connection.c 6.2 KB
Newer Older
1
2
3
4
5
/* connection.c
 *
 */

#include "connection.h"
6

7
#include "encrypt.h"
8
#include "format.h"
9
#include "disconnect.h"
10
#include "keyexchange.h"
11
#include "packet_ignore.h"
12
#include "pad.h"
13
14
15
#include "ssh.h"
#include "werror.h"
#include "xalloc.h"
16

17
static int handle_connection(struct abstract_write **w,
18
			     struct lsh_string *packet)
19
{
20
  struct ssh_connection *closure = (struct ssh_connection *) *w;
21
  UINT8 msg;
Niels Möller's avatar
Niels Möller committed
22

23
24
25
26
27
  if (!packet->length)
    {
      werror("connection.c: Recieved empty packet!\n");
      return 0;
    }
28

29
  msg = packet->data[0];
30

Niels Möller's avatar
Niels Möller committed
31
  debug("handle_connection: Recieved packet of type %d\n", msg);
32
33

  switch(closure->kex_state)
34
    {
35
36
37
38
39
40
41
42
43
    case KEX_STATE_INIT:
      if (msg == SSH_MSG_NEWKEYS)
	{
	  werror("Unexpected NEWKEYS message!\n");
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    case KEX_STATE_IGNORE:
Niels Möller's avatar
Niels Möller committed
44
      debug("handle_connection: Ignoring packet %d\n", msg);
45
46
47
48
49
50
51

      /* It's concievable with key exchange methods for which one
       * wants to switch to the NEWKEYS state immediately. But for
       * now, we always switch to the IN_PROGRESS state, to wait for a
       * KEXDH_INIT or KEXDH_REPLY message. */
      closure->kex_state = KEX_STATE_IN_PROGRESS;
      lsh_free(packet);
52
      return WRITE_OK;
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73

    case KEX_STATE_IN_PROGRESS:
      if ( (msg == SSH_MSG_NEWKEYS)
	   || (msg == SSH_MSG_KEXINIT))
	{
	  werror("Unexpected KEXINIT or NEWKEYS message!\n");
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    case KEX_STATE_NEWKEYS:
      if (msg != SSH_MSG_NEWKEYS)
	{
	  werror("Expected NEWKEYS message, but recieved message %d!\n",
		 msg);
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    default:
      fatal("handle_connection: Internal error.\n");
74
    }
75

76
  return HANDLE_PACKET(closure->dispatch[msg], closure, packet);
77
78
}

79
static int do_fail(struct packet_handler *closure,
Niels Möller's avatar
Niels Möller committed
80
81
		   struct ssh_connection *connection,
		   struct lsh_string *packet)
82
{
83
84
  lsh_string_free(packet);
  return WRITE_CLOSED;
85
}
86

Niels Möller's avatar
Niels Möller committed
87
struct packet_handler *make_fail_handler()
88
{
89
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
90

91
92
  res->handler = do_fail;
  return res;
93
94
}

95
96
97
static int do_unimplemented(struct packet_handler *closure,
			    struct ssh_connection *connection,
			    struct lsh_string *packet)
98
{
99
100
101
102
  int res =  A_WRITE(connection->write,
		     ssh_format("%c%i",
				SSH_MSG_UNIMPLEMENTED,
				packet->sequence_number));
Niels Möller's avatar
Niels Möller committed
103
104
105
  verbose("Recieved packet of unimplemented type %d.\n",
	  packet->data[0]);
  
106
107
108
  lsh_string_free(packet);
  return res;
}
109

110
struct packet_handler *make_unimplemented_handler()
111
112
{
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
113

114
115
  res->handler = do_unimplemented;
  return res;
116
117
118
}


119
120
121
122
123
struct ssh_connection *make_ssh_connection(struct packet_handler *kex_handler)
{
  struct ssh_connection *connection = xalloc(sizeof(struct ssh_connection));
  int i;

124
  connection->super.write = handle_connection;
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146

  /* Initialize instance variables */
  connection->client_version
    = connection->server_version
    = connection->session_id = NULL;

  connection->rec_max_packet = 0x8000;
  connection->rec_mac = NULL;
  connection->rec_crypto = NULL;

  connection->send_mac = NULL;
  connection->send_crypto = NULL;
  
  connection->kex_state = KEX_STATE_INIT;

  connection->kexinits[0]
    = connection->kexinits[1] = NULL;

  connection->literal_kexinits[0]
    = connection->literal_kexinits[1] = NULL;

  connection->newkeys = NULL;
147
148
  
  /* Initialize dispatch */
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
  connection->ignore = make_ignore_handler();
  connection->unimplemented = make_unimplemented_handler();
  connection->fail = make_fail_handler();
  
  for (i = 0; i < 0x100; i++)
    connection->dispatch[i] = connection->unimplemented;

  connection->dispatch[0] = connection->fail;
  connection->dispatch[SSH_MSG_DISCONNECT] = make_disconnect_handler();
  connection->dispatch[SSH_MSG_IGNORE] = connection->ignore;
  connection->dispatch[SSH_MSG_UNIMPLEMENTED] = connection->ignore;

  /* FIXME: Write a debug handler */
  connection->dispatch[SSH_MSG_DEBUG] = connection->ignore;

  connection->dispatch[SSH_MSG_KEXINIT] = kex_handler;

  /* Make all other known message types terminate the connection */

  connection->dispatch[SSH_MSG_SERVICE_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_SERVICE_ACCEPT] = connection->fail;
  connection->dispatch[SSH_MSG_NEWKEYS] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_INIT] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_REPLY] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_BANNER] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PK_OK] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PASSWD_CHANGEREQ] = connection->fail;
  connection->dispatch[SSH_MSG_GLOBAL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_CONFIRMATION] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_WINDOW_ADJUST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EXTENDED_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EOF] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_CLOSE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_FAILURE] = connection->fail;
  
  return connection;
}
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210

void connection_init_io(struct ssh_connection *connection,
			struct abstract_write *raw,
			struct randomness *r)
{
  /* Initialize i/o hooks */
  connection->raw = raw;
  connection->write = make_packet_pad(make_packet_encrypt(raw,
							  connection),
				      connection,
				      r);

  connection->send_crypto = connection->rec_crypto = NULL;
  connection->send_mac = connection->rec_mac = NULL;
}