1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
|
/*
* Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR `AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
#include "includes.h"
#ifdef GSSAPI
#include <openssl/crypto.h>
#include <openssl/bn.h>
#include "xmalloc.h"
#include "buffer.h"
#include "bufaux.h"
#include "kex.h"
#include "log.h"
#include "packet.h"
#include "dh.h"
#include "canohost.h"
#include "ssh2.h"
#include "ssh-gss.h"
extern char *xxx_host;
Gssctxt *xxx_gssctxt;
static void kexgss_verbose_cleanup(void *arg);
void
kexgss_client(Kex *kex)
{
gss_buffer_desc gssbuf, send_tok, recv_tok, msg_tok;
gss_buffer_t token_ptr;
gss_OID mech = GSS_C_NULL_OID;
Gssctxt *ctxt = NULL;
OM_uint32 maj_status, min_status, smaj_status, smin_status;
unsigned int klen, kout;
DH *dh;
BIGNUM *dh_server_pub = 0;
BIGNUM *shared_secret = 0;
Key *server_host_key = NULL;
unsigned char *kbuf;
unsigned char *hash;
unsigned char *server_host_key_blob = NULL;
char *msg, *lang;
int type = 0;
int first = 1;
uint_t sbloblen = 0;
uint_t strlen;
/* Map the negotiated kex name to a mech OID */
ssh_gssapi_oid_of_kexname(kex->name, &mech);
if (mech == GSS_C_NULL_OID)
fatal("Couldn't match the negotiated GSS key exchange");
ssh_gssapi_build_ctx(&ctxt, 1, mech);
/* This code should match that in ssh_dh1_client */
/* Step 1 - e is dh->pub_key */
dh = dh_new_group1();
dh_gen_key(dh, kex->we_need * 8);
/* This is f, we initialise it now to make life easier */
dh_server_pub = BN_new();
if (dh_server_pub == NULL) {
fatal("dh_server_pub == NULL");
}
token_ptr = GSS_C_NO_BUFFER;
recv_tok.value = NULL;
recv_tok.length = 0;
do {
debug("Calling gss_init_sec_context");
maj_status = ssh_gssapi_init_ctx(ctxt, xxx_host,
kex->options.gss_deleg_creds, token_ptr, &send_tok);
if (GSS_ERROR(maj_status)) {
ssh_gssapi_error(ctxt, "performing GSS-API protected "
"SSHv2 key exchange");
(void) gss_release_buffer(&min_status, &send_tok);
packet_disconnect("A GSS-API error occurred during "
"GSS-API protected SSHv2 key exchange\n");
}
/* If we've got an old receive buffer get rid of it */
if (token_ptr != GSS_C_NO_BUFFER) {
/* We allocated recv_tok */
xfree(recv_tok.value);
recv_tok.value = NULL;
recv_tok.length = 0;
token_ptr = GSS_C_NO_BUFFER;
}
if (maj_status == GSS_S_COMPLETE) {
/* If mutual state flag is not true, kex fails */
if (!(ctxt->flags & GSS_C_MUTUAL_FLAG)) {
fatal("Mutual authentication failed");
}
/* If integ avail flag is not true kex fails */
if (!(ctxt->flags & GSS_C_INTEG_FLAG)) {
fatal("Integrity check failed");
}
}
/*
* If we have data to send, then the last message that we
* received cannot have been a 'complete'.
*/
if (send_tok.length != 0) {
if (first) {
packet_start(SSH2_MSG_KEXGSS_INIT);
packet_put_string(send_tok.value,
send_tok.length);
packet_put_bignum2(dh->pub_key);
first = 0;
} else {
packet_start(SSH2_MSG_KEXGSS_CONTINUE);
packet_put_string(send_tok.value,
send_tok.length);
}
(void) gss_release_buffer(&min_status, &send_tok);
packet_send();
packet_write_wait();
/*
* If we've sent them data, they'd better be polite and
* reply.
*/
next_packet:
/*
* We need to catch connection closing w/o error
* tokens or messages so we can tell the user
* _something_ more useful than "Connection
* closed by ..."
*
* We use a fatal cleanup function as that's
* all, really, that we can do for now.
