forked from qt-creator/qt-creator
Change-Id: Ia32f968bc672c587925ebc600de06b4387966aee Reviewed-by: Christian Kandeler <christian.kandeler@theqtcompany.com> Reviewed-by: Eike Ziller <eike.ziller@theqtcompany.com>
334 lines
14 KiB
C++
334 lines
14 KiB
C++
/****************************************************************************
|
|
**
|
|
** Copyright (C) 2015 The Qt Company Ltd.
|
|
** Contact: http://www.qt.io/licensing
|
|
**
|
|
** This file is part of Qt Creator.
|
|
**
|
|
** Commercial License Usage
|
|
** Licensees holding valid commercial Qt licenses may use this file in
|
|
** accordance with the commercial license agreement provided with the
|
|
** Software or, alternatively, in accordance with the terms contained in
|
|
** a written agreement between you and The Qt Company. For licensing terms and
|
|
** conditions see http://www.qt.io/terms-conditions. For further information
|
|
** use the contact form at http://www.qt.io/contact-us.
|
|
**
|
|
** GNU Lesser General Public License Usage
|
|
** Alternatively, this file may be used under the terms of the GNU Lesser
|
|
** General Public License version 2.1 or version 3 as published by the Free
|
|
** Software Foundation and appearing in the file LICENSE.LGPLv21 and
|
|
** LICENSE.LGPLv3 included in the packaging of this file. Please review the
|
|
** following information to ensure the GNU Lesser General Public License
|
|
** requirements will be met: https://www.gnu.org/licenses/lgpl.html and
|
|
** http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
|
|
**
|
|
** In addition, as a special exception, The Qt Company gives you certain additional
|
|
** rights. These rights are described in The Qt Company LGPL Exception
|
|
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package.
|
|
**
|
|
****************************************************************************/
|
|
|
|
#include "sshkeyexchange_p.h"
|
|
|
|
#include "sshbotanconversions_p.h"
|
|
#include "sshcapabilities_p.h"
|
|
#include "sshsendfacility_p.h"
|
|
#include "sshexception_p.h"
|
|
#include "sshincomingpacket_p.h"
|
|
|
|
#include <botan/botan.h>
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
#include <iostream>
|
|
#endif
|
|
#include <string>
|
|
|
|
using namespace Botan;
|
|
|
|
namespace QSsh {
|
|
namespace Internal {
|
|
|
|
namespace {
|
|
|
|
// For debugging
|
|
void printNameList(const char *listName, const SshNameList &list)
|
|
{
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
qDebug("%s:", listName);
|
|
foreach (const QByteArray &name, list.names)
|
|
qDebug("%s", name.constData());
|
|
#else
|
|
Q_UNUSED(listName);
|
|
Q_UNUSED(list);
|
|
#endif
|
|
}
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
void printData(const char *name, const QByteArray &data)
|
|
{
|
|
std::cerr << std::hex;
|
|
qDebug("The client thinks the %s has length %d and is:", name, data.count());
|
|
for (int i = 0; i < data.count(); ++i)
|
|
std::cerr << (static_cast<unsigned int>(data.at(i)) & 0xff) << ' ';
|
|
std::cerr << std::endl;
|
|
}
|
|
#endif
|
|
|
|
} // anonymous namespace
|
|
|
|
SshKeyExchange::SshKeyExchange(const SshConnectionParameters &connParams,
|
|
SshSendFacility &sendFacility)
|
|
: m_connParams(connParams), m_sendFacility(sendFacility)
|
|
{
|
|
}
|
|
|
|
SshKeyExchange::~SshKeyExchange() {}
|
|
|
|
void SshKeyExchange::sendKexInitPacket(const QByteArray &serverId)
|
|
{
|
|
m_serverId = serverId;
|
|
m_clientKexInitPayload = m_sendFacility.sendKeyExchangeInitPacket();
|
|
}
|
|
|
|
bool SshKeyExchange::sendDhInitPacket(const SshIncomingPacket &serverKexInit)
|
|
{
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
qDebug("server requests key exchange");
|
|
#endif
|
|
serverKexInit.printRawBytes();
|
|
SshKeyExchangeInit kexInitParams
|
|
= serverKexInit.extractKeyExchangeInitData();
|
|
|
|
printNameList("Key Algorithms", kexInitParams.keyAlgorithms);
|
|
printNameList("Server Host Key Algorithms", kexInitParams.serverHostKeyAlgorithms);
|
|
printNameList("Encryption algorithms client to server", kexInitParams.encryptionAlgorithmsClientToServer);
|
|
printNameList("Encryption algorithms server to client", kexInitParams.encryptionAlgorithmsServerToClient);
|
|
