You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

629 lines
16 KiB

  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "os"
  11. "strings"
  12. "testing"
  13. )
  14. type keyboardInteractive map[string]string
  15. func (cr keyboardInteractive) Challenge(user string, instruction string, questions []string, echos []bool) ([]string, error) {
  16. var answers []string
  17. for _, q := range questions {
  18. answers = append(answers, cr[q])
  19. }
  20. return answers, nil
  21. }
  22. // reused internally by tests
  23. var clientPassword = "tiger"
  24. // tryAuth runs a handshake with a given config against an SSH server
  25. // with config serverConfig
  26. func tryAuth(t *testing.T, config *ClientConfig) error {
  27. c1, c2, err := netPipe()
  28. if err != nil {
  29. t.Fatalf("netPipe: %v", err)
  30. }
  31. defer c1.Close()
  32. defer c2.Close()
  33. certChecker := CertChecker{
  34. IsUserAuthority: func(k PublicKey) bool {
  35. return bytes.Equal(k.Marshal(), testPublicKeys["ecdsa"].Marshal())
  36. },
  37. UserKeyFallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  38. if conn.User() == "testuser" && bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) {
  39. return nil, nil
  40. }
  41. return nil, fmt.Errorf("pubkey for %q not acceptable", conn.User())
  42. },
  43. IsRevoked: func(c *Certificate) bool {
  44. return c.Serial == 666
  45. },
  46. }
  47. serverConfig := &ServerConfig{
  48. PasswordCallback: func(conn ConnMetadata, pass []byte) (*Permissions, error) {
  49. if conn.User() == "testuser" && string(pass) == clientPassword {
  50. return nil, nil
  51. }
  52. return nil, errors.New("password auth failed")
  53. },
  54. PublicKeyCallback: certChecker.Authenticate,
  55. KeyboardInteractiveCallback: func(conn ConnMetadata, challenge KeyboardInteractiveChallenge) (*Permissions, error) {
  56. ans, err := challenge("user",
  57. "instruction",
  58. []string{"question1", "question2"},
  59. []bool{true, true})
  60. if err != nil {
  61. return nil, err
  62. }
  63. ok := conn.User() == "testuser" && ans[0] == "answer1" && ans[1] == "answer2"
  64. if ok {
  65. challenge("user", "motd", nil, nil)
  66. return nil, nil
  67. }
  68. return nil, errors.New("keyboard-interactive failed")
  69. },
  70. }
  71. serverConfig.AddHostKey(testSigners["rsa"])
  72. go newServer(c1, serverConfig)
  73. _, _, _, err = NewClientConn(c2, "", config)
  74. return err
  75. }
  76. func TestClientAuthPublicKey(t *testing.T) {
  77. config := &ClientConfig{
  78. User: "testuser",
  79. Auth: []AuthMethod{
  80. PublicKeys(testSigners["rsa"]),
  81. },
  82. HostKeyCallback: InsecureIgnoreHostKey(),
  83. }
  84. if err := tryAuth(t, config); err != nil {
  85. t.Fatalf("unable to dial remote side: %s", err)
  86. }
  87. }
  88. func TestAuthMethodPassword(t *testing.T) {
  89. config := &ClientConfig{
  90. User: "testuser",
  91. Auth: []AuthMethod{
  92. Password(clientPassword),
  93. },
  94. HostKeyCallback: InsecureIgnoreHostKey(),
  95. }
  96. if err := tryAuth(t, config); err != nil {
  97. t.Fatalf("unable to dial remote side: %s", err)
  98. }
  99. }
  100. func TestAuthMethodFallback(t *testing.T) {
  101. var passwordCalled bool
  102. config := &ClientConfig{
  103. User: "testuser",
  104. Auth: []AuthMethod{
  105. PublicKeys(testSigners["rsa"]),
  106. PasswordCallback(
  107. func() (string, error) {
  108. passwordCalled = true
  109. return "WRONG", nil
  110. }),
  111. },
  112. HostKeyCallback: InsecureIgnoreHostKey(),
  113. }
  114. if err := tryAuth(t, config); err != nil {
  115. t.Fatalf("unable to dial remote side: %s", err)
  116. }
  117. if passwordCalled {
  118. t.Errorf("password auth tried before public-key auth.")
