summaryrefslogtreecommitdiff
path: root/src/session.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/session.h')
-rw-r--r--src/session.h352
1 files changed, 352 insertions, 0 deletions
diff --git a/src/session.h b/src/session.h
new file mode 100644
index 0000000..6706592
--- /dev/null
+++ b/src/session.h
@@ -0,0 +1,352 @@
+/*
+ * Dropbear - a SSH2 server
+ *
+ * Copyright (c) 2002,2003 Matt Johnston
+ * All rights reserved.
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining a copy
+ * of this software and associated documentation files (the "Software"), to deal
+ * in the Software without restriction, including without limitation the rights
+ * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+ * copies of the Software, and to permit persons to whom the Software is
+ * furnished to do so, subject to the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be included in
+ * all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+ * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+ * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+ * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+ * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+ * SOFTWARE. */
+
+#ifndef DROPBEAR_SESSION_H_
+#define DROPBEAR_SESSION_H_
+
+#include "includes.h"
+#include "buffer.h"
+#include "signkey.h"
+#include "kex.h"
+#include "auth.h"
+#include "channel.h"
+#include "queue.h"
+#include "listener.h"
+#include "packet.h"
+#include "tcpfwd.h"
+#include "chansession.h"
+#include "dbutil.h"
+#include "netio.h"
+#if DROPBEAR_PLUGIN
+#include "pubkeyapi.h"
+#endif
+#include "gcm.h"
+#include "chachapoly.h"
+
+void common_session_init(int sock_in, int sock_out);
+void session_loop(void(*loophandler)(void)) ATTRIB_NORETURN;
+void session_cleanup(void);
+void send_session_identification(void);
+void send_msg_ignore(void);
+void ignore_recv_response(void);
+
+void update_channel_prio(void);
+
+const char* get_user_shell(void);
+void fill_passwd(const char* username);
+
+/* Server */
+void svr_session(int sock, int childpipe) ATTRIB_NORETURN;
+void svr_dropbear_exit(int exitcode, const char* format, va_list param) ATTRIB_NORETURN;
+void svr_dropbear_log(int priority, const char* format, va_list param);
+
+/* Client */
+void cli_session(int sock_in, int sock_out, struct dropbear_progress_connection *progress, pid_t proxy_cmd_pid) ATTRIB_NORETURN;
+void cli_connected(int result, int sock, void* userdata, const char *errstring);
+void cli_dropbear_exit(int exitcode, const char* format, va_list param) ATTRIB_NORETURN;
+void cli_dropbear_log(int priority, const char* format, va_list param);
+void cleantext(char* dirtytext);
+void kill_proxy_command(void);
+
+/* crypto parameters that are stored individually for transmit and receive */
+struct key_context_directional {
+ const struct dropbear_cipher *algo_crypt;
+ const struct dropbear_cipher_mode *crypt_mode;
+ const struct dropbear_hash *algo_mac;
+ int hash_index; /* lookup for libtomcrypt */
+ int algo_comp; /* compression */
+#ifndef DISABLE_ZLIB
+ z_streamp zstream;
+#endif
+ /* actual keys */
+ union {
+#if DROPBEAR_ENABLE_CBC_MODE
+ symmetric_CBC cbc;
+#endif
+#if DROPBEAR_ENABLE_CTR_MODE
+ symmetric_CTR ctr;
+#endif
+#if DROPBEAR_ENABLE_GCM_MODE
+ dropbear_gcm_state gcm;
+#endif
+#if DROPBEAR_CHACHA20POLY1305
+ dropbear_chachapoly_state chachapoly;
+#endif
+ } cipher_state;
+ unsigned char mackey[MAX_MAC_LEN];
+ int valid;
+};
+
+struct key_context {
+
+ struct key_context_directional recv;
+ struct key_context_directional trans;
+
+ const struct dropbear_kex *algo_kex;
+ enum signkey_type algo_hostkey; /* server key type */
+ enum signature_type algo_signature; /* server signature type */
+
+ int allow_compress; /* whether compression has started (useful in
+ zlib@openssh.com delayed compression case) */
+};
+
+struct packetlist;
+struct packetlist {
+ struct packetlist *next;
+ buffer * payload;
+};
+
+struct sshsession {
+
+ /* Is it a client or server? */
+ unsigned char isserver;
+
+ time_t connect_time; /* time the connection was established
+ (cleared after auth once we're not
+ respecting AUTH_TIMEOUT any more).