printNameList("MAC algorithms client to server", kexInitParams.macAlgorithmsClientToServer);
|
|
printNameList("MAC algorithms server to client", kexInitParams.macAlgorithmsServerToClient);
|
|
printNameList("Compression algorithms client to server", kexInitParams.compressionAlgorithmsClientToServer);
|
|
printNameList("Compression algorithms client to server", kexInitParams.compressionAlgorithmsClientToServer);
|
|
printNameList("Languages client to server", kexInitParams.languagesClientToServer);
|
|
printNameList("Languages server to client", kexInitParams.languagesServerToClient);
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
qDebug("First packet follows: %d", kexInitParams.firstKexPacketFollows);
|
|
#endif
|
|
|
|
m_kexAlgoName = SshCapabilities::findBestMatch(SshCapabilities::KeyExchangeMethods,
|
|
kexInitParams.keyAlgorithms.names);
|
|
const QList<QByteArray> &commonHostKeyAlgos
|
|
= SshCapabilities::commonCapabilities(SshCapabilities::PublicKeyAlgorithms,
|
|
kexInitParams.serverHostKeyAlgorithms.names);
|
|
const bool ecdh = m_kexAlgoName.startsWith(SshCapabilities::EcdhKexNamePrefix);
|
|
foreach (const QByteArray &possibleHostKeyAlgo, commonHostKeyAlgos) {
|
|
if (ecdh && possibleHostKeyAlgo == SshCapabilities::PubKeyEcdsa) {
|
|
m_serverHostKeyAlgo = possibleHostKeyAlgo;
|
|
break;
|
|
}
|
|
if (!ecdh && (possibleHostKeyAlgo == SshCapabilities::PubKeyDss
|
|
|| possibleHostKeyAlgo == SshCapabilities::PubKeyRsa)) {
|
|
m_serverHostKeyAlgo = possibleHostKeyAlgo;
|
|
break;
|
|
}
|
|
}
|
|
if (m_serverHostKeyAlgo.isEmpty()) {
|
|
throw SshServerException(SSH_DISCONNECT_KEY_EXCHANGE_FAILED,
|
|
"Invalid combination of key exchange and host key algorithms.",
|
|
QCoreApplication::translate("SshConnection",
|
|
"No matching host key algorithm available for key exchange algorithm \"%1\".")
|
|
.arg(QString::fromLatin1(m_kexAlgoName)));
|
|
}
|
|
determineHashingAlgorithm(kexInitParams, true);
|
|
determineHashingAlgorithm(kexInitParams, false);
|
|
|
|
m_encryptionAlgo
|
|
= SshCapabilities::findBestMatch(SshCapabilities::EncryptionAlgorithms,
|
|
kexInitParams.encryptionAlgorithmsClientToServer.names);
|
|
m_decryptionAlgo
|
|
= SshCapabilities::findBestMatch(SshCapabilities::EncryptionAlgorithms,
|
|
kexInitParams.encryptionAlgorithmsServerToClient.names);
|
|
SshCapabilities::findBestMatch(SshCapabilities::CompressionAlgorithms,
|
|
kexInitParams.compressionAlgorithmsClientToServer.names);
|
|
SshCapabilities::findBestMatch(SshCapabilities::CompressionAlgorithms,
|
|
kexInitParams.compressionAlgorithmsServerToClient.names);
|
|
|
|
AutoSeeded_RNG rng;
|
|
if (ecdh) {
|
|
m_ecdhKey.reset(new ECDH_PrivateKey(rng, EC_Group(botanKeyExchangeAlgoName(m_kexAlgoName))));
|
|
m_sendFacility.sendKeyEcdhInitPacket(convertByteArray(m_ecdhKey->public_value()));
|
|
} else {
|
|
m_dhKey.reset(new DH_PrivateKey(rng, DL_Group(botanKeyExchangeAlgoName(m_kexAlgoName))));
|
|
m_sendFacility.sendKeyDhInitPacket(m_dhKey->get_y());
|
|
}
|
|
|
|
m_serverKexInitPayload = serverKexInit.payLoad();
|
|
return kexInitParams.firstKexPacketFollows;
|
|
}
|
|
|
|
void SshKeyExchange::sendNewKeysPacket(const SshIncomingPacket &dhReply,
|
|
const QByteArray &clientId)
|
|
{
|
|
|
|
const SshKeyExchangeReply &reply
|
|
= dhReply.extractKeyExchangeReply(m_serverHostKeyAlgo);
|
|
if (m_dhKey && (reply.f <= 0 || reply.f >= m_dhKey->group_p())) {
|
|
throw SSH_SERVER_EXCEPTION(SSH_DISCONNECT_KEY_EXCHANGE_FAILED,
|
|
"Server sent invalid f.");
|
|
}
|
|
|
|
QByteArray concatenatedData = AbstractSshPacket::encodeString(clientId);
|
|
concatenatedData += AbstractSshPacket::encodeString(m_serverId);
|
|
concatenatedData += AbstractSshPacket::encodeString(m_clientKexInitPayload);
|
|
concatenatedData += AbstractSshPacket::encodeString(m_serverKexInitPayload);
|
|
concatenatedData += reply.k_s;
|
|
SecureVector<byte> encodedK;
|
|
if (m_dhKey) {
|
|
concatenatedData += AbstractSshPacket::encodeMpInt(m_dhKey->get_y());
|
|
concatenatedData += AbstractSshPacket::encodeMpInt(reply.f);
|
|
DH_KA_Operation dhOp(*m_dhKey);
|
|
SecureVector<byte> encodedF = BigInt::encode(reply.f);
|
|
encodedK = dhOp.agree(encodedF, encodedF.size());
|
|
} else {
|
|
Q_ASSERT(m_ecdhKey);
|
|
concatenatedData // Q_C.
