216 |
|
|
if (ent->flags & MON_AUTH) { |
217 |
|
|
ent->flags &= ~MON_PERMIT; |
218 |
|
|
ent->flags |= permit ? MON_PERMIT : 0; |
219 |
|
|
} |
220 |
|
|
ent++; |
221 |
|
|
} |
222 |
|
|
} |
223 |
|
|
|
224 |
|
|
void |
225 |
|
|
monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor) |
226 |
|
|
{ |
227 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
228 |
|
|
struct mon_table *ent; |
229 |
|
|
int authenticated = 0, partial = 0; |
230 |
|
|
|
231 |
|
|
debug3("preauth child monitor started"); |
232 |
|
|
|
233 |
|
|
close(pmonitor->m_recvfd); |
234 |
|
|
close(pmonitor->m_log_sendfd); |
235 |
|
|
pmonitor->m_log_sendfd = pmonitor->m_recvfd = -1; |
236 |
|
|
|
237 |
|
|
authctxt = _authctxt; |
238 |
|
|
memset(authctxt, 0, sizeof(*authctxt)); |
239 |
|
|
|
240 |
|
|
mon_dispatch = mon_dispatch_proto20; |
241 |
|
|
/* Permit requests for moduli and signatures */ |
242 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_MODULI, 1); |
243 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_SIGN, 1); |
244 |
|
|
|
245 |
|
|
/* The first few requests do not require asynchronous access */ |
246 |
|
|
while (!authenticated) { |
247 |
|
|
partial = 0; |
248 |
|
|
auth_method = "unknown"; |
249 |
|
|
auth_submethod = NULL; |
250 |
|
|
auth2_authctxt_reset_info(authctxt); |
251 |
|
|
|
252 |
|
|
authenticated = (monitor_read(pmonitor, mon_dispatch, &ent) == 1); |
253 |
|
|
|
254 |
|
|
/* Special handling for multiple required authentications */ |
255 |
|
|
if (options.num_auth_methods != 0) { |
256 |
|
|
if (authenticated && |
257 |
|
|
!auth2_update_methods_lists(authctxt, |
258 |
|
|
auth_method, auth_submethod)) { |
259 |
|
|
debug3("%s: method %s: partial", __func__, |
260 |
|
|
auth_method); |
261 |
|
|
authenticated = 0; |
262 |
|
|
partial = 1; |
263 |
|
|
} |
264 |
|
|
} |
265 |
|
|
|
266 |
|
|
if (authenticated) { |
267 |
|
|
if (!(ent->flags & MON_AUTHDECIDE)) |
268 |
|
|
fatal("%s: unexpected authentication from %d", |
269 |
|
|
__func__, ent->type); |
270 |
|
|
if (authctxt->pw->pw_uid == 0 && |
271 |
|
|
!auth_root_allowed(auth_method)) |
272 |
|
|
authenticated = 0; |
273 |
|
|
} |
274 |
|
|
if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { |
275 |
|
|
auth_log(authctxt, authenticated, partial, |
276 |
|
|
auth_method, auth_submethod); |
277 |
|
|
if (!partial && !authenticated) |
278 |
|
|
authctxt->failures++; |
279 |
|
|
if (authenticated || partial) { |
280 |
|
|
auth2_update_session_info(authctxt, |
281 |
|
|
auth_method, auth_submethod); |
282 |
|
|
} |
283 |
|
|
} |
284 |
|
|
} |
285 |
|
|
|
286 |
|
|
if (!authctxt->valid) |
287 |
|
|
fatal("%s: authenticated invalid user", __func__); |
288 |
|
|
if (strcmp(auth_method, "unknown") == 0) |
289 |
|
|
fatal("%s: authentication method name unknown", __func__); |
290 |
|
|
|
291 |
|
|
debug("%s: %s has been authenticated by privileged process", |
292 |
|
|
__func__, authctxt->user); |
293 |
|
|
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user); |
294 |
|
|
|
295 |
|
|
mm_get_keystate(pmonitor); |
296 |
|
|
|
297 |
|
|
/* Drain any buffered messages from the child */ |
298 |
|
|
while (pmonitor->m_log_recvfd != -1 && monitor_read_log(pmonitor) == 0) |
299 |
|
|
; |
300 |
|
|
|
301 |
|
|
close(pmonitor->m_sendfd); |
302 |
|
|
close(pmonitor->m_log_recvfd); |
303 |
|
|
pmonitor->m_sendfd = pmonitor->m_log_recvfd = -1; |
304 |
|
|
} |
305 |
|
|
|
306 |
|
|
static void |
307 |
|
|
monitor_set_child_handler(pid_t pid) |
308 |
|
|
{ |
309 |
|
|
monitor_child_pid = pid; |
310 |
|
|
} |
311 |
|
|
|
312 |
|
|
static void |
313 |
|
|
monitor_child_handler(int sig) |
314 |
|
|
{ |
315 |
|
|
kill(monitor_child_pid, sig); |
316 |
|
|
} |
317 |
|
|
|
318 |
|
|
void |
319 |
|
|
monitor_child_postauth(struct monitor *pmonitor) |
320 |
|
|
{ |
321 |
|
|
close(pmonitor->m_recvfd); |
322 |
|
|
pmonitor->m_recvfd = -1; |
323 |
|
|
|
324 |
|
|
monitor_set_child_handler(pmonitor->m_pid); |
325 |
|
|
signal(SIGHUP, &monitor_child_handler); |
326 |
|
|
signal(SIGTERM, &monitor_child_handler); |
327 |
|
|
signal(SIGINT, &monitor_child_handler); |
328 |
|
|
|
329 |
|
|
mon_dispatch = mon_dispatch_postauth20; |
330 |
|
|
|
331 |
|
|
/* Permit requests for moduli and signatures */ |
332 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_MODULI, 1); |
333 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_SIGN, 1); |
334 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_TERM, 1); |
335 |
|
|
|
336 |
|
|
if (!no_pty_flag) { |
337 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PTY, 1); |
338 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PTYCLEANUP, 1); |
339 |
|
|
} |
340 |
|
|
|
341 |
|
|
for (;;) |
342 |
|
|
monitor_read(pmonitor, mon_dispatch, NULL); |
343 |
|
|
} |
344 |
|
|
|
345 |
|
|
static int |
346 |
|
|
monitor_read_log(struct monitor *pmonitor) |
347 |
|
|
{ |
348 |
|
|
Buffer logmsg; |
349 |
|
|
u_int len, level; |
350 |
|
|
char *msg; |
351 |
|
|
|
352 |
|
|
buffer_init(&logmsg); |
353 |
|
|
|
354 |
|
|
/* Read length */ |
355 |
|
|
buffer_append_space(&logmsg, 4); |
356 |
|
|
if (atomicio(read, pmonitor->m_log_recvfd, |
357 |
|
|
buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) { |
358 |
|
|
if (errno == EPIPE) { |
359 |
|
|
buffer_free(&logmsg); |
360 |
|
|
debug("%s: child log fd closed", __func__); |
361 |
|
|
close(pmonitor->m_log_recvfd); |
362 |
|
|
pmonitor->m_log_recvfd = -1; |
363 |
|
|
return -1; |
364 |
|
|
} |
365 |
|
|
fatal("%s: log fd read: %s", __func__, strerror(errno)); |
366 |
|
|
} |
367 |
|
|
len = buffer_get_int(&logmsg); |
368 |
|
|
if (len <= 4 || len > 8192) |
369 |
|
|
fatal("%s: invalid log message length %u", __func__, len); |
370 |
|
|
|
371 |
|
|
/* Read severity, message */ |
