- djm@cvs.openbsd.org 2005/05/20 12:57:01;

[auth1.c] split protocol 1 auth methods into separate functions, makes
   authloop much more readable; fixes and ok markus@ (portable ok &
   polish dtucker@)
This commit is contained in:
Damien Miller 2005-06-19 07:31:37 +10:00
parent f0bd352429
commit 6abf57ccbf
2 changed files with 200 additions and 132 deletions

View File

@ -1,3 +1,10 @@
20050618
- (djm) OpenBSD CVS Sync
- djm@cvs.openbsd.org 2005/05/20 12:57:01;
[auth1.c] split protocol 1 auth methods into separate functions, makes
authloop much more readable; fixes and ok markus@ (portable ok &
polish dtucker@)
20050617 20050617
- (djm) OpenBSD CVS Sync - (djm) OpenBSD CVS Sync
- djm@cvs.openbsd.org 2005/06/16 03:38:36 - djm@cvs.openbsd.org 2005/06/16 03:38:36
@ -2738,4 +2745,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.3824 2005/06/17 11:15:20 dtucker Exp $ $Id: ChangeLog,v 1.3825 2005/06/18 21:31:37 djm Exp $

313
auth1.c
View File

@ -10,7 +10,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: auth1.c,v 1.59 2004/07/28 09:40:29 markus Exp $"); RCSID("$OpenBSD: auth1.c,v 1.60 2005/05/20 12:57:01 djm Exp $");
#include "xmalloc.h" #include "xmalloc.h"
#include "rsa.h" #include "rsa.h"
@ -31,28 +31,181 @@ RCSID("$OpenBSD: auth1.c,v 1.59 2004/07/28 09:40:29 markus Exp $");
extern ServerOptions options; extern ServerOptions options;
extern Buffer loginmsg; extern Buffer loginmsg;
/* static int auth1_process_password(Authctxt *, char *, size_t);
* convert ssh auth msg type into description static int auth1_process_rsa(Authctxt *, char *, size_t);
*/ static int auth1_process_rhosts_rsa(Authctxt *, char *, size_t);
static int auth1_process_tis_challenge(Authctxt *, char *, size_t);
static int auth1_process_tis_response(Authctxt *, char *, size_t);
static char *client_user = NULL; /* Used to fill in remote user for PAM */
struct AuthMethod1 {
int type;
char *name;
int *enabled;
int (*method)(Authctxt *, char *, size_t);
};
const struct AuthMethod1 auth1_methods[] = {
{
SSH_CMSG_AUTH_PASSWORD, "password",
&options.password_authentication, auth1_process_password
},
{
SSH_CMSG_AUTH_RSA, "rsa",
&options.rsa_authentication, auth1_process_rsa
},
{
SSH_CMSG_AUTH_RHOSTS_RSA, "rhosts-rsa",
&options.rhosts_rsa_authentication, auth1_process_rhosts_rsa
},
{
SSH_CMSG_AUTH_TIS, "challenge-response",
&options.challenge_response_authentication,
auth1_process_tis_challenge
},
{
SSH_CMSG_AUTH_TIS_RESPONSE, "challenge-response",
&options.challenge_response_authentication,
auth1_process_tis_response
},
{ -1, NULL, NULL, NULL}
};
static const struct AuthMethod1
*lookup_authmethod1(int type)
{
int i;
for(i = 0; auth1_methods[i].name != NULL; i++)
if (auth1_methods[i].type == type)
return (&(auth1_methods[i]));
return (NULL);
}
static char * static char *
get_authname(int type) get_authname(int type)
{ {
static char buf[1024]; const struct AuthMethod1 *a;
switch (type) { static char buf[64];
case SSH_CMSG_AUTH_PASSWORD:
return "password"; if ((a = lookup_authmethod1(type)) != NULL)
case SSH_CMSG_AUTH_RSA: return (a->name);
return "rsa"; snprintf(buf, sizeof(buf), "bad-auth-msg-%d", type);
case SSH_CMSG_AUTH_RHOSTS_RSA: return (buf);
return "rhosts-rsa"; }
case SSH_CMSG_AUTH_RHOSTS:
return "rhosts"; static int
case SSH_CMSG_AUTH_TIS: auth1_process_password(Authctxt *authctxt, char *info, size_t infolen)
case SSH_CMSG_AUTH_TIS_RESPONSE: {
return "challenge-response"; int authenticated = 0;
char *password;
u_int dlen;
/*
* Read user password. It is in plain text, but was
* transmitted over the encrypted channel so it is
* not visible to an outside observer.
*/
password = packet_get_string(&dlen);
packet_check_eom();