+ A monotonic time, not realworld */
+
+ int sock_in;
+ int sock_out;
+
+ /* remotehost will be initially NULL as we delay
+ * reading the remote version string. it will be set
+ * by the time any recv_() packet methods are called */
+ char *remoteident;
+
+ int maxfd; /* the maximum file descriptor to check with select() */
+
+
+ /* Packet buffers/values etc */
+ buffer *writepayload; /* Unencrypted payload to write - this is used
+ throughout the code, as handlers fill out this
+ buffer with the packet to send. */
+ struct Queue writequeue; /* A queue of encrypted packets to send */
+ unsigned int writequeue_len; /* Number of bytes pending to send in writequeue */
+ buffer *readbuf; /* From the wire, decrypted in-place */
+ buffer *payload; /* Post-decompression, the actual SSH packet.
+ May have extra data at the beginning, will be
+ passed to packet processing functions positioned past
+ that, see payload_beginning */
+ unsigned int payload_beginning;
+ unsigned int transseq, recvseq; /* Sequence IDs */
+
+ /* Packet-handling flags */
+ const packettype * packettypes; /* Packet handler mappings for this
+ session, see process-packet.c */
+
+ unsigned dataallowed : 1; /* whether we can send data packets or we are in
+ the middle of a KEX or something */
+
+ unsigned char requirenext; /* byte indicating what packets we require next,
+ or 0x00 for any. */
+
+ unsigned char ignorenext; /* whether to ignore the next packet,
+ used for kex_follows stuff */
+
+ unsigned char lastpacket; /* What the last received packet type was */
+
+ int signal_pipe[2]; /* stores endpoints of a self-pipe used for
+ race-free signal handling */
+ int channel_signal_pending; /* Flag set when the signal pipe is triggered */
+
+ m_list conn_pending;
+
+ /* time of the last packet send/receive, for keepalive. Not real-world clock */
+ time_t last_packet_time_keepalive_sent;
+ time_t last_packet_time_keepalive_recv;
+ time_t last_packet_time_any_sent;
+
+ time_t last_packet_time_idle; /* time of the last packet transmission or receive, for
+ idle timeout purposes so ignores SSH_MSG_IGNORE
+ or responses to keepalives. Not real-world clock */
+
+
+ /* KEX/encryption related */
+ struct KEXState kexstate;
+ struct key_context *keys;
+ struct key_context *newkeys;
+ buffer *session_id; /* this is the hash from the first kex */
+ /* The below are used temporarily during kex, are freed after use */
+ mp_int * dh_K; /* SSH_MSG_KEXDH_REPLY and sending SSH_MSH_NEWKEYS */
+ buffer *hash; /* the session hash */
+ buffer* kexhashbuf; /* session hash buffer calculated from various packets*/
+ buffer* transkexinit; /* the kexinit packet we send should be kept so we
+ can add it to the hash when generating keys */
+
+ /* Enables/disables compression */
+ algo_type *compress_algos;
+
+ /* Other side allows SSH_MSG_EXT_INFO. Currently only set for server */
+ int allow_ext_info;
+
+ /* a list of queued replies that should be sent after a KEX has
+ concluded (ie, while dataallowed was unset)*/
+ struct packetlist *reply_queue_head, *reply_queue_tail;
+
+ void(*remoteclosed)(void); /* A callback to handle closure of the
+ remote connection */
+
+ void(*extra_session_cleanup)(void); /* client or server specific cleanup */
+ void(*send_kex_first_guess)(void);
+
+ struct AuthState authstate; /* Common amongst client and server, since most
+ struct elements are common */
+
+ /* Channel related */
+ struct Channel ** channels; /* these pointers may be null */
+ unsigned int chansize; /* the number of Channel*s allocated for channels */