  119. }
  120. }
  121. func TestAuthMethodWrongPassword(t *testing.T) {
  122. config := &ClientConfig{
  123. User: "testuser",
  124. Auth: []AuthMethod{
  125. Password("wrong"),
  126. PublicKeys(testSigners["rsa"]),
  127. },
  128. HostKeyCallback: InsecureIgnoreHostKey(),
  129. }
  130. if err := tryAuth(t, config); err != nil {
  131. t.Fatalf("unable to dial remote side: %s", err)
  132. }
  133. }
  134. func TestAuthMethodKeyboardInteractive(t *testing.T) {
  135. answers := keyboardInteractive(map[string]string{
  136. "question1": "answer1",
  137. "question2": "answer2",
  138. })
  139. config := &ClientConfig{
  140. User: "testuser",
  141. Auth: []AuthMethod{
  142. KeyboardInteractive(answers.Challenge),
  143. },
  144. HostKeyCallback: InsecureIgnoreHostKey(),
  145. }
  146. if err := tryAuth(t, config); err != nil {
  147. t.Fatalf("unable to dial remote side: %s", err)
  148. }
  149. }
  150. func TestAuthMethodWrongKeyboardInteractive(t *testing.T) {
  151. answers := keyboardInteractive(map[string]string{
  152. "question1": "answer1",
  153. "question2": "WRONG",
  154. })
  155. config := &ClientConfig{
  156. User: "testuser",
  157. Auth: []AuthMethod{
  158. KeyboardInteractive(answers.Challenge),
  159. },
  160. }
  161. if err := tryAuth(t, config); err == nil {
  162. t.Fatalf("wrong answers should not have authenticated with KeyboardInteractive")
  163. }
  164. }
  165. // the mock server will only authenticate ssh-rsa keys
  166. func TestAuthMethodInvalidPublicKey(t *testing.T) {
  167. config := &ClientConfig{
  168. User: "testuser",
  169. Auth: []AuthMethod{
  170. PublicKeys(testSigners["dsa"]),
  171. },
  172. }
  173. if err := tryAuth(t, config); err == nil {
  174. t.Fatalf("dsa private key should not have authenticated with rsa public key")
  175. }
  176. }
  177. // the client should authenticate with the second key
  178. func TestAuthMethodRSAandDSA(t *testing.T) {
  179. config := &ClientConfig{
  180. User: "testuser",
  181. Auth: []AuthMethod{
  182. PublicKeys(testSigners["dsa"], testSigners["rsa"]),
  183. },
  184. HostKeyCallback: InsecureIgnoreHostKey(),
  185. }
  186. if err := tryAuth(t, config); err != nil {
  187. t.Fatalf("client could not authenticate with rsa key: %v", err)
  188. }
  189. }
  190. func TestClientHMAC(t *testing.T) {
  191. for _, mac := range supportedMACs {
  192. config := &ClientConfig{
  193. User: "testuser",
  194. Auth: []AuthMethod{
  195. PublicKeys(testSigners["rsa"]),
  196. },
  197. Config: Config{
  198. MACs: []string{mac},
  199. },
  200. HostKeyCallback: InsecureIgnoreHostKey(),
  201. }
  202. if err := tryAuth(t, config); err != nil {
  203. t.Fatalf("client could not authenticate with mac algo %s: %v", mac, err)
  204. }
  205. }
  206. }
  207. // issue 4285.
