blob: 8786014f2f7e445ee3406635273781f6bfa8bec9 [file] [log] [blame]
Damien Miller57c30112006-03-26 14:24:48 +11001/* $OpenBSD: auth2-pubkey.c,v 1.12 2006/03/25 13:17:01 djm Exp $ */
Ben Lindstrom855bf3a2002-06-06 20:27:55 +00002/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26#include "includes.h"
Damien Millerf17883e2006-03-15 11:45:54 +110027
28#include <sys/types.h>
29#include <sys/stat.h>
Ben Lindstrom855bf3a2002-06-06 20:27:55 +000030
Darren Tucker22cc7412004-12-06 22:47:41 +110031#include "ssh.h"
Ben Lindstrom855bf3a2002-06-06 20:27:55 +000032#include "ssh2.h"
33#include "xmalloc.h"
34#include "packet.h"
35#include "buffer.h"
36#include "log.h"
37#include "servconf.h"
38#include "compat.h"
39#include "bufaux.h"
40#include "auth.h"
41#include "key.h"
42#include "pathnames.h"
43#include "uidswap.h"
44#include "auth-options.h"
45#include "canohost.h"
46#include "monitor_wrap.h"
Darren Tuckerf0f90982004-12-11 13:39:50 +110047#include "misc.h"
Ben Lindstrom855bf3a2002-06-06 20:27:55 +000048
49/* import */
50extern ServerOptions options;
51extern u_char *session_id2;
Darren Tucker502d3842003-06-28 12:38:01 +100052extern u_int session_id2_len;
Ben Lindstrom855bf3a2002-06-06 20:27:55 +000053
54static int
55userauth_pubkey(Authctxt *authctxt)
56{
57 Buffer b;
58 Key *key = NULL;
59 char *pkalg;
60 u_char *pkblob, *sig;
61 u_int alen, blen, slen;
62 int have_sig, pktype;
63 int authenticated = 0;
64
65 if (!authctxt->valid) {
66 debug2("userauth_pubkey: disabled because of invalid user");
67 return 0;
68 }
69 have_sig = packet_get_char();
70 if (datafellows & SSH_BUG_PKAUTH) {
71 debug2("userauth_pubkey: SSH_BUG_PKAUTH");
72 /* no explicit pkalg given */
73 pkblob = packet_get_string(&blen);
74 buffer_init(&b);
75 buffer_append(&b, pkblob, blen);
76 /* so we have to extract the pkalg from the pkblob */
77 pkalg = buffer_get_string(&b, &alen);
78 buffer_free(&b);
79 } else {
80 pkalg = packet_get_string(&alen);
81 pkblob = packet_get_string(&blen);
82 }
83 pktype = key_type_from_name(pkalg);
84 if (pktype == KEY_UNSPEC) {
85 /* this is perfectly legal */
Damien Miller996acd22003-04-09 20:59:48 +100086 logit("userauth_pubkey: unsupported public key algorithm: %s",
Ben Lindstrom855bf3a2002-06-06 20:27:55 +000087 pkalg);
88 goto done;
89 }
90 key = key_from_blob(pkblob, blen);
91 if (key == NULL) {
92 error("userauth_pubkey: cannot decode key: %s", pkalg);
93 goto done;
94 }
95 if (key->type != pktype) {
96 error("userauth_pubkey: type mismatch for decoded key "
97 "(received %d, expected %d)", key->type, pktype);
98 goto done;
99 }
100 if (have_sig) {
101 sig = packet_get_string(&slen);
102 packet_check_eom();
103 buffer_init(&b);
104 if (datafellows & SSH_OLD_SESSIONID) {
105 buffer_append(&b, session_id2, session_id2_len);
106 } else {
107 buffer_put_string(&b, session_id2, session_id2_len);
108 }
109 /* reconstruct packet */
110 buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
111 buffer_put_cstring(&b, authctxt->user);
112 buffer_put_cstring(&b,
113 datafellows & SSH_BUG_PKSERVICE ?