|
|
+= AbstractSshPacket::encodeString(convertByteArray(m_ecdhKey->public_value()));
|
|
concatenatedData += AbstractSshPacket::encodeString(reply.q_s);
|
|
ECDH_KA_Operation ecdhOp(*m_ecdhKey);
|
|
encodedK = ecdhOp.agree(convertByteArray(reply.q_s), reply.q_s.count());
|
|
}
|
|
const BigInt k = BigInt::decode(encodedK);
|
|
m_k = AbstractSshPacket::encodeMpInt(k); // Roundtrip, as Botan encodes BigInts somewhat differently.
|
|
concatenatedData += m_k;
|
|
|
|
m_hash.reset(get_hash(botanHMacAlgoName(hashAlgoForKexAlgo())));
|
|
const SecureVector<byte> &hashResult = m_hash->process(convertByteArray(concatenatedData),
|
|
concatenatedData.size());
|
|
m_h = convertByteArray(hashResult);
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
printData("Client Id", AbstractSshPacket::encodeString(clientId));
|
|
printData("Server Id", AbstractSshPacket::encodeString(m_serverId));
|
|
printData("Client Payload", AbstractSshPacket::encodeString(m_clientKexInitPayload));
|
|
printData("Server payload", AbstractSshPacket::encodeString(m_serverKexInitPayload));
|
|
printData("K_S", reply.k_s);
|
|
printData("y", AbstractSshPacket::encodeMpInt(m_dhKey->get_y()));
|
|
printData("f", AbstractSshPacket::encodeMpInt(reply.f));
|
|
printData("K", m_k);
|
|
printData("Concatenated data", concatenatedData);
|
|
printData("H", m_h);
|
|
#endif // CREATOR_SSH_DEBUG
|
|
|
|
QScopedPointer<Public_Key> sigKey;
|
|
if (m_serverHostKeyAlgo == SshCapabilities::PubKeyDss) {
|
|
const DL_Group group(reply.parameters.at(0), reply.parameters.at(1),
|
|
reply.parameters.at(2));
|
|
DSA_PublicKey * const dsaKey
|
|
= new DSA_PublicKey(group, reply.parameters.at(3));
|
|
sigKey.reset(dsaKey);
|
|
} else if (m_serverHostKeyAlgo == SshCapabilities::PubKeyRsa) {
|
|
RSA_PublicKey * const rsaKey
|
|
= new RSA_PublicKey(reply.parameters.at(1), reply.parameters.at(0));
|
|
sigKey.reset(rsaKey);
|
|
} else if (m_serverHostKeyAlgo == SshCapabilities::PubKeyEcdsa) {
|
|
const PointGFp point = OS2ECP(convertByteArray(reply.q), reply.q.count(),
|
|
m_ecdhKey->domain().get_curve());
|
|
ECDSA_PublicKey * const ecdsaKey = new ECDSA_PublicKey(m_ecdhKey->domain(), point);
|
|
sigKey.reset(ecdsaKey);
|
|
} else {
|
|
Q_ASSERT(!"Impossible: Neither DSS nor RSA nor ECDSA!");
|
|
}
|
|
|
|
const byte * const botanH = convertByteArray(m_h);
|
|
const Botan::byte * const botanSig = convertByteArray(reply.signatureBlob);
|
|
PK_Verifier verifier(*sigKey, botanEmsaAlgoName(m_serverHostKeyAlgo));
|
|
if (!verifier.verify_message(botanH, m_h.size(), botanSig, reply.signatureBlob.size())) {
|
|
throw SSH_SERVER_EXCEPTION(SSH_DISCONNECT_KEY_EXCHANGE_FAILED,
|
|
"Invalid signature in key exchange reply packet.");
|
|
}
|
|
|
|
checkHostKey(reply.k_s);
|
|
|
|
m_sendFacility.sendNewKeysPacket();
|
|
m_dhKey.reset(nullptr);
|
|
m_ecdhKey.reset(nullptr);
|
|
}
|
|
|
|
QByteArray SshKeyExchange::hashAlgoForKexAlgo() const
|
|
{
|
|
