server.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package agent
  5. import (
  6. "crypto/rsa"
  7. "encoding/binary"
  8. "fmt"
  9. "io"
  10. "log"
  11. "math/big"
  12. "golang.org/x/crypto/ssh"
  13. )
  14. // Server wraps an Agent and uses it to implement the agent side of
  15. // the SSH-agent, wire protocol.
  16. type server struct {
  17. agent Agent
  18. }
  19. func (s *server) processRequestBytes(reqData []byte) []byte {
  20. rep, err := s.processRequest(reqData)
  21. if err != nil {
  22. if err != errLocked {
  23. // TODO(hanwen): provide better logging interface?
  24. log.Printf("agent %d: %v", reqData[0], err)
  25. }
  26. return []byte{agentFailure}
  27. }
  28. if err == nil && rep == nil {
  29. return []byte{agentSuccess}
  30. }
  31. return ssh.Marshal(rep)
  32. }
  33. func marshalKey(k *Key) []byte {
  34. var record struct {
  35. Blob []byte
  36. Comment string
  37. }
  38. record.Blob = k.Marshal()
  39. record.Comment = k.Comment
  40. return ssh.Marshal(&record)
  41. }
  42. // See [PROTOCOL.agent], section 2.5.1.
  43. const agentV1IdentitiesAnswer = 2
  44. type agentV1IdentityMsg struct {
  45. Numkeys uint32 `sshtype:"2"`
  46. }
  47. type agentRemoveIdentityMsg struct {
  48. KeyBlob []byte `sshtype:"18"`
  49. }
  50. type agentLockMsg struct {
  51. Passphrase []byte `sshtype:"22"`
  52. }
  53. type agentUnlockMsg struct {
  54. Passphrase []byte `sshtype:"23"`
  55. }
  56. func (s *server) processRequest(data []byte) (interface{}, error) {
  57. switch data[0] {
  58. case agentRequestV1Identities:
  59. return &agentV1IdentityMsg{0}, nil
  60. case agentRemoveAllV1Identities:
  61. return nil, nil
  62. case agentRemoveIdentity:
  63. var req agentRemoveIdentityMsg
  64. if err := ssh.Unmarshal(data, &req); err != nil {
  65. return nil, err
  66. }
  67. var wk wireKey
  68. if err := ssh.Unmarshal(req.KeyBlob, &wk); err != nil {
  69. return nil, err
  70. }
  71. return nil, s.agent.Remove(&Key{Format: wk.Format, Blob: req.KeyBlob})
  72. case agentRemoveAllIdentities:
  73. return nil, s.agent.RemoveAll()
  74. case agentLock:
  75. var req agentLockMsg
  76. if err := ssh.Unmarshal(data, &req); err != nil {
  77. return nil, err
  78. }
  79. return nil, s.agent.Lock(req.Passphrase)
  80. case agentUnlock:
  81. var req agentLockMsg
  82. if err := ssh.Unmarshal(data, &req); err != nil {
  83. return nil, err
  84. }
  85. return nil, s.agent.Unlock(req.Passphrase)
  86. case agentSignRequest:
  87. var req signRequestAgentMsg
  88. if err := ssh.Unmarshal(data, &req); err != nil {
  89. return nil, err
  90. }
  91. var wk wireKey
  92. if err := ssh.Unmarshal(req.KeyBlob, &wk); err != nil {
  93. return nil, err
  94. }
  95. k := &Key{
  96. Format: wk.Format,
  97. Blob: req.KeyBlob,
  98. }
  99. sig, err := s.agent.Sign(k, req.Data) // TODO(hanwen): flags.
  100. if err != nil {
  101. return nil, err
  102. }
  103. return &signResponseAgentMsg{SigBlob: ssh.Marshal(sig)}, nil
  104. case agentRequestIdentities:
  105. keys, err := s.agent.List()
  106. if err != nil {
  107. return nil, err
  108. }
  109. rep := identitiesAnswerAgentMsg{
  110. NumKeys: uint32(len(keys)),
  111. }
  112. for _, k := range keys {
  113. rep.Keys = append(rep.Keys, marshalKey(k)...)
  114. }
  115. return rep, nil
  116. case agentAddIdentity:
  117. return nil, s.insertIdentity(data)
  118. }
  119. return nil, fmt.Errorf("unknown opcode %d", data[0])
  120. }
  121. func (s *server) insertIdentity(req []byte) error {
  122. var record struct {
  123. Type string `sshtype:"17"`
  124. Rest []byte `ssh:"rest"`
  125. }
  126. if err := ssh.Unmarshal(req, &record); err != nil {
  127. return err
  128. }
  129. switch record.Type {
  130. case ssh.KeyAlgoRSA:
  131. var k rsaKeyMsg
  132. if err := ssh.Unmarshal(req, &k); err != nil {
  133. return err
  134. }
  135. priv := rsa.PrivateKey{
  136. PublicKey: rsa.PublicKey{
  137. E: int(k.E.Int64()),
  138. N: k.N,
  139. },
  140. D: k.D,
  141. Primes: []*big.Int{k.P, k.Q},
  142. }
  143. priv.Precompute()
  144. return s.agent.Add(AddedKey{PrivateKey: &priv, Comment: k.Comments})
  145. }
  146. return fmt.Errorf("not implemented: %s", record.Type)
  147. }
  148. // ServeAgent serves the agent protocol on the given connection. It
  149. // returns when an I/O error occurs.
  150. func ServeAgent(agent Agent, c io.ReadWriter) error {
  151. s := &server{agent}
  152. var length [4]byte
  153. for {
  154. if _, err := io.ReadFull(c, length[:]); err != nil {
  155. return err
  156. }
  157. l := binary.BigEndian.Uint32(length[:])
  158. if l > maxAgentResponseBytes {
  159. // We also cap requests.
  160. return fmt.Errorf("agent: request too large: %d", l)
  161. }
  162. req := make([]byte, l)
  163. if _, err := io.ReadFull(c, req); err != nil {
  164. return err
  165. }
  166. repData := s.processRequestBytes(req)
  167. if len(repData) > maxAgentResponseBytes {
  168. return fmt.Errorf("agent: reply too large: %d bytes", len(repData))
  169. }
  170. binary.BigEndian.PutUint32(length[:], uint32(len(repData)))
  171. if _, err := c.Write(length[:]); err != nil {
  172. return err
  173. }
  174. if _, err := c.Write(repData); err != nil {
  175. return err
  176. }
  177. }
  178. }