mirror of
https://github.com/Noratrieb/cluelessh.git
synced 2026-01-16 17:35:04 +01:00
refactor
This commit is contained in:
parent
49a3793770
commit
982de53668
3 changed files with 86 additions and 24 deletions
|
|
@ -1,12 +1,13 @@
|
||||||
use aes_gcm::aead::AeadMutInPlace;
|
use aes_gcm::aead::AeadMutInPlace;
|
||||||
use chacha20::cipher::{KeyInit, StreamCipher, StreamCipherSeek};
|
use chacha20::cipher::{KeyInit, StreamCipher, StreamCipherSeek};
|
||||||
use p256::ecdsa::signature::{Signer};
|
use p256::ecdsa::signature::Signer;
|
||||||
use sha2::Digest;
|
use sha2::Digest;
|
||||||
use subtle::ConstantTimeEq;
|
use subtle::ConstantTimeEq;
|
||||||
|
|
||||||
use crate::{
|
use crate::{
|
||||||
client_error,
|
client_error,
|
||||||
packet::{EncryptedPacket, MsgKind, Packet, RawPacket},
|
packet::{EncryptedPacket, MsgKind, Packet, RawPacket},
|
||||||
|
parse::Writer,
|
||||||
Msg, Result, SshRng,
|
Msg, Result, SshRng,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -129,11 +130,14 @@ pub const ENC_AES256_GCM: EncryptionAlgorithm = EncryptionAlgorithm {
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
|
|
||||||
|
pub struct EncodedSshPublicHostKey(pub Vec<u8>);
|
||||||
|
pub struct EncodedSshSignature(pub Vec<u8>);
|
||||||
|
|
||||||
pub struct HostKeySigningAlgorithm {
|
pub struct HostKeySigningAlgorithm {
|
||||||
name: &'static str,
|
name: &'static str,
|
||||||
hostkey_private: Vec<u8>,
|
hostkey_private: Vec<u8>,
|
||||||
public_key: fn(private_key: &[u8]) -> Vec<u8>,
|
public_key: fn(private_key: &[u8]) -> EncodedSshPublicHostKey,
|
||||||
sign: fn(private_key: &[u8], data: &[u8]) -> Vec<u8>,
|
sign: fn(private_key: &[u8], data: &[u8]) -> EncodedSshSignature,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl AlgorithmName for HostKeySigningAlgorithm {
|
impl AlgorithmName for HostKeySigningAlgorithm {
|
||||||
|
|
@ -143,10 +147,10 @@ impl AlgorithmName for HostKeySigningAlgorithm {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl HostKeySigningAlgorithm {
|
impl HostKeySigningAlgorithm {
|
||||||
pub fn sign(&self, data: &[u8]) -> Vec<u8> {
|
pub fn sign(&self, data: &[u8]) -> EncodedSshSignature {
|
||||||
(self.sign)(&self.hostkey_private, data)
|
(self.sign)(&self.hostkey_private, data)
|
||||||
}
|
}
|
||||||
pub fn public_key(&self) -> Vec<u8> {
|
pub fn public_key(&self) -> EncodedSshPublicHostKey {
|
||||||
(self.public_key)(&self.hostkey_private)
|
(self.public_key)(&self.hostkey_private)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -157,11 +161,43 @@ pub fn hostkey_ed25519(hostkey_private: Vec<u8>) -> HostKeySigningAlgorithm {
|
||||||
hostkey_private,
|
hostkey_private,
|
||||||
public_key: |key| {
|
public_key: |key| {
|
||||||
let key = ed25519_dalek::SigningKey::from_bytes(key.try_into().unwrap());
|
let key = ed25519_dalek::SigningKey::from_bytes(key.try_into().unwrap());
|
||||||
key.verifying_key().as_bytes().to_vec()
|
let public_key = key.verifying_key();
|
||||||
|
|
||||||
|
// <https://datatracker.ietf.org/doc/html/rfc8709#section-4>
|
||||||
|
let mut data = Writer::new();
|
||||||
|
data.string(b"ssh-ed25519");
|
||||||
|
data.string(public_key.as_bytes());
|
||||||
|
EncodedSshPublicHostKey(data.finish())
|
||||||
},
|
},
|
||||||
sign: |key, data| {
|
sign: |key, data| {
|
||||||
let key = ed25519_dalek::SigningKey::from_bytes(key.try_into().unwrap());
|
let key = ed25519_dalek::SigningKey::from_bytes(key.try_into().unwrap());
|
||||||
key.sign(data).to_vec()
|
let signature = key.sign(data);
|
||||||
|
|
||||||
|
// <https://datatracker.ietf.org/doc/html/rfc8709#section-6>
|
||||||
