transport.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bufio"
  7. "bytes"
  8. "errors"
  9. "io"
  10. "log"
  11. )
  12. // debugTransport if set, will print packet types as they go over the
  13. // wire. No message decoding is done, to minimize the impact on timing.
  14. const debugTransport = false
  15. const (
  16. gcm128CipherID = "aes128-gcm@openssh.com"
  17. gcm256CipherID = "aes256-gcm@openssh.com"
  18. aes128cbcID = "aes128-cbc"
  19. tripledescbcID = "3des-cbc"
  20. )
  21. // packetConn represents a transport that implements packet based
  22. // operations.
  23. type packetConn interface {
  24. // Encrypt and send a packet of data to the remote peer.
  25. writePacket(packet []byte) error
  26. // Read a packet from the connection. The read is blocking,
  27. // i.e. if error is nil, then the returned byte slice is
  28. // always non-empty.
  29. readPacket() ([]byte, error)
  30. // Close closes the write-side of the connection.
  31. Close() error
  32. }
  33. // transport is the keyingTransport that implements the SSH packet
  34. // protocol.
  35. type transport struct {
  36. reader connectionState
  37. writer connectionState
  38. bufReader *bufio.Reader
  39. bufWriter *bufio.Writer
  40. rand io.Reader
  41. isClient bool
  42. io.Closer
  43. strictMode bool
  44. initialKEXDone bool
  45. }
  46. // packetCipher represents a combination of SSH encryption/MAC
  47. // protocol. A single instance should be used for one direction only.
  48. type packetCipher interface {
  49. // writeCipherPacket encrypts the packet and writes it to w. The
  50. // contents of the packet are generally scrambled.
  51. writeCipherPacket(seqnum uint32, w io.Writer, rand io.Reader, packet []byte) error
  52. // readCipherPacket reads and decrypts a packet of data. The
  53. // returned packet may be overwritten by future calls of
  54. // readPacket.
  55. readCipherPacket(seqnum uint32, r io.Reader) ([]byte, error)
  56. }
  57. // connectionState represents one side (read or write) of the
  58. // connection. This is necessary because each direction has its own
  59. // keys, and can even have its own algorithms
  60. type connectionState struct {
  61. packetCipher
  62. seqNum uint32
  63. dir direction
  64. pendingKeyChange chan packetCipher
  65. }
  66. func (t *transport) setStrictMode() error {
  67. if t.reader.seqNum != 1 {
  68. return errors.New("ssh: sequence number != 1 when strict KEX mode requested")
  69. }
  70. t.strictMode = true
  71. return nil
  72. }
  73. func (t *transport) setInitialKEXDone() {
  74. t.initialKEXDone = true
  75. }
  76. // prepareKeyChange sets up key material for a keychange. The key changes in
  77. // both directions are triggered by reading and writing a msgNewKey packet
  78. // respectively.
  79. func (t *transport) prepareKeyChange(algs *algorithms, kexResult *kexResult) error {
  80. ciph, err := newPacketCipher(t.reader.dir, algs.r, kexResult)
  81. if err != nil {
  82. return err
  83. }
  84. t.reader.pendingKeyChange <- ciph
  85. ciph, err = newPacketCipher(t.writer.dir, algs.w, kexResult)
  86. if err != nil {
  87. return err
  88. }
  89. t.writer.pendingKeyChange <- ciph
  90. return nil
  91. }
  92. func (t *transport) printPacket(p []byte, write bool) {
  93. if len(p) == 0 {
  94. return
  95. }
  96. who := "server"
  97. if t.isClient {
  98. who = "client"
  99. }
  100. what := "read"
  101. if write {
  102. what = "write"
  103. }
  104. log.Println(what, who, p[0])
  105. }
  106. // Read and decrypt next packet.
