connection.c 4.76 KB
Newer Older
1
2
3
4
5
/* connection.c
 *
 */

#include "connection.h"
6

7
#include "encrypt.h"
8
#include "format.h"
9
#include "disconnect.h"
10
#include "packet_ignore.h"
11
#include "pad.h"
12
13
14
#include "ssh.h"
#include "werror.h"
#include "xalloc.h"
15

16
static int handle_connection(struct abstract_write **w,
17
			     struct lsh_string *packet)
18
{
19
  struct ssh_connection *closure = (struct ssh_connection *) *w;
20
21
22
23
24
25
26
  UINT8 msg;
  
  if (!packet->length)
    {
      werror("connection.c: Recieved empty packet!\n");
      return 0;
    }
27

28
  msg = packet->data[0];
29
30
31
32
33
34
35

  if (closure->ignore_one_packet)
    {
      closure->ignore_one_packet = 0;
      lsh_string_free(packet);
      return WRITE_OK;
    }
36
37
38
39
40
41

  /* If we are expecting a NEWKEYS message, don't accept anything else. */
  
  if (closure->dispatch[SSH_MSG_NEWKEYS]
      && (msg != SSH_MSG_NEWKEYS))
    return WRITE_CLOSED;
42
  
43
  return HANDLE_PACKET(closure->dispatch[msg], closure, packet);
44
45
}

46
static int do_fail(struct packet_handler *closure,
Niels Möller's avatar
Niels Möller committed
47
48
		   struct ssh_connection *connection,
		   struct lsh_string *packet)
49
{
50
51
  lsh_string_free(packet);
  return WRITE_CLOSED;
52
}
53

Niels Möller's avatar
Niels Möller committed
54
struct packet_handler *make_fail_handler()
55
{
56
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
57

58
59
  res->handler = do_fail;
  return res;
60
61
}

62
63
64
static int do_unimplemented(struct packet_handler *closure,
			    struct ssh_connection *connection,
			    struct lsh_string *packet)
65
{
66
67
68
69
70
71
72
  int res =  A_WRITE(connection->write,
		     ssh_format("%c%i",
				SSH_MSG_UNIMPLEMENTED,
				packet->sequence_number));
  lsh_string_free(packet);
  return res;
}
73

74
struct packet_handler *make_unimplemented_handler()
75
76
{
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
77

78
79
  res->handler = do_unimplemented;
  return res;
80
81
82
}


83
84
85
86
87
struct ssh_connection *make_ssh_connection(struct packet_handler *kex_handler)
{
  struct ssh_connection *connection = xalloc(sizeof(struct ssh_connection));
  int i;

88
89
90
  connection->super.write = handle_connection;
  
  /* Initialize dispatch */
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
  connection->ignore = make_ignore_handler();
  connection->unimplemented = make_unimplemented_handler();
  connection->fail = make_fail_handler();
  
  for (i = 0; i < 0x100; i++)
    connection->dispatch[i] = connection->unimplemented;

  connection->dispatch[0] = connection->fail;
  connection->dispatch[SSH_MSG_DISCONNECT] = make_disconnect_handler();
  connection->dispatch[SSH_MSG_IGNORE] = connection->ignore;
  connection->dispatch[SSH_MSG_UNIMPLEMENTED] = connection->ignore;

  /* FIXME: Write a debug handler */
  connection->dispatch[SSH_MSG_DEBUG] = connection->ignore;

  connection->dispatch[SSH_MSG_KEXINIT] = kex_handler;

  /* Make all other known message types terminate the connection */

  connection->dispatch[SSH_MSG_SERVICE_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_SERVICE_ACCEPT] = connection->fail;
  connection->dispatch[SSH_MSG_NEWKEYS] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_INIT] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_REPLY] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_BANNER] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PK_OK] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PASSWD_CHANGEREQ] = connection->fail;
  connection->dispatch[SSH_MSG_GLOBAL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_CONFIRMATION] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_WINDOW_ADJUST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EXTENDED_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EOF] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_CLOSE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_FAILURE] = connection->fail;
  
  return connection;
}
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154

void connection_init_io(struct ssh_connection *connection,
			struct abstract_write *raw,
			struct randomness *r)
{
  /* Initialize i/o hooks */
  connection->raw = raw;
  connection->write = make_packet_pad(make_packet_encrypt(raw,
							  connection),
				      connection,
				      r);

  connection->send_crypto = connection->rec_crypto = NULL;
  connection->send_mac = connection->rec_mac = NULL;
  
  connection->rec_max_packet = 0x8000;
}