4bcbdc54c9
This switches the Metasploit Framework to a Rails 3 backend. If you run into new problems (especially around Active Record or your postgresql gem) you should try first updating your Ruby installation to 1.9.3 and use a more recent 'pg' gem. If that fails, we'd love to see your bug report (just drop all the detail you can into an issue on GitHub). In the meantime, you can checkout the rails2 branch, which was branched from master immediately before this cutover. Squashed commit of the following: commit 5802ec851580341c6717dfea529027c12678d35f Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 23:30:12 2012 -0500 Enable MSF_BUNDLE_GEMS mode by default (set to N/F/0 to disable) commit 8102f98dce9eb0c73c4374e40dce09af7b51d060 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 23:30:03 2012 -0500 Add a method to expand win32 file paths commit bda6479d154cf75572dd5de8b66bfde661a55de9 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:53:44 2012 -0500 Fix 1.8.x compatibility commit 101ce4eb17bfdf755ef8c0a5198174668b6cd6fd Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:40:59 2012 -0500 Use verbose instead of stringio commit 5db467ffb593488285576d183b1662093e454b3e Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:30:06 2012 -0500 Hide the iconv warning, were stuck with it due to EBCDIC support commit 63b9cb20eb6a61daf4effb4c8d2761c16ff0c4e0 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:29:58 2012 -0500 Dont use GEM_HOME by default commit ca49271c22c314a4465fff934334df18c704cbc0 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:23:34 2012 -0500 Move Gemfile to root (there be dragons, lets find them) and catch failed bundler loads commit 34af04076a068e9f60c5526045ddbba5fca359fd Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 18:18:29 2012 -0500 Fallback to bundler when not running inside of a installer env commit ed1066a4f3f12fae7d4afc03eb1ab70ffe2f9cf3 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 16:26:55 2012 -0500 Remove a mess of gems that were not actually required commit 21290a73926809e9049a59359449168f740d13d2 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 15:59:10 2012 -0500 Hack around a gem() call that is well-intentioned but an obstacle in this case commit 8e414a8bfab9641c81088d22f73033be5b37a700 Author: Tod Beardsley <todb@metasploit.com> Date: Sun Apr 15 15:06:08 2012 -0500 Ruby, come on. Ducktype this. Please. Use interpolated strings to get the to_s behavior you don't get with just plussing. commit 0fa92c58750f8f84edbecfaab72cd2da5062743f Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 15:05:42 2012 -0500 Add new eventmachine/thin gems commit 819d5e7d45e0a16741d3852df3ed110b4d7abc44 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 15:01:18 2012 -0500 Purge (reimport in a second) commit ea6f3f6c434537ca15b6c6674e31081e27ce7f86 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 14:54:42 2012 -0500 Cleanup uncessary .so files (ext vs lib) commit d219330a3cc563e9da9f01fade016c9ed8cda21c Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 14:53:02 2012 -0500 PG gems built against the older installation environment commit d6e590cfa331ae7b25313ff1471c6148a6b36f3b Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 14:06:35 2012 -0500 Rename to include the version commit a893de222b97ce1222a55324f1811b0262aae2d0 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 13:56:47 2012 -0500 Detect older installation environments and load the arch-lib directories into the search path commit 6444bba0a421921e2ebe2df2323277a586f9736f Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 13:49:25 2012 -0500 Merge in windows gems commit 95efbcfde220917bc7ee08e6083d7b383240d185 