  107. func (t *transport) readPacket() (p []byte, err error) {
  108. for {
  109. p, err = t.reader.readPacket(t.bufReader, t.strictMode)
  110. if err != nil {
  111. break
  112. }
  113. // in strict mode we pass through DEBUG and IGNORE packets only during the initial KEX
  114. if len(p) == 0 || (t.strictMode && !t.initialKEXDone) || (p[0] != msgIgnore && p[0] != msgDebug) {
  115. break
  116. }
  117. }
  118. if debugTransport {
  119. t.printPacket(p, false)
  120. }
  121. return p, err
  122. }
  123. func (s *connectionState) readPacket(r *bufio.Reader, strictMode bool) ([]byte, error) {
  124. packet, err := s.packetCipher.readCipherPacket(s.seqNum, r)
  125. s.seqNum++
  126. if err == nil && len(packet) == 0 {
  127. err = errors.New("ssh: zero length packet")
  128. }
  129. if len(packet) > 0 {
  130. switch packet[0] {
  131. case msgNewKeys:
  132. select {
  133. case cipher := <-s.pendingKeyChange:
  134. s.packetCipher = cipher
  135. if strictMode {
  136. s.seqNum = 0
  137. }
  138. default:
  139. return nil, errors.New("ssh: got bogus newkeys message")
  140. }
  141. case msgDisconnect:
  142. // Transform a disconnect message into an
  143. // error. Since this is lowest level at which
  144. // we interpret message types, doing it here
  145. // ensures that we don't have to handle it
  146. // elsewhere.
  147. var msg disconnectMsg
  148. if err := Unmarshal(packet, &msg); err != nil {
  149. return nil, err
  150. }
  151. return nil, &msg
  152. }
  153. }
  154. // The packet may point to an internal buffer, so copy the
  155. // packet out here.
  156. fresh := make([]byte, len(packet))
  157. copy(fresh, packet)
  158. return fresh, err
  159. }
  160. func (t *transport) writePacket(packet []byte) error {
  161. if debugTransport {
  162. t.printPacket(packet, true)
  163. }
  164. return t.writer.writePacket(t.bufWriter, t.rand, packet, t.strictMode)
  165. }
  166. func (s *connectionState) writePacket(w *bufio.Writer, rand io.Reader, packet []byte, strictMode bool) error {
  167. changeKeys := len(packet) > 0 && packet[0] == msgNewKeys
  168. err := s.packetCipher.writeCipherPacket(s.seqNum, w, rand, packet)
  169. if err != nil {
  170. return err
  171. }
  172. if err = w.Flush(); err != nil {
  173. return err
  174. }
  175. s.seqNum++
  176. if changeKeys {
  177. select {
  178. case cipher := <-s.pendingKeyChange:
  179. s.packetCipher = cipher
  180. if strictMode {
  181. s.seqNum = 0
  182. }
  183. default:
  184. panic("ssh: no key material for msgNewKeys")
  185. }
  186. }
  187. return err
  188. }
  189. func newTransport(rwc io.ReadWriteCloser, rand io.Reader, isClient bool) *transport {
  190. t := &transport{
  191. bufReader: bufio.NewReader(rwc),
  192. bufWriter: bufio.NewWriter(rwc),
  193. rand: rand,
  194. reader: connectionState{
  195. packetCipher: &streamPacketCipher{cipher: noneCipher{}},
  196. pendingKeyChange: make(chan packetCipher, 1),
  197. },
  198. writer: connectionState{
  199. packetCipher: &streamPacketCipher{cipher: noneCipher{}},
  200. pendingKeyChange: make(chan packetCipher, 1),
  201. },
  202. Closer: rwc,
  203. }
  204. t.isClient = isClient
  205. if isClient {
  206. t.reader.dir = serverKeys
  207. t.writer.dir = clientKeys
  208. } else {
  209. t.reader.dir = clientKeys
  210. t.writer.dir = serverKeys
  211. }
  212. return t
  213. }
  214. type direction struct {
  215. ivTag []byte
  216. keyTag []byte
  217. macKeyTag []byte
  218. }
  219. var (
  220. serverKeys = direction{[]byte{'B'}, []byte{'D'}, []byte{'F'}}
  221. clientKeys = direction{[]byte{'A'}, []byte{'C'}, []byte{'E'}}
  222. )
  223. // setupKeys sets the cipher and MAC keys from kex.K, kex.H and sessionId, as
  224. // described in RFC 4253, section 6.4. direction should either be serverKeys
  225. // (to setup server->client keys) or clientKeys (for client->server keys).