/* Try authentication with the password. */
authenticated = PRIVSEP(auth_password(authctxt, password));
memset(password, 0, dlen);
xfree(password);
return (authenticated);
}
static int
auth1_process_rsa(Authctxt *authctxt, char *info, size_t infolen)
{
int authenticated = 0;
BIGNUM *n;
/* RSA authentication requested. */
if ((n = BN_new()) == NULL)
fatal("do_authloop: BN_new failed");
packet_get_bignum(n);
packet_check_eom();
authenticated = auth_rsa(authctxt, n);
BN_clear_free(n);
return (authenticated);
}
static int
auth1_process_rhosts_rsa(Authctxt *authctxt, char *info, size_t infolen)
{
int authenticated = 0;
u_int bits;
Key *client_host_key;
u_int ulen;
/*
* Get client user name. Note that we just have to
* trust the client; root on the client machine can
* claim to be any user.
*/
client_user = packet_get_string(&ulen);
/* Get the client host key. */
client_host_key = key_new(KEY_RSA1);
bits = packet_get_int();
packet_get_bignum(client_host_key->rsa->e);
packet_get_bignum(client_host_key->rsa->n);
if (bits != BN_num_bits(client_host_key->rsa->n)) {
verbose("Warning: keysize mismatch for client_host_key: "
"actual %d, announced %d",
BN_num_bits(client_host_key->rsa->n), bits);
} }
snprintf(buf, sizeof buf, "bad-auth-msg-%d", type); packet_check_eom();
return buf;
authenticated = auth_rhosts_rsa(authctxt, client_user,
client_host_key);
key_free(client_host_key);
snprintf(info, infolen, " ruser %.100s", client_user);
return (authenticated);
}
static int
auth1_process_tis_challenge(Authctxt *authctxt, char *info, size_t infolen)
{
char *challenge;
if ((challenge = get_challenge(authctxt)) == NULL)
return (0);
debug("sending challenge '%s'", challenge);
packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE);
packet_put_cstring(challenge);
xfree(challenge);
packet_send();
packet_write_wait();
return (-1);
}
static int
auth1_process_tis_response(Authctxt *authctxt, char *info, size_t infolen)
{
int authenticated = 0;
char *response;
u_int dlen;
response = packet_get_string(&dlen);
packet_check_eom();
authenticated = verify_response(authctxt, response);
memset(response, 'r', dlen);
xfree(response);
return (authenticated);
} }
/* /*
@ -63,14 +216,9 @@ static void
do_authloop(Authctxt *authctxt) do_authloop(Authctxt *authctxt)
{ {
int authenticated = 0; int authenticated = 0;
u_int bits;
Key *client_host_key;
BIGNUM *n;
char *client_user, *password;
char info[1024]; char info[1024];
u_int dlen; int prev = 0, type = 0;
u_int ulen; const struct AuthMethod1 *meth;
int prev, type = 0;
debug("Attempting authentication for %s%.100s.", debug("Attempting authentication for %s%.100s.",
authctxt->valid ? "" : "invalid user ", authctxt->user); authctxt->valid ? "" : "invalid user ", authctxt->user);
@ -95,8 +243,6 @@ do_authloop(Authctxt *authctxt)
packet_send(); packet_send();
packet_write_wait(); packet_write_wait();
client_user = NULL;
for (;;) { for (;;) {
/* default to fail */ /* default to fail */
authenticated = 0; authenticated = 0;
@ -118,107 +264,21 @@ do_authloop(Authctxt *authctxt)
type != SSH_CMSG_AUTH_TIS_RESPONSE) type != SSH_CMSG_AUTH_TIS_RESPONSE)
abandon_challenge_response(authctxt); abandon_challenge_response(authctxt);
/* Process the packet. */ if ((meth = lookup_authmethod1(type)) == NULL) {
switch (type) { logit("Unknown message during authentication: "
case SSH_CMSG_AUTH_RHOSTS_RSA: "type %d", type);
if (!options.rhosts_rsa_authentication) { goto skip;
verbose("Rhosts with RSA authentication disabled.");
break;
} }
/*
* Get client user name. Note that we just have to
* trust the client; root on the client machine can
* claim to be any user.
*/
client_user = packet_get_string(&ulen);
/* Get the client host key. */ if (!*(meth->enabled)) {