Author: Tod Beardsley <todb@metasploit.com> Date: Sun Apr 15 13:49:33 2012 -0500 Report_vuln shouldn't use :include in finder find_or_create_by doesn't take :include as a param. commit c5f99eb87f0874ef7d32fa42828841c9a714b787 Author: David Maloney <DMaloney@rapid7.com> Date: Sun Apr 15 12:44:09 2012 -0500 One more msised Mdm namespace issue commit 2184e2bbc3dd9b0993e8f21d2811a65a0c694d68 Author: David Maloney <DMaloney@rapid7.com> Date: Sun Apr 15 12:33:41 2012 -0500 Fixes some mroe Mdm namespace confusion Fixes #6626 commit 10cee17f391f398bb2be3409137ff7348c7a66ee Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 03:40:44 2012 -0500 Add robots gem (required by webscan) commit 327e674c83850101364c9cca8f8d16da1de3dfb5 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 03:39:05 2012 -0500 Fix missing error checks commit a5a24641866e47e611d7636a3f19ba3b3ed10ac5 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 01:15:37 2012 -0500 Reorder requires and add a method for injecting a new migration path commit 250a5fa5ae8cb05807af022aa4168907772c15f8 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 00:56:09 2012 -0500 Remove missing constant (use string) and add gemcache cleaner commit 37ad6063fce0a41dddedb857fa49aa2c4834a508 Merge: d47ee824be0361Author: Tod Beardsley <todb@metasploit.com> Date: Sun Apr 15 00:40:16 2012 -0500 Merge branch 'master-clone' into rails3-clone commit d47ee82ad7e66de53dd3d3a65649cc37299a2479 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 00:30:03 2012 -0500 cleanup leftovers from gems commit 6d883b5aa8a3a7ddbcde5bfd4521d57c5b30d3c2 Author: HD Moore <hd_moore@rapid7.com> Date: Sun Apr 15 00:25:47 2012 -0500 MDM update with purged DBSave module commit 71e4f2d81f6da221b76150562a16c730888f5925 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 23:19:37 2012 -0500 Add new mdm commit 651cd5adac8211d65e0c8079371d8264e549533a Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 23:19:13 2012 -0500 Update mdm commit 0191a8bd0acec30ddb2a9e9c291111a12378537f Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 22:30:40 2012 -0500 This fixes numerous cases of missed Mdm:: prefixes on db objects commit a2a9bb3f2148622c135663dead80b3367b6f7695 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 18:30:18 2012 -0500 Add eventmachine commit 301ddeb12b906ed3c508613ca894347bedc3b499 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 18:18:12 2012 -0500 A nicer error for folks who need to upgrade pg commit fa6bde1e67b12e2d3d9978f59bbc98e0c1a1a707 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 17:54:55 2012 -0500 Remove bundler requirements commit 2e3ab9ed211303f1116e602b9a450141b71e56a4 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 17:35:38 2012 -0500 Pull in eventmachine with actual .so's this time commit 901fb33ff6b754ce2c2cfd51e3b0b669f6ec600b Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 17:19:12 2012 -0500 Update deps, still need to add eventmachine commit 6b0e17068e8caa0601f3ef81e8dbdb672758fcbe Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 13:07:06 2012 -0500 Handle older installer environments and only allow binary gems when the environment specifically asks for it commit b98eb7873a6342834840424699caa414a5cb172a Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 04:05:13 2012 -0500 Bump version to -testing commit 6ac508c4ba3fdc278aaf8cfe2c58d01de3395431 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 02:25:09 2012 -0500 Remove msf3 subdir commit a27dac5067635a95b4cbb773df1985f2a2dc2c5a Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 02:24:39 2012 -0500 Remove the old busted external commit 5fb5a0fc642b6c301934c319db854cc3145427a1 