+ unsigned int chancount; /* the number of Channel*s in use */
+ const struct ChanType **chantypes; /* The valid channel types */
+
+ /* TCP priority level for the main "port 22" tcp socket */
+ enum dropbear_prio socket_prio;
+
+ /* TCP forwarding - where manage listeners */
+ struct Listener ** listeners;
+ unsigned int listensize;
+
+ /* Whether to allow binding to privileged ports (<1024). This doesn't
+ * really belong here, but nowhere else fits nicely */
+ int allowprivport;
+
+ /* this is set when we get SIGINT or SIGTERM, the handler is in main.c */
+ volatile int exitflag;
+ /* set once the ses structure (and cli_ses/svr_ses) have been populated to their initial state */
+ int init_done;
+
+#if DROPBEAR_PLUGIN
+ struct PluginSession * plugin_session;
+#endif
+};
+
+struct serversession {
+
+ /* Server specific options */
+ int childpipe; /* kept open until we successfully authenticate */
+ /* userauth */
+
+ struct ChildPid * childpids; /* array of mappings childpid<->channel */
+ unsigned int childpidsize;
+
+ /* Used to avoid a race in the exit returncode handling - see
+ * svr-chansession.c for details */
+ struct exitinfo lastexit;
+
+ /* The numeric address they connected from, used for logging */
+ char * addrstring;
+
+ /* The resolved remote address, used for lastlog etc */
+ char *remotehost;
+
+#if DROPBEAR_VFORK
+ pid_t server_pid;
+#endif
+
+#if DROPBEAR_PLUGIN
+ /* The shared library handle */
+ void *plugin_handle;
+
+ /* The instance created by the plugin_new function */
+ struct PluginInstance *plugin_instance;
+#endif
+};
+
+typedef enum {
+ KEX_NOTHING,
+ KEXINIT_RCVD,
+ KEXDH_INIT_SENT,
+ KEXDONE
+} cli_kex_state;
+
+typedef enum {
+ STATE_NOTHING,
+ USERAUTH_WAIT,
+ USERAUTH_REQ_SENT,
+ USERAUTH_FAIL_RCVD,
+ USERAUTH_SUCCESS_RCVD,
+ SESSION_RUNNING
+} cli_state;
+
+struct clientsession {
+
+ /* XXX - move these to kexstate? */
+ struct kex_dh_param *dh_param;
+ struct kex_ecdh_param *ecdh_param;
+ struct kex_curve25519_param *curve25519_param;
+ const struct dropbear_kex *param_kex_algo; /* KEX algorithm corresponding to current dh_e and dh_x */
+
+ cli_kex_state kex_state; /* Used for progressing KEX */
+ cli_state state; /* Used to progress auth/channelsession etc */
+
+ int tty_raw_mode; /* Whether we're in raw mode (and have to clean up) */
+ struct termios saved_tio;
+ int stdincopy;
+ int stdinflags;
+ int stdoutcopy;
+ int stdoutflags;
+ int stderrcopy;
+ int stderrflags;
+
+ /* for escape char handling */
+ int last_char;
+
+ volatile int winchange; /* Set to 1 when a windowchange signal happens */
+
+ int lastauthtype; /* either AUTH_TYPE_PUBKEY or AUTH_TYPE_PASSWORD,
+ for the last type of auth we tried */
+ int is_trivial_auth;
+ int ignore_next_auth_response;
+#if DROPBEAR_CLI_INTERACT_AUTH
+ int auth_interact_failed; /* flag whether interactive auth can still
+ be used */
+ int interact_request_received; /* flag whether we've received an
+ info request from the server for
+ interactive auth.*/
+#endif
+ sign_key *lastprivkey;
+
+ buffer *server_sig_algs;
+
+ int retval; /* What the command exit status was - we emulate it */
+#if 0
+ TODO
+ struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */
+#endif
+
+ pid_t proxy_cmd_pid;
+};
+
+/* Global structs storing the state */
+extern struct sshsession ses;
+
+#if DROPBEAR_SERVER
+extern struct serversession svr_ses;
+#endif /* DROPBEAR_SERVER */
+
+#if DROPBEAR_CLIENT
+extern struct clientsession cli_ses;
+#endif /* DROPBEAR_CLIENT */
+
+#endif /* DROPBEAR_SESSION_H_ */