Damien Miller | 431f66b | 1999-11-21 18:31:57 +1100 | [diff] [blame] | 1 | This document is intended for those who wish to read the ssh source |
Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 2 | code. This tries to give an overview of the structure of the code. |
| 3 | |
| 4 | Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi> |
| 5 | Updated 17 Nov 1995. |
| 6 | Updated 19 Oct 1999 for OpenSSH-1.2 |
| 7 | |
| 8 | The software consists of ssh (client), sshd (server), scp, sdist, and |
| 9 | the auxiliary programs ssh-keygen, ssh-agent, ssh-add, and |
| 10 | make-ssh-known-hosts. The main program for each of these is in a .c |
| 11 | file with the same name. |
| 12 | |
| 13 | There are some subsystems/abstractions that are used by a number of |
| 14 | these programs. |
| 15 | |
| 16 | Buffer manipulation routines |
| 17 | |
| 18 | - These provide an arbitrary size buffer, where data can be appended. |
| 19 | Data can be consumed from either end. The code is used heavily |
| 20 | throughout ssh. The basic buffer manipulation functions are in |
| 21 | buffer.c (header buffer.h), and additional code to manipulate specific |
| 22 | data types is in bufaux.c. |
| 23 | |
| 24 | Compression Library |
| 25 | |
| 26 | - Ssh uses the GNU GZIP compression library (ZLIB). |
| 27 | |
| 28 | Encryption/Decryption |
| 29 | |
| 30 | - Ssh contains several encryption algorithms. These are all |
| 31 | accessed through the cipher.h interface. The interface code is |
| 32 | in cipher.c, and the implementations are in libc. |
| 33 | |
| 34 | Multiple Precision Integer Library |
| 35 | |
| 36 | - Uses the SSLeay BIGNUM sublibrary. |
| 37 | - Some auxiliary functions for mp-int manipulation are in mpaux.c. |
| 38 | |
| 39 | Random Numbers |
| 40 | |
| 41 | - Uses arc4random() and such. |
| 42 | |
| 43 | RSA key generation, encryption, decryption |
| 44 | |
| 45 | - Ssh uses the RSA routines in libssl. |
| 46 | |
| 47 | RSA key files |
| 48 | |
| 49 | - RSA keys are stored in files with a special format. The code to |
| 50 | read/write these files is in authfile.c. The files are normally |
| 51 | encrypted with a passphrase. The functions to read passphrases |
| 52 | are in readpass.c (the same code is used to read passwords). |
| 53 | |
| 54 | Binary packet protocol |
| 55 | |
| 56 | - The ssh binary packet protocol is implemented in packet.c. The |
| 57 | code in packet.c does not concern itself with packet types or their |
| 58 | execution; it contains code to build packets, to receive them and |
| 59 | extract data from them, and the code to compress and/or encrypt |
| 60 | packets. CRC code comes from crc32.c. |
| 61 | |
| 62 | - The code in packet.c calls the buffer manipulation routines |
| 63 | (buffer.c, bufaux.c), compression routines (compress.c, zlib), |
| 64 | and the encryption routines. |
| 65 | |
| 66 | X11, TCP/IP, and Agent forwarding |
| 67 | |
| 68 | - Code for various types of channel forwarding is in channels.c. |
| 69 | The file defines a generic framework for arbitrary communication |
| 70 | channels inside the secure channel, and uses this framework to |
| 71 | implement X11 forwarding, TCP/IP forwarding, and authentication |
| 72 | agent forwarding. |
| 73 | The new, Protocol 1.5, channel close implementation is in nchan.c |
| 74 | |
| 75 | Authentication agent |
| 76 | |
| 77 | - Code to communicate with the authentication agent is in authfd.c. |
| 78 | |
| 79 | Authentication methods |
| 80 | |
| 81 | - Code for various authentication methods resides in auth-*.c |
| 82 | (auth-passwd.c, auth-rh-rsa.c, auth-rhosts.c, auth-rsa.c). This |
| 83 | code is linked into the server. The routines also manipulate |
| 84 | known hosts files using code in hostfile.c. Code in canohost.c |
| 85 | is used to retrieve the canonical host name of the remote host. |
