mirror of
https://github.com/hierynomus/sshj.git
synced 2025-12-07 15:50:57 +03:00
Implement OpenSSH strict key exchange extension (#917)
This commit is contained in:
@@ -51,6 +51,14 @@ abstract class Converter {
|
||||
return seq;
|
||||
}
|
||||
|
||||
void resetSequenceNumber() {
|
||||
seq = -1;
|
||||
}
|
||||
|
||||
boolean isSequenceNumberAtMax() {
|
||||
return seq == 0xffffffffL;
|
||||
}
|
||||
|
||||
void setAlgorithms(Cipher cipher, MAC mac, Compression compression) {
|
||||
this.cipher = cipher;
|
||||
this.mac = mac;
|
||||
|
||||
@@ -60,6 +60,10 @@ final class KeyExchanger
|
||||
|
||||
private final AtomicBoolean kexOngoing = new AtomicBoolean();
|
||||
|
||||
private final AtomicBoolean initialKex = new AtomicBoolean(true);
|
||||
|
||||
private final AtomicBoolean strictKex = new AtomicBoolean();
|
||||
|
||||
/** What we are expecting from the next packet */
|
||||
private Expected expected = Expected.KEXINIT;
|
||||
|
||||
@@ -123,6 +127,14 @@ final class KeyExchanger
|
||||
return kexOngoing.get();
|
||||
}
|
||||
|
||||
boolean isStrictKex() {
|
||||
return strictKex.get();
|
||||
}
|
||||
|
||||
boolean isInitialKex() {
|
||||
return initialKex.get();
|
||||
}
|
||||
|
||||
/**
|
||||
* Starts key exchange by sending a {@code SSH_MSG_KEXINIT} packet. Key exchange needs to be done once mandatorily
|
||||
* after initializing the {@link Transport} for it to be usable and may be initiated at any later point e.g. if
|
||||
@@ -183,7 +195,7 @@ final class KeyExchanger
|
||||
throws TransportException {
|
||||
log.debug("Sending SSH_MSG_KEXINIT");
|
||||
List<String> knownHostAlgs = findKnownHostAlgs(transport.getRemoteHost(), transport.getRemotePort());
|
||||
clientProposal = new Proposal(transport.getConfig(), knownHostAlgs);
|
||||
clientProposal = new Proposal(transport.getConfig(), knownHostAlgs, initialKex.get());
|
||||
transport.write(clientProposal.getPacket());
|
||||
kexInitSent.set();
|
||||
}
|
||||
@@ -202,6 +214,9 @@ final class KeyExchanger
|
||||
throws TransportException {
|
||||
log.debug("Sending SSH_MSG_NEWKEYS");
|
||||
transport.write(new SSHPacket(Message.NEWKEYS));
|
||||
if (strictKex.get()) {
|
||||
transport.getEncoder().resetSequenceNumber();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -234,6 +249,10 @@ final class KeyExchanger
|
||||
|
||||
private void setKexDone() {
|
||||
kexOngoing.set(false);
|
||||
initialKex.set(false);
|
||||
if (strictKex.get()) {
|
||||
transport.getDecoder().resetSequenceNumber();
|
||||
}
|
||||
kexInitSent.clear();
|
||||
done.set();
|
||||
}
|
||||
@@ -242,6 +261,7 @@ final class KeyExchanger
|
||||
throws TransportException {
|
||||
buf.rpos(buf.rpos() - 1);
|
||||
final Proposal serverProposal = new Proposal(buf);
|
||||
gotStrictKexInfo(serverProposal);
|
||||
negotiatedAlgs = clientProposal.negotiate(serverProposal);
|
||||
log.debug("Negotiated algorithms: {}", negotiatedAlgs);
|
||||
for(AlgorithmsVerifier v: algorithmVerifiers) {
|
||||
@@ -265,6 +285,18 @@ final class KeyExchanger
|
||||
}
|
||||
}
|
||||
|
||||
private void gotStrictKexInfo(Proposal serverProposal) throws TransportException {
|
||||
if (initialKex.get() && serverProposal.isStrictKeyExchangeSupportedByServer()) {
|
||||
strictKex.set(true);
|
||||
log.debug("Enabling strict key exchange extension");
|
||||
if (transport.getDecoder().getSequenceNumber() != 0) {
|
||||
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
||||
"SSH_MSG_KEXINIT was not first package during strict key exchange"
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Private method used while putting new keys into use that will resize the key used to initialize the cipher to the
|
||||
* needed length.