  226. func newPacketCipher(d direction, algs directionAlgorithms, kex *kexResult) (packetCipher, error) {
  227. cipherMode := cipherModes[algs.Cipher]
  228. iv := make([]byte, cipherMode.ivSize)
  229. key := make([]byte, cipherMode.keySize)
  230. generateKeyMaterial(iv, d.ivTag, kex)
  231. generateKeyMaterial(key, d.keyTag, kex)
  232. var macKey []byte
  233. if !aeadCiphers[algs.Cipher] {
  234. macMode := macModes[algs.MAC]
  235. macKey = make([]byte, macMode.keySize)
  236. generateKeyMaterial(macKey, d.macKeyTag, kex)
  237. }
  238. return cipherModes[algs.Cipher].create(key, iv, macKey, algs)
  239. }
  240. // generateKeyMaterial fills out with key material generated from tag, K, H
  241. // and sessionId, as specified in RFC 4253, section 7.2.
  242. func generateKeyMaterial(out, tag []byte, r *kexResult) {
  243. var digestsSoFar []byte
  244. h := r.Hash.New()
  245. for len(out) > 0 {
  246. h.Reset()
  247. h.Write(r.K)
  248. h.Write(r.H)
  249. if len(digestsSoFar) == 0 {
  250. h.Write(tag)
  251. h.Write(r.SessionID)
  252. } else {
  253. h.Write(digestsSoFar)
  254. }
  255. digest := h.Sum(nil)
  256. n := copy(out, digest)
  257. out = out[n:]
  258. if len(out) > 0 {
  259. digestsSoFar = append(digestsSoFar, digest...)
  260. }
  261. }
  262. }
  263. const packageVersion = "SSH-2.0-Go"
  264. // Sends and receives a version line. The versionLine string should
  265. // be US ASCII, start with "SSH-2.0-", and should not include a
  266. // newline. exchangeVersions returns the other side's version line.
  267. func exchangeVersions(rw io.ReadWriter, versionLine []byte) (them []byte, err error) {
  268. // Contrary to the RFC, we do not ignore lines that don't
  269. // start with "SSH-2.0-" to make the library usable with
  270. // nonconforming servers.
  271. for _, c := range versionLine {
  272. // The spec disallows non US-ASCII chars, and
  273. // specifically forbids null chars.
  274. if c < 32 {
  275. return nil, errors.New("ssh: junk character in version line")
  276. }
  277. }
  278. if _, err = rw.Write(append(versionLine, '\r', '\n')); err != nil {
  279. return
  280. }
  281. them, err = readVersion(rw)
  282. return them, err
  283. }
  284. // maxVersionStringBytes is the maximum number of bytes that we'll
  285. // accept as a version string. RFC 4253 section 4.2 limits this at 255
  286. // chars
  287. const maxVersionStringBytes = 255
  288. // Read version string as specified by RFC 4253, section 4.2.
  289. func readVersion(r io.Reader) ([]byte, error) {
  290. versionString := make([]byte, 0, 64)
  291. var ok bool
  292. var buf [1]byte
  293. for length := 0; length < maxVersionStringBytes; length++ {
  294. _, err := io.ReadFull(r, buf[:])
  295. if err != nil {
  296. return nil, err
  297. }
  298. // The RFC says that the version should be terminated with \r\n
  299. // but several SSH servers actually only send a \n.
  300. if buf[0] == '\n' {
  301. if !bytes.HasPrefix(versionString, []byte("SSH-")) {
  302. // RFC 4253 says we need to ignore all version string lines
  303. // except the one containing the SSH version (provided that
  304. // all the lines do not exceed 255 bytes in total).
  305. versionString = versionString[:0]
  306. continue
  307. }
  308. ok = true
  309. break
  310. }
  311. // non ASCII chars are disallowed, but we are lenient,
  312. // since Go doesn't use null-terminated strings.
  313. // The RFC allows a comment after a space, however,
  314. // all of it (version and comments) goes into the
  315. // session hash.
  316. versionString = append(versionString, buf[0])
  317. }
  318. if !ok {
  319. return nil, errors.New("ssh: overflow reading version string")
  320. }
  321. // There might be a '\r' on the end which we should remove.
  322. if len(versionString) > 0 && versionString[len(versionString)-1] == '\r' {
  323. versionString = versionString[:len(versionString)-1]
  324. }
  325. return versionString, nil
  326. }