372 |
|
|
buffer_clear(&logmsg); |
373 |
|
|
buffer_append_space(&logmsg, len); |
374 |
|
|
if (atomicio(read, pmonitor->m_log_recvfd, |
375 |
|
|
buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) |
376 |
|
|
fatal("%s: log fd read: %s", __func__, strerror(errno)); |
377 |
|
|
|
378 |
|
|
/* Log it */ |
379 |
|
|
level = buffer_get_int(&logmsg); |
380 |
|
|
msg = buffer_get_string(&logmsg, NULL); |
381 |
|
|
if (log_level_name(level) == NULL) |
382 |
|
|
fatal("%s: invalid log level %u (corrupted message?)", |
383 |
|
|
__func__, level); |
384 |
|
|
do_log2(level, "%s [preauth]", msg); |
385 |
|
|
|
386 |
|
|
buffer_free(&logmsg); |
387 |
|
|
free(msg); |
388 |
|
|
|
389 |
|
|
return 0; |
390 |
|
|
} |
391 |
|
|
|
392 |
|
|
int |
393 |
|
|
monitor_read(struct monitor *pmonitor, struct mon_table *ent, |
394 |
|
|
struct mon_table **pent) |
395 |
|
|
{ |
396 |
|
|
Buffer m; |
397 |
|
|
int ret; |
398 |
|
|
u_char type; |
399 |
|
|
struct pollfd pfd[2]; |
400 |
|
|
|
401 |
|
|
for (;;) { |
402 |
|
|
memset(&pfd, 0, sizeof(pfd)); |
403 |
|
|
pfd[0].fd = pmonitor->m_sendfd; |
404 |
|
|
pfd[0].events = POLLIN; |
405 |
|
|
pfd[1].fd = pmonitor->m_log_recvfd; |
406 |
|
|
pfd[1].events = pfd[1].fd == -1 ? 0 : POLLIN; |
407 |
|
|
if (poll(pfd, pfd[1].fd == -1 ? 1 : 2, -1) == -1) { |
408 |
|
|
if (errno == EINTR || errno == EAGAIN) |
409 |
|
|
continue; |
410 |
|
|
fatal("%s: poll: %s", __func__, strerror(errno)); |
411 |
|
|
} |
412 |
|
|
if (pfd[1].revents) { |
413 |
|
|
/* |
414 |
|
|
* Drain all log messages before processing next |
415 |
|
|
* monitor request. |
416 |
|
|
*/ |
417 |
|
|
monitor_read_log(pmonitor); |
418 |
|
|
continue; |
419 |
|
|
} |
420 |
|
|
if (pfd[0].revents) |
421 |
|
|
break; /* Continues below */ |
422 |
|
|
} |
423 |
|
|
|
424 |
|
|
buffer_init(&m); |
425 |
|
|
|
426 |
|
|
mm_request_receive(pmonitor->m_sendfd, &m); |
427 |
|
|
type = buffer_get_char(&m); |
428 |
|
|
|
429 |
|
|
debug3("%s: checking request %d", __func__, type); |
430 |
|
|
|
431 |
|
|
while (ent->f != NULL) { |
432 |
|
|
if (ent->type == type) |
433 |
|
|
break; |
434 |
|
|
ent++; |
435 |
|
|
} |
436 |
|
|
|
437 |
|
|
if (ent->f != NULL) { |
438 |
|
|
if (!(ent->flags & MON_PERMIT)) |
439 |
|
|
fatal("%s: unpermitted request %d", __func__, |
440 |
|
|
type); |
441 |
|
|
ret = (*ent->f)(pmonitor->m_sendfd, &m); |
442 |
|
|
buffer_free(&m); |
443 |
|
|
|
444 |
|
|
/* The child may use this request only once, disable it */ |
445 |
|
|
if (ent->flags & MON_ONCE) { |
446 |
|
|
debug2("%s: %d used once, disabling now", __func__, |
447 |
|
|
type); |
448 |
|
|
ent->flags &= ~MON_PERMIT; |
449 |
|
|
} |
450 |
|
|
|
451 |
|
|
if (pent != NULL) |
452 |
|
|
*pent = ent; |
453 |
|
|
|
454 |
|
|
return ret; |
455 |
|
|
} |
456 |
|
|
|
457 |
|
|
fatal("%s: unsupported request: %d", __func__, type); |
458 |
|
|
|
459 |
|
|
/* NOTREACHED */ |
460 |
|
|
return (-1); |
461 |
|
|
} |
462 |
|
|
|
463 |
|
|
/* allowed key state */ |
464 |
|
|
static int |
465 |
|
|
monitor_allowed_key(u_char *blob, u_int bloblen) |
466 |
|
|
{ |
467 |
|
|
/* make sure key is allowed */ |
468 |
|
|
if (key_blob == NULL || key_bloblen != bloblen || |
469 |
|
|
timingsafe_bcmp(key_blob, blob, key_bloblen)) |
470 |
|
|
return (0); |
471 |
|
|
return (1); |
472 |
|
|
} |
473 |
|
|
|
474 |
|
|
static void |
475 |
|
|
monitor_reset_key_state(void) |
476 |
|
|
{ |
477 |
|
|
/* reset state */ |
478 |
|
|
free(key_blob); |
479 |
|
|
free(hostbased_cuser); |
480 |
|
|
free(hostbased_chost); |
481 |
|
|
key_blob = NULL; |
482 |
|
|
key_bloblen = 0; |
483 |
|
|
key_blobtype = MM_NOKEY; |
484 |
|
|
hostbased_cuser = NULL; |
485 |
|
|
hostbased_chost = NULL; |
486 |
|
|
} |
487 |
|
|
|
488 |
|
|
#ifdef WITH_OPENSSL |
489 |
|
|
int |
490 |
|
|
mm_answer_moduli(int sock, Buffer *m) |
491 |
|
|
{ |
492 |
|
|
DH *dh; |
493 |
|
|
int min, want, max; |
494 |
|
|
|
495 |
|
|
min = buffer_get_int(m); |
496 |
|
|
want = buffer_get_int(m); |
497 |
|
|
max = buffer_get_int(m); |
498 |
|
|
|
499 |
|
|
debug3("%s: got parameters: %d %d %d", |
500 |
|
|
__func__, min, want, max); |
501 |
|
|
/* We need to check here, too, in case the child got corrupted */ |
502 |
|
|
if (max < min || want < min || max < want) |
503 |
|
|
fatal("%s: bad parameters: %d %d %d", |
504 |
|
|
__func__, min, want, max); |
505 |
|
|
|
506 |
|
|
buffer_clear(m); |
507 |
|
|
|
508 |
|
|
dh = choose_dh(min, want, max); |
509 |
|
|
if (dh == NULL) { |
510 |
|
|
buffer_put_char(m, 0); |
511 |
|
|
return (0); |
512 |
|
|
} else { |
513 |
|
|
/* Send first bignum */ |
514 |
|
|
buffer_put_char(m, 1); |
515 |
|
|
buffer_put_bignum2(m, dh->p); |
516 |
|
|
buffer_put_bignum2(m, dh->g); |
517 |
|
|
|
518 |
|
|
DH_free(dh); |
519 |
|
|
} |
520 |
|
|
mm_request_send(sock, MONITOR_ANS_MODULI, m); |
521 |
|
|
return (0); |
522 |
|
|
} |
523 |
|
|
#endif |
524 |
|
|
|
525 |
|
|
int |
526 |
|
|
mm_answer_sign(int sock, Buffer *m) |
527 |
|
|
{ |
528 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
529 |
|
|
extern int auth_sock; /* XXX move to state struct? */ |
530 |
|
|
struct sshkey *key; |
531 |
|
|
struct sshbuf *sigbuf = NULL; |
532 |
|
|
u_char *p = NULL, *signature = NULL; |
533 |
|
|
char *alg = NULL; |
534 |
|
|
size_t datlen, siglen, alglen; |
535 |
|
|
int r, is_proof = 0; |
536 |
|
|
u_int keyid; |
537 |
|
|
const char proof_req[] = "hostkeys-prove-00@openssh.com"; |
538 |
|
|
|
539 |
|
|
debug3("%s", __func__); |
540 |
|
|
|
541 |
|
|
if ((r = sshbuf_get_u32(m, &keyid)) != 0 || |
542 |
|
|
(r = sshbuf_get_string(m, &p, &datlen)) != 0 || |
543 |
|
|
(r = sshbuf_get_cstring(m, &alg, &alglen)) != 0) |
544 |
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
545 |
|
|
if (keyid > INT_MAX) |