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 02:03:10 2012 -0500 Add the gemcache loader commit 09e2d89dfd09b9ac0c123fcc4e19816c86725627 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Apr 14 02:02:23 2012 -0500 Purge gemfile/bundler configure in exchange for new gemcache setup commit 3cc0264e1cfb027b515d7f24b95a74b023bd905c Author: Tod Beardsley <todb@metasploit.com> Date: Thu Apr 12 14:11:45 2012 -0500 Mode change on modicon_ladder.apx commit c18b3d56efd639e461137acdc76b4b283fe978d4 Author: HD Moore <hd_moore@rapid7.com> Date: Thu Apr 12 01:38:56 2012 -0500 The go faster button commit ca2a67d51d6d4c7c3ca2e745f8b018279aef668a Merge: 674ee09b8129f9Author: Tod Beardsley <todb@metasploit.com> Date: Mon Apr 9 15:50:33 2012 -0500 Merge branch 'master-clone' into rails3-clone Picking up Packetfu upstream changes, all pretty minor commit 674ee097ab8a6bc9608bf377479ccd0b87e7302b Merge: e9513e5a26e844Author: Tod Beardsley <todb@metasploit.com> Date: Mon Apr 9 13:57:26 2012 -0500 Merge branch 'master-clone' into rails3-clone Conflicts: lib/msf/core/handler/reverse_http.rb lib/msf/core/handler/reverse_https.rb modules/auxiliary/scanner/discovery/udp_probe.rb modules/auxiliary/scanner/discovery/udp_sweep.rb Resolved conflicts with the reverse_http handlers and the udp probe / scanners byt favoring the more recent changes (which happened to be the intent anyway). The reverse_http and reverse_https changes were mine so I know what the intent was, and @dmaloney-r7 changed udp_probe and udp_sweep to use pcAnywhere_stat instead of merely pcAnywhere, so the intent is clear there as well. commit e9513e54f984fdb100c13b44a1724246779ccb76 Author: David Maloney <dmaloney@melodie.gateway.2wire.net> Date: Fri Apr 6 18:21:46 2012 -0500 Some fixes to how services get reported to prevent issues with the web interface commit adeb44e9aaf1a329a0e587d2b26e678398730422 Author: David Maloney <David_Maloney@rapid7.com> Date: Mon Apr 2 15:39:46 2012 -0500 Some corrections to pcAnywhere discovery modules to distinguish between the two services commit b13900176484fea8f5217a2ef925ae2ad9b7af47 Author: HD Moore <hd_moore@rapid7.com> Date: Sat Mar 31 12:03:21 2012 -0500 Enable additional migration-path parameters, use a temporary directory to bring the database online commit 526b4c56883f461417f71269404faef38639917c Author: David Maloney <David_Maloney@rapid7.com> Date: Wed Mar 28 23:24:56 2012 -0500 A bunch of Mdsm fixes for .kind_of? calls, to make sure we ponit to the right place commit 2cf3143370af808637d164ce59400605300f922c Author: HD Moore <hd_moore@rapid7.com> Date: Mon Mar 26 16:22:09 2012 -0500 Check for ruby 2.0 as well as 1.9 for encoding override commit 4d0f51b76d89f00f7acbce6b1f00dc6e4c4545ee Author: HD Moore <hd_moore@rapid7.com> Date: Mon Mar 26 15:36:04 2012 -0500 Remove debug statement commit f5d2335e7745aa1a354f4d6c8fc9d0b3876c472a Author: HD Moore <hd_moore@rapid7.com> Date: Mon Mar 26 15:01:55 2012 -0500 Be explicit about the Mdm namespace commit bc8be225606d6ea38dd2a85ab4310c1c181a94ee Author: hdm <hdm@hypo.(none)> Date: Mon Mar 26 11:49:51 2012 -0500 Precalculate some uri strings in case the 1000-round generation fails commit 4254f419723349ffb93e4aebdaeabbd7d66bf8c0 Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Sat Mar 24 14:03:44 2012 -0500 Removed some non-namespaced calls to Host commit c8190e1bb8ad365fb0d7a1c4a9173e6c739be85c Author: HD Moore <hd_moore@rapid7.com> Date: Tue Mar 20 00:37:00 2012 -0500 Purge the rvmrc, this is causing major headaches commit 76df18588917b7150a3bedf2569710a80bab51f8 Author: HD Moore <hd_moore@rapid7.com> Date: Tue Mar 20 00:31:52 2012 -0500 Switch .rvmrc to the shipping 