SHA_State exhash;
-static void nullmac_sesskey(unsigned char *key, int len) { }
+static void nullmac_key(unsigned char *key) { }
static void nullmac_generate(unsigned char *blk, int len, unsigned long seq) { }
static int nullmac_verify(unsigned char *blk, int len, unsigned long seq) { return 1; }
struct ssh_mac ssh_mac_none = {
- nullmac_sesskey, nullmac_generate, nullmac_verify, "none", 0
+ nullmac_key, nullmac_key, nullmac_generate, nullmac_verify, "none", 0
};
struct ssh_mac *macs[] = { &ssh_sha1, &ssh_mac_none };
/* FIXME */
}
#endif
+ debug(("Got initblk:"));
+ for (i = 0; i < cipherblk; i++)
+ debug((" %02x", (unsigned char)pktin.data[i]));
+ debug(("\r\n"));
if (sccipher)
sccipher->decrypt(pktin.data, cipherblk);
+ debug(("Decrypted initblk:"));
+ for (i = 0; i < cipherblk; i++)
+ debug((" %02x", (unsigned char)pktin.data[i]));
+ debug(("\r\n"));
/*
* Now get the length and padding figures.
if (sccipher)
sccipher->decrypt(pktin.data + cipherblk, packetlen - cipherblk);
+ debug(("Got packet len=%d pad=%d\r\n", len, pad));
+ for (i = 0; i < packetlen; i++)
+ debug((" %02x", (unsigned char)pktin.data[i]));
+ debug(("\r\n"));
+
/*
* Check the MAC.
*/
pktin.savedpos = 6;
pktin.type = pktin.data[5];
-#if 0
- debug(("Got packet len=%d pad=%d\r\n", len, pad));
- for (i = 0; i < payload; i++)
- debug((" %02x", (unsigned char)pktin.data[i]));
- debug(("\r\n"));
-#endif
/*
* FIXME: handle IGNORE and DEBUG messages.
}
/*
+ * SSH2 key creation method.
+ */
+void ssh2_mkkey(Bignum K, char *H, char chr, char *keyspace) {
+ SHA_State s;
+ /* First 20 bytes. */
+ SHA_Init(&s);
+ sha_mpint(&s, K);
+ SHA_Bytes(&s, H, 20);
+ SHA_Bytes(&s, &chr, 1);
+ SHA_Bytes(&s, H, 20);
+ SHA_Final(&s, keyspace);
+ /* Next 20 bytes. */
+ SHA_Init(&s);
+ sha_mpint(&s, K);
+ SHA_Bytes(&s, H, 20);
+ SHA_Bytes(&s, keyspace, 20);
+ SHA_Final(&s, keyspace+20);
+}
+
+/*
* Handle the SSH2 key exchange phase.
*/
static int do_ssh2_kex(unsigned char *in, int inlen, int ispkt)
static char *hostkeydata, *sigdata;
static int hostkeylen, siglen;
static unsigned char exchange_hash[20];
+ static unsigned char keyspace[40];
crBegin;
debug(("\r\n"));
/*
- * FIXME: verify hostkeydata and sigdata.
+ * FIXME: verify host key. This bit will be moderately
+ * unpleasant, because of having to rewrite it to work
+ * alongside the old scheme.
*/
-
+
+ /*
+ * FIXME: verify signature of exchange hash.
+ */
+
+ /*
+ * Send SSH2_MSG_NEWKEYS. Expect it from server.
+ */
+ ssh2_pkt_init(SSH2_MSG_NEWKEYS);
+ ssh2_pkt_send();
+ crWaitUntil(ispkt);
+ if (pktin.type != SSH2_MSG_NEWKEYS)
+ fatalbox("expected new-keys packet from server");
+
+ /*
+ * Create and initialise session keys.
+ */
+ cscipher = cscipher_tobe;
+ sccipher = sccipher_tobe;
+ csmac = csmac_tobe;
+ scmac = scmac_tobe;
+ cscomp = cscomp_tobe;
+ sccomp = sccomp_tobe;
+ /*
+ * Set IVs after keys.