  208. func TestClientUnsupportedCipher(t *testing.T) {
  209. config := &ClientConfig{
  210. User: "testuser",
  211. Auth: []AuthMethod{
  212. PublicKeys(),
  213. },
  214. Config: Config{
  215. Ciphers: []string{"aes128-cbc"}, // not currently supported
  216. },
  217. }
  218. if err := tryAuth(t, config); err == nil {
  219. t.Errorf("expected no ciphers in common")
  220. }
  221. }
  222. func TestClientUnsupportedKex(t *testing.T) {
  223. if os.Getenv("GO_BUILDER_NAME") != "" {
  224. t.Skip("skipping known-flaky test on the Go build dashboard; see golang.org/issue/15198")
  225. }
  226. config := &ClientConfig{
  227. User: "testuser",
  228. Auth: []AuthMethod{
  229. PublicKeys(),
  230. },
  231. Config: Config{
  232. KeyExchanges: []string{"diffie-hellman-group-exchange-sha256"}, // not currently supported
  233. },
  234. HostKeyCallback: InsecureIgnoreHostKey(),
  235. }
  236. if err := tryAuth(t, config); err == nil || !strings.Contains(err.Error(), "common algorithm") {
  237. t.Errorf("got %v, expected 'common algorithm'", err)
  238. }
  239. }
  240. func TestClientLoginCert(t *testing.T) {
  241. cert := &Certificate{
  242. Key: testPublicKeys["rsa"],
  243. ValidBefore: CertTimeInfinity,
  244. CertType: UserCert,
  245. }
  246. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  247. certSigner, err := NewCertSigner(cert, testSigners["rsa"])
  248. if err != nil {
  249. t.Fatalf("NewCertSigner: %v", err)
  250. }
  251. clientConfig := &ClientConfig{
  252. User: "user",
  253. HostKeyCallback: InsecureIgnoreHostKey(),
  254. }
  255. clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner))
  256. // should succeed
  257. if err := tryAuth(t, clientConfig); err != nil {
  258. t.Errorf("cert login failed: %v", err)
  259. }
  260. // corrupted signature
  261. cert.Signature.Blob[0]++
  262. if err := tryAuth(t, clientConfig); err == nil {
  263. t.Errorf("cert login passed with corrupted sig")
  264. }
  265. // revoked
  266. cert.Serial = 666
  267. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  268. if err := tryAuth(t, clientConfig); err == nil {
  269. t.Errorf("revoked cert login succeeded")
  270. }
  271. cert.Serial = 1
  272. // sign with wrong key
  273. cert.SignCert(rand.Reader, testSigners["dsa"])
  274. if err := tryAuth(t, clientConfig); err == nil {
  275. t.Errorf("cert login passed with non-authoritative key")
  276. }
  277. // host cert
  278. cert.CertType = HostCert
  279. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  280. if err := tryAuth(t, clientConfig); err == nil {
  281. t.Errorf("cert login passed with wrong type")
  282. }
  283. cert.CertType = UserCert
  284. // principal specified
  285. cert.ValidPrincipals = []string{"user"}
  286. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  287. if err := tryAuth(t, clientConfig); err != nil {
  288. t.Errorf("cert login failed: %v", err)
  289. }
  290. // wrong principal specified
  291. cert.ValidPrincipals = []string{"fred"}
  292. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  293. if err := tryAuth(t, clientConfig); err == nil {
  294. t.Errorf("cert login passed with wrong principal")
  295. }
  296. cert.ValidPrincipals = nil
  297. // added critical option
  298. cert.CriticalOptions = map[string]string{"root-access": "yes"}
  299. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  300. if err := tryAuth(t, clientConfig); err == nil {
  301. t.Errorf("cert login passed with unrecognized critical option")
  302. }
  303. // allowed source address
  304. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42/24,::42/120"}
  305. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  306. if err := tryAuth(t, clientConfig); err != nil {
  307. t.Errorf("cert login with source-address failed: %v", err)
  308. }
  309. // disallowed source address
  310. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42,::42"}
  311. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  312. if err := tryAuth(t, clientConfig); err == nil {