|
let mut data = Writer::new();
|
||||||
|
data.string(b"ssh-ed25519");
|
||||||
|
data.string(&signature.to_bytes());
|
||||||
|
EncodedSshSignature(data.finish())
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
pub fn hostkey_ecdsa_sha2_p256(hostkey_private: Vec<u8>) -> HostKeySigningAlgorithm {
|
||||||
|
HostKeySigningAlgorithm {
|
||||||
|
name: "ecdsa-sha2-nistp256",
|
||||||
|
hostkey_private,
|
||||||
|
public_key: |key| {
|
||||||
|
let key = p256::ecdsa::SigningKey::from_slice(key).unwrap();
|
||||||
|
key.verifying_key()
|
||||||
|
.to_encoded_point(true)
|
||||||
|
.as_bytes()
|
||||||
|
.to_vec();
|
||||||
|
todo!()
|
||||||
|
},
|
||||||
|
sign: |key, data| {
|
||||||
|
let key = p256::ecdsa::SigningKey::from_slice(key).unwrap();
|
||||||
|
let signature: p256::ecdsa::Signature = key.sign(data);
|
||||||
|
signature.to_vec();
|
||||||
|
todo!()
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -7,7 +7,6 @@ use core::str;
|
||||||
use std::{collections::VecDeque, mem::take};
|
use std::{collections::VecDeque, mem::take};
|
||||||
|
|
||||||
use crypto::{AlgorithmName, AlgorithmNegotiation, EncryptionAlgorithm, HostKeySigningAlgorithm};
|
use crypto::{AlgorithmName, AlgorithmNegotiation, EncryptionAlgorithm, HostKeySigningAlgorithm};
|
||||||
use ed25519_dalek::ed25519::signature::Signer;
|
|
||||||
use packet::{
|
use packet::{
|
||||||
KeyExchangeEcDhInitPacket, KeyExchangeInitPacket, Packet, PacketTransport, SshPublicKey,
|
KeyExchangeEcDhInitPacket, KeyExchangeInitPacket, Packet, PacketTransport, SshPublicKey,
|
||||||
SshSignature,
|
SshSignature,
|
||||||
|
|
@ -198,13 +197,15 @@ impl ServerConnection {
|
||||||
let kex_algorithm = kex_algorithms.find(kex.kex_algorithms.0)?;
|
let kex_algorithm = kex_algorithms.find(kex.kex_algorithms.0)?;
|
||||||
debug!(name = %kex_algorithm.name(), "Using KEX algorithm");
|
debug!(name = %kex_algorithm.name(), "Using KEX algorithm");
|
||||||
|
|
||||||
// TODO: support ecdsa-sha2-nistp256
|
|
||||||
let hostkey_algorithms = AlgorithmNegotiation {
|
let hostkey_algorithms = AlgorithmNegotiation {
|
||||||
supported: vec![crypto::hostkey_ed25519(ED25519_PRIVKEY_BYTES.to_vec())],
|
supported: vec![
|
||||||
|
//crypto::hostkey_ed25519(ED25519_PRIVKEY_BYTES.to_vec()),
|
||||||
|
crypto::hostkey_ecdsa_sha2_p256(ECDSA_P256_PRIVKEY_BYTES.to_vec()),
|
||||||
|
],
|
||||||
};
|
};
|
||||||
|
|
||||||
let server_host_key_algorithm =
|
let server_host_key_algorithm =
|
||||||
hostkey_algorithms.find(kex.server_host_key_algorithms.0)?;
|
hostkey_algorithms.find(kex.server_host_key_algorithms.0)?;
|
||||||
|
debug!(name = %server_host_key_algorithm.name(), "Using host key algorithm");
|
||||||
|
|
||||||
let encryption_algorithms_client_to_server = AlgorithmNegotiation {
|
let encryption_algorithms_client_to_server = AlgorithmNegotiation {
|
||||||
supported: vec![crypto::ENC_CHACHA20POLY1305, crypto::ENC_AES256_GCM],
|
supported: vec![crypto::ENC_CHACHA20POLY1305, crypto::ENC_AES256_GCM],
|
||||||
|
|
@ -299,7 +300,7 @@ impl ServerConnection {
|
||||||
shared_secret,
|
shared_secret,
|
||||||
} = (kex_algorithm.exchange)(client_public_key, &mut *self.rng)?;
|
} = (kex_algorithm.exchange)(client_public_key, &mut *self.rng)?;
|
||||||
|
|
||||||
/*let hostkey =
|
let hostkey =
|
||||||
p256::ecdsa::SigningKey::random(&mut SshRngRandAdapter(&mut *self.rng));
|
p256::ecdsa::SigningKey::random(&mut SshRngRandAdapter(&mut *self.rng));
|
||||||
|
|
||||||
eprintln!(
|
eprintln!(
|
||||||
|
|
@ -310,12 +311,9 @@ impl ServerConnection {
|
||||||
.map(|b| format!("0x{b:x}"))
|
.map(|b| format!("0x{b:x}"))
|
||||||