546 |
|
|
fatal("%s: invalid key ID", __func__); |
547 |
|
|
|
548 |
|
|
/* |
549 |
|
|
* Supported KEX types use SHA1 (20 bytes), SHA256 (32 bytes), |
550 |
|
|
* SHA384 (48 bytes) and SHA512 (64 bytes). |
551 |
|
|
* |
552 |
|
|
* Otherwise, verify the signature request is for a hostkey |
553 |
|
|
* proof. |
554 |
|
|
* |
555 |
|
|
* XXX perform similar check for KEX signature requests too? |
556 |
|
|
* it's not trivial, since what is signed is the hash, rather |
557 |
|
|
* than the full kex structure... |
558 |
|
|
*/ |
559 |
|
|
if (datlen != 20 && datlen != 32 && datlen != 48 && datlen != 64) { |
560 |
|
|
/* |
561 |
|
|
* Construct expected hostkey proof and compare it to what |
562 |
|
|
* the client sent us. |
563 |
|
|
*/ |
564 |
|
|
if (session_id2_len == 0) /* hostkeys is never first */ |
565 |
|
|
fatal("%s: bad data length: %zu", __func__, datlen); |
566 |
|
|
if ((key = get_hostkey_public_by_index(keyid, ssh)) == NULL) |
567 |
|
|
fatal("%s: no hostkey for index %d", __func__, keyid); |
568 |
|
|
if ((sigbuf = sshbuf_new()) == NULL) |
569 |
|
|
fatal("%s: sshbuf_new", __func__); |
570 |
|
|
if ((r = sshbuf_put_cstring(sigbuf, proof_req)) != 0 || |
571 |
|
|
(r = sshbuf_put_string(sigbuf, session_id2, |
572 |
|
|
session_id2_len)) != 0 || |
573 |
|
|
(r = sshkey_puts(key, sigbuf)) != 0) |
574 |
|
|
fatal("%s: couldn't prepare private key " |
575 |
|
|
"proof buffer: %s", __func__, ssh_err(r)); |
576 |
|
|
if (datlen != sshbuf_len(sigbuf) || |
577 |
|
|
memcmp(p, sshbuf_ptr(sigbuf), sshbuf_len(sigbuf)) != 0) |
578 |
|
|
fatal("%s: bad data length: %zu, hostkey proof len %zu", |
579 |
|
|
__func__, datlen, sshbuf_len(sigbuf)); |
580 |
|
|
sshbuf_free(sigbuf); |
581 |
|
|
is_proof = 1; |
582 |
|
|
} |
583 |
|
|
|
584 |
|
|
/* save session id, it will be passed on the first call */ |
585 |
|
|
if (session_id2_len == 0) { |
586 |
|
|
session_id2_len = datlen; |
587 |
|
|
session_id2 = xmalloc(session_id2_len); |
588 |
|
|
memcpy(session_id2, p, session_id2_len); |
589 |
|
|
} |
590 |
|
|
|
591 |
|
|
if ((key = get_hostkey_by_index(keyid)) != NULL) { |
592 |
|
|
if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg, |
593 |
|
|
datafellows)) != 0) |
594 |
|
|
fatal("%s: sshkey_sign failed: %s", |
595 |
|
|
__func__, ssh_err(r)); |
596 |
|
|
} else if ((key = get_hostkey_public_by_index(keyid, ssh)) != NULL && |
597 |
|
|
auth_sock > 0) { |
598 |
|
|
if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen, |
599 |
|
|
p, datlen, alg, datafellows)) != 0) { |
600 |
|
|
fatal("%s: ssh_agent_sign failed: %s", |
601 |
|
|
__func__, ssh_err(r)); |
602 |
|
|
} |
603 |
|
|
} else |
604 |
|
|
fatal("%s: no hostkey from index %d", __func__, keyid); |
605 |
|
|
|
606 |
|
|
debug3("%s: %s signature %p(%zu)", __func__, |
607 |
|
|
is_proof ? "KEX" : "hostkey proof", signature, siglen); |
608 |
|
|
|
609 |
|
|
sshbuf_reset(m); |
610 |
|
|
if ((r = sshbuf_put_string(m, signature, siglen)) != 0) |
611 |
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
612 |
|
|
|
613 |
|
|
free(alg); |
614 |
|
|
free(p); |
615 |
|
|
free(signature); |
616 |
|
|
|
617 |
|
|
mm_request_send(sock, MONITOR_ANS_SIGN, m); |
618 |
|
|
|
619 |
|
|
/* Turn on permissions for getpwnam */ |
620 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_PWNAM, 1); |
621 |
|
|
|
622 |
|
|
return (0); |
623 |
|
|
} |
624 |
|
|
|
625 |
|
|
/* Retrieves the password entry and also checks if the user is permitted */ |
626 |
|
|
|
627 |
|
|
int |
628 |
|
|
mm_answer_pwnamallow(int sock, Buffer *m) |
629 |
|
|
{ |
630 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
631 |
|
|
char *username; |
632 |
|
|
struct passwd *pwent; |
633 |
|
|
int allowed = 0; |
634 |
|
|
u_int i; |
635 |
|
|
|
636 |
|
|
debug3("%s", __func__); |
637 |
|
|
|
638 |
|
|
if (authctxt->attempt++ != 0) |
639 |
|
|
fatal("%s: multiple attempts for getpwnam", __func__); |
640 |
|
|
|
641 |
|
|
username = buffer_get_string(m, NULL); |
642 |
|
|
|
643 |
|
|
pwent = getpwnamallow(username); |
644 |
|
|
|
645 |
|
|
authctxt->user = xstrdup(username); |
646 |
|
|
setproctitle("%s [priv]", pwent ? username : "unknown"); |
647 |
|
|
free(username); |
648 |
|
|
|
649 |
|
|
buffer_clear(m); |
650 |
|
|
|
651 |
|
|
if (pwent == NULL) { |
652 |
|
|
buffer_put_char(m, 0); |
653 |
|
|
authctxt->pw = fakepw(); |
654 |
|
|
goto out; |
655 |
|
|
} |
656 |
|
|
|
657 |
|
|
allowed = 1; |
658 |
|
|
authctxt->pw = pwent; |
659 |
|
|
authctxt->valid = 1; |
660 |
|
|
|
661 |
|
|
buffer_put_char(m, 1); |
662 |
|
|
buffer_put_string(m, pwent, sizeof(struct passwd)); |
663 |
|
|
buffer_put_cstring(m, pwent->pw_name); |
664 |
|
|
buffer_put_cstring(m, "*"); |
665 |
|
|
buffer_put_cstring(m, pwent->pw_gecos); |
666 |
|
|
buffer_put_cstring(m, pwent->pw_class); |
667 |
|
|
buffer_put_cstring(m, pwent->pw_dir); |
668 |
|
|
buffer_put_cstring(m, pwent->pw_shell); |
669 |
|
|
|
670 |
|
|
out: |
671 |
|
|
ssh_packet_set_log_preamble(ssh, "%suser %s", |
672 |
|
|
authctxt->valid ? "authenticating" : "invalid ", authctxt->user); |
673 |
|
|
buffer_put_string(m, &options, sizeof(options)); |
674 |
|
|
|
675 |
|
|
#define M_CP_STROPT(x) do { \ |
676 |
|
|
if (options.x != NULL) \ |
677 |
|
|
buffer_put_cstring(m, options.x); \ |
678 |
|
|
} while (0) |
679 |
|
|
#define M_CP_STRARRAYOPT(x, nx) do { \ |
680 |
|
|
for (i = 0; i < options.nx; i++) \ |
681 |
|
|
buffer_put_cstring(m, options.x[i]); \ |
682 |
|
|
} while (0) |
683 |
|
|
#define M_CP_STRARRAYOPT_ALLOC(x, nx) M_CP_STRARRAYOPT(x, nx) |
684 |
|
|
/* See comment in servconf.h */ |
685 |
|
|
COPY_MATCH_STRING_OPTS(); |
686 |
|
|
#undef M_CP_STROPT |
687 |
|
|
#undef M_CP_STRARRAYOPT |
688 |
|
|
#undef M_CP_STRARRAYOPT_ALLOC |
689 |
