You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

472 lines
12 KiB

  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "os"
  11. "strings"
  12. "testing"
  13. )
  14. type keyboardInteractive map[string]string
  15. func (cr keyboardInteractive) Challenge(user string, instruction string, questions []string, echos []bool) ([]string, error) {
  16. var answers []string
  17. for _, q := range questions {
  18. answers = append(answers, cr[q])
  19. }
  20. return answers, nil
  21. }
  22. // reused internally by tests
  23. var clientPassword = "tiger"
  24. // tryAuth runs a handshake with a given config against an SSH server
  25. // with config serverConfig
  26. func tryAuth(t *testing.T, config *ClientConfig) error {
  27. c1, c2, err := netPipe()
  28. if err != nil {
  29. t.Fatalf("netPipe: %v", err)
  30. }
  31. defer c1.Close()
  32. defer c2.Close()
  33. certChecker := CertChecker{
  34. IsAuthority: func(k PublicKey) bool {
  35. return bytes.Equal(k.Marshal(), testPublicKeys["ecdsa"].Marshal())
  36. },
  37. UserKeyFallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  38. if conn.User() == "testuser" && bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) {
  39. return nil, nil
  40. }
  41. return nil, fmt.Errorf("pubkey for %q not acceptable", conn.User())
  42. },
  43. IsRevoked: func(c *Certificate) bool {
  44. return c.Serial == 666
  45. },
  46. }
  47. serverConfig := &ServerConfig{
  48. PasswordCallback: func(conn ConnMetadata, pass []byte) (*Permissions, error) {
  49. if conn.User() == "testuser" && string(pass) == clientPassword {
  50. return nil, nil
  51. }
  52. return nil, errors.New("password auth failed")
  53. },
  54. PublicKeyCallback: certChecker.Authenticate,
  55. KeyboardInteractiveCallback: func(conn ConnMetadata, challenge KeyboardInteractiveChallenge) (*Permissions, error) {
  56. ans, err := challenge("user",
  57. "instruction",
  58. []string{"question1", "question2"},
  59. []bool{true, true})
  60. if err != nil {
  61. return nil, err
  62. }
  63. ok := conn.User() == "testuser" && ans[0] == "answer1" && ans[1] == "answer2"
  64. if ok {
  65. challenge("user", "motd", nil, nil)
  66. return nil, nil
  67. }
  68. return nil, errors.New("keyboard-interactive failed")
  69. },
  70. AuthLogCallback: func(conn ConnMetadata, method string, err error) {
  71. },
  72. }
  73. serverConfig.AddHostKey(testSigners["rsa"])
  74. go newServer(c1, serverConfig)
  75. _, _, _, err = NewClientConn(c2, "", config)
  76. return err
  77. }
  78. func TestClientAuthPublicKey(t *testing.T) {
  79. config := &ClientConfig{
  80. User: "testuser",
  81. Auth: []AuthMethod{
  82. PublicKeys(testSigners["rsa"]),
  83. },
  84. }
  85. if err := tryAuth(t, config); err != nil {
  86. t.Fatalf("unable to dial remote side: %s", err)
  87. }
  88. }
  89. func TestAuthMethodPassword(t *testing.T) {
  90. config := &ClientConfig{
  91. User: "testuser",
  92. Auth: []AuthMethod{
  93. Password(clientPassword),
  94. },
  95. }
  96. if err := tryAuth(t, config); err != nil {
  97. t.Fatalf("unable to dial remote side: %s", err)
  98. }
  99. }
  100. func TestAuthMethodFallback(t *testing.T) {
  101. var passwordCalled bool
  102. config := &ClientConfig{
  103. User: "testuser",
  104. Auth: []AuthMethod{
  105. PublicKeys(testSigners["rsa"]),
  106. PasswordCallback(
  107. func() (string, error) {
  108. passwordCalled = true
  109. return "WRONG", nil
  110. }),
  111. },
  112. }
  113. if err := tryAuth(t, config); err != nil {
  114. t.Fatalf("unable to dial remote side: %s", err)
  115. }
  116. if passwordCalled {
  117. t.Errorf("password auth tried before public-key auth.")