1.9.3 version commit7124971d00Author: David Maloney <David_Maloney@rapid7.com> Date: Mon Mar 12 16:56:40 2012 -0500 Adds mixin for looking up Mime Types by extension commitb7ca835316Merge:a0b0c756b9a219Author: Matt Buck <techpeace@gmail.com> Date: Tue Mar 6 19:38:53 2012 -0600 Merge from develop. commita0b0c7528dAuthor: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Mar 6 11:08:59 2012 -0600 Somehow migration file is new? commit84d2b3cb1aAuthor: David Maloney <David_Maloney@rapid7.com> Date: Wed Feb 29 16:38:55 2012 -0600 Added ability to specify headers to redirects in http server commite50d27cda8Author: HD Moore <hd_moore@rapid7.com> Date: Sat Feb 4 04:44:50 2012 -0600 Tweak the event dispatcher to enable customer events without a category and trigger http request events from the main exploit mixin. Experimental commit0e4fd2040dAuthor: Matt Buck <Matthew_Buck@rapid7.com> Date: Thu Feb 2 22:09:05 2012 -0600 Change Msm -> Mdm in migrations. This is what was preventing migrations from finishing on first boot. commitc94a2961d0Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Wed Feb 1 12:48:48 2012 -0600 Changed Gemfile to use new gem name commit245c2063f0Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Wed Feb 1 12:47:42 2012 -0600 Did find/replace for final namespace of Mdm commit6ed9bf8430Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Jan 24 10:47:44 2012 -0600 Fix a bunch of namespace issues commit2fe08d9e42Author: Matt Buck <Matthew_Buck@rapid7.com> Date: Fri Jan 20 14:37:37 2012 -0600 Update Msm contstants in migrations for initial DB builds. commit4cc6b8fb04Author: Matt Buck <Matthew_Buck@rapid7.com> Date: Fri Jan 20 14:37:25 2012 -0600 Update Gemfile.lock. commit1cc655b678Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Thu Jan 19 11:48:29 2012 -0600 Errant Workspaces needed namespace commit607a782855Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Jan 17 15:44:02 2012 -0600 Refactored all models to use the new namespace * Every model using DBManager::* namespace is now Msm namespace * Almost all of this in msf/base/core * Some in modules commita690cd959bAuthor: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Jan 17 13:41:44 2012 -0600 Move bundler setup commitdae115cc8fAuthor: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Mon Jan 9 15:51:07 2012 -0600 Moved ActiveSupport dep to gem commitd32f8edb6eAuthor: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Mon Jan 9 14:40:05 2012 -0600 Removed model require file commitd0c74cff8cAuthor: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Jan 3 16:06:10 2012 -0600 Update some more finds commit4eb79ea6b5Author: Trevor Rosen <Trevor_Rosen@rapid7.com> Date: Tue Jan 3 14:21:15 2012 -0600 Yet another dumb commit commita75febcb59Author: Trevor Rosen <trevor@catapult-creative.com> Date: Thu Dec 29 19:20:51 2011 -0600 Fixing deletion commitdc139ff2fdAuthor: Trevor Rosen <trevor@catapult-creative.com> Date: Wed Dec 7 17:06:45 2011 -0600 Fixed erroneous commit commit531c1e611cAuthor: Trevor Rosen <trevor@catapult-creative.com> Date: Mon Nov 21 16:11:35 2011 -0600 Remove AR patch stuff; attempting to debug non-connection between MSF and Pro commit4586112241Author: Trevor Rosen <trevor@catapult-creative.com> Date: Fri Nov 18 16:17:27 2011 -0600 Drop ActiveRecord/ActiveSupport in preparation for upgrade
385 lines
16 KiB
Ruby
385 lines
16 KiB
Ruby
require 'net/ssh/buffer'
|
|
require 'net/ssh/known_hosts'
|
|
require 'net/ssh/loggable'
|
|
require 'net/ssh/transport/cipher_factory'
|
|
require 'net/ssh/transport/constants'
|
|
require 'net/ssh/transport/hmac'
|
|
require 'net/ssh/transport/kex'
|
|
require 'net/ssh/transport/server_version'