|
|
|
690 |
|
|
/* Create valid auth method lists */ |
691 |
|
|
if (auth2_setup_methods_lists(authctxt) != 0) { |
692 |
|
|
/* |
693 |
|
|
* The monitor will continue long enough to let the child |
694 |
|
|
* run to it's packet_disconnect(), but it must not allow any |
695 |
|
|
* authentication to succeed. |
696 |
|
|
*/ |
697 |
|
|
debug("%s: no valid authentication method lists", __func__); |
698 |
|
|
} |
699 |
|
|
|
700 |
|
|
debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); |
701 |
|
|
mm_request_send(sock, MONITOR_ANS_PWNAM, m); |
702 |
|
|
|
703 |
|
|
/* Allow service/style information on the auth context */ |
704 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_AUTHSERV, 1); |
705 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_AUTH2_READ_BANNER, 1); |
706 |
|
|
|
707 |
|
|
return (0); |
708 |
|
|
} |
709 |
|
|
|
710 |
|
|
int mm_answer_auth2_read_banner(int sock, Buffer *m) |
711 |
|
|
{ |
712 |
|
|
char *banner; |
713 |
|
|
|
714 |
|
|
buffer_clear(m); |
715 |
|
|
banner = auth2_read_banner(); |
716 |
|
|
buffer_put_cstring(m, banner != NULL ? banner : ""); |
717 |
|
|
mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m); |
718 |
|
|
free(banner); |
719 |
|
|
|
720 |
|
|
return (0); |
721 |
|
|
} |
722 |
|
|
|
723 |
|
|
int |
724 |
|
|
mm_answer_authserv(int sock, Buffer *m) |
725 |
|
|
{ |
726 |
|
|
monitor_permit_authentications(1); |
727 |
|
|
|
728 |
|
|
authctxt->service = buffer_get_string(m, NULL); |
729 |
|
|
authctxt->style = buffer_get_string(m, NULL); |
730 |
|
|
debug3("%s: service=%s, style=%s", |
731 |
|
|
__func__, authctxt->service, authctxt->style); |
732 |
|
|
|
733 |
|
|
if (strlen(authctxt->style) == 0) { |
734 |
|
|
free(authctxt->style); |
735 |
|
|
authctxt->style = NULL; |
736 |
|
|
} |
737 |
|
|
|
738 |
|
|
return (0); |
739 |
|
|
} |
740 |
|
|
|
741 |
|
|
int |
742 |
|
|
mm_answer_authpassword(int sock, Buffer *m) |
743 |
|
|
{ |
744 |
|
|
static int call_count; |
745 |
|
|
char *passwd; |
746 |
|
|
int authenticated; |
747 |
|
|
u_int plen; |
748 |
|
|
|
749 |
|
|
if (!options.password_authentication) |
750 |
|
|
fatal("%s: password authentication not enabled", __func__); |
751 |
|
|
passwd = buffer_get_string(m, &plen); |
752 |
|
|
/* Only authenticate if the context is valid */ |
753 |
|
|
authenticated = options.password_authentication && |
754 |
|
|
auth_password(authctxt, passwd); |
755 |
|
|
explicit_bzero(passwd, strlen(passwd)); |
756 |
|
|
free(passwd); |
757 |
|
|
|
758 |
|
|
buffer_clear(m); |
759 |
|
|
buffer_put_int(m, authenticated); |
760 |
|
|
|
761 |
|
|
debug3("%s: sending result %d", __func__, authenticated); |
762 |
|
|
mm_request_send(sock, MONITOR_ANS_AUTHPASSWORD, m); |
763 |
|
|
|
764 |
|
|
call_count++; |
765 |
|
|
if (plen == 0 && call_count == 1) |
766 |
|
|
auth_method = "none"; |
767 |
|
|
else |
768 |
|
|
auth_method = "password"; |
769 |
|
|
|
770 |
|
|
/* Causes monitor loop to terminate if authenticated */ |
771 |
|
|
return (authenticated); |
772 |
|
|
} |
773 |
|
|
|
774 |
|
|
int |
775 |
|
|
mm_answer_bsdauthquery(int sock, Buffer *m) |
776 |
|
|
{ |
777 |
|
|
char *name, *infotxt; |
778 |
|
|
u_int numprompts; |
779 |
|
|
u_int *echo_on; |
780 |
|
|
char **prompts; |
781 |
|
|
u_int success; |
782 |
|
|
|
783 |
|
|
if (!options.kbd_interactive_authentication) |
784 |
|
|
fatal("%s: kbd-int authentication not enabled", __func__); |
785 |
|
|
success = bsdauth_query(authctxt, &name, &infotxt, &numprompts, |
786 |
|
|
&prompts, &echo_on) < 0 ? 0 : 1; |
787 |
|
|
|
788 |
|
|
buffer_clear(m); |
789 |
|
|
buffer_put_int(m, success); |
790 |
|
|
if (success) |
791 |
|
|
buffer_put_cstring(m, prompts[0]); |
792 |
|
|
|
793 |
|
|
debug3("%s: sending challenge success: %u", __func__, success); |
794 |
|
|
mm_request_send(sock, MONITOR_ANS_BSDAUTHQUERY, m); |
795 |
|
|
|
796 |
|
|
if (success) { |
797 |
|
|
free(name); |
798 |
|
|
free(infotxt); |
799 |
|
|
free(prompts); |
800 |
|
|
free(echo_on); |
801 |
|
|
} |
802 |
|
|
|
803 |
|
|
return (0); |
804 |
|
|
} |
805 |
|
|
|
806 |
|
|
int |
807 |
|
|
mm_answer_bsdauthrespond(int sock, Buffer *m) |
808 |
|
|
{ |
809 |
|
|
char *response; |
810 |
|
|
int authok; |
811 |
|
|
|
812 |
|
|
if (!options.kbd_interactive_authentication) |
813 |
|
|
fatal("%s: kbd-int authentication not enabled", __func__); |
814 |
|
|
if (authctxt->as == NULL) |
815 |
|
|
fatal("%s: no bsd auth session", __func__); |
816 |
|
|
|
817 |
|
|
response = buffer_get_string(m, NULL); |
818 |
|
|
authok = options.challenge_response_authentication && |
819 |
|
|
auth_userresponse(authctxt->as, response, 0); |
820 |
|
|
authctxt->as = NULL; |
821 |
|
|
debug3("%s: <%s> = <%d>", __func__, response, authok); |
822 |
|
|
free(response); |
823 |
|
|
|
824 |
|
|
buffer_clear(m); |
825 |
|
|
buffer_put_int(m, authok); |
826 |
|
|
|
827 |
|
|
debug3("%s: sending authenticated: %d", __func__, authok); |
828 |
|
|
mm_request_send(sock, MONITOR_ANS_BSDAUTHRESPOND, m); |
829 |
|
|
|
830 |
|
|
auth_method = "keyboard-interactive"; |
831 |
|
|
auth_submethod = "bsdauth"; |
832 |
|
|
|
833 |
|
|
return (authok != 0); |
834 |
|
|
} |
835 |
|
|
|
836 |
|
|
int |
837 |
|
|
mm_answer_keyallowed(int sock, Buffer *m) |
838 |
|
|
{ |
839 |
|
|
struct sshkey *key; |
840 |
|
|
char *cuser, *chost; |
841 |
|
|
u_char *blob; |
842 |
|
|
u_int bloblen, pubkey_auth_attempt; |
843 |
|
|
enum mm_keytype type = 0; |
844 |
|
|
int allowed = 0; |
845 |
|
|
|
846 |
|
|
debug3("%s entering", __func__); |
847 |
|
|
|
848 |
|
|
type = buffer_get_int(m); |
849 |
|
|
cuser = buffer_get_string(m, NULL); |
850 |
|
|
chost = buffer_get_string(m, NULL); |
851 |
|
|
blob = buffer_get_string(m, &bloblen); |
852 |
|
|