  313. t.Errorf("cert login with source-address succeeded")
  314. }
  315. }
  316. func testPermissionsPassing(withPermissions bool, t *testing.T) {
  317. serverConfig := &ServerConfig{
  318. PublicKeyCallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  319. if conn.User() == "nopermissions" {
  320. return nil, nil
  321. }
  322. return &Permissions{}, nil
  323. },
  324. }
  325. serverConfig.AddHostKey(testSigners["rsa"])
  326. clientConfig := &ClientConfig{
  327. Auth: []AuthMethod{
  328. PublicKeys(testSigners["rsa"]),
  329. },
  330. HostKeyCallback: InsecureIgnoreHostKey(),
  331. }
  332. if withPermissions {
  333. clientConfig.User = "permissions"
  334. } else {
  335. clientConfig.User = "nopermissions"
  336. }
  337. c1, c2, err := netPipe()
  338. if err != nil {
  339. t.Fatalf("netPipe: %v", err)
  340. }
  341. defer c1.Close()
  342. defer c2.Close()
  343. go NewClientConn(c2, "", clientConfig)
  344. serverConn, err := newServer(c1, serverConfig)
  345. if err != nil {
  346. t.Fatal(err)
  347. }
  348. if p := serverConn.Permissions; (p != nil) != withPermissions {
  349. t.Fatalf("withPermissions is %t, but Permissions object is %#v", withPermissions, p)
  350. }
  351. }
  352. func TestPermissionsPassing(t *testing.T) {
  353. testPermissionsPassing(true, t)
  354. }
  355. func TestNoPermissionsPassing(t *testing.T) {
  356. testPermissionsPassing(false, t)
  357. }
  358. func TestRetryableAuth(t *testing.T) {
  359. n := 0
  360. passwords := []string{"WRONG1", "WRONG2"}
  361. config := &ClientConfig{
  362. User: "testuser",
  363. Auth: []AuthMethod{
  364. RetryableAuthMethod(PasswordCallback(func() (string, error) {
  365. p := passwords[n]
  366. n++
  367. return p, nil
  368. }), 2),
  369. PublicKeys(testSigners["rsa"]),
  370. },
  371. HostKeyCallback: InsecureIgnoreHostKey(),
  372. }
  373. if err := tryAuth(t, config); err != nil {
  374. t.Fatalf("unable to dial remote side: %s", err)
  375. }
  376. if n != 2 {
  377. t.Fatalf("Did not try all passwords")
  378. }
  379. }
  380. func ExampleRetryableAuthMethod(t *testing.T) {
  381. user := "testuser"
  382. NumberOfPrompts := 3
  383. // Normally this would be a callback that prompts the user to answer the
  384. // provided questions
  385. Cb := func(user, instruction string, questions []string, echos []bool) (answers []string, err error) {
  386. return []string{"answer1", "answer2"}, nil
  387. }
  388. config := &ClientConfig{
  389. HostKeyCallback: InsecureIgnoreHostKey(),
  390. User: user,
  391. Auth: []AuthMethod{
  392. RetryableAuthMethod(KeyboardInteractiveChallenge(Cb), NumberOfPrompts),
  393. },
  394. }
  395. if err := tryAuth(t, config); err != nil {
  396. t.Fatalf("unable to dial remote side: %s", err)
  397. }
  398. }
  399. // Test if username is received on server side when NoClientAuth is used
  400. func TestClientAuthNone(t *testing.T) {
  401. user := "testuser"
  402. serverConfig := &ServerConfig{
  403. NoClientAuth: true,
  404. }
  405. serverConfig.AddHostKey(testSigners["rsa"])
  406. clientConfig := &ClientConfig{
  407. User: user,
  408. HostKeyCallback: InsecureIgnoreHostKey(),
  409. }
  410. c1, c2, err := netPipe()
  411. if err != nil {
  412. t.Fatalf("netPipe: %v", err)
  413. }
  414. defer c1.Close()
  415. defer c2.Close()
  416. go NewClientConn(c2, "", clientConfig)
  417. serverConn, err := newServer(c1, serverConfig)
  418. if err != nil {
  419. t.Fatalf("newServer: %v", err)
  420. }
  421. if serverConn.User() != user {
  422. t.Fatalf("server: got %q, want %q", serverConn.User(), user)
  423. }
  424. }
  425. // Test if authentication attempts are limited on server when MaxAuthTries is set
  426. func TestClientAuthMaxAuthTries(t *testing.T) {
  427. user := "testuser"
  428. serverConfig := &ServerConfig{
  429. MaxAuthTries: 2,
  430. PasswordCallback: func(conn ConnMetadata, pass []byte) (*Permissions, error) {
  431. if conn.User() == "testuser" && string(pass) == "right" {
  432. return nil, nil
  433. }
  434. return nil, errors.New("password auth failed")