114 "ssh-userauth" :
115 authctxt->service);
116 if (datafellows & SSH_BUG_PKAUTH) {
117 buffer_put_char(&b, have_sig);
118 } else {
119 buffer_put_cstring(&b, "publickey");
120 buffer_put_char(&b, have_sig);
121 buffer_put_cstring(&b, pkalg);
122 }
123 buffer_put_string(&b, pkblob, blen);
124#ifdef DEBUG_PK
125 buffer_dump(&b);
126#endif
127 /* test for correct signature */
128 authenticated = 0;
129 if (PRIVSEP(user_key_allowed(authctxt->pw, key)) &&
130 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
Damien Millerfb1310e2004-01-21 11:02:50 +1100131 buffer_len(&b))) == 1)
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000132 authenticated = 1;
Damien Millerfb1310e2004-01-21 11:02:50 +1100133 buffer_free(&b);
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000134 xfree(sig);
135 } else {
136 debug("test whether pkalg/pkblob are acceptable");
137 packet_check_eom();
138
139 /* XXX fake reply and always send PK_OK ? */
140 /*
141 * XXX this allows testing whether a user is allowed
142 * to login: if you happen to have a valid pubkey this
143 * message is sent. the message is NEVER sent at all
144 * if a user is not allowed to login. is this an
145 * issue? -markus
146 */
147 if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
148 packet_start(SSH2_MSG_USERAUTH_PK_OK);
149 packet_put_string(pkalg, alen);
150 packet_put_string(pkblob, blen);
151 packet_send();
152 packet_write_wait();
153 authctxt->postponed = 1;
154 }
155 }
156 if (authenticated != 1)
157 auth_clear_options();
158done:
159 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg);
160 if (key != NULL)
161 key_free(key);
162 xfree(pkalg);
163 xfree(pkblob);
164#ifdef HAVE_CYGWIN
165 if (check_nt_auth(0, authctxt->pw) == 0)
Damien Miller47656792004-09-11 22:42:09 +1000166 authenticated = 0;
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000167#endif
168 return authenticated;
169}
170
171/* return 1 if user allows given key */
172static int
173user_key_allowed2(struct passwd *pw, Key *key, char *file)
174{
Darren Tucker22cc7412004-12-06 22:47:41 +1100175 char line[SSH_MAX_PUBKEY_BYTES];
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000176 int found_key = 0;
177 FILE *f;
178 u_long linenum = 0;
179 struct stat st;
180 Key *found;
181 char *fp;
182
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000183 /* Temporarily use the user's uid. */
184 temporarily_use_uid(pw);
185
186 debug("trying public key file %s", file);
187
188 /* Fail quietly if file does not exist */
189 if (stat(file, &st) < 0) {
190 /* Restore the privileged uid. */
191 restore_uid();
192 return 0;
193 }
194 /* Open the file containing the authorized keys. */
195 f = fopen(file, "r");
196 if (!f) {
197 /* Restore the privileged uid. */
198 restore_uid();
199 return 0;
200 }
201 if (options.strict_modes &&
202 secure_filename(f, file, pw, line, sizeof(line)) != 0) {
203 fclose(f);
Damien Miller996acd22003-04-09 20:59:48 +1000204 logit("Authentication refused: %s", line);
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000205 restore_uid();
206 return 0;
207 }
208
209 found_key = 0;
210 found = key_new(key->type);
211
Darren Tucker22cc7412004-12-06 22:47:41 +1100212 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
Darren Tucker3f9fdc72004-06-22 12:56:01 +1000213 char *cp, *key_options = NULL;
Darren Tucker22cc7412004-12-06 22:47:41 +1100214
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000215 /* Skip leading whitespace, empty and comment lines. */
216 for (cp = line; *cp == ' ' || *cp == '\t'; cp++)
217 ;
218 if (!*cp || *cp == '\n' || *cp == '#')
219 continue;
220
221 if (key_read(found, &cp) != 1) {
222 /* no key? check if there are options for this key */
223 int quoted = 0;
224 debug2("user_key_allowed: check options: '%s'", cp);
Darren Tucker3f9fdc72004-06-22 12:56:01 +1000225 key_options = cp;
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000226 for (; *cp && (quoted || (*cp != ' ' && *cp != '\t')); cp++) {
227 if (*cp == '\\' && cp[1] == '"')
228 cp++; /* Skip both */
229 else if (*cp == '"')
230 quoted = !quoted;
231 }
232 /* Skip remaining whitespace. */
233 for (; *cp == ' ' || *cp == '\t'; cp++)
234 ;
235 if (key_read(found, &cp) != 1) {
236 debug2("user_key_allowed: advance: '%s'", cp);
237 /* still no key? advance to next line*/
238 continue;
239 }
240 }
241 if (key_equal(found, key) &&
Darren Tucker3f9fdc72004-06-22 12:56:01 +1000242 auth_parse_options(pw, key_options, file, linenum) == 1) {
Ben Lindstrom855bf3a2002-06-06 20:27:55 +0000243 found_key = 1;
244 debug("matching key found: file %s, line %lu",
245 file, linenum);
246 fp = key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX);
247 verbose("Found matching %s key: %s",
248 key_type(found), fp);
249 xfree(fp);
250 break;
251 }
252 }
253 restore_uid();
254 fclose(f);
255 key_free(found);
256 if (!found_key)
257 debug2("key not found");
258 return found_key;
259}
260
261/* check whether given key is in .ssh/authorized_keys* */
262int
263user_key_allowed(struct passwd *pw, Key *key)
264{
265 int success;
266 char *file;
267
268 file = authorized_keys_file(pw);
269 success = user_key_allowed2(pw, key, file);
270 xfree(file);
271 if (success)
272 return success;
273
274 /* try suffix "2" for backward compat, too */
275 file = authorized_keys_file2(pw);
276 success = user_key_allowed2(pw, key, file);
277 xfree(file);
278 return success;
279}
280
281Authmethod method_pubkey = {
282 "publickey",
283 userauth_pubkey,
284 &options.pubkey_authentication
285};