blob: 19dc76d961667934c2bd2ce7a9f8f6875a03fea1 [file] [log] [blame]
Damien Miller5428f641999-11-25 11:54:57 +11001/*
Damien Millere4340be2000-09-16 13:29:08 +11002 * Copyright (c) 1999,2000 Markus Friedl. All rights reserved.
Damien Miller5428f641999-11-25 11:54:57 +11003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
Damien Miller5428f641999-11-25 11:54:57 +110012 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
24
Damien Millerd4a8b7e1999-10-27 13:42:43 +100025#include "includes.h"
Damien Miller874d77b2000-10-14 16:23:11 +110026RCSID("$OpenBSD: compat.c,v 1.24 2000/10/10 20:20:45 markus Exp $");
Damien Millerd4a8b7e1999-10-27 13:42:43 +100027
28#include "ssh.h"
Damien Miller33b13562000-04-04 14:38:59 +100029#include "packet.h"
Damien Miller78928792000-04-12 20:17:38 +100030#include "xmalloc.h"
31#include "compat.h"
Damien Miller874d77b2000-10-14 16:23:11 +110032#include <regex.h>
Damien Millerd4a8b7e1999-10-27 13:42:43 +100033
Damien Miller95def091999-11-25 00:26:21 +110034int compat13 = 0;
Damien Miller33b13562000-04-04 14:38:59 +100035int compat20 = 0;
36int datafellows = 0;
Damien Miller95def091999-11-25 00:26:21 +110037
Damien Miller4af51302000-04-16 11:18:38 +100038void
Damien Miller33b13562000-04-04 14:38:59 +100039enable_compat20(void)
40{
Damien Miller1383bd82000-04-06 12:32:37 +100041 verbose("Enabling compatibility mode for protocol 2.0");
42 compat20 = 1;
Damien Miller33b13562000-04-04 14:38:59 +100043}
Damien Miller4af51302000-04-16 11:18:38 +100044void
Damien Miller95def091999-11-25 00:26:21 +110045enable_compat13(void)
46{
47 verbose("Enabling compatibility mode for protocol 1.3");
48 compat13 = 1;
Damien Millerd4a8b7e1999-10-27 13:42:43 +100049}
Damien Miller33b13562000-04-04 14:38:59 +100050/* datafellows bug compatibility */
51void
52compat_datafellows(const char *version)
53{
Damien Miller874d77b2000-10-14 16:23:11 +110054 int i, ret;
55 char ebuf[1024];
56 regex_t reg;
57 static struct {
58 char *pat;
Damien Miller30c3d422000-05-09 11:02:59 +100059 int bugs;
60 } check[] = {
Damien Miller874d77b2000-10-14 16:23:11 +110061 {"^.*MindTerm", 0},
62 {"^2\\.1\\.0 ", SSH_BUG_SIGBLOB|SSH_BUG_HMAC},
63 {"^2\\.0\\.", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|SSH_BUG_PUBKEYAUTH|SSH_BUG_X11FWD},
64 {"^2\\.[23]\\.0 ", SSH_BUG_HMAC|SSH_COMPAT_SESSIONID_ENCODING},
65 {"^2\\.[2-9]\\.", SSH_COMPAT_SESSIONID_ENCODING},
66 {"^2\\.", SSH_BUG_HMAC|SSH_COMPAT_SESSIONID_ENCODING},
67 {NULL, 0}
Damien Miller33b13562000-04-04 14:38:59 +100068 };
Damien Millercaf6dd62000-08-29 11:33:50 +110069 /* process table, return first match */
Damien Miller874d77b2000-10-14 16:23:11 +110070 for (i = 0; check[i].pat; i++) {
71 ret = regcomp(&reg, check[i].pat, REG_EXTENDED|REG_NOSUB);
72 if (ret != 0) {
73 regerror(ret, &reg, ebuf, sizeof(ebuf));
74 ebuf[sizeof(ebuf)-1] = '\0';
75 error("regerror: %s", ebuf);
76 continue;
77 }
78 ret = regexec(&reg, version, 0, NULL, 0);
79 regfree(&reg);
80 if (ret == 0) {
81 debug("match: %s pat %s\n", version, check[i].pat);
Damien Miller30c3d422000-05-09 11:02:59 +100082 datafellows = check[i].bugs;
Damien Miller33b13562000-04-04 14:38:59 +100083 return;
84 }
85 }
Damien Miller874d77b2000-10-14 16:23:11 +110086 debug("no match: %s", version);
Damien Miller33b13562000-04-04 14:38:59 +100087}
Damien Miller78928792000-04-12 20:17:38 +100088
89#define SEP ","
90int
91proto_spec(const char *spec)
92{
Damien Miller37023962000-07-11 17:31:38 +100093 char *s, *p, *q;
Damien Miller78928792000-04-12 20:17:38 +100094 int ret = SSH_PROTO_UNKNOWN;
95
Damien Millerb1715dc2000-05-30 13:44:51 +100096 if (spec == NULL)
97 return ret;
Damien Miller37023962000-07-11 17:31:38 +100098 q = s = xstrdup(spec);
99 for ((p = strsep(&q, SEP)); p && *p != '\0'; (p = strsep(&q, SEP))) {
Damien Miller78928792000-04-12 20:17:38 +1000100 switch(atoi(p)) {
101 case 1:
102 if (ret == SSH_PROTO_UNKNOWN)
103 ret |= SSH_PROTO_1_PREFERRED;
104 ret |= SSH_PROTO_1;
105 break;
106 case 2:
107 ret |= SSH_PROTO_2;
108 break;
109 default:
110 log("ignoring bad proto spec: '%s'.", p);
111 break;
112 }
113 }
114 xfree(s);
115 return ret;
116}