  118. }
  119. }
  120. func TestAuthMethodWrongPassword(t *testing.T) {
  121. config := &ClientConfig{
  122. User: "testuser",
  123. Auth: []AuthMethod{
  124. Password("wrong"),
  125. PublicKeys(testSigners["rsa"]),
  126. },
  127. }
  128. if err := tryAuth(t, config); err != nil {
  129. t.Fatalf("unable to dial remote side: %s", err)
  130. }
  131. }
  132. func TestAuthMethodKeyboardInteractive(t *testing.T) {
  133. answers := keyboardInteractive(map[string]string{
  134. "question1": "answer1",
  135. "question2": "answer2",
  136. })
  137. config := &ClientConfig{
  138. User: "testuser",
  139. Auth: []AuthMethod{
  140. KeyboardInteractive(answers.Challenge),
  141. },
  142. }
  143. if err := tryAuth(t, config); err != nil {
  144. t.Fatalf("unable to dial remote side: %s", err)
  145. }
  146. }
  147. func TestAuthMethodWrongKeyboardInteractive(t *testing.T) {
  148. answers := keyboardInteractive(map[string]string{
  149. "question1": "answer1",
  150. "question2": "WRONG",
  151. })
  152. config := &ClientConfig{
  153. User: "testuser",
  154. Auth: []AuthMethod{
  155. KeyboardInteractive(answers.Challenge),
  156. },
  157. }
  158. if err := tryAuth(t, config); err == nil {
  159. t.Fatalf("wrong answers should not have authenticated with KeyboardInteractive")
  160. }
  161. }
  162. // the mock server will only authenticate ssh-rsa keys
  163. func TestAuthMethodInvalidPublicKey(t *testing.T) {
  164. config := &ClientConfig{
  165. User: "testuser",
  166. Auth: []AuthMethod{
  167. PublicKeys(testSigners["dsa"]),
  168. },
  169. }
  170. if err := tryAuth(t, config); err == nil {
  171. t.Fatalf("dsa private key should not have authenticated with rsa public key")
  172. }
  173. }
  174. // the client should authenticate with the second key
  175. func TestAuthMethodRSAandDSA(t *testing.T) {
  176. config := &ClientConfig{
  177. User: "testuser",
  178. Auth: []AuthMethod{
  179. PublicKeys(testSigners["dsa"], testSigners["rsa"]),
  180. },
  181. }
  182. if err := tryAuth(t, config); err != nil {
  183. t.Fatalf("client could not authenticate with rsa key: %v", err)
  184. }
  185. }
  186. func TestClientHMAC(t *testing.T) {
  187. for _, mac := range supportedMACs {
  188. config := &ClientConfig{
  189. User: "testuser",
  190. Auth: []AuthMethod{
  191. PublicKeys(testSigners["rsa"]),
  192. },
  193. Config: Config{
  194. MACs: []string{mac},
  195. },
  196. }
  197. if err := tryAuth(t, config); err != nil {
  198. t.Fatalf("client could not authenticate with mac algo %s: %v", mac, err)
  199. }
  200. }
  201. }
  202. // issue 4285.
  203. func TestClientUnsupportedCipher(t *testing.T) {
  204. config := &ClientConfig{
  205. User: "testuser",
  206. Auth: []AuthMethod{
  207. PublicKeys(),
  208. },
  209. Config: Config{
  210. Ciphers: []string{"aes128-cbc"}, // not currently supported
  211. },
  212. }
  213. if err := tryAuth(t, config); err == nil {
  214. t.Errorf("expected no ciphers in common")
  215. }
  216. }
  217. func TestClientUnsupportedKex(t *testing.T) {
  218. if os.Getenv("GO_BUILDER_NAME") != "" {
  219. t.Skip("skipping known-flaky test on the Go build dashboard; see golang.org/issue/15198")
  220. }
  221. config := &ClientConfig{
  222. User: "testuser",
  223. Auth: []AuthMethod{
  224. PublicKeys(),
  225. },
  226. Config: Config{
  227. KeyExchanges: []string{"diffie-hellman-group-exchange-sha256"}, // not currently supported
  228. },
  229. }
  230. if err := tryAuth(t, config); err == nil || !strings.Contains(err.Error(), "common algorithm") {
  231. t.Errorf("got %v, expected 'common algorithm'", err)
  232. }
  233. }
  234. func TestClientLoginCert(t *testing.T) {
  235. cert := &Certificate{
  236. Key: testPublicKeys["rsa"],
  237. ValidBefore: CertTimeInfinity,
  238. CertType: UserCert,
  239. }
  240. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  241. certSigner, err := NewCertSigner(cert, testSigners["rsa"])
  242. if err != nil {
  243. t.Fatalf("NewCertSigner: %v", err)
  244. }
  245. clientConfig := &ClientConfig{
  246. User: "user",
  247. }
  248. clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner))
  249. // should succeed
  250. if err := tryAuth(t, clientConfig); err != nil {
  251. t.Errorf("cert login failed: %v", err)
  252. }
  253. // corrupted signature
  254. cert.Signature.Blob[0]++
  255. if err := tryAuth(t, clientConfig); err == nil {
  256. t.Errorf("cert login passed with corrupted sig")
  257. }
  258. // revoked
  259. cert.Serial = 666
  260. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  261. if err := tryAuth(t, clientConfig); err == nil {
  262. t.Errorf("revoked cert login succeeded")
  263. }
  264. cert.Serial = 1
  265. // sign with wrong key
  266. cert.SignCert(rand.Reader, testSigners["dsa"])
  267. if err := tryAuth(t, clientConfig); err == nil {
  268. t.Errorf("cert login passed with non-authoritative key")
  269. }
  270. // host cert
  271. cert.CertType = HostCert