+ */
+ ssh2_mkkey(K, exchange_hash, 'C', keyspace); cscipher->setcskey(keyspace);
+ ssh2_mkkey(K, exchange_hash, 'D', keyspace); cscipher->setsckey(keyspace);
+ ssh2_mkkey(K, exchange_hash, 'A', keyspace); cscipher->setcsiv(keyspace);
+ ssh2_mkkey(K, exchange_hash, 'B', keyspace); sccipher->setsciv(keyspace);
+ ssh2_mkkey(K, exchange_hash, 'E', keyspace); csmac->setcskey(keyspace);
+ ssh2_mkkey(K, exchange_hash, 'F', keyspace); scmac->setsckey(keyspace);
+
crWaitUntil(0);
crFinish(1);
void SHA_Final(SHA_State *s, unsigned char *output);
struct ssh_cipher {
- void (*sesskey)(unsigned char *key);
+ void (*sesskey)(unsigned char *key); /* for ssh 1 */
+ void (*setcsiv)(unsigned char *key); /* for ssh 2 */
+ void (*setcskey)(unsigned char *key); /* for ssh 2 */
+ void (*setsciv)(unsigned char *key); /* for ssh 2 */
+ void (*setsckey)(unsigned char *key); /* for ssh 2 */
void (*encrypt)(unsigned char *blk, int len);
void (*decrypt)(unsigned char *blk, int len);
char *name;
};
struct ssh_mac {
- void (*sesskey)(unsigned char *key, int len);
+ void (*setcskey)(unsigned char *key);
+ void (*setsckey)(unsigned char *key);
void (*generate)(unsigned char *blk, int len, unsigned long seq);
int (*verify)(unsigned char *blk, int len, unsigned long seq);
char *name;
#define SSH_SESSION_KEY_LENGTH 32
static BlowfishContext ectx, dctx;
+static void blowfish_cskey(unsigned char *key)
+{
+ blowfish_setkey(&ectx, key, 16);
+ logevent("Initialised Blowfish client->server encryption");
+}
+
+static void blowfish_sckey(unsigned char *key)
+{
+ blowfish_setkey(&dctx, key, 16);
+ logevent("Initialised Blowfish server->client encryption");
+}
+
+static void blowfish_csiv(unsigned char *key)
+{
+ ectx.iv0 = GET_32BIT_LSB_FIRST(key);
+ ectx.iv1 = GET_32BIT_LSB_FIRST(key+4);
+}
+
+static void blowfish_sciv(unsigned char *key)
+{
+ dctx.iv0 = GET_32BIT_LSB_FIRST(key);
+ dctx.iv1 = GET_32BIT_LSB_FIRST(key+4);
+}
+
static void blowfish_sesskey(unsigned char *key)
{
blowfish_setkey(&ectx, key, SSH_SESSION_KEY_LENGTH);
struct ssh_cipher ssh_blowfish = {
blowfish_sesskey,
+ blowfish_csiv, blowfish_cskey,
+ blowfish_sciv, blowfish_sckey,
blowfish_encrypt_blk,
blowfish_decrypt_blk,
"blowfish-cbc",
des_cbc_decrypt(dest, src, len, &scheds[0]);
}
-static DESContext keys[3];
+static DESContext cskeys[3], sckeys[3];
-static void des3_sesskey(unsigned char *key) {
+static void des3_cskey(unsigned char *key) {
des_key_setup(GET_32BIT_MSB_FIRST(key),
- GET_32BIT_MSB_FIRST(key+4), &keys[0]);
+ GET_32BIT_MSB_FIRST(key+4), &cskeys[0]);
des_key_setup(GET_32BIT_MSB_FIRST(key+8),
- GET_32BIT_MSB_FIRST(key+12), &keys[1]);
+ GET_32BIT_MSB_FIRST(key+12), &cskeys[1]);
des_key_setup(GET_32BIT_MSB_FIRST(key+16),
- GET_32BIT_MSB_FIRST(key+20), &keys[2]);
- logevent("Initialised triple-DES encryption");
+ GET_32BIT_MSB_FIRST(key+20), &cskeys[2]);
+ logevent("Initialised triple-DES client->server encryption");
+}
+
+static void des3_csiv(unsigned char *key) {
+ cskeys[0].eiv0 = GET_32BIT_MSB_FIRST(key);
+ cskeys[0].eiv1 = GET_32BIT_MSB_FIRST(key+4);
+}
+
+static void des3_sciv(unsigned char *key) {
+ sckeys[0].div0 = GET_32BIT_MSB_FIRST(key);
+ sckeys[0].div1 = GET_32BIT_MSB_FIRST(key+4);
+}
+
+static void des3_sckey(unsigned char *key) {
+ des_key_setup(GET_32BIT_MSB_FIRST(key),
+ GET_32BIT_MSB_FIRST(key+4), &sckeys[0]);
+ des_key_setup(GET_32BIT_MSB_FIRST(key+8),
+ GET_32BIT_MSB_FIRST(key+12), &sckeys[1]);
+ des_key_setup(GET_32BIT_MSB_FIRST(key+16),