*/
fatal_add_cleanup(kexgss_verbose_cleanup, NULL);
type = packet_read();
fatal_remove_cleanup(kexgss_verbose_cleanup, NULL);
switch (type) {
case SSH2_MSG_KEXGSS_HOSTKEY:
debug("Received KEXGSS_HOSTKEY");
server_host_key_blob =
packet_get_string(&sbloblen);
server_host_key =
key_from_blob(server_host_key_blob,
sbloblen);
goto next_packet; /* there MUSt be another */
break;
case SSH2_MSG_KEXGSS_CONTINUE:
debug("Received GSSAPI_CONTINUE");
if (maj_status == GSS_S_COMPLETE)
packet_disconnect("Protocol error: "
"received GSS-API context token "
"though the context was already "
"established");
recv_tok.value = packet_get_string(&strlen);
recv_tok.length = strlen; /* u_int vs. size_t */
break;
case SSH2_MSG_KEXGSS_COMPLETE:
debug("Received GSSAPI_COMPLETE");
packet_get_bignum2(dh_server_pub);
msg_tok.value = packet_get_string(&strlen);
msg_tok.length = strlen; /* u_int vs. size_t */
/* Is there a token included? */
if (packet_get_char()) {
recv_tok.value =
packet_get_string(&strlen);
/* u_int/size_t */
recv_tok.length = strlen;
}
if (recv_tok.length > 0 &&
maj_status == GSS_S_COMPLETE) {
packet_disconnect("Protocol error: "
"received GSS-API context token "
"though the context was already "
"established");
} else if (recv_tok.length == 0 &&
maj_status == GSS_S_CONTINUE_NEEDED) {
/* No token included */
packet_disconnect("Protocol error: "
"did not receive expected "
"GSS-API context token");
}
break;
case SSH2_MSG_KEXGSS_ERROR:
smaj_status = packet_get_int();
smin_status = packet_get_int();
msg = packet_get_string(NULL);
lang = packet_get_string(NULL);
xfree(lang);
error("Server had a GSS-API error; the "
"connection will close (%d/%d):\n%s",
smaj_status, smin_status, msg);
error("Use the GssKeyEx option to disable "
"GSS-API key exchange and try again.");
packet_disconnect("The server had a GSS-API "
"error during GSS-API protected SSHv2 "
"key exchange\n");
break;
default:
packet_disconnect("Protocol error: "
"didn't expect packet type %d", type);
}
if (recv_tok.value)
token_ptr = &recv_tok;
} else {
/* No data, and not complete */
if (maj_status != GSS_S_COMPLETE) {
fatal("Not complete, and no token output");
}
}
} while (maj_status == GSS_S_CONTINUE_NEEDED);
/*
* We _must_ have received a COMPLETE message in reply from the
* server, which will have set dh_server_pub and msg_tok.
*/
if (type != SSH2_MSG_KEXGSS_COMPLETE)
fatal("Expected SSH2_MSG_KEXGSS_COMPLETE never arrived");
if (maj_status != GSS_S_COMPLETE)
fatal("Internal error in GSS-API protected SSHv2 key exchange");
/* Check f in range [1, p-1] */
if (!dh_pub_is_valid(dh, dh_server_pub))
packet_disconnect("bad server public DH value");
/* compute K=f^x mod p */
klen = DH_size(dh);
kbuf = xmalloc(klen);
kout = DH_compute_key(kbuf, dh_server_pub, dh);
shared_secret = BN_new();
BN_bin2bn(kbuf, kout, shared_secret);
(void) memset(kbuf, 0, klen);
xfree(kbuf);
/* The GSS hash is identical to the DH one */
hash = kex_dh_hash(
kex->client_version_string,
kex->server_version_string,
buffer_ptr(&kex->my), buffer_len(&kex->my),
buffer_ptr(&kex->peer), buffer_len(&kex->peer),
server_host_key_blob, sbloblen, /* server host key */
dh->pub_key, /* e */
dh_server_pub, /* f */
shared_secret); /* K */
gssbuf.value = hash;
gssbuf.length = 20;
/* Verify that H matches the token we just got. */
if ((maj_status = gss_verify_mic(&min_status, ctxt->context, &gssbuf,
&msg_tok, NULL))) {
packet_disconnect("Hash's MIC didn't verify");
}
if (server_host_key && kex->accept_host_key != NULL)
(void) kex->accept_host_key(server_host_key);
DH_free(dh);
xxx_gssctxt = ctxt; /* for gss keyex w/ mic userauth */
/* save session id */
if (kex->session_id == NULL) {
kex->session_id_len = 20;
kex->session_id = xmalloc(kex->session_id_len);
(void) memcpy(kex->session_id, hash, kex->session_id_len);
}
kex_derive_keys(kex, hash, shared_secret);
BN_clear_free(shared_secret);
kex_finish(kex);
}
/* ARGSUSED */
static
void
kexgss_verbose_cleanup(void *arg)
{
error("The GSS-API protected key exchange has failed without "
"indication\nfrom the server, possibly due to misconfiguration "
"of the server.");
error("Use the GssKeyEx option to disable GSS-API key exchange "
"and try again.");
}
#endif /* GSSAPI */
|