| 86 | Code in match.c is used to match host names. |
| 87 | |
| 88 | - In the client end, authentication code is in sshconnect.c. It |
| 89 | reads Passwords/passphrases using code in readpass.c. It reads |
| 90 | RSA key files with authfile.c. It communicates the |
| 91 | authentication agent using authfd.c. |
| 92 | |
| 93 | The ssh client |
| 94 | |
| 95 | - The client main program is in ssh.c. It first parses arguments |
| 96 | and reads configuration (readconf.c), then calls ssh_connect (in |
| 97 | sshconnect.c) to open a connection to the server (possibly via a |
| 98 | proxy), and performs authentication (ssh_login in sshconnect.c). |
| 99 | It then makes any pty, forwarding, etc. requests. It may call |
| 100 | code in ttymodes.c to encode current tty modes. Finally it |
| 101 | calls client_loop in clientloop.c. This does the real work for |
| 102 | the session. |
| 103 | |
| 104 | - The client is suid root. It tries to temporarily give up this |
| 105 | rights while reading the configuration data. The root |
| 106 | privileges are only used to make the connection (from a |
| 107 | privileged socket). Any extra privileges are dropped before |
| 108 | calling ssh_login. |
| 109 | |
| 110 | Pseudo-tty manipulation and tty modes |
| 111 | |
| 112 | - Code to allocate and use a pseudo tty is in pty.c. Code to |
| 113 | encode and set terminal modes is in ttymodes.c. |
| 114 | |
| 115 | Logging in (updating utmp, lastlog, etc.) |
| 116 | |
| 117 | - The code to do things that are done when a user logs in are in |
| 118 | login.c. This includes things such as updating the utmp, wtmp, |
| 119 | and lastlog files. Some of the code is in sshd.c. |
| 120 | |
| 121 | Writing to the system log and terminal |
| 122 | |
| 123 | - The programs use the functions fatal(), log(), debug(), error() |
| 124 | in many places to write messages to system log or user's |
| 125 | terminal. The implementation that logs to system log is in |
| 126 | log-server.c; it is used in the server program. The other |
| 127 | programs use an implementation that sends output to stderr; it |
| 128 | is in log-client.c. The definitions are in ssh.h. |
| 129 | |
| 130 | The sshd server (daemon) |
| 131 | |
| 132 | - The sshd daemon starts by processing arguments and reading the |
| 133 | configuration file (servconf.c). It then reads the host key, |
| 134 | starts listening for connections, and generates the server key. |
| 135 | The server key will be regenerated every hour by an alarm. |
| 136 | |
| 137 | - When the server receives a connection, it forks, disables the |
| 138 | regeneration alarm, and starts communicating with the client. |
| 139 | They first perform identification string exchange, then |
| 140 | negotiate encryption, then perform authentication, preparatory |
| 141 | operations, and finally the server enters the normal session |
| 142 | mode by calling server_loop in serverloop.c. This does the real |
| 143 | work, calling functions in other modules. |
| 144 | |
| 145 | - The code for the server is in sshd.c. It contains a lot of |
| 146 | stuff, including: |
| 147 | - server main program |
| 148 | - waiting for connections |
| 149 | - processing new connection |
| 150 | - authentication |
| 151 | - preparatory operations |
| 152 | - building up the execution environment for the user program |
| 153 | - starting the user program. |
| 154 | |
| 155 | Auxiliary files |
| 156 | |
| 157 | - There are several other files in the distribution that contain |
| 158 | various auxiliary routines: |
| 159 | ssh.h the main header file for ssh (various definitions) |
| 160 | getput.h byte-order independent storage of integers |
| 161 | includes.h includes most system headers. Lots of #ifdefs. |
| 162 | tildexpand.c expand tilde in file names |
| 163 | uidswap.c uid-swapping |
| 164 | xmalloc.c "safe" malloc routines |