keys_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252
  1. package test
  2. import (
  3. "crypto/rsa"
  4. "crypto/x509"
  5. "encoding/pem"
  6. "reflect"
  7. "strings"
  8. "testing"
  9. "code.google.com/p/go.crypto/ssh"
  10. )
  11. var (
  12. validKey = `AAAAB3NzaC1yc2EAAAADAQABAAABAQDEX/dPu4PmtvgK3La9zioCEDrJ` +
  13. `yUr6xEIK7Pr+rLgydcqWTU/kt7w7gKjOw4vvzgHfjKl09CWyvgb+y5dCiTk` +
  14. `9MxI+erGNhs3pwaoS+EavAbawB7iEqYyTep3YaJK+4RJ4OX7ZlXMAIMrTL+` +
  15. `UVrK89t56hCkFYaAgo3VY+z6rb/b3bDBYtE1Y2tS7C3au73aDgeb9psIrSV` +
  16. `86ucKBTl5X62FnYiyGd++xCnLB6uLximM5OKXfLzJQNS/QyZyk12g3D8y69` +
  17. `Xw1GzCSKX1u1+MQboyf0HJcG2ryUCLHdcDVppApyHx2OLq53hlkQ/yxdflD` +
  18. `qCqAE4j+doagSsIfC1T2T`
  19. authWithOptions = []string{
  20. `# comments to ignore before any keys...`,
  21. ``,
  22. `env="HOME=/home/root",no-port-forwarding ssh-rsa ` + validKey + ` user@host`,
  23. `# comments to ignore, along with a blank line`,
  24. ``,
  25. `env="HOME=/home/root2" ssh-rsa ` + validKey + ` user2@host2`,
  26. ``,
  27. `# more comments, plus a invalid entry`,
  28. `ssh-rsa data-that-will-not-parse user@host3`,
  29. }
  30. authOptions = strings.Join(authWithOptions, "\n")
  31. authWithCRLF = strings.Join(authWithOptions, "\r\n")
  32. authInvalid = []byte(`ssh-rsa`)
  33. authWithQuotedCommaInEnv = []byte(`env="HOME=/home/root,dir",no-port-forwarding ssh-rsa ` + validKey + ` user@host`)
  34. authWithQuotedSpaceInEnv = []byte(`env="HOME=/home/root dir",no-port-forwarding ssh-rsa ` + validKey + ` user@host`)
  35. authWithQuotedQuoteInEnv = []byte(`env="HOME=/home/\"root dir",no-port-forwarding` + "\t" + `ssh-rsa` + "\t" + validKey + ` user@host`)
  36. authWithDoubleQuotedQuote = []byte(`no-port-forwarding,env="HOME=/home/ \"root dir\"" ssh-rsa ` + validKey + "\t" + `user@host`)
  37. authWithInvalidSpace = []byte(`env="HOME=/home/root dir", no-port-forwarding ssh-rsa ` + validKey + ` user@host
  38. #more to follow but still no valid keys`)
  39. authWithMissingQuote = []byte(`env="HOME=/home/root,no-port-forwarding ssh-rsa ` + validKey + ` user@host
  40. env="HOME=/home/root",shared-control ssh-rsa ` + validKey + ` user@host`)
  41. testClientPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
  42. MIIEowIBAAKCAQEAxF/3T7uD5rb4Cty2vc4qAhA6yclK+sRCCuz6/qy4MnXKlk1P
  43. 5Le8O4CozsOL784B34ypdPQlsr4G/suXQok5PTMSPnqxjYbN6cGqEvhGrwG2sAe4