|
|
|
|
module Net; module SSH; module Transport
|
|
|
|
# Implements the higher-level logic behind an SSH key-exchange. It handles
|
|
# both the initial exchange, as well as subsequent re-exchanges (as needed).
|
|
# It also encapsulates the negotiation of the algorithms, and provides a
|
|
# single point of access to the negotiated algorithms.
|
|
#
|
|
# You will never instantiate or reference this directly. It is used
|
|
# internally by the transport layer.
|
|
class Algorithms
|
|
include Constants, Loggable
|
|
|
|
# Define the default algorithms, in order of preference, supported by
|
|
# Net::SSH.
|
|
ALGORITHMS = {
|
|
:host_key => %w(ssh-rsa ssh-dss),
|
|
:kex => %w(diffie-hellman-group-exchange-sha1
|
|
diffie-hellman-group1-sha1),
|
|
:encryption => %w(aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
|
|
aes192-cbc aes256-cbc rijndael-cbc@lysator.liu.se
|
|
idea-cbc none arcfour128 arcfour256),
|
|
:hmac => %w(hmac-sha1 hmac-md5 hmac-sha1-96 hmac-md5-96 none),
|
|
:compression => %w(none zlib@openssh.com zlib),
|
|
:language => %w()
|
|
}
|
|
|
|
# The underlying transport layer session that supports this object
|
|
attr_reader :session
|
|
|
|
# The hash of options used to initialize this object
|
|
attr_reader :options
|
|
|
|
# The kex algorithm to use settled on between the client and server.
|
|
attr_reader :kex
|
|
|
|
# The type of host key that will be used for this session.
|
|
attr_reader :host_key
|
|
|
|
# The type of the cipher to use to encrypt packets sent from the client to
|
|
# the server.
|
|
attr_reader :encryption_client
|
|
|
|
# The type of the cipher to use to decrypt packets arriving from the server.
|
|
attr_reader :encryption_server
|
|
|
|
# The type of HMAC to use to sign packets sent by the client.
|
|
attr_reader :hmac_client
|
|
|
|
# The type of HMAC to use to validate packets arriving from the server.
|
|
attr_reader :hmac_server
|
|
|
|
# The type of compression to use to compress packets being sent by the client.
|
|
attr_reader :compression_client
|
|
|
|
# The type of compression to use to decompress packets arriving from the server.
|
|
attr_reader :compression_server
|
|
|
|
# The language that will be used in messages sent by the client.
|
|
attr_reader :language_client
|
|
|
|
# The language that will be used in messages sent from the server.
|
|
attr_reader :language_server
|
|
|
|
# The hash of algorithms preferred by the client, which will be told to
|
|
# the server during algorithm negotiation.
|
|
attr_reader :algorithms
|
|
|
|
# The session-id for this session, as decided during the initial key exchange.
|
|
attr_reader :session_id
|
|
|
|
# Returns true if the given packet can be processed during a key-exchange.
|
|
def self.allowed_packet?(packet)
|
|
( 1.. 4).include?(packet.type) ||
|
|
( 6..19).include?(packet.type) ||
|
|
(21..49).include?(packet.type)
|
|
end
|
|
|
|
# Instantiates a new Algorithms object, and prepares the hash of preferred
|
|
# algorithms based on the options parameter and the ALGORITHMS constant.
|
|
def initialize(session, options={})
|
|
@session = session
|
|
@logger = session.logger
|
|
@options = options
|
|
@algorithms = {}
|
|
@pending = @initialized = false
|
|
@client_packet = @server_packet = nil
|
|
prepare_preferred_algorithms!
|
|
end
|
|
|
|
# Request a rekey operation. This will return immediately, and does not
|
|
# actually perform the rekey operation. It does cause the session to change
|
|
# state, however--until the key exchange finishes, no new packets will be
|
|
# processed.
|
|
def rekey!
|
|
@client_packet = @server_packet = nil
|
|
@initialized = false
|
|
send_kexinit
|
|
end
|
|
|
|
# Called by the transport layer when a KEXINIT packet is recieved, indicating
|
|
# that the server wants to exchange keys. This can be spontaneous, or it
|
|
# can be in response to a client-initiated rekey request (see #rekey!). Either
|
|
# way, this will block until the key exchange completes.
|
|
def accept_kexinit(packet)
|
|
info { "got KEXINIT from server" }
|
|
@server_data = parse_server_algorithm_packet(packet)
|
|
@server_packet = @server_data[:raw]
|
|
if !pending?