  435. },
  436. }
  437. serverConfig.AddHostKey(testSigners["rsa"])
  438. expectedErr := fmt.Errorf("ssh: handshake failed: %v", &disconnectMsg{
  439. Reason: 2,
  440. Message: "too many authentication failures",
  441. })
  442. for tries := 2; tries < 4; tries++ {
  443. n := tries
  444. clientConfig := &ClientConfig{
  445. User: user,
  446. Auth: []AuthMethod{
  447. RetryableAuthMethod(PasswordCallback(func() (string, error) {
  448. n--
  449. if n == 0 {
  450. return "right", nil
  451. }
  452. return "wrong", nil
  453. }), tries),
  454. },
  455. HostKeyCallback: InsecureIgnoreHostKey(),
  456. }
  457. c1, c2, err := netPipe()
  458. if err != nil {
  459. t.Fatalf("netPipe: %v", err)
  460. }
  461. defer c1.Close()
  462. defer c2.Close()
  463. go newServer(c1, serverConfig)
  464. _, _, _, err = NewClientConn(c2, "", clientConfig)
  465. if tries > 2 {
  466. if err == nil {
  467. t.Fatalf("client: got no error, want %s", expectedErr)
  468. } else if err.Error() != expectedErr.Error() {
  469. t.Fatalf("client: got %s, want %s", err, expectedErr)
  470. }
  471. } else {
  472. if err != nil {
  473. t.Fatalf("client: got %s, want no error", err)
  474. }
  475. }
  476. }
  477. }
  478. // Test if authentication attempts are correctly limited on server
  479. // when more public keys are provided then MaxAuthTries
  480. func TestClientAuthMaxAuthTriesPublicKey(t *testing.T) {
  481. signers := []Signer{}
  482. for i := 0; i < 6; i++ {
  483. signers = append(signers, testSigners["dsa"])
  484. }
  485. validConfig := &ClientConfig{
  486. User: "testuser",
  487. Auth: []AuthMethod{
  488. PublicKeys(append([]Signer{testSigners["rsa"]}, signers...)...),
  489. },
  490. HostKeyCallback: InsecureIgnoreHostKey(),
  491. }
  492. if err := tryAuth(t, validConfig); err != nil {
  493. t.Fatalf("unable to dial remote side: %s", err)
  494. }
  495. expectedErr := fmt.Errorf("ssh: handshake failed: %v", &disconnectMsg{
  496. Reason: 2,
  497. Message: "too many authentication failures",
  498. })
  499. invalidConfig := &ClientConfig{
  500. User: "testuser",
  501. Auth: []AuthMethod{
  502. PublicKeys(append(signers, testSigners["rsa"])...),
  503. },
  504. HostKeyCallback: InsecureIgnoreHostKey(),
  505. }
  506. if err := tryAuth(t, invalidConfig); err == nil {
  507. t.Fatalf("client: got no error, want %s", expectedErr)
  508. } else if err.Error() != expectedErr.Error() {
  509. t.Fatalf("client: got %s, want %s", err, expectedErr)
  510. }
  511. }
  512. // Test whether authentication errors are being properly logged if all
  513. // authentication methods have been exhausted
  514. func TestClientAuthErrorList(t *testing.T) {
  515. publicKeyErr := errors.New("This is an error from PublicKeyCallback")
  516. clientConfig := &ClientConfig{
  517. Auth: []AuthMethod{
  518. PublicKeys(testSigners["rsa"]),
  519. },
  520. HostKeyCallback: InsecureIgnoreHostKey(),
  521. }
  522. serverConfig := &ServerConfig{
  523. PublicKeyCallback: func(_ ConnMetadata, _ PublicKey) (*Permissions, error) {
  524. return nil, publicKeyErr
  525. },
  526. }
  527. serverConfig.AddHostKey(testSigners["rsa"])
  528. c1, c2, err := netPipe()
  529. if err != nil {
  530. t.Fatalf("netPipe: %v", err)
  531. }
  532. defer c1.Close()
  533. defer c2.Close()
  534. go NewClientConn(c2, "", clientConfig)
  535. _, err = newServer(c1, serverConfig)
  536. if err == nil {
  537. t.Fatal("newServer: got nil, expected errors")
  538. }
  539. authErrs, ok := err.(*ServerAuthError)
  540. if !ok {
  541. t.Fatalf("errors: got %T, want *ssh.ServerAuthError", err)
  542. }
  543. for i, e := range authErrs.Errors {
  544. switch i {
  545. case 0:
  546. if e != ErrNoAuth {
  547. t.Fatalf("errors: got error %v, want ErrNoAuth", e)
  548. }
  549. case 1:
  550. if e != publicKeyErr {
  551. t.Fatalf("errors: got %v, want %v", e, publicKeyErr)
  552. }
  553. default:
  554. t.Fatalf("errors: got %v, expected 2 errors", authErrs.Errors)
  555. }
  556. }
  557. }