client_host_key = key_new(KEY_RSA1); verbose("%s authentication disabled.", meth->name);
bits = packet_get_int(); goto skip;
packet_get_bignum(client_host_key->rsa->e);
packet_get_bignum(client_host_key->rsa->n);
if (bits != BN_num_bits(client_host_key->rsa->n))
verbose("Warning: keysize mismatch for client_host_key: "
"actual %d, announced %d",
BN_num_bits(client_host_key->rsa->n), bits);
packet_check_eom();
authenticated = auth_rhosts_rsa(authctxt, client_user,
client_host_key);
key_free(client_host_key);
snprintf(info, sizeof info, " ruser %.100s", client_user);
break;
case SSH_CMSG_AUTH_RSA:
if (!options.rsa_authentication) {
verbose("RSA authentication disabled.");
break;
} }
/* RSA authentication requested. */
if ((n = BN_new()) == NULL)
fatal("do_authloop: BN_new failed");
packet_get_bignum(n);
packet_check_eom();
authenticated = auth_rsa(authctxt, n);
BN_clear_free(n);
break;
case SSH_CMSG_AUTH_PASSWORD: authenticated = meth->method(authctxt, info, sizeof(info));
if (!options.password_authentication) { if (authenticated == -1)
verbose("Password authentication disabled."); continue; /* "postponed" */
break;
}
/*
* Read user password. It is in plain text, but was
* transmitted over the encrypted channel so it is
* not visible to an outside observer.
*/
password = packet_get_string(&dlen);
packet_check_eom();
/* Try authentication with the password. */
authenticated = PRIVSEP(auth_password(authctxt, password));
memset(password, 0, strlen(password));
xfree(password);
break;
case SSH_CMSG_AUTH_TIS:
debug("rcvd SSH_CMSG_AUTH_TIS");
if (options.challenge_response_authentication == 1) {
char *challenge = get_challenge(authctxt);
if (challenge != NULL) {
debug("sending challenge '%s'", challenge);
packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE);
packet_put_cstring(challenge);
xfree(challenge);
packet_send();
packet_write_wait();
continue;
}
}
break;
case SSH_CMSG_AUTH_TIS_RESPONSE:
debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE");
if (options.challenge_response_authentication == 1) {
char *response = packet_get_string(&dlen);
packet_check_eom();
authenticated = verify_response(authctxt, response);
memset(response, 'r', dlen);
xfree(response);
}
break;
default:
/*
* Any unknown messages will be ignored (and failure
* returned) during authentication.
*/
logit("Unknown message during authentication: type %d", type);
break;
}
#ifdef BSD_AUTH #ifdef BSD_AUTH
if (authctxt->as) { if (authctxt->as) {
auth_close(authctxt->as); auth_close(authctxt->as);
@ -247,7 +307,7 @@ do_authloop(Authctxt *authctxt)
#else #else
/* Special handling for root */ /* Special handling for root */
if (authenticated && authctxt->pw->pw_uid == 0 && if (authenticated && authctxt->pw->pw_uid == 0 &&
!auth_root_allowed(get_authname(type))) { !auth_root_allowed(meth->name)) {
authenticated = 0; authenticated = 0;
# ifdef SSH_AUDIT_EVENTS # ifdef SSH_AUDIT_EVENTS
PRIVSEP(audit_event(SSH_LOGIN_ROOT_DENIED)); PRIVSEP(audit_event(SSH_LOGIN_ROOT_DENIED));
@ -276,6 +336,7 @@ do_authloop(Authctxt *authctxt)
} }
#endif #endif
skip:
/* Log before sending the reply */ /* Log before sending the reply */
auth_log(authctxt, authenticated, get_authname(type), info); auth_log(authctxt, authenticated, get_authname(type), info);
@ -341,7 +402,7 @@ do_authentication(Authctxt *authctxt)
/* /*
* If we are not running as root, the user must have the same uid as * If we are not running as root, the user must have the same uid as
* the server. (Unless you are running Windows) * the server.
*/ */
#ifndef HAVE_CYGWIN #ifndef HAVE_CYGWIN
if (!use_privsep && getuid() != 0 && authctxt->pw && if (!use_privsep && getuid() != 0 && authctxt->pw &&