Mercurial > dropbear
annotate cli-session.c @ 62:20563735e8b5
just checkpointing
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Tue, 10 Aug 2004 17:09:52 +0000 |
parents | 4b53a43f0082 |
children | efb5e0b335cf |
rev | line source |
---|---|
26 | 1 #include "includes.h" |
2 #include "session.h" | |
3 #include "dbutil.h" | |
4 #include "kex.h" | |
5 #include "ssh.h" | |
6 #include "packet.h" | |
62 | 7 #include "tcp-accept.h" |
8 #include "tcp-connect.h" | |
26 | 9 #include "channel.h" |
10 #include "random.h" | |
33 | 11 #include "service.h" |
40
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
12 #include "runopts.h" |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
13 #include "chansession.h" |
26 | 14 |
15 static void cli_remoteclosed(); | |
16 static void cli_sessionloop(); | |
33 | 17 static void cli_session_init(); |
40
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
18 static void cli_finished(); |
26 | 19 |
20 struct clientsession cli_ses; /* GLOBAL */ | |
21 | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
22 /* Sorted in decreasing frequency will be more efficient - data and window |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
23 * should be first */ |
26 | 24 static const packettype cli_packettypes[] = { |
25 /* TYPE, AUTHREQUIRED, FUNCTION */ | |
26 {SSH_MSG_CHANNEL_DATA, recv_msg_channel_data}, | |
27 {SSH_MSG_CHANNEL_WINDOW_ADJUST, recv_msg_channel_window_adjust}, | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
28 {SSH_MSG_USERAUTH_FAILURE, recv_msg_userauth_failure}, /* client */ |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
29 {SSH_MSG_USERAUTH_SUCCESS, recv_msg_userauth_success}, /* client */ |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
30 {SSH_MSG_KEXINIT, recv_msg_kexinit}, |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
31 {SSH_MSG_KEXDH_REPLY, recv_msg_kexdh_reply}, /* client */ |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
32 {SSH_MSG_NEWKEYS, recv_msg_newkeys}, |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
33 {SSH_MSG_SERVICE_ACCEPT, recv_msg_service_accept}, /* client */ |
26 | 34 {SSH_MSG_CHANNEL_REQUEST, recv_msg_channel_request}, |
35 {SSH_MSG_CHANNEL_OPEN, recv_msg_channel_open}, | |
36 {SSH_MSG_CHANNEL_EOF, recv_msg_channel_eof}, | |
37 {SSH_MSG_CHANNEL_CLOSE, recv_msg_channel_close}, | |
38 {SSH_MSG_CHANNEL_OPEN_CONFIRMATION, recv_msg_channel_open_confirmation}, | |
39 {SSH_MSG_CHANNEL_OPEN_FAILURE, recv_msg_channel_open_failure}, | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
40 {SSH_MSG_USERAUTH_BANNER, recv_msg_userauth_banner}, /* client */ |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
41 #ifdef DROPBEAR_PUBKEY_AUTH |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
42 {SSH_MSG_USERAUTH_PK_OK, recv_msg_userauth_pk_ok}, /* client */ |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
43 #endif |
26 | 44 {0, 0} /* End */ |
45 }; | |
46 | |
47 static const struct ChanType *cli_chantypes[] = { | |
48 /* &chan_tcpdirect etc, though need to only allow if we've requested | |
49 * that forwarding */ | |
50 NULL /* Null termination */ | |
51 }; | |
33 | 52 |
26 | 53 void cli_session(int sock, char* remotehost) { |
54 | |
55 crypto_init(); | |
56 common_session_init(sock, remotehost); | |
57 | |
58 chaninitialise(cli_chantypes); | |
59 | |
60 | |
33 | 61 /* Set up cli_ses vars */ |
62 cli_session_init(); | |
26 | 63 |
64 /* Ready to go */ | |
65 sessinitdone = 1; | |
66 | |
67 /* Exchange identification */ | |
68 session_identification(); | |
69 | |
70 seedrandom(); | |
71 | |
72 send_msg_kexinit(); | |
73 | |
74 /* XXX here we do stuff differently */ | |
75 | |
76 session_loop(cli_sessionloop); | |
77 | |
78 /* Not reached */ | |
79 | |
33 | 80 } |
26 | 81 |
33 | 82 static void cli_session_init() { |
83 | |
84 cli_ses.state = STATE_NOTHING; | |
85 cli_ses.kex_state = KEX_NOTHING; | |
86 | |
39
0883c0906870
tty raw mode support works mostly
Matt Johnston <matt@ucc.asn.au>
parents:
37
diff
changeset
|
87 cli_ses.tty_raw_mode = 0; |
41
18eccbfb9641
added window-size change handling
Matt Johnston <matt@ucc.asn.au>
parents:
40
diff
changeset
|
88 cli_ses.winchange = 0; |
39
0883c0906870
tty raw mode support works mostly
Matt Johnston <matt@ucc.asn.au>
parents:
37
diff
changeset
|
89 |
47 | 90 /* Auth */ |
91 cli_ses.lastpubkey = NULL; | |
92 cli_ses.lastauthtype = NULL; | |
93 | |
33 | 94 /* For printing "remote host closed" for the user */ |
95 ses.remoteclosed = cli_remoteclosed; | |
96 ses.buf_match_algo = cli_buf_match_algo; | |
97 | |
98 /* packet handlers */ | |
99 ses.packettypes = cli_packettypes; | |
35
0ad5fb979f42
set the isserver flag (oops)
Matt Johnston <matt@ucc.asn.au>
parents:
34
diff
changeset
|
100 |
0ad5fb979f42
set the isserver flag (oops)
Matt Johnston <matt@ucc.asn.au>
parents:
34
diff
changeset
|
101 ses.isserver = 0; |
26 | 102 } |
103 | |
33 | 104 /* This function drives the progress of the session - it initiates KEX, |
105 * service, userauth and channel requests */ | |
26 | 106 static void cli_sessionloop() { |
107 | |
33 | 108 TRACE(("enter cli_sessionloop")); |
109 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
110 if (ses.lastpacket == SSH_MSG_KEXINIT && cli_ses.kex_state == KEX_NOTHING) { |
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
111 cli_ses.kex_state = KEXINIT_RCVD; |
33 | 112 } |
113 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
114 if (cli_ses.kex_state == KEXINIT_RCVD) { |
33 | 115 |
116 /* We initiate the KEXDH. If DH wasn't the correct type, the KEXINIT | |
117 * negotiation would have failed. */ | |
118 send_msg_kexdh_init(); | |
119 cli_ses.kex_state = KEXDH_INIT_SENT; | |
120 TRACE(("leave cli_sessionloop: done with KEXINIT_RCVD")); | |
121 return; | |
122 } | |
123 | |
124 /* A KEX has finished, so we should go back to our KEX_NOTHING state */ | |
125 if (cli_ses.kex_state != KEX_NOTHING && ses.kexstate.recvkexinit == 0 | |
126 && ses.kexstate.sentkexinit == 0) { | |
127 cli_ses.kex_state = KEX_NOTHING; | |
128 } | |
129 | |
130 /* We shouldn't do anything else if a KEX is in progress */ | |
131 if (cli_ses.kex_state != KEX_NOTHING) { | |
132 TRACE(("leave cli_sessionloop: kex_state != KEX_NOTHING")); | |
133 return; | |
134 } | |
135 | |
136 /* We should exit if we haven't donefirstkex: we shouldn't reach here | |
137 * in normal operation */ | |
138 if (ses.kexstate.donefirstkex == 0) { | |
139 TRACE(("XXX XXX might be bad! leave cli_sessionloop: haven't donefirstkex")); | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
140 return; |
33 | 141 } |
142 | |
26 | 143 switch (cli_ses.state) { |
144 | |
33 | 145 case STATE_NOTHING: |
146 /* We've got the transport layer sorted, we now need to request | |
147 * userauth */ | |
148 send_msg_service_request(SSH_SERVICE_USERAUTH); | |
149 cli_ses.state = SERVICE_AUTH_REQ_SENT; | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
150 TRACE(("leave cli_sessionloop: sent userauth service req")); |
33 | 151 return; |
26 | 152 |
33 | 153 /* userauth code */ |
154 case SERVICE_AUTH_ACCEPT_RCVD: | |
155 cli_auth_getmethods(); | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
156 cli_ses.state = USERAUTH_REQ_SENT; |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
157 TRACE(("leave cli_sessionloop: sent userauth methods req")); |
33 | 158 return; |
159 | |
160 case USERAUTH_FAIL_RCVD: | |
161 cli_auth_try(); | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
162 cli_ses.state = USERAUTH_REQ_SENT; |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
163 TRACE(("leave cli_sessionloop: cli_auth_try")); |
33 | 164 return; |
165 | |
47 | 166 /* |
37 | 167 case USERAUTH_SUCCESS_RCVD: |
168 send_msg_service_request(SSH_SERVICE_CONNECTION); | |
169 cli_ses.state = SERVICE_CONN_REQ_SENT; | |
170 TRACE(("leave cli_sessionloop: sent ssh-connection service req")); | |
171 return; | |
172 | |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
173 case SERVICE_CONN_ACCEPT_RCVD: |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
174 cli_send_chansess_request(); |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
175 TRACE(("leave cli_sessionloop: cli_send_chansess_request")); |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
176 cli_ses.state = SESSION_RUNNING; |
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