.collect::<Vec<_>>()
|
.collect::<Vec<_>>()
|
||||||
.join(", ")
|
.join(", ")
|
||||||
);*/
|
);
|
||||||
|
|
||||||
let pub_hostkey = SshPublicKey {
|
let pub_hostkey = server_host_key_algorithm.public_key();
|
||||||
format: server_host_key_algorithm.name().as_bytes(),
|
|
||||||
data: &server_host_key_algorithm.public_key(),
|
|
||||||
};
|
|
||||||
|
|
||||||
let mut hash = sha2::Sha256::new();
|
let mut hash = sha2::Sha256::new();
|
||||||
let add_hash = |hash: &mut sha2::Sha256, bytes: &[u8]| {
|
let add_hash = |hash: &mut sha2::Sha256, bytes: &[u8]| {
|
||||||
|
|
@ -339,7 +337,7 @@ impl ServerConnection {
|
||||||
); // V_S
|
); // V_S
|
||||||
hash_string(&mut hash, client_kexinit); // I_C
|
hash_string(&mut hash, client_kexinit); // I_C
|
||||||
hash_string(&mut hash, server_kexinit); // I_S
|
hash_string(&mut hash, server_kexinit); // I_S
|
||||||
hash_string(&mut hash, &pub_hostkey.to_bytes()); // K_S
|
hash_string(&mut hash, &pub_hostkey.0); // K_S
|
||||||
|
|
||||||
// For normal DH as in RFC4253, e and f are mpints.
|
// For normal DH as in RFC4253, e and f are mpints.
|
||||||
// But for ECDH as defined in RFC5656, Q_C and Q_S are strings.
|
// But for ECDH as defined in RFC5656, Q_C and Q_S are strings.
|
||||||
|
|
@ -358,13 +356,9 @@ impl ServerConnection {
|
||||||
// eprintln!("hash: {:x?}", hash);
|
// eprintln!("hash: {:x?}", hash);
|
||||||
|
|
||||||
let packet = Packet::new_msg_kex_ecdh_reply(
|
let packet = Packet::new_msg_kex_ecdh_reply(
|
||||||
&pub_hostkey.to_bytes(),
|
&pub_hostkey.0,
|
||||||
&server_public_key,
|
&server_public_key,
|
||||||
&SshSignature {
|
&signature.0,
|
||||||
format: server_host_key_algorithm.name().as_bytes(),
|
|
||||||
data: &signature,
|
|
||||||
}
|
|
||||||
.to_bytes(),
|
|
||||||
);
|
);
|
||||||
|
|
||||||
self.packet_transport.queue_packet(packet);
|
self.packet_transport.queue_packet(packet);
|
||||||
|
|
|
||||||
|
|
@ -333,6 +333,24 @@ impl SshPublicKey<'_> {
|
||||||
data.finish()
|
data.finish()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
#[derive(Debug)]
|
||||||
|
pub(crate) struct SshPublicKeyEcdsa<'a> {
|
||||||
|
pub(crate) format: &'a [u8],
|
||||||
|
pub(crate) ident: &'a [u8],
|
||||||
|
pub(crate) data: &'a [u8],
|
||||||
|
}
|
||||||
|
impl SshPublicKeyEcdsa<'_> {
|
||||||
|
pub(crate) fn to_bytes(&self) -> Vec<u8> {
|
||||||
|
let mut data = Writer::new();
|
||||||
|
// ECDSA-specific!
|
||||||
|
// <https://datatracker.ietf.org/doc/html/rfc5656#section-3.1>
|
||||||
|
data.string(self.format);
|
||||||
|
data.string(self.ident);
|
||||||
|
data.string(self.data);
|
||||||
|
data.finish()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub(crate) struct SshSignature<'a> {
|
pub(crate) struct SshSignature<'a> {
|
||||||
pub(crate) format: &'a [u8],
|
pub(crate) format: &'a [u8],
|
||||||
|
|
@ -349,6 +367,20 @@ impl SshSignature<'_> {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub(crate) struct SshSignatureEcdsa<'a> {
|
||||||
|
pub(crate) format: &'a [u8],
|
||||||
|
pub(crate) data: &'a [u8],
|
||||||
|
}
|
||||||
|
|
||||||
|
impl SshSignatureEcdsa<'_> {
|
||||||
|
pub(crate) fn to_bytes(&self) -> Vec<u8> {
|
||||||
|
let mut data = Writer::new();
|
||||||
|
// <https://datatracker.ietf.org/doc/html/rfc5656#section-3.1.2>
|
||||||
|
data.string(self.format);
|
||||||
|
data.finish()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
pub(crate) struct RawPacket {
|
pub(crate) struct RawPacket {
|
||||||
pub mac_len: usize,
|
pub mac_len: usize,
|
||||||
pub raw: Vec<u8>,
|
pub raw: Vec<u8>,
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue