1
0
mirror of http://galexander.org/git/simplesshd.git synced 2024-12-29 09:28:07 +00:00
simplesshd/dropbear/session.h

321 lines
10 KiB
C
Raw Normal View History

2014-12-10 21:56:49 +00:00
/*
* Dropbear - a SSH2 server
*
* Copyright (c) 2002,2003 Matt Johnston
* All rights reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE. */
2019-06-09 20:44:26 +00:00
#ifndef DROPBEAR_SESSION_H_
#define DROPBEAR_SESSION_H_
2014-12-10 21:56:49 +00:00
#include "includes.h"
#include "buffer.h"
#include "signkey.h"
#include "kex.h"
#include "auth.h"
#include "channel.h"
#include "queue.h"
#include "listener.h"
#include "packet.h"
#include "tcpfwd.h"
#include "chansession.h"
#include "dbutil.h"
2019-06-09 20:44:26 +00:00
#include "netio.h"
2014-12-10 21:56:49 +00:00
void common_session_init(int sock_in, int sock_out);
2019-06-09 20:44:26 +00:00
void session_loop(void(*loophandler)(void)) ATTRIB_NORETURN;
void session_cleanup(void);
void send_session_identification(void);
void send_msg_ignore(void);
void ignore_recv_response(void);
2014-12-10 21:56:49 +00:00
2019-06-09 20:44:26 +00:00
void update_channel_prio(void);
2014-12-10 21:56:49 +00:00
2019-06-09 20:44:26 +00:00
const char* get_user_shell(void);
2014-12-10 21:56:49 +00:00
void fill_passwd(const char* username);
/* Server */
2019-06-09 20:44:26 +00:00
void svr_session(int sock, int childpipe) ATTRIB_NORETURN;
2014-12-10 21:56:49 +00:00
void svr_dropbear_exit(int exitcode, const char* format, va_list param) ATTRIB_NORETURN;
void svr_dropbear_log(int priority, const char* format, va_list param);
/* Client */
2019-06-09 20:44:26 +00:00
void cli_session(int sock_in, int sock_out, struct dropbear_progress_connection *progress, pid_t proxy_cmd_pid) ATTRIB_NORETURN;
void cli_connected(int result, int sock, void* userdata, const char *errstring);
void cleantext(char* dirtytext);
void kill_proxy_command(void);
2014-12-10 21:56:49 +00:00
/* crypto parameters that are stored individually for transmit and receive */
struct key_context_directional {
const struct dropbear_cipher *algo_crypt;
const struct dropbear_cipher_mode *crypt_mode;
const struct dropbear_hash *algo_mac;
int hash_index; /* lookup for libtomcrypt */
int algo_comp; /* compression */
#ifndef DISABLE_ZLIB
z_streamp zstream;
#endif
/* actual keys */
union {
symmetric_CBC cbc;
2019-06-09 20:44:26 +00:00
#if DROPBEAR_ENABLE_CTR_MODE
2014-12-10 21:56:49 +00:00
symmetric_CTR ctr;
#endif
} cipher_state;
unsigned char mackey[MAX_MAC_LEN];
int valid;
};
struct key_context {
struct key_context_directional recv;
struct key_context_directional trans;
const struct dropbear_kex *algo_kex;
int algo_hostkey;
int allow_compress; /* whether compression has started (useful in
zlib@openssh.com delayed compression case) */
};
struct packetlist;
struct packetlist {
struct packetlist *next;
buffer * payload;
};
struct sshsession {
/* Is it a client or server? */
unsigned char isserver;
2019-06-09 20:44:26 +00:00
time_t connect_time; /* time the connection was established
(cleared after auth once we're not
respecting AUTH_TIMEOUT any more).
A monotonic time, not realworld */
2014-12-10 21:56:49 +00:00
int sock_in;
int sock_out;
/* remotehost will be initially NULL as we delay
* reading the remote version string. it will be set
* by the time any recv_() packet methods are called */
2019-06-09 20:44:26 +00:00
char *remoteident;
2014-12-10 21:56:49 +00:00
int maxfd; /* the maximum file descriptor to check with select() */
/* Packet buffers/values etc */
buffer *writepayload; /* Unencrypted payload to write - this is used
throughout the code, as handlers fill out this
buffer with the packet to send. */
struct Queue writequeue; /* A queue of encrypted packets to send */
2019-06-09 20:44:26 +00:00
unsigned int writequeue_len; /* Number of bytes pending to send in writequeue */
2014-12-10 21:56:49 +00:00
buffer *readbuf; /* From the wire, decrypted in-place */
2019-06-09 20:44:26 +00:00
buffer *payload; /* Post-decompression, the actual SSH packet.