+ GET_32BIT_MSB_FIRST(key+20), &sckeys[2]);
+ logevent("Initialised triple-DES server->client encryption");
+}
+
+static void des3_sesskey(unsigned char *key) {
+ des3_cskey(key);
+ des3_sckey(key);
}
static void des3_encrypt_blk(unsigned char *blk, int len) {
- des_3cbc_encrypt(blk, blk, len, keys);
+ des_3cbc_encrypt(blk, blk, len, cskeys);
}
static void des3_decrypt_blk(unsigned char *blk, int len) {
- des_3cbc_decrypt(blk, blk, len, keys);
+ des_3cbc_decrypt(blk, blk, len, sckeys);
}
struct ssh_cipher ssh_3des = {
des3_sesskey,
+ des3_csiv, des3_cskey,
+ des3_sciv, des3_sckey,
des3_encrypt_blk,
des3_decrypt_blk,
"3des-cbc",
static void des_sesskey(unsigned char *key) {
des_key_setup(GET_32BIT_MSB_FIRST(key),
- GET_32BIT_MSB_FIRST(key+4), &keys[0]);
+ GET_32BIT_MSB_FIRST(key+4), &cskeys[0]);
logevent("Initialised single-DES encryption");
}
static void des_encrypt_blk(unsigned char *blk, int len) {
- des_cbc_encrypt(blk, blk, len, keys);
+ des_cbc_encrypt(blk, blk, len, cskeys);
}
static void des_decrypt_blk(unsigned char *blk, int len) {
- des_cbc_decrypt(blk, blk, len, keys);
+ des_cbc_decrypt(blk, blk, len, cskeys);
}
struct ssh_cipher ssh_des = {
des_sesskey,
+ NULL, NULL, NULL, NULL, /* SSH 2 bits - unused */
des_encrypt_blk,
des_decrypt_blk,
"des-cbc", /* should never be used - not a valid cipher in ssh2 */
* HMAC wrapper on it.
*/
-static SHA_State sha1_mac_s1, sha1_mac_s2;
+static SHA_State sha1_cs_mac_s1, sha1_cs_mac_s2;
+static SHA_State sha1_sc_mac_s1, sha1_sc_mac_s2;
-static void sha1_sesskey(unsigned char *key, int len) {
+static void sha1_key(SHA_State *s1, SHA_State *s2,
+ unsigned char *key, int len) {
unsigned char foo[64];
int i;
memset(foo, 0x36, 64);
for (i = 0; i < len && i < 64; i++)
foo[i] ^= key[i];
- SHA_Init(&sha1_mac_s1);
- SHA_Bytes(&sha1_mac_s1, foo, 64);
+ SHA_Init(s1);
+ SHA_Bytes(s1, foo, 64);
memset(foo, 0x5C, 64);
for (i = 0; i < len && i < 64; i++)
foo[i] ^= key[i];
- SHA_Init(&sha1_mac_s2);
- SHA_Bytes(&sha1_mac_s2, foo, 64);
+ SHA_Init(s2);
+ SHA_Bytes(s2, foo, 64);
memset(foo, 0, 64); /* burn the evidence */
}
-static void sha1_do_hmac(unsigned char *blk, int len, unsigned long seq,
+static void sha1_cskey(unsigned char *key) {
+ sha1_key(&sha1_cs_mac_s1, &sha1_cs_mac_s2, key, 20);
+}
+
+static void sha1_sckey(unsigned char *key) {
+ sha1_key(&sha1_sc_mac_s1, &sha1_sc_mac_s2, key, 20);
+}
+
+static void sha1_do_hmac(SHA_State *s1, SHA_State *s2,
+ unsigned char *blk, int len, unsigned long seq,
unsigned char *hmac) {
SHA_State s;
unsigned char intermediate[20];
intermediate[2] = (unsigned char)((seq >> 8) & 0xFF);
intermediate[3] = (unsigned char)((seq ) & 0xFF);
- s = sha1_mac_s1; /* structure copy */
+ s = *s1; /* structure copy */
SHA_Bytes(&s, intermediate, 4);
SHA_Bytes(&s, blk, len);
SHA_Final(&s, intermediate);
- s = sha1_mac_s2; /* structure copy */
+ s = *s2; /* structure copy */
SHA_Bytes(&s, intermediate, 20);
SHA_Final(&s, hmac);
}
static void sha1_generate(unsigned char *blk, int len, unsigned long seq) {
- sha1_do_hmac(blk, len, seq, blk+len);
+ sha1_do_hmac(&sha1_cs_mac_s1, &sha1_cs_mac_s2, blk, len, seq, blk+len);
}
static int sha1_verify(unsigned char *blk, int len, unsigned long seq) {
unsigned char correct[20];
- sha1_do_hmac(blk, len, seq, correct);
+ sha1_do_hmac(&sha1_sc_mac_s1, &sha1_sc_mac_s2, blk, len, seq, correct);
return !memcmp(correct, blk+len, 20);
}
struct ssh_mac ssh_sha1 = {
- sha1_sesskey,
+ sha1_cskey, sha1_sckey,
sha1_generate,
sha1_verify,
"hmac-sha1",