|
|
send_kexinit
|
|
else
|
|
proceed!
|
|
end
|
|
end
|
|
|
|
# A convenience method for accessing the list of preferred types for a
|
|
# specific algorithm (see #algorithms).
|
|
def [](key)
|
|
algorithms[key]
|
|
end
|
|
|
|
# Returns +true+ if a key-exchange is pending. This will be true from the
|
|
# moment either the client or server requests the key exchange, until the
|
|
# exchange completes. While an exchange is pending, only a limited number
|
|
# of packets are allowed, so event processing essentially stops during this
|
|
# period.
|
|
def pending?
|
|
@pending
|
|
end
|
|
|
|
# Returns true if no exchange is pending, and otherwise returns true or
|
|
# false depending on whether the given packet is of a type that is allowed
|
|
# during a key exchange.
|
|
def allow?(packet)
|
|
!pending? || Algorithms.allowed_packet?(packet)
|
|
end
|
|
|
|
# Returns true if the algorithms have been negotiated at all.
|
|
def initialized?
|
|
@initialized
|
|
end
|
|
|
|
private
|
|
|
|
# Sends a KEXINIT packet to the server. If a server KEXINIT has already
|
|
# been received, this will then invoke #proceed! to proceed with the key
|
|
# exchange, otherwise it returns immediately (but sets the object to the
|
|
# pending state).
|
|
def send_kexinit
|
|
info { "sending KEXINIT" }
|
|
@pending = true
|
|
packet = build_client_algorithm_packet
|
|
@client_packet = packet.to_s
|
|
session.send_message(packet)
|
|
proceed! if @server_packet
|
|
end
|
|
|
|
# After both client and server have sent their KEXINIT packets, this
|
|
# will do the algorithm negotiation and key exchange. Once both finish,
|
|
# the object leaves the pending state and the method returns.
|
|
def proceed!
|
|
info { "negotiating algorithms" }
|
|
negotiate_algorithms
|
|
exchange_keys
|
|
@pending = false
|
|
end
|
|
|
|
# Prepares the list of preferred algorithms, based on the options hash
|
|
# that was given when the object was constructed, and the ALGORITHMS
|
|
# constant. Also, when determining the host_key type to use, the known
|
|
# hosts files are examined to see if the host has ever sent a host_key
|
|
# before, and if so, that key type is used as the preferred type for
|
|
# communicating with this server.
|
|
def prepare_preferred_algorithms!
|
|
options[:compression] = %w(zlib@openssh.com zlib) if options[:compression] == true
|
|
|
|
ALGORITHMS.each do |algorithm, list|
|
|
algorithms[algorithm] = list.dup
|
|
|
|
# apply the preferred algorithm order, if any
|
|
if options[algorithm]
|
|
algorithms[algorithm] = Array(options[algorithm]).compact.uniq
|
|
invalid = algorithms[algorithm].detect { |name| !ALGORITHMS[algorithm].include?(name) }
|
|
raise NotImplementedError, "unsupported #{algorithm} algorithm: `#{invalid}'" if invalid
|
|
|
|
# make sure all of our supported algorithms are tacked onto the
|
|
# end, so that if the user tries to give a list of which none are
|
|
# supported, we can still proceed.
|
|
list.each { |name| algorithms[algorithm] << name unless algorithms[algorithm].include?(name) }
|
|
end
|
|
end
|
|
|
|
# for convention, make sure our list has the same keys as the server
|
|
# list
|
|
|
|
algorithms[:encryption_client ] = algorithms[:encryption_server ] = algorithms[:encryption]
|
|
algorithms[:hmac_client ] = algorithms[:hmac_server ] = algorithms[:hmac]
|
|
algorithms[:compression_client] = algorithms[:compression_server] = algorithms[:compression]
|
|
algorithms[:language_client ] = algorithms[:language_server ] = algorithms[:language]
|
|
|
|
if !options.key?(:host_key)