May have extra data at the beginning, will be
passed to packet processing functions positioned past
that, see payload_beginning */
unsigned int payload_beginning;
2014-12-10 21:56:49 +00:00
unsigned int transseq, recvseq; /* Sequence IDs */
/* Packet-handling flags */
const packettype * packettypes; /* Packet handler mappings for this
session, see process-packet.c */
unsigned dataallowed : 1; /* whether we can send data packets or we are in
the middle of a KEX or something */
unsigned char requirenext; /* byte indicating what packets we require next,
or 0x00 for any. */
unsigned char ignorenext; /* whether to ignore the next packet,
used for kex_follows stuff */
unsigned char lastpacket; /* What the last received packet type was */
int signal_pipe[2]; /* stores endpoints of a self-pipe used for
race-free signal handling */
2019-06-09 20:44:26 +00:00
int channel_signal_pending; /* Flag set when the signal pipe is triggered */
m_list conn_pending;
2014-12-10 21:56:49 +00:00
/* time of the last packet send/receive, for keepalive. Not real-world clock */
time_t last_packet_time_keepalive_sent;
time_t last_packet_time_keepalive_recv;
time_t last_packet_time_any_sent;
time_t last_packet_time_idle; /* time of the last packet transmission or receive, for
idle timeout purposes so ignores SSH_MSG_IGNORE
or responses to keepalives. Not real-world clock */
/* KEX/encryption related */
struct KEXState kexstate;
struct key_context *keys;
struct key_context *newkeys;
buffer *session_id; /* this is the hash from the first kex */
/* The below are used temporarily during kex, are freed after use */
mp_int * dh_K; /* SSH_MSG_KEXDH_REPLY and sending SSH_MSH_NEWKEYS */
buffer *hash; /* the session hash */
buffer* kexhashbuf; /* session hash buffer calculated from various packets*/
buffer* transkexinit; /* the kexinit packet we send should be kept so we
can add it to the hash when generating keys */
/* Enables/disables compression */
algo_type *compress_algos;
/* a list of queued replies that should be sent after a KEX has
concluded (ie, while dataallowed was unset)*/
struct packetlist *reply_queue_head, *reply_queue_tail;
2019-06-09 20:44:26 +00:00
void(*remoteclosed)(void); /* A callback to handle closure of the
2014-12-10 21:56:49 +00:00
remote connection */
2019-06-09 20:44:26 +00:00
void(*extra_session_cleanup)(void); /* client or server specific cleanup */
void(*send_kex_first_guess)(void);
2014-12-10 21:56:49 +00:00
struct AuthState authstate; /* Common amongst client and server, since most
struct elements are common */
/* Channel related */
struct Channel ** channels; /* these pointers may be null */
unsigned int chansize; /* the number of Channel*s allocated for channels */
unsigned int chancount; /* the number of Channel*s in use */
const struct ChanType **chantypes; /* The valid channel types */
/* TCP priority level for the main "port 22" tcp socket */
enum dropbear_prio socket_prio;
/* TCP forwarding - where manage listeners */
struct Listener ** listeners;
unsigned int listensize;
/* Whether to allow binding to privileged ports (<1024). This doesn't
* really belong here, but nowhere else fits nicely */
int allowprivport;
2019-06-09 20:44:26 +00:00
/* this is set when we get SIGINT or SIGTERM, the handler is in main.c */
volatile int exitflag;
/* set once the ses structure (and cli_ses/svr_ses) have been populated to their initial state */
int init_done;
2014-12-10 21:56:49 +00:00
};
struct serversession {
/* Server specific options */
int childpipe; /* kept open until we successfully authenticate */
/* userauth */
struct ChildPid * childpids; /* array of mappings childpid<->channel */
unsigned int childpidsize;
/* Used to avoid a race in the exit returncode handling - see
* svr-chansession.c for details */
struct exitinfo lastexit;
/* The numeric address they connected from, used for logging */
char * addrstring;
/* The resolved remote address, used for lastlog etc */
char *remotehost;
2019-06-09 20:44:26 +00:00
#if DROPBEAR_VFORK
2014-12-10 21:56:49 +00:00
pid_t server_pid;
#endif
};
typedef enum {
KEX_NOTHING,
KEXINIT_RCVD,
KEXDH_INIT_SENT,
KEXDONE
} cli_kex_state;
typedef enum {
STATE_NOTHING,
USERAUTH_WAIT,
USERAUTH_REQ_SENT,
USERAUTH_FAIL_RCVD,
USERAUTH_SUCCESS_RCVD,
SESSION_RUNNING
} cli_state;
struct clientsession {
/* XXX - move these to kexstate? */
struct kex_dh_param *dh_param;
struct kex_ecdh_param *ecdh_param;
struct kex_curve25519_param *curve25519_param;
const struct dropbear_kex *param_kex_algo; /* KEX algorithm corresponding to current dh_e and dh_x */
cli_kex_state kex_state; /* Used for progressing KEX */
cli_state state; /* Used to progress auth/channelsession etc */
unsigned donefirstkex : 1; /* Set when we set sentnewkeys, never reset */
int tty_raw_mode; /* Whether we're in raw mode (and have to clean up) */
struct termios saved_tio;
int stdincopy;
int stdinflags;
int stdoutcopy;
int stdoutflags;
int stderrcopy;
int stderrflags;
/* for escape char handling */
int last_char;
2019-06-09 20:44:26 +00:00
volatile int winchange; /* Set to 1 when a windowchange signal happens */
2014-12-10 21:56:49 +00:00
int lastauthtype; /* either AUTH_TYPE_PUBKEY or AUTH_TYPE_PASSWORD,
for the last type of auth we tried */
int ignore_next_auth_response;
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLI_INTERACT_AUTH
2014-12-10 21:56:49 +00:00
int auth_interact_failed; /* flag whether interactive auth can still
be used */
int interact_request_received; /* flag whether we've received an
info request from the server for
interactive auth.*/
#endif
sign_key *lastprivkey;
int retval; /* What the command exit status was - we emulate it */
#if 0
TODO
struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */
#endif
2019-06-09 20:44:26 +00:00
pid_t proxy_cmd_pid;
2014-12-10 21:56:49 +00:00
};
/* Global structs storing the state */
extern struct sshsession ses;
2019-06-09 20:44:26 +00:00
#if DROPBEAR_SERVER
2014-12-10 21:56:49 +00:00
extern struct serversession svr_ses;
#endif /* DROPBEAR_SERVER */
2019-06-09 20:44:26 +00:00
#if DROPBEAR_CLIENT
2014-12-10 21:56:49 +00:00
extern struct clientsession cli_ses;
#endif /* DROPBEAR_CLIENT */
2019-06-09 20:44:26 +00:00
#endif /* DROPBEAR_SESSION_H_ */