pubkey_auth_attempt = buffer_get_int(m); |
853 |
|
|
|
854 |
|
|
key = key_from_blob(blob, bloblen); |
855 |
|
|
|
856 |
|
|
debug3("%s: key_from_blob: %p", __func__, key); |
857 |
|
|
|
858 |
|
|
if (key != NULL && authctxt->valid) { |
859 |
|
|
/* These should not make it past the privsep child */ |
860 |
|
|
if (key_type_plain(key->type) == KEY_RSA && |
861 |
|
|
(datafellows & SSH_BUG_RSASIGMD5) != 0) |
862 |
|
|
fatal("%s: passed a SSH_BUG_RSASIGMD5 key", __func__); |
863 |
|
|
|
864 |
|
|
switch (type) { |
865 |
|
|
case MM_USERKEY: |
866 |
|
|
allowed = options.pubkey_authentication && |
867 |
|
|
!auth2_key_already_used(authctxt, key) && |
868 |
|
|
match_pattern_list(sshkey_ssh_name(key), |
869 |
|
|
options.pubkey_key_types, 0) == 1 && |
870 |
|
|
user_key_allowed(authctxt->pw, key, |
871 |
|
|
pubkey_auth_attempt); |
872 |
|
|
auth_method = "publickey"; |
873 |
|
|
if (options.pubkey_authentication && |
874 |
|
|
(!pubkey_auth_attempt || allowed != 1)) |
875 |
|
|
auth_clear_options(); |
876 |
|
|
break; |
877 |
|
|
case MM_HOSTKEY: |
878 |
|
|
allowed = options.hostbased_authentication && |
879 |
|
|
!auth2_key_already_used(authctxt, key) && |
880 |
|
|
match_pattern_list(sshkey_ssh_name(key), |
881 |
|
|
options.hostbased_key_types, 0) == 1 && |
882 |
|
|
hostbased_key_allowed(authctxt->pw, |
883 |
|
|
cuser, chost, key); |
884 |
|
|
auth2_record_info(authctxt, |
885 |
|
|
"client user \"%.100s\", client host \"%.100s\"", |
886 |
|
|
cuser, chost); |
887 |
|
|
auth_method = "hostbased"; |
888 |
|
|
break; |
889 |
|
|
default: |
890 |
|
|
fatal("%s: unknown key type %d", __func__, type); |
891 |
|
|
break; |
892 |
|
|
} |
893 |
|
|
} |
894 |
|
|
|
895 |
|
|
debug3("%s: key is %s", __func__, allowed ? "allowed" : "not allowed"); |
896 |
|
|
|
897 |
|
|
auth2_record_key(authctxt, 0, key); |
898 |
|
|
sshkey_free(key); |
899 |
|
|
|
900 |
|
|
/* clear temporarily storage (used by verify) */ |
901 |
|
|
monitor_reset_key_state(); |
902 |
|
|
|
903 |
|
|
if (allowed) { |
904 |
|
|
/* Save temporarily for comparison in verify */ |
905 |
|
|
key_blob = blob; |
906 |
|
|
key_bloblen = bloblen; |
907 |
|
|
key_blobtype = type; |
908 |
|
|
hostbased_cuser = cuser; |
909 |
|
|
hostbased_chost = chost; |
910 |
|
|
} else { |
911 |
|
|
/* Log failed attempt */ |
912 |
|
|
auth_log(authctxt, 0, 0, auth_method, NULL); |
913 |
|
|
free(blob); |
914 |
|
|
free(cuser); |
915 |
|
|
free(chost); |
916 |
|
|
} |
917 |
|
|
|
918 |
|
|
buffer_clear(m); |
919 |
|
|
buffer_put_int(m, allowed); |
920 |
|
|
buffer_put_int(m, forced_command != NULL); |
921 |
|
|
|
922 |
|
|
mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); |
923 |
|
|
|
924 |
|
|
return (0); |
925 |
|
|
} |
926 |
|
|
|
927 |
|
|
static int |
928 |
|
|
monitor_valid_userblob(u_char *data, u_int datalen) |
929 |
|
|
{ |
930 |
|
|
Buffer b; |
931 |
|
|
u_char *p; |
932 |
|
|
char *userstyle, *cp; |
933 |
|
|
u_int len; |
934 |
|
|
int fail = 0; |
935 |
|
|
|
936 |
|
|
buffer_init(&b); |
937 |
|
|
buffer_append(&b, data, datalen); |
938 |
|
|
|
939 |
|
|
if (datafellows & SSH_OLD_SESSIONID) { |
940 |
|
|
p = buffer_ptr(&b); |
941 |
|
|
len = buffer_len(&b); |
942 |
|
|
if ((session_id2 == NULL) || |
943 |
|
|
(len < session_id2_len) || |
944 |
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0)) |
945 |
|
|
fail++; |
946 |
|
|
buffer_consume(&b, session_id2_len); |
947 |
|
|
} else { |
948 |
|
|
p = buffer_get_string(&b, &len); |
949 |
|
|
if ((session_id2 == NULL) || |
950 |
|
|
(len != session_id2_len) || |
951 |
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0)) |
952 |
|
|
fail++; |
953 |
|
|
free(p); |
954 |
|
|
} |
955 |
|
|
if (buffer_get_char(&b) != SSH2_MSG_USERAUTH_REQUEST) |
956 |
|
|
fail++; |
957 |
|
|
cp = buffer_get_cstring(&b, NULL); |
958 |
|
|
xasprintf(&userstyle, "%s%s%s", authctxt->user, |
959 |
|
|
authctxt->style ? ":" : "", |
960 |
|
|
authctxt->style ? authctxt->style : ""); |
961 |
|
|
if (strcmp(userstyle, cp) != 0) { |
962 |
|
|
logit("wrong user name passed to monitor: " |
963 |
|
|
"expected %s != %.100s", userstyle, cp); |
964 |
|
|
fail++; |
965 |
|
|
} |
966 |
|
|
free(userstyle); |
967 |
|
|
free(cp); |
968 |
|
|
buffer_skip_string(&b); |
969 |
|
|
if (datafellows & SSH_BUG_PKAUTH) { |
970 |
|
|
if (!buffer_get_char(&b)) |
971 |
|
|
fail++; |
972 |
|
|
} else { |
973 |
|
|
cp = buffer_get_cstring(&b, NULL); |
974 |
|
|
if (strcmp("publickey", cp) != 0) |
975 |
|
|
fail++; |
976 |
|
|
free(cp); |
977 |
|
|
if (!buffer_get_char(&b)) |
978 |
|
|
fail++; |
979 |
|
|
buffer_skip_string(&b); |
980 |
|
|
} |
981 |
|
|
buffer_skip_string(&b); |
982 |
|
|
if (buffer_len(&b) != 0) |
983 |
|
|
fail++; |
984 |
|
|
buffer_free(&b); |
985 |
|
|
return (fail == 0); |
986 |
|
|
} |
987 |
|
|
|
988 |
|
|
static int |
989 |
|
|
monitor_valid_hostbasedblob(u_char *data, u_int datalen, char *cuser, |
990 |
|
|
char *chost) |
991 |
|
|
{ |
992 |
|
|
Buffer b; |
993 |
|
|
char *p, *userstyle; |
994 |
|
|
u_int len; |
995 |
|
|
int fail = 0; |
996 |
|
|
|
997 |
|
|
buffer_init(&b); |
998 |
|
|
buffer_append(&b, data, datalen); |
999 |
|
|
|
1000 |
|
|
p = buffer_get_string(&b, &len); |
1001 |
|
|
if ((session_id2 == NULL) || |
1002 |
|
|
(len != session_id2_len) || |
1003 |
|
|
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0)) |
1004 |
|
|
fail++; |
1005 |
|
|
free(p); |
1006 |
|
|
|
1007 |
|
|
if (buffer_get_char(&b) != SSH2_MSG_USERAUTH_REQUEST) |
1008 |
|
|
fail++; |
1009 |
|
|
p = buffer_get_cstring(&b, NULL); |
1010 |
|
|
xasprintf(&userstyle, "%s%s%s", authctxt->user, |
1011 |
|
|
authctxt->style ? ":" : "", |
1012 |
|
|
authctxt->style ? authctxt->style : ""); |
1013 |
|
|
if (strcmp(userstyle, p) != 0) { |
1014 |
|
|