|
|
# make sure the host keys are specified in preference order, where any
|
|
# existing known key for the host has preference.
|
|
|
|
existing_keys = KnownHosts.search_for(options[:host_key_alias] || session.host_as_string, options)
|
|
host_keys = existing_keys.map { |key| key.ssh_type }.uniq
|
|
algorithms[:host_key].each do |name|
|
|
host_keys << name unless host_keys.include?(name)
|
|
end
|
|
algorithms[:host_key] = host_keys
|
|
end
|
|
end
|
|
|
|
# Parses a KEXINIT packet from the server.
|
|
def parse_server_algorithm_packet(packet)
|
|
data = { :raw => packet.content }
|
|
|
|
packet.read(16) # skip the cookie value
|
|
|
|
data[:kex] = packet.read_string.split(/,/)
|
|
data[:host_key] = packet.read_string.split(/,/)
|
|
data[:encryption_client] = packet.read_string.split(/,/)
|
|
data[:encryption_server] = packet.read_string.split(/,/)
|
|
data[:hmac_client] = packet.read_string.split(/,/)
|
|
data[:hmac_server] = packet.read_string.split(/,/)
|
|
data[:compression_client] = packet.read_string.split(/,/)
|
|
data[:compression_server] = packet.read_string.split(/,/)
|
|
data[:language_client] = packet.read_string.split(/,/)
|
|
data[:language_server] = packet.read_string.split(/,/)
|
|
|
|
# TODO: if first_kex_packet_follows, we need to try to skip the
|
|
# actual kexinit stuff and try to guess what the server is doing...
|
|
# need to read more about this scenario.
|
|
first_kex_packet_follows = packet.read_bool
|
|
|
|
return data
|
|
end
|
|
|
|
# Given the #algorithms map of preferred algorithm types, this constructs
|
|
# a KEXINIT packet to send to the server. It does not actually send it,
|
|
# it simply builds the packet and returns it.
|
|
def build_client_algorithm_packet
|
|
kex = algorithms[:kex ].join(",")
|
|
host_key = algorithms[:host_key ].join(",")
|
|
encryption = algorithms[:encryption ].join(",")
|
|
hmac = algorithms[:hmac ].join(",")
|
|
compression = algorithms[:compression].join(",")
|
|
language = algorithms[:language ].join(",")
|
|
|
|
Net::SSH::Buffer.from(:byte, KEXINIT,
|
|
:long, [rand(0xFFFFFFFF), rand(0xFFFFFFFF), rand(0xFFFFFFFF), rand(0xFFFFFFFF)],
|
|
:string, [kex, host_key, encryption, encryption, hmac, hmac],
|
|
:string, [compression, compression, language, language],
|
|
:bool, false, :long, 0)
|
|
end
|
|
|
|
# Given the parsed server KEX packet, and the client's preferred algorithm
|
|
# lists in #algorithms, determine which preferred algorithms each has
|
|
# in common and set those as the selected algorithms. If, for any algorithm,
|
|
# no type can be settled on, an exception is raised.
|
|
def negotiate_algorithms
|
|
@kex = negotiate(:kex)
|
|
@host_key = negotiate(:host_key)
|
|
@encryption_client = negotiate(:encryption_client)
|
|
@encryption_server = negotiate(:encryption_server)
|
|
@hmac_client = negotiate(:hmac_client)
|
|
@hmac_server = negotiate(:hmac_server)
|
|
@compression_client = negotiate(:compression_client)
|
|
@compression_server = negotiate(:compression_server)
|
|
@language_client = negotiate(:language_client) rescue ""
|
|
@language_server = negotiate(:language_server) rescue ""
|
|
|
|
debug do
|
|
"negotiated:\n" +
|
|
[:kex, :host_key, :encryption_server, :encryption_client, :hmac_client, :hmac_server, :compression_client, :compression_server, :language_client, :language_server].map do |key|
|
|
"* #{key}: #{instance_variable_get("@#{key}")}"
|
|
end.join("\n")
|
|
end
|
|
end
|
|
|
|
# Negotiates a single algorithm based on the preferences reported by the
|
|
# server and those set by the client. This is called by
|
|
# #negotiate_algorithms.
|
|
def negotiate(algorithm)
|
|
match = self[algorithm].find { |item| @server_data[algorithm].include?(item) }
|
|
|
|
if match.nil?
