connection.c 6.29 KB
Newer Older
1
2
3
4
5
/* connection.c
 *
 */

#include "connection.h"
6

7
#include "encrypt.h"
8
#include "format.h"
9
#include "disconnect.h"
10
#include "keyexchange.h"
11
#include "packet_ignore.h"
12
#include "pad.h"
13
14
15
#include "ssh.h"
#include "werror.h"
#include "xalloc.h"
16

17
static int handle_connection(struct abstract_write **w,
18
			     struct lsh_string *packet)
19
{
20
  struct ssh_connection *closure = (struct ssh_connection *) *w;
21
  UINT8 msg;
Niels Möller's avatar
Niels Möller committed
22

23
24
25
26
27
  if (!packet->length)
    {
      werror("connection.c: Recieved empty packet!\n");
      return 0;
    }
28

29
  msg = packet->data[0];
30

Niels Möller's avatar
Niels Möller committed
31
  debug("handle_connection: Recieved packet of type %d\n", msg);
32
33

  switch(closure->kex_state)
34
    {
35
36
37
38
39
40
41
42
43
    case KEX_STATE_INIT:
      if (msg == SSH_MSG_NEWKEYS)
	{
	  werror("Unexpected NEWKEYS message!\n");
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    case KEX_STATE_IGNORE:
Niels Möller's avatar
Niels Möller committed
44
      debug("handle_connection: Ignoring packet %d\n", msg);
45
46
47
48
49
50
51

      /* It's concievable with key exchange methods for which one
       * wants to switch to the NEWKEYS state immediately. But for
       * now, we always switch to the IN_PROGRESS state, to wait for a
       * KEXDH_INIT or KEXDH_REPLY message. */
      closure->kex_state = KEX_STATE_IN_PROGRESS;
      lsh_free(packet);
52
      return WRITE_OK;
53
54
55
56
57
58
59
60
61
62
63

    case KEX_STATE_IN_PROGRESS:
      if ( (msg == SSH_MSG_NEWKEYS)
	   || (msg == SSH_MSG_KEXINIT))
	{
	  werror("Unexpected KEXINIT or NEWKEYS message!\n");
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    case KEX_STATE_NEWKEYS:
Niels Möller's avatar
Niels Möller committed
64
65
      if ( (msg != SSH_MSG_NEWKEYS)
	   && (msg != SSH_MSG_DISCONNECT) )
66
67
68
69
70
71
72
73
74
	{
	  werror("Expected NEWKEYS message, but recieved message %d!\n",
		 msg);
	  lsh_free(packet);
	  return WRITE_CLOSED;
	}
      break;
    default:
      fatal("handle_connection: Internal error.\n");
75
    }
76

77
  return HANDLE_PACKET(closure->dispatch[msg], closure, packet);
78
79
}

80
static int do_fail(struct packet_handler *closure,
Niels Möller's avatar
Niels Möller committed
81
82
		   struct ssh_connection *connection,
		   struct lsh_string *packet)
83
{
Niels Möller's avatar
Niels Möller committed
84
85
  MDEBUG(closure);

86
87
  lsh_string_free(packet);
  return WRITE_CLOSED;
88
}
89

Niels Möller's avatar
Niels Möller committed
90
struct packet_handler *make_fail_handler(void)
91
{
92
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
93

94
95
  res->handler = do_fail;
  return res;
96
97
}

98
99
100
static int do_unimplemented(struct packet_handler *closure,
			    struct ssh_connection *connection,
			    struct lsh_string *packet)
101
{
Niels Möller's avatar
Niels Möller committed
102
103
104
105
106
107
108
109
  int res;

  MDEBUG(closure);

  res =  A_WRITE(connection->write,
		 ssh_format("%c%i",
			    SSH_MSG_UNIMPLEMENTED,
			    packet->sequence_number));
Niels Möller's avatar
Niels Möller committed
110
111
112
  verbose("Recieved packet of unimplemented type %d.\n",
	  packet->data[0]);
  
113
114
115
  lsh_string_free(packet);
  return res;
}
116

Niels Möller's avatar
Niels Möller committed
117
struct packet_handler *make_unimplemented_handler(void)
118
119
{
  struct packet_handler *res =  xalloc(sizeof(struct packet_handler));
120

121
122
  res->handler = do_unimplemented;
  return res;
123
124
125
}


126
127
128
129
130
struct ssh_connection *make_ssh_connection(struct packet_handler *kex_handler)
{
  struct ssh_connection *connection = xalloc(sizeof(struct ssh_connection));
  int i;

131
  connection->super.write = handle_connection;
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153

  /* Initialize instance variables */
  connection->client_version
    = connection->server_version
    = connection->session_id = NULL;

  connection->rec_max_packet = 0x8000;
  connection->rec_mac = NULL;
  connection->rec_crypto = NULL;

  connection->send_mac = NULL;
  connection->send_crypto = NULL;
  
  connection->kex_state = KEX_STATE_INIT;

  connection->kexinits[0]
    = connection->kexinits[1] = NULL;

  connection->literal_kexinits[0]
    = connection->literal_kexinits[1] = NULL;

  connection->newkeys = NULL;
154
155
  
  /* Initialize dispatch */
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
  connection->ignore = make_ignore_handler();
  connection->unimplemented = make_unimplemented_handler();
  connection->fail = make_fail_handler();
  
  for (i = 0; i < 0x100; i++)
    connection->dispatch[i] = connection->unimplemented;

  connection->dispatch[0] = connection->fail;
  connection->dispatch[SSH_MSG_DISCONNECT] = make_disconnect_handler();
  connection->dispatch[SSH_MSG_IGNORE] = connection->ignore;
  connection->dispatch[SSH_MSG_UNIMPLEMENTED] = connection->ignore;

  /* FIXME: Write a debug handler */
  connection->dispatch[SSH_MSG_DEBUG] = connection->ignore;

  connection->dispatch[SSH_MSG_KEXINIT] = kex_handler;

  /* Make all other known message types terminate the connection */

  connection->dispatch[SSH_MSG_SERVICE_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_SERVICE_ACCEPT] = connection->fail;
  connection->dispatch[SSH_MSG_NEWKEYS] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_INIT] = connection->fail;
  connection->dispatch[SSH_MSG_KEXDH_REPLY] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_BANNER] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PK_OK] = connection->fail;
  connection->dispatch[SSH_MSG_USERAUTH_PASSWD_CHANGEREQ] = connection->fail;
  connection->dispatch[SSH_MSG_GLOBAL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_REQUEST_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_CONFIRMATION] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_OPEN_FAILURE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_WINDOW_ADJUST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EXTENDED_DATA] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_EOF] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_CLOSE] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_REQUEST] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_SUCCESS] = connection->fail;
  connection->dispatch[SSH_MSG_CHANNEL_FAILURE] = connection->fail;
  
  return connection;
}
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217

void connection_init_io(struct ssh_connection *connection,
			struct abstract_write *raw,
			struct randomness *r)
{
  /* Initialize i/o hooks */
  connection->raw = raw;
  connection->write = make_packet_pad(make_packet_encrypt(raw,
							  connection),
				      connection,
				      r);

  connection->send_crypto = connection->rec_crypto = NULL;
  connection->send_mac = connection->rec_mac = NULL;
}