logit("wrong user name passed to monitor: expected %s != %.100s", |
1015 |
|
|
userstyle, p); |
1016 |
|
|
fail++; |
1017 |
|
|
} |
1018 |
|
|
free(userstyle); |
1019 |
|
|
free(p); |
1020 |
|
|
buffer_skip_string(&b); /* service */ |
1021 |
|
|
p = buffer_get_cstring(&b, NULL); |
1022 |
|
|
if (strcmp(p, "hostbased") != 0) |
1023 |
|
|
fail++; |
1024 |
|
|
free(p); |
1025 |
|
|
buffer_skip_string(&b); /* pkalg */ |
1026 |
|
|
buffer_skip_string(&b); /* pkblob */ |
1027 |
|
|
|
1028 |
|
|
/* verify client host, strip trailing dot if necessary */ |
1029 |
|
|
p = buffer_get_string(&b, NULL); |
1030 |
|
|
if (((len = strlen(p)) > 0) && p[len - 1] == '.') |
1031 |
|
|
p[len - 1] = '\0'; |
1032 |
|
|
if (strcmp(p, chost) != 0) |
1033 |
|
|
fail++; |
1034 |
|
|
free(p); |
1035 |
|
|
|
1036 |
|
|
/* verify client user */ |
1037 |
|
|
p = buffer_get_string(&b, NULL); |
1038 |
|
|
if (strcmp(p, cuser) != 0) |
1039 |
|
|
fail++; |
1040 |
|
|
free(p); |
1041 |
|
|
|
1042 |
|
|
if (buffer_len(&b) != 0) |
1043 |
|
|
fail++; |
1044 |
|
|
buffer_free(&b); |
1045 |
|
|
return (fail == 0); |
1046 |
|
|
} |
1047 |
|
|
|
1048 |
|
|
int |
1049 |
|
|
mm_answer_keyverify(int sock, struct sshbuf *m) |
1050 |
|
|
{ |
1051 |
|
|
struct sshkey *key; |
1052 |
|
|
u_char *signature, *data, *blob; |
1053 |
|
|
size_t signaturelen, datalen, bloblen; |
1054 |
|
|
int r, ret, valid_data = 0, encoded_ret; |
1055 |
|
|
|
1056 |
|
|
if ((r = sshbuf_get_string(m, &blob, &bloblen)) != 0 || |
1057 |
|
|
(r = sshbuf_get_string(m, &signature, &signaturelen)) != 0 || |
1058 |
|
|
(r = sshbuf_get_string(m, &data, &datalen)) != 0) |
1059 |
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
1060 |
|
|
|
1061 |
|
|
if (hostbased_cuser == NULL || hostbased_chost == NULL || |
1062 |
|
|
!monitor_allowed_key(blob, bloblen)) |
1063 |
|
|
fatal("%s: bad key, not previously allowed", __func__); |
1064 |
|
|
|
1065 |
|
|
/* XXX use sshkey_froms here; need to change key_blob, etc. */ |
1066 |
|
|
if ((r = sshkey_from_blob(blob, bloblen, &key)) != 0) |
1067 |
|
|
fatal("%s: bad public key blob: %s", __func__, ssh_err(r)); |
1068 |
|
|
|
1069 |
|
|
switch (key_blobtype) { |
1070 |
|
|
case MM_USERKEY: |
1071 |
|
|
valid_data = monitor_valid_userblob(data, datalen); |
1072 |
|
|
auth_method = "publickey"; |
1073 |
|
|
break; |
1074 |
|
|
case MM_HOSTKEY: |
1075 |
|
|
valid_data = monitor_valid_hostbasedblob(data, datalen, |
1076 |
|
|
hostbased_cuser, hostbased_chost); |
1077 |
|
|
auth_method = "hostbased"; |
1078 |
|
|
break; |
1079 |
|
|
default: |
1080 |
|
|
valid_data = 0; |
1081 |
|
|
break; |
1082 |
|
|
} |
1083 |
|
|
if (!valid_data) |
1084 |
|
|
fatal("%s: bad signature data blob", __func__); |
1085 |
|
|
|
1086 |
|
|
ret = sshkey_verify(key, signature, signaturelen, data, datalen, |
1087 |
|
|
active_state->compat); |
1088 |
|
|
debug3("%s: %s %p signature %s", __func__, auth_method, key, |
1089 |
|
|
(ret == 0) ? "verified" : "unverified"); |
1090 |
|
|
auth2_record_key(authctxt, ret == 0, key); |
1091 |
|
|
|
1092 |
|
|
free(blob); |
1093 |
|
|
free(signature); |
1094 |
|
|
free(data); |
1095 |
|
|
|
1096 |
|
|
monitor_reset_key_state(); |
1097 |
|
|
|
1098 |
|
|
sshkey_free(key); |
1099 |
|
|
sshbuf_reset(m); |
1100 |
|
|
|
1101 |
|
|
/* encode ret != 0 as positive integer, since we're sending u32 */ |
1102 |
|
|
encoded_ret = (ret != 0); |
1103 |
|
|
if ((r = sshbuf_put_u32(m, encoded_ret)) != 0) |
1104 |
|
|
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
1105 |
|
|
mm_request_send(sock, MONITOR_ANS_KEYVERIFY, m); |
1106 |
|
|
|
1107 |
|
|
return ret == 0; |
1108 |
|
|
} |
1109 |
|
|
|
1110 |
|
|
static void |
1111 |
|
|
mm_record_login(Session *s, struct passwd *pw) |
1112 |
|
|
{ |
1113 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
1114 |
|
|
socklen_t fromlen; |
1115 |
|
|
struct sockaddr_storage from; |
1116 |
|
|
|
1117 |
|
|
/* |
1118 |
|
|
* Get IP address of client. If the connection is not a socket, let |
1119 |
|
|
* the address be 0.0.0.0. |
1120 |
|
|
*/ |
1121 |
|
|
memset(&from, 0, sizeof(from)); |
1122 |
|
|
fromlen = sizeof(from); |
1123 |
|
|
if (packet_connection_is_on_socket()) { |
1124 |
|
|
if (getpeername(packet_get_connection_in(), |
1125 |
|
|
(struct sockaddr *)&from, &fromlen) < 0) { |
1126 |
|
|
debug("getpeername: %.100s", strerror(errno)); |
1127 |
|
|
cleanup_exit(255); |
1128 |
|
|
} |
1129 |
|
|
} |
1130 |
|
|
/* Record that there was a login on that tty from the remote host. */ |
1131 |
|
|
record_login(s->pid, s->tty, pw->pw_name, pw->pw_uid, |
1132 |
|
|
session_get_remote_name_or_ip(ssh, utmp_len, options.use_dns), |
1133 |
|
|
(struct sockaddr *)&from, fromlen); |
1134 |
|
|
} |
1135 |
|
|
|
1136 |
|
|
static void |
1137 |
|
|
mm_session_close(Session *s) |
1138 |
|
|
{ |
1139 |
|
|
debug3("%s: session %d pid %ld", __func__, s->self, (long)s->pid); |
1140 |
|
|
if (s->ttyfd != -1) { |
1141 |
|
|
debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ptyfd); |
1142 |
|
|
session_pty_cleanup2(s); |
1143 |
|
|
} |
1144 |
|
|
session_unused(s->self); |
1145 |
|
|
} |
1146 |
|
|
|
1147 |
|
|
int |
1148 |
|
|
mm_answer_pty(int sock, Buffer *m) |
1149 |
|
|
{ |
1150 |
|
|
extern struct monitor *pmonitor; |
1151 |
|
|
Session *s; |
1152 |
|
|
int res, fd0; |
1153 |
|
|
|
1154 |
|
|
debug3("%s entering", __func__); |
1155 |
|
|
|
1156 |
|
|
buffer_clear(m); |
1157 |
|
|
s = session_new(); |
1158 |
|
|
if (s == NULL) |
1159 |
|
|
goto error; |
1160 |
|
|
s->authctxt = authctxt; |
1161 |
|
|
s->pw = authctxt->pw; |
1162 |
|
|
s->pid = pmonitor->m_pid; |
1163 |
|
|
res = pty_allocate(&s->ptyfd, &s->ttyfd, s->tty, sizeof(s->tty)); |
1164 |
|
|
if (res == 0) |
1165 |
|
|
goto error; |
1166 |
|
|