177 return; |
47 | 178 */ |
45
9ee8996a375f
Pubkey auth is mostly there for the client. Something strange with
Matt Johnston <matt@ucc.asn.au>
parents:
43
diff
changeset
|
179 |
37 | 180 case USERAUTH_SUCCESS_RCVD: |
181 cli_send_chansess_request(); | |
182 TRACE(("leave cli_sessionloop: cli_send_chansess_request")); | |
183 cli_ses.state = SESSION_RUNNING; | |
184 return; | |
185 | |
40
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
186 case SESSION_RUNNING: |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
187 if (ses.chancount < 1) { |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
188 cli_finished(); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
189 } |
41
18eccbfb9641
added window-size change handling
Matt Johnston <matt@ucc.asn.au>
parents:
40
diff
changeset
|
190 |
18eccbfb9641
added window-size change handling
Matt Johnston <matt@ucc.asn.au>
parents:
40
diff
changeset
|
191 if (cli_ses.winchange) { |
18eccbfb9641
added window-size change handling
Matt Johnston <matt@ucc.asn.au>
parents:
40
diff
changeset
|
192 cli_chansess_winchange(); |
18eccbfb9641
added window-size change handling
Matt Johnston <matt@ucc.asn.au>
parents:
40
diff
changeset
|
193 } |
40
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
194 return; |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
195 |
33 | 196 /* XXX more here needed */ |
197 | |
198 | |
199 default: | |
200 break; | |
26 | 201 } |
202 | |
34
e2a1eaa19f22
Client mostly works up to password auth
Matt Johnston <matt@ucc.asn.au>
parents:
33
diff
changeset
|
203 TRACE(("leave cli_sessionloop: fell out")); |
26 | 204 |
205 } | |
206 | |
40
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
207 void cli_session_cleanup() { |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
208 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
209 if (!sessinitdone) { |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
210 return; |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
211 } |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
212 cli_tty_cleanup(); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
213 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
214 } |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
215 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
216 static void cli_finished() { |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
217 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
218 cli_session_cleanup(); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
219 common_session_cleanup(); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
220 fprintf(stderr, "Connection to %s@%s:%s closed.\n", cli_opts.username, |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
221 cli_opts.remotehost, cli_opts.remoteport); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
222 exit(EXIT_SUCCESS); |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
223 } |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
224 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
225 |
b4874d772210
- Added terminal mode handling etc for the client, and window change
Matt Johnston <matt@ucc.asn.au>
parents:
39
diff
changeset
|
226 |
26 | 227 /* called when the remote side closes the connection */ |
228 static void cli_remoteclosed() { | |
229 | |
230 /* XXX TODO perhaps print a friendlier message if we get this but have | |
231 * already sent/received disconnect message(s) ??? */ | |
232 close(ses.sock); | |
233 ses.sock = -1; | |
33 | 234 dropbear_exit("remote closed the connection"); |
26 | 235 } |
43 | 236 |
237 /* Operates in-place turning dirty (untrusted potentially containing control | |
238 * characters) text into clean text. */ | |
239 void cleantext(unsigned char* dirtytext) { | |
240 | |
241 unsigned int i, j; | |
47 | 242 unsigned char c; |
43 | 243 |
244 j = 0; | |
245 for (i = 0; dirtytext[i] != '\0'; i++) { | |
246 | |
247 c = dirtytext[i]; | |
248 /* We can ignore '\r's */ | |
249 if ( (c >= ' ' && c <= '~') || c == '\n' || c == '\t') { | |
250 dirtytext[j] = c; | |
251 j++; | |
252 } | |
253 } | |
254 /* Null terminate */ | |
255 dirtytext[j] = '\0'; | |
256 } |