|
||||
|
||||
@@ -37,8 +37,11 @@ class Proposal {
|
||||
private final List<String> s2cComp;
|
||||
private final SSHPacket packet;
|
||||
|
||||
public Proposal(Config config, List<String> knownHostAlgs) {
|
||||
public Proposal(Config config, List<String> knownHostAlgs, boolean initialKex) {
|
||||
kex = Factory.Named.Util.getNames(config.getKeyExchangeFactories());
|
||||
if (initialKex) {
|
||||
kex.add("kex-strict-c-v00@openssh.com");
|
||||
}
|
||||
sig = filterKnownHostKeyAlgorithms(Factory.Named.Util.getNames(config.getKeyAlgorithms()), knownHostAlgs);
|
||||
c2sCipher = s2cCipher = Factory.Named.Util.getNames(config.getCipherFactories());
|
||||
c2sMAC = s2cMAC = Factory.Named.Util.getNames(config.getMACFactories());
|
||||
@@ -91,6 +94,10 @@ class Proposal {
|
||||
return kex;
|
||||
}
|
||||
|
||||
public boolean isStrictKeyExchangeSupportedByServer() {
|
||||
return kex.contains("kex-strict-s-v00@openssh.com");
|
||||
}
|
||||
|
||||
public List<String> getHostKeyAlgorithms() {
|
||||
return sig;
|
||||
}
|
||||
|
||||
@@ -426,7 +426,7 @@ public final class TransportImpl
|
||||
assert m != Message.KEXINIT;
|
||||
kexer.waitForDone();
|
||||
}
|
||||
} else if (encoder.getSequenceNumber() == 0) // We get here every 2**32th packet
|
||||
} else if (encoder.isSequenceNumberAtMax()) // We get here every 2**32th packet
|
||||
kexer.startKex(true);
|
||||
|
||||
final long seq = encoder.encode(payload);
|
||||
@@ -479,9 +479,20 @@ public final class TransportImpl
|
||||
|
||||
log.trace("Received packet {}", msg);
|
||||
|
||||
if (kexer.isInitialKex()) {
|
||||
if (decoder.isSequenceNumberAtMax()) {
|
||||
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
||||
"Sequence number of decoder is about to wrap during initial key exchange");
|
||||
}
|
||||
if (kexer.isStrictKex() && !isKexerPacket(msg) && msg != Message.DISCONNECT) {
|
||||
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
||||
"Unexpected packet type during initial strict key exchange");
|
||||
}
|
||||
}
|
||||
|
||||
if (msg.geq(50)) { // not a transport layer packet
|
||||
service.handle(msg, buf);
|
||||
} else if (msg.in(20, 21) || msg.in(30, 49)) { // kex packet
|
||||
} else if (isKexerPacket(msg)) {
|
||||
kexer.handle(msg, buf);
|
||||
} else {
|
||||
switch (msg) {
|
||||
@@ -513,6 +524,10 @@ public final class TransportImpl
|
||||
}
|
||||
}
|
||||
|
||||
private static boolean isKexerPacket(Message msg) {
|
||||
return msg.in(20, 21) || msg.in(30, 49);
|
||||
}
|
||||
|
||||
private void gotDebug(SSHPacket buf)
|
||||
throws TransportException {
|
||||
try {
|
||||
|
||||
Reference in New Issue
Block a user