pty_setowner(authctxt->pw, s->tty); |
1167 |
|
|
|
1168 |
|
|
buffer_put_int(m, 1); |
1169 |
|
|
buffer_put_cstring(m, s->tty); |
1170 |
|
|
|
1171 |
|
|
/* We need to trick ttyslot */ |
1172 |
|
|
if (dup2(s->ttyfd, 0) == -1) |
1173 |
|
|
fatal("%s: dup2", __func__); |
1174 |
|
|
|
1175 |
|
|
mm_record_login(s, authctxt->pw); |
1176 |
|
|
|
1177 |
|
|
/* Now we can close the file descriptor again */ |
1178 |
|
|
close(0); |
1179 |
|
|
|
1180 |
|
|
/* send messages generated by record_login */ |
1181 |
|
|
buffer_put_string(m, buffer_ptr(&loginmsg), buffer_len(&loginmsg)); |
1182 |
|
|
buffer_clear(&loginmsg); |
1183 |
|
|
|
1184 |
|
|
mm_request_send(sock, MONITOR_ANS_PTY, m); |
1185 |
|
|
|
1186 |
|
|
if (mm_send_fd(sock, s->ptyfd) == -1 || |
1187 |
|
|
mm_send_fd(sock, s->ttyfd) == -1) |
1188 |
|
|
fatal("%s: send fds failed", __func__); |
1189 |
|
|
|
1190 |
|
|
/* make sure nothing uses fd 0 */ |
1191 |
|
|
if ((fd0 = open(_PATH_DEVNULL, O_RDONLY)) < 0) |
1192 |
|
|
fatal("%s: open(/dev/null): %s", __func__, strerror(errno)); |
1193 |
|
|
if (fd0 != 0) |
1194 |
|
|
error("%s: fd0 %d != 0", __func__, fd0); |
1195 |
|
|
|
1196 |
|
|
/* slave is not needed */ |
1197 |
|
|
close(s->ttyfd); |
1198 |
|
|
s->ttyfd = s->ptyfd; |
1199 |
|
|
/* no need to dup() because nobody closes ptyfd */ |
1200 |
|
|
s->ptymaster = s->ptyfd; |
1201 |
|
|
|
1202 |
|
|
debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ttyfd); |
1203 |
|
|
|
1204 |
|
|
return (0); |
1205 |
|
|
|
1206 |
|
|
error: |
1207 |
|
|
if (s != NULL) |
1208 |
|
|
mm_session_close(s); |
1209 |
|
|
buffer_put_int(m, 0); |
1210 |
|
|
mm_request_send(sock, MONITOR_ANS_PTY, m); |
1211 |
|
|
return (0); |
1212 |
|
|
} |
1213 |
|
|
|
1214 |
|
|
int |
1215 |
|
|
mm_answer_pty_cleanup(int sock, Buffer *m) |
1216 |
|
|
{ |
1217 |
|
|
Session *s; |
1218 |
|
|
char *tty; |
1219 |
|
|
|
1220 |
|
|
debug3("%s entering", __func__); |
1221 |
|
|
|
1222 |
|
|
tty = buffer_get_string(m, NULL); |
1223 |
|
|
if ((s = session_by_tty(tty)) != NULL) |
1224 |
|
|
mm_session_close(s); |
1225 |
|
|
buffer_clear(m); |
1226 |
|
|
free(tty); |
1227 |
|
|
return (0); |
1228 |
|
|
} |
1229 |
|
|
|
1230 |
|
|
int |
1231 |
|
|
mm_answer_term(int sock, Buffer *req) |
1232 |
|
|
{ |
1233 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
1234 |
|
|
extern struct monitor *pmonitor; |
1235 |
|
|
int res, status; |
1236 |
|
|
|
1237 |
|
|
debug3("%s: tearing down sessions", __func__); |
1238 |
|
|
|
1239 |
|
|
/* The child is terminating */ |
1240 |
|
|
session_destroy_all(ssh, &mm_session_close); |
1241 |
|
|
|
1242 |
|
|
while (waitpid(pmonitor->m_pid, &status, 0) == -1) |
1243 |
|
|
if (errno != EINTR) |
1244 |
|
|
exit(1); |
1245 |
|
|
|
1246 |
|
|
res = WIFEXITED(status) ? WEXITSTATUS(status) : 1; |
1247 |
|
|
|
1248 |
|
|
/* Terminate process */ |
1249 |
|
|
exit(res); |
1250 |
|
|
} |
1251 |
|
|
|
1252 |
|
|
void |
1253 |
|
|
monitor_clear_keystate(struct monitor *pmonitor) |
1254 |
|
|
{ |
1255 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
1256 |
|
|
|
1257 |
|
|
ssh_clear_newkeys(ssh, MODE_IN); |
1258 |
|
|
ssh_clear_newkeys(ssh, MODE_OUT); |
1259 |
|
|
sshbuf_free(child_state); |
1260 |
|
|
child_state = NULL; |
1261 |
|
|
} |
1262 |
|
|
|
1263 |
|
|
void |
1264 |
|
|
monitor_apply_keystate(struct monitor *pmonitor) |
1265 |
|
|
{ |
1266 |
|
|
struct ssh *ssh = active_state; /* XXX */ |
1267 |
|
|
struct kex *kex; |
1268 |
|
|
int r; |
1269 |
|
|
|
1270 |
|
|
debug3("%s: packet_set_state", __func__); |
1271 |
|
|
if ((r = ssh_packet_set_state(ssh, child_state)) != 0) |
1272 |
|
|
fatal("%s: packet_set_state: %s", __func__, ssh_err(r)); |
1273 |
|
|
sshbuf_free(child_state); |
1274 |
|
|
child_state = NULL; |
1275 |
|
|
|
1276 |
|
|
if ((kex = ssh->kex) != NULL) { |
1277 |
|
|
/* XXX set callbacks */ |
1278 |
|
|
#ifdef WITH_OPENSSL |
1279 |
|
|
kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server; |
1280 |
|
|
kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server; |
1281 |
|
|
kex->kex[KEX_DH_GRP14_SHA256] = kexdh_server; |
1282 |
|
|
kex->kex[KEX_DH_GRP16_SHA512] = kexdh_server; |
1283 |
|
|
kex->kex[KEX_DH_GRP18_SHA512] = kexdh_server; |
1284 |
|
|
kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; |
1285 |
|
|
kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; |
1286 |
|
|
kex->kex[KEX_ECDH_SHA2] = kexecdh_server; |
1287 |
|
|
#endif |
1288 |
|
|
kex->kex[KEX_C25519_SHA256] = kexc25519_server; |
1289 |
|
|
kex->load_host_public_key=&get_hostkey_public_by_type; |
1290 |
|
|
kex->load_host_private_key=&get_hostkey_private_by_type; |
1291 |
|
|
kex->host_key_index=&get_hostkey_index; |
1292 |
|
|
kex->sign = sshd_hostkey_sign; |
1293 |
|
|
} |
1294 |
|
|
} |
1295 |
|
|
|
1296 |
|
|
/* This function requries careful sanity checking */ |
1297 |
|
|
|
1298 |
|
|
void |
1299 |
|
|
mm_get_keystate(struct monitor *pmonitor) |
1300 |
|
|
{ |
1301 |
|
|
debug3("%s: Waiting for new keys", __func__); |
1302 |
|
|
|
1303 |
|
|
if ((child_state = sshbuf_new()) == NULL) |
1304 |
|
|
fatal("%s: sshbuf_new failed", __func__); |
1305 |
|
|
mm_request_receive_expect(pmonitor->m_sendfd, MONITOR_REQ_KEYEXPORT, |
1306 |
|
|
child_state); |
1307 |
|
|
debug3("%s: GOT new keys", __func__); |
1308 |
|
|
} |
1309 |
|
|
|
1310 |
|
|
|
1311 |
|
|
/* XXX */ |
1312 |
|
|
|
1313 |
|
|
#define FD_CLOSEONEXEC(x) do { \ |
1314 |
|
|
if (fcntl(x, F_SETFD, FD_CLOEXEC) == -1) \ |
1315 |
|
|
fatal("fcntl(%d, F_SETFD)", x); \ |
1316 |
|
|
} while (0) |
1317 |
|
|
|
1318 |
|
|
static void |
1319 |
|
|
monitor_openfds(struct monitor *mon, int do_logfds) |
1320 |
|
|
{ |
1321 |
|
|
int pair[2]; |
1322 |
|
|
#ifdef SO_ZEROIZE |
1323 |
|
|
int on = 1; |
1324 |
|
|
#endif |
1325 |
|
