client_test.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. // Copyright 2014 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "strings"
  9. "testing"
  10. )
  11. func TestClientVersion(t *testing.T) {
  12. for _, tt := range []struct {
  13. name string
  14. version string
  15. multiLine string
  16. wantErr bool
  17. }{
  18. {
  19. name: "default version",
  20. version: packageVersion,
  21. },
  22. {
  23. name: "custom version",
  24. version: "SSH-2.0-CustomClientVersionString",
  25. },
  26. {
  27. name: "good multi line version",
  28. version: packageVersion,
  29. multiLine: strings.Repeat("ignored\r\n", 20),
  30. },
  31. {
  32. name: "bad multi line version",
  33. version: packageVersion,
  34. multiLine: "bad multi line version",
  35. wantErr: true,
  36. },
  37. {
  38. name: "long multi line version",
  39. version: packageVersion,
  40. multiLine: strings.Repeat("long multi line version\r\n", 50)[:256],
  41. wantErr: true,
  42. },
  43. } {
  44. t.Run(tt.name, func(t *testing.T) {
  45. c1, c2, err := netPipe()
  46. if err != nil {
  47. t.Fatalf("netPipe: %v", err)
  48. }
  49. defer c1.Close()
  50. defer c2.Close()
  51. go func() {
  52. if tt.multiLine != "" {
  53. c1.Write([]byte(tt.multiLine))
  54. }
  55. NewClientConn(c1, "", &ClientConfig{
  56. ClientVersion: tt.version,
  57. HostKeyCallback: InsecureIgnoreHostKey(),
  58. })
  59. c1.Close()
  60. }()
  61. conf := &ServerConfig{NoClientAuth: true}
  62. conf.AddHostKey(testSigners["rsa"])
  63. conn, _, _, err := NewServerConn(c2, conf)
  64. if err == nil == tt.wantErr {
  65. t.Fatalf("got err %v; wantErr %t", err, tt.wantErr)
  66. }
  67. if tt.wantErr {
  68. // Don't verify the version on an expected error.
  69. return
  70. }
  71. if got := string(conn.ClientVersion()); got != tt.version {
  72. t.Fatalf("got %q; want %q", got, tt.version)
  73. }
  74. })
  75. }
  76. }
  77. func TestHostKeyCheck(t *testing.T) {
  78. for _, tt := range []struct {
  79. name string
  80. wantError string
  81. key PublicKey
  82. }{
  83. {"no callback", "must specify HostKeyCallback", nil},
  84. {"correct key", "", testSigners["rsa"].PublicKey()},
  85. {"mismatch", "mismatch", testSigners["ecdsa"].PublicKey()},
  86. } {
  87. c1, c2, err := netPipe()
  88. if err != nil {
  89. t.Fatalf("netPipe: %v", err)
  90. }
  91. defer c1.Close()
  92. defer c2.Close()
  93. serverConf := &ServerConfig{
  94. NoClientAuth: true,
  95. }
  96. serverConf.AddHostKey(testSigners["rsa"])
  97. go NewServerConn(c1, serverConf)
  98. clientConf := ClientConfig{
  99. User: "user",
  100. }
  101. if tt.key != nil {
  102. clientConf.HostKeyCallback = FixedHostKey(tt.key)
  103. }
  104. _, _, _, err = NewClientConn(c2, "", &clientConf)
  105. if err != nil {
  106. if tt.wantError == "" || !strings.Contains(err.Error(), tt.wantError) {
  107. t.Errorf("%s: got error %q, missing %q", tt.name, err.Error(), tt.wantError)
  108. }
  109. } else if tt.wantError != "" {
  110. t.Errorf("%s: succeeded, but want error string %q", tt.name, tt.wantError)
  111. }
  112. }
  113. }
  114. func TestVerifyHostKeySignature(t *testing.T) {
  115. for _, tt := range []struct {
  116. key string
  117. signAlgo string
  118. verifyAlgo string
  119. wantError string
  120. }{
  121. {"rsa", SigAlgoRSA, SigAlgoRSA, ""},
  122. {"rsa", SigAlgoRSASHA2256, SigAlgoRSASHA2256, ""},
  123. {"rsa", SigAlgoRSA, SigAlgoRSASHA2512, `ssh: invalid signature algorithm "ssh-rsa", expected "rsa-sha2-512"`},