|
|
raise Net::SSH::Exception, "could not settle on #{algorithm} algorithm"
|
|
end
|
|
|
|
return match
|
|
end
|
|
|
|
# Considers the sizes of the keys and block-sizes for the selected ciphers,
|
|
# and the lengths of the hmacs, and returns the largest as the byte requirement
|
|
# for the key-exchange algorithm.
|
|
def kex_byte_requirement
|
|
sizes = [8] # require at least 8 bytes
|
|
|
|
sizes.concat(CipherFactory.get_lengths(encryption_client))
|
|
sizes.concat(CipherFactory.get_lengths(encryption_server))
|
|
|
|
sizes << HMAC.key_length(hmac_client)
|
|
sizes << HMAC.key_length(hmac_server)
|
|
|
|
sizes.max
|
|
end
|
|
|
|
# Instantiates one of the Transport::Kex classes (based on the negotiated
|
|
# kex algorithm), and uses it to exchange keys. Then, the ciphers and
|
|
# HMACs are initialized and fed to the transport layer, to be used in
|
|
# further communication with the server.
|
|
def exchange_keys
|
|
debug { "exchanging keys" }
|
|
|
|
algorithm = Kex::MAP[kex].new(self, session,
|
|
:client_version_string => Net::SSH::Transport::ServerVersion::PROTO_VERSION,
|
|
:server_version_string => session.server_version.version,
|
|
:server_algorithm_packet => @server_packet,
|
|
:client_algorithm_packet => @client_packet,
|
|
:need_bytes => kex_byte_requirement,
|
|
:logger => logger)
|
|
result = algorithm.exchange_keys
|
|
|
|
secret = result[:shared_secret].to_ssh
|
|
hash = result[:session_id]
|
|
digester = result[:hashing_algorithm]
|
|
|
|
@session_id ||= hash
|
|
|
|
key = Proc.new { |salt| digester.digest(secret + hash + salt + @session_id) }
|
|
|
|
iv_client = key["A"]
|
|
iv_server = key["B"]
|
|
key_client = key["C"]
|
|
key_server = key["D"]
|
|
mac_key_client = key["E"]
|
|
mac_key_server = key["F"]
|
|
|
|
parameters = { :iv => iv_client, :key => key_client, :shared => secret,
|
|
:hash => hash, :digester => digester }
|
|
|
|
cipher_client = CipherFactory.get(encryption_client, parameters.merge(:encrypt => true))
|
|
cipher_server = CipherFactory.get(encryption_server, parameters.merge(:iv => iv_server, :key => key_server, :decrypt => true))
|
|
|
|
mac_client = HMAC.get(hmac_client, mac_key_client)
|
|
mac_server = HMAC.get(hmac_server, mac_key_server)
|
|
|
|
session.configure_client :cipher => cipher_client, :hmac => mac_client,
|
|
:compression => normalize_compression_name(compression_client),
|
|
:compression_level => options[:compression_level],
|
|
:rekey_limit => options[:rekey_limit],
|
|
:max_packets => options[:rekey_packet_limit],
|
|
:max_blocks => options[:rekey_blocks_limit]
|
|
|
|
session.configure_server :cipher => cipher_server, :hmac => mac_server,
|
|
:compression => normalize_compression_name(compression_server),
|
|
:rekey_limit => options[:rekey_limit],
|
|
:max_packets => options[:rekey_packet_limit],
|
|
:max_blocks => options[:rekey_blocks_limit]
|
|
|
|
@initialized = true
|
|
end
|
|
|
|
# Given the SSH name for some compression algorithm, return a normalized
|
|
# name as a symbol.
|
|
def normalize_compression_name(name)
|
|
case name
|
|
when "none" then false
|
|
when "zlib" then :standard
|
|
when "zlib@openssh.com" then :delayed
|
|
else raise ArgumentError, "unknown compression type `#{name}'"
|
|
end
|
|
end
|
|
end
|
|
end; end; end
|