  272. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  273. if err := tryAuth(t, clientConfig); err == nil {
  274. t.Errorf("cert login passed with wrong type")
  275. }
  276. cert.CertType = UserCert
  277. // principal specified
  278. cert.ValidPrincipals = []string{"user"}
  279. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  280. if err := tryAuth(t, clientConfig); err != nil {
  281. t.Errorf("cert login failed: %v", err)
  282. }
  283. // wrong principal specified
  284. cert.ValidPrincipals = []string{"fred"}
  285. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  286. if err := tryAuth(t, clientConfig); err == nil {
  287. t.Errorf("cert login passed with wrong principal")
  288. }
  289. cert.ValidPrincipals = nil
  290. // added critical option
  291. cert.CriticalOptions = map[string]string{"root-access": "yes"}
  292. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  293. if err := tryAuth(t, clientConfig); err == nil {
  294. t.Errorf("cert login passed with unrecognized critical option")
  295. }
  296. // allowed source address
  297. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42/24,::42/120"}
  298. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  299. if err := tryAuth(t, clientConfig); err != nil {
  300. t.Errorf("cert login with source-address failed: %v", err)
  301. }
  302. // disallowed source address
  303. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42,::42"}
  304. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  305. if err := tryAuth(t, clientConfig); err == nil {
  306. t.Errorf("cert login with source-address succeeded")
  307. }
  308. }
  309. func testPermissionsPassing(withPermissions bool, t *testing.T) {
  310. serverConfig := &ServerConfig{
  311. PublicKeyCallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  312. if conn.User() == "nopermissions" {
  313. return nil, nil
  314. } else {
  315. return &Permissions{}, nil
  316. }
  317. },
  318. }
  319. serverConfig.AddHostKey(testSigners["rsa"])
  320. clientConfig := &ClientConfig{
  321. Auth: []AuthMethod{
  322. PublicKeys(testSigners["rsa"]),
  323. },
  324. }
  325. if withPermissions {
  326. clientConfig.User = "permissions"
  327. } else {
  328. clientConfig.User = "nopermissions"
  329. }
  330. c1, c2, err := netPipe()
  331. if err != nil {
  332. t.Fatalf("netPipe: %v", err)
  333. }
  334. defer c1.Close()
  335. defer c2.Close()
  336. go NewClientConn(c2, "", clientConfig)
  337. serverConn, err := newServer(c1, serverConfig)
  338. if err != nil {
  339. t.Fatal(err)
  340. }
  341. if p := serverConn.Permissions; (p != nil) != withPermissions {
  342. t.Fatalf("withPermissions is %t, but Permissions object is %#v", withPermissions, p)
  343. }
  344. }
  345. func TestPermissionsPassing(t *testing.T) {
  346. testPermissionsPassing(true, t)
  347. }
  348. func TestNoPermissionsPassing(t *testing.T) {
  349. testPermissionsPassing(false, t)
  350. }
  351. func TestRetryableAuth(t *testing.T) {
  352. n := 0
  353. passwords := []string{"WRONG1", "WRONG2"}
  354. config := &ClientConfig{
  355. User: "testuser",
  356. Auth: []AuthMethod{
  357. RetryableAuthMethod(PasswordCallback(func() (string, error) {
  358. p := passwords[n]
  359. n++
  360. return p, nil
  361. }), 2),
  362. PublicKeys(testSigners["rsa"]),
  363. },
  364. }
  365. if err := tryAuth(t, config); err != nil {
  366. t.Fatalf("unable to dial remote side: %s", err)
  367. }
  368. if n != 2 {
  369. t.Fatalf("Did not try all passwords")
  370. }
  371. }
  372. func ExampleRetryableAuthMethod(t *testing.T) {
  373. user := "testuser"
  374. NumberOfPrompts := 3
  375. // Normally this would be a callback that prompts the user to answer the
  376. // provided questions
  377. Cb := func(user, instruction string, questions []string, echos []bool) (answers []string, err error) {
  378. return []string{"answer1", "answer2"}, nil
  379. }
  380. config := &ClientConfig{
  381. User: user,
  382. Auth: []AuthMethod{
  383. RetryableAuthMethod(KeyboardInteractiveChallenge(Cb), NumberOfPrompts),
  384. },
  385. }
  386. if err := tryAuth(t, config); err != nil {
  387. t.Fatalf("unable to dial remote side: %s", err)
  388. }
  389. }
  390. // Test if username is received on server side when NoClientAuth is used
  391. func TestClientAuthNone(t *testing.T) {
  392. user := "testuser"
  393. serverConfig := &ServerConfig{
  394. NoClientAuth: true,
  395. }
  396. serverConfig.AddHostKey(testSigners["rsa"])
  397. clientConfig := &ClientConfig{
  398. User: user,
  399. }
  400. c1, c2, err := netPipe()
  401. if err != nil {
  402. t.Fatalf("netPipe: %v", err)
  403. }
  404. defer c1.Close()
  405. defer c2.Close()
  406. go NewClientConn(c2, "", clientConfig)
  407. serverConn, err := newServer(c1, serverConfig)
  408. if err != nil {
  409. t.Fatalf("newServer: %v", err)
  410. }
  411. if serverConn.User() != user {
  412. t.Fatalf("server: got %q, want %q", serverConn.User(), user)
  413. }
  414. }