|
|
1326 |
|
|
if (socketpair(AF_UNIX, SOCK_STREAM, 0, pair) == -1) |
1327 |
|
|
fatal("%s: socketpair: %s", __func__, strerror(errno)); |
1328 |
|
|
#ifdef SO_ZEROIZE |
1329 |
|
|
if (setsockopt(pair[0], SOL_SOCKET, SO_ZEROIZE, &on, sizeof(on)) < 0) |
1330 |
|
|
error("setsockopt SO_ZEROIZE(0): %.100s", strerror(errno)); |
1331 |
|
|
if (setsockopt(pair[1], SOL_SOCKET, SO_ZEROIZE, &on, sizeof(on)) < 0) |
1332 |
|
|
error("setsockopt SO_ZEROIZE(1): %.100s", strerror(errno)); |
1333 |
|
|
#endif |
1334 |
|
|
FD_CLOSEONEXEC(pair[0]); |
1335 |
|
|
FD_CLOSEONEXEC(pair[1]); |
1336 |
|
|
mon->m_recvfd = pair[0]; |
1337 |
|
|
mon->m_sendfd = pair[1]; |
1338 |
|
|
|
1339 |
|
|
if (do_logfds) { |
1340 |
|
|
if (pipe(pair) == -1) |
1341 |
|
|
fatal("%s: pipe: %s", __func__, strerror(errno)); |
1342 |
|
|
FD_CLOSEONEXEC(pair[0]); |
1343 |
|
|
FD_CLOSEONEXEC(pair[1]); |
1344 |
|
|
mon->m_log_recvfd = pair[0]; |
1345 |
|
|
mon->m_log_sendfd = pair[1]; |
1346 |
|
|
} else |
1347 |
|
|
mon->m_log_recvfd = mon->m_log_sendfd = -1; |
1348 |
|
|
} |
1349 |
|
|
|
1350 |
|
|
#define MM_MEMSIZE 65536 |
1351 |
|
|
|
1352 |
|
|
struct monitor * |
1353 |
|
|
monitor_init(void) |
1354 |
|
|
{ |
1355 |
|
|
struct monitor *mon; |
1356 |
|
|
|
1357 |
|
|
mon = xcalloc(1, sizeof(*mon)); |
1358 |
|
|
monitor_openfds(mon, 1); |
1359 |
|
|
|
1360 |
|
|
return mon; |
1361 |
|
|
} |
1362 |
|
|
|
1363 |
|
|
void |
1364 |
|
|
monitor_reinit(struct monitor *mon) |
1365 |
|
|
{ |
1366 |
|
|
monitor_openfds(mon, 0); |
1367 |
|
|
} |
1368 |
|
|
|
1369 |
|
|
#ifdef GSSAPI |
1370 |
|
|
int |
1371 |
|
|
mm_answer_gss_setup_ctx(int sock, Buffer *m) |
1372 |
|
|
{ |
1373 |
|
|
gss_OID_desc goid; |
1374 |
|
|
OM_uint32 major; |
1375 |
|
|
u_int len; |
1376 |
|
|
|
1377 |
|
|
if (!options.gss_authentication) |
1378 |
|
|
fatal("%s: GSSAPI authentication not enabled", __func__); |
1379 |
|
|
|
1380 |
|
|
goid.elements = buffer_get_string(m, &len); |
1381 |
|
|
goid.length = len; |
1382 |
|
|
|
1383 |
|
|
major = ssh_gssapi_server_ctx(&gsscontext, &goid); |
1384 |
|
|
|
1385 |
|
|
free(goid.elements); |
1386 |
|
|
|
1387 |
|
|
buffer_clear(m); |
1388 |
|
|
buffer_put_int(m, major); |
1389 |
|
|
|
1390 |
|
|
mm_request_send(sock, MONITOR_ANS_GSSSETUP, m); |
1391 |
|
|
|
1392 |
|
|
/* Now we have a context, enable the step */ |
1393 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSSTEP, 1); |
1394 |
|
|
|
1395 |
|
|
return (0); |
1396 |
|
|
} |
1397 |
|
|
|
1398 |
|
|
int |
1399 |
|
|
mm_answer_gss_accept_ctx(int sock, Buffer *m) |
1400 |
|
|
{ |
1401 |
|
|
gss_buffer_desc in; |
1402 |
|
|
gss_buffer_desc out = GSS_C_EMPTY_BUFFER; |
1403 |
|
|
OM_uint32 major, minor; |
1404 |
|
|
OM_uint32 flags = 0; /* GSI needs this */ |
1405 |
|
|
u_int len; |
1406 |
|
|
|
1407 |
|
|
if (!options.gss_authentication) |
1408 |
|
|
fatal("%s: GSSAPI authentication not enabled", __func__); |
1409 |
|
|
|
1410 |
|
|
in.value = buffer_get_string(m, &len); |
1411 |
|
|
in.length = len; |
1412 |
|
|
major = ssh_gssapi_accept_ctx(gsscontext, &in, &out, &flags); |
1413 |
|
|
free(in.value); |
1414 |
|
|
|
1415 |
|
|
buffer_clear(m); |
1416 |
|
|
buffer_put_int(m, major); |
1417 |
|
|
buffer_put_string(m, out.value, out.length); |
1418 |
|
|
buffer_put_int(m, flags); |
1419 |
|
|
mm_request_send(sock, MONITOR_ANS_GSSSTEP, m); |
1420 |
|
|
|
1421 |
|
|
gss_release_buffer(&minor, &out); |
1422 |
|
|
|
1423 |
|
|
if (major == GSS_S_COMPLETE) { |
1424 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSSTEP, 0); |
1425 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSUSEROK, 1); |
1426 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSCHECKMIC, 1); |
1427 |
|
|
} |
1428 |
|
|
return (0); |
1429 |
|
|
} |
1430 |
|
|
|
1431 |
|
|
int |
1432 |
|
|
mm_answer_gss_checkmic(int sock, Buffer *m) |
1433 |
|
|
{ |
1434 |
|
|
gss_buffer_desc gssbuf, mic; |
1435 |
|
|
OM_uint32 ret; |
1436 |
|
|
u_int len; |
1437 |
|
|
|
1438 |
|
|
if (!options.gss_authentication) |
1439 |
|
|
fatal("%s: GSSAPI authentication not enabled", __func__); |
1440 |
|
|
|
1441 |
|
|
gssbuf.value = buffer_get_string(m, &len); |
1442 |
|
|
gssbuf.length = len; |
1443 |
|
|
mic.value = buffer_get_string(m, &len); |
1444 |
|
|
mic.length = len; |
1445 |
|
|
|
1446 |
|
|
ret = ssh_gssapi_checkmic(gsscontext, &gssbuf, &mic); |
1447 |
|
|
|
1448 |
|
|
free(gssbuf.value); |
1449 |
|
|
free(mic.value); |
1450 |
|
|
|
1451 |
|
|
buffer_clear(m); |
1452 |
|
|
buffer_put_int(m, ret); |
1453 |
|
|
|
1454 |
|
|
mm_request_send(sock, MONITOR_ANS_GSSCHECKMIC, m); |
1455 |
|
|
|
1456 |
|
|
if (!GSS_ERROR(ret)) |
1457 |
|
|
monitor_permit(mon_dispatch, MONITOR_REQ_GSSUSEROK, 1); |
1458 |
|
|
|
1459 |
|
|
return (0); |
1460 |
|
|
} |
1461 |
|
|
|
1462 |
|
|
int |
1463 |
|
|
mm_answer_gss_userok(int sock, Buffer *m) |
1464 |
|
|
{ |
1465 |
|
|
int authenticated; |
1466 |
|
|
const char *displayname; |
1467 |
|
|
|
1468 |
|
|
if (!options.gss_authentication) |
1469 |
|
|
fatal("%s: GSSAPI authentication not enabled", __func__); |
1470 |
|
|
|
1471 |
|
|
authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user); |
1472 |
|
|
|
1473 |
|
|
buffer_clear(m); |
1474 |
|
|
buffer_put_int(m, authenticated); |
1475 |
|
|
|
1476 |
|
|
debug3("%s: sending result %d", __func__, authenticated); |
1477 |
|
|
mm_request_send(sock, MONITOR_ANS_GSSUSEROK, m); |
1478 |
|
|
|
1479 |
|
|
auth_method = "gssapi-with-mic"; |
1480 |
|
|
|
1481 |
|
|
if ((displayname = ssh_gssapi_displayname()) != NULL) |
1482 |
|
|
auth2_record_info(authctxt, "%s", displayname); |
1483 |
|
|
|
1484 |
|
|
/* Monitor loop will terminate if authenticated */ |
1485 |
|
|
return (authenticated); |
1486 |
|
|
} |
1487 |
|
|
#endif /* GSSAPI */ |
1488 |
|
|
|