if (m_kexAlgoName == SshCapabilities::EcdhNistp256)
|
|
return SshCapabilities::HMacSha256;
|
|
if (m_kexAlgoName == SshCapabilities::EcdhNistp384)
|
|
return SshCapabilities::HMacSha384;
|
|
if (m_kexAlgoName == SshCapabilities::EcdhNistp521)
|
|
return SshCapabilities::HMacSha512;
|
|
return SshCapabilities::HMacSha1;
|
|
}
|
|
|
|
void SshKeyExchange::determineHashingAlgorithm(const SshKeyExchangeInit &kexInit,
|
|
bool serverToClient)
|
|
{
|
|
QByteArray * const algo = serverToClient ? &m_s2cHMacAlgo : &m_c2sHMacAlgo;
|
|
const QList<QByteArray> &serverCapabilities = serverToClient
|
|
? kexInit.macAlgorithmsServerToClient.names
|
|
: kexInit.macAlgorithmsClientToServer.names;
|
|
const QList<QByteArray> commonAlgos = SshCapabilities::commonCapabilities(
|
|
SshCapabilities::MacAlgorithms, serverCapabilities);
|
|
const QByteArray hashAlgo = hashAlgoForKexAlgo();
|
|
foreach (const QByteArray &potentialAlgo, commonAlgos) {
|
|
if (potentialAlgo == hashAlgo
|
|
|| !m_kexAlgoName.startsWith(SshCapabilities::EcdhKexNamePrefix)) {
|
|
*algo = potentialAlgo;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (algo->isEmpty()) {
|
|
throw SshServerException(SSH_DISCONNECT_KEY_EXCHANGE_FAILED,
|
|
"Invalid combination of key exchange and hashing algorithms.",
|
|
QCoreApplication::translate("SshConnection",
|
|
"Server requested invalid combination of key exchange and hashing algorithms. "
|
|
"Key exchange algorithm list was: %1.\nHashing algorithm list was %2.")
|
|
.arg(QString::fromLocal8Bit(kexInit.keyAlgorithms.names.join(", ")))
|
|
.arg(QString::fromLocal8Bit(serverCapabilities.join(", "))));
|
|
|
|
}
|
|
}
|
|
|
|
void SshKeyExchange::checkHostKey(const QByteArray &hostKey)
|
|
{
|
|
if (m_connParams.hostKeyCheckingMode == SshHostKeyCheckingNone) {
|
|
if (m_connParams.hostKeyDatabase)
|
|
m_connParams.hostKeyDatabase->insertHostKey(m_connParams.host, hostKey);
|
|
return;
|
|
}
|
|
|
|
if (!m_connParams.hostKeyDatabase) {
|
|
throw SshClientException(SshInternalError,
|
|
SSH_TR("Host key database must exist "
|
|
"if host key checking is enabled."));
|
|
}
|
|
|
|
switch (m_connParams.hostKeyDatabase->matchHostKey(m_connParams.host, hostKey)) {
|
|
case SshHostKeyDatabase::KeyLookupMatch:
|
|
return; // Nothing to do.
|
|
case SshHostKeyDatabase::KeyLookupMismatch:
|
|
if (m_connParams.hostKeyCheckingMode != SshHostKeyCheckingAllowMismatch)
|
|
throwHostKeyException();
|
|
break;
|
|
case SshHostKeyDatabase::KeyLookupNoMatch:
|
|
if (m_connParams.hostKeyCheckingMode == SshHostKeyCheckingStrict)
|
|
throwHostKeyException();
|
|
break;
|
|
}
|
|
m_connParams.hostKeyDatabase->insertHostKey(m_connParams.host, hostKey);
|
|
}
|
|
|
|
void SshKeyExchange::throwHostKeyException()
|
|
{
|
|
throw SshServerException(SSH_DISCONNECT_HOST_KEY_NOT_VERIFIABLE, "Host key changed",
|
|
SSH_TR("Host key of machine \"%1\" has changed.")
|
|
.arg(m_connParams.host));
|
|
}
|
|
|
|
} // namespace Internal
|
|
} // namespace QSsh
|