  124. {"ed25519", KeyAlgoED25519, KeyAlgoED25519, ""},
  125. } {
  126. key := testSigners[tt.key].PublicKey()
  127. s, ok := testSigners[tt.key].(AlgorithmSigner)
  128. if !ok {
  129. t.Fatalf("needed an AlgorithmSigner")
  130. }
  131. sig, err := s.SignWithAlgorithm(rand.Reader, []byte("test"), tt.signAlgo)
  132. if err != nil {
  133. t.Fatalf("couldn't sign: %q", err)
  134. }
  135. b := bytes.Buffer{}
  136. writeString(&b, []byte(sig.Format))
  137. writeString(&b, sig.Blob)
  138. result := kexResult{Signature: b.Bytes(), H: []byte("test")}
  139. err = verifyHostKeySignature(key, tt.verifyAlgo, &result)
  140. if err != nil {
  141. if tt.wantError == "" || !strings.Contains(err.Error(), tt.wantError) {
  142. t.Errorf("got error %q, expecting %q", err.Error(), tt.wantError)
  143. }
  144. } else if tt.wantError != "" {
  145. t.Errorf("succeeded, but want error string %q", tt.wantError)
  146. }
  147. }
  148. }
  149. func TestBannerCallback(t *testing.T) {
  150. c1, c2, err := netPipe()
  151. if err != nil {
  152. t.Fatalf("netPipe: %v", err)
  153. }
  154. defer c1.Close()
  155. defer c2.Close()
  156. serverConf := &ServerConfig{
  157. PasswordCallback: func(conn ConnMetadata, password []byte) (*Permissions, error) {
  158. return &Permissions{}, nil
  159. },
  160. BannerCallback: func(conn ConnMetadata) string {
  161. return "Hello World"
  162. },
  163. }
  164. serverConf.AddHostKey(testSigners["rsa"])
  165. go NewServerConn(c1, serverConf)
  166. var receivedBanner string
  167. var bannerCount int
  168. clientConf := ClientConfig{
  169. Auth: []AuthMethod{
  170. Password("123"),
  171. },
  172. User: "user",
  173. HostKeyCallback: InsecureIgnoreHostKey(),
  174. BannerCallback: func(message string) error {
  175. bannerCount++
  176. receivedBanner = message
  177. return nil
  178. },
  179. }
  180. _, _, _, err = NewClientConn(c2, "", &clientConf)
  181. if err != nil {
  182. t.Fatal(err)
  183. }
  184. if bannerCount != 1 {
  185. t.Errorf("got %d banners; want 1", bannerCount)
  186. }
  187. expected := "Hello World"
  188. if receivedBanner != expected {
  189. t.Fatalf("got %s; want %s", receivedBanner, expected)
  190. }
  191. }
  192. func TestNewClientConn(t *testing.T) {
  193. for _, tt := range []struct {
  194. name string
  195. user string
  196. }{
  197. {
  198. name: "good user field for ConnMetadata",
  199. user: "testuser",
  200. },
  201. {
  202. name: "empty user field for ConnMetadata",
  203. user: "",
  204. },
  205. } {
  206. t.Run(tt.name, func(t *testing.T) {
  207. c1, c2, err := netPipe()
  208. if err != nil {
  209. t.Fatalf("netPipe: %v", err)
  210. }
  211. defer c1.Close()
  212. defer c2.Close()
  213. serverConf := &ServerConfig{
  214. PasswordCallback: func(conn ConnMetadata, password []byte) (*Permissions, error) {
  215. return &Permissions{}, nil
  216. },
  217. }
  218. serverConf.AddHostKey(testSigners["rsa"])
  219. go NewServerConn(c1, serverConf)
  220. clientConf := &ClientConfig{
  221. User: tt.user,
  222. Auth: []AuthMethod{
  223. Password("testpw"),
  224. },
  225. HostKeyCallback: InsecureIgnoreHostKey(),
  226. }
  227. clientConn, _, _, err := NewClientConn(c2, "", clientConf)
  228. if err != nil {
  229. t.Fatal(err)
  230. }
  231. if userGot := clientConn.User(); userGot != tt.user {
  232. t.Errorf("got user %q; want user %q", userGot, tt.user)
  233. }
  234. })
  235. }
  236. }