  44. hKmMk3qd2GiSvuESeDl+2ZVzACDK0y/lFayvPbeeoQpBWGgIKN1WPs+q2/292wwW
  45. LRNWNrUuwt2ru92g4Hm/abCK0lfOrnCgU5eV+thZ2IshnfvsQpyweri8YpjOTil3
  46. y8yUDUv0MmcpNdoNw/MuvV8NRswkil9btfjEG6Mn9ByXBtq8lAix3XA1aaQKch8d
  47. ji6ud4ZZEP8sXX5Q6gqgBOI/naGoErCHwtU9kwIDAQABAoIBAFJRKAp0QEZmTHPB
  48. MZk+4r0asIoFpziXLFgIHu7C2DPOzK1Umzj1DCKlPB3wOqi7Ym2jOSWdcnAK2EPW
  49. dAGgJC5TSkKGjAcXixmB5RkumfKidUI0+lQh/puTurcMnvcEwglDkLkEvMBA/sSo
  50. Pw9m486rOgOnmNzGPyViItURmD2+0yDdLl/vOsO/L1p76GCd0q0J3LqnmsQmawi7
  51. Zwj2Stm6BIrggG5GsF204Iet5219TYLo4g1Qb2AlJ9C8P1FtAWhMwJalDxH9Os2/
  52. KCDjnaq5n3bXbIU+3QjskjeVXL/Fnbhjnh4zs1EA7eHzl9dCGbcZ2LOimo2PRo8q
  53. wVQmz4ECgYEA9dhiu74TxRVoaO5N2X+FsMzRO8gZdP3Z9IrV4jVN8WT4Vdp0snoF
  54. gkVkqqbQUNKUb5K6B3Js/qNKfcjLbCNq9fewTcT6WsHQdtPbX/QA6Pa2Z29wrlA2
  55. wrIYaAkmVaHny7wsOmgX01aOnuf2MlUnksK43sjZHdIo/m+sDKwwY1cCgYEAzHx4
  56. mwUDMdRF4qpDKJhthraBNejRextNQQYsHVnNaMwZ4aeQcH5l85Cgjm7VpGlbVyBQ
  57. h4zwFvllImp3D2U3mjVkV8Tm9ID98eWvw2YDzBnS3P3SysajD23Z+BXSG9GNv/8k
  58. oAm+bVlvnJy4haK2AcIMk1YFuDuAOmy73abk7iUCgYEAj4qVM1sq/eKfAM1LJRfg
  59. /jbIX+hYfMePD8pUUWygIra6jJ4tjtvSBZrwyPb3IImjY3W/KoP0AcVjxAeORohz
  60. dkP1a6L8LiuFxSuzpdW5BkyuebxGhXCOWKVVvMDC4jLTPVCUXlHSv3GFemCjjgXM
  61. QlNxT5rjsha4Gr8nLIsJAacCgYA4VA1Q/pd7sXKy1p37X8nD8yAyvnh+Be5I/C9I
  62. woUP2jFC9MqYAmmJJ4ziz2swiAkuPeuQ+2Tjnz2ZtmQnrIUdiJmkh8vrDGFnshKx
  63. q7deELsCPzVCwGcIiAUkDra7DQWUHu9y2lxHePyC0rUNst2aLF8UcvzOXC2danhx
  64. vViQtQKBgCmZ7YavE/GNWww8N3xHBJ6UPmUuhQlnAbgNCcdyz30MevBg/JbyUTs2
  65. slftTH15QusJ1UoITnnZuFJ40LqDvh8UhiK09ffM/IbUx839/m2vUOdFZB/WNn9g
  66. Cy0LzddU4KE8JZ/tlk68+hM5fjLLA0aqSunaql5CKfplwLu8x1hL
  67. -----END RSA PRIVATE KEY-----
  68. `
  69. keys = map[string]string{
  70. "ssh_host_dsa_key": `-----BEGIN DSA PRIVATE KEY-----
  71. MIIBugIBAAKBgQDe2SIKvZdBp+InawtSXH0NotiMPhm3udyu4hh/E+icMz264kDX
  72. v+sV7ddnSQGQWZ/eVU7Jtx29dCMD1VlFpEd7yGKzmdwJIeA+YquNWoqBRQEJsWWS
  73. 7Fsfvv83dA/DTNIQfOY3+TIs6Mb9vagbgQMU3JUWEhbLE9LCEU6UwwRlpQIVAL4p
  74. JF83SwpE8Jx6KnDpR89npkl/AoGAAy00TdDnAXvStwrZiAFbjZi8xDmPa9WwpfhJ
  75. Rkno45TthDLrS+WmqY8/LTwlqZdOBtoBAynMJfKkUiZM21lWWpL1hRKYdwBlIBy5
  76. XdR2/6wcPSuZ0tCQhDBTstX0Q3P1j198KGKvzy7q9vILKQwtSRqLS1y4JJERafdO
  77. E+9CnGwCgYBz0WwBe2EZtGhGhBdnelTIBeo7PIsr0PzqxQj+dc8PBl8K9FfhRyOp
  78. U39stUvoUxE9vaIFrY1P5xENjLFnPf+hlcuf40GUWEssW9YWPOaBp8afa9hY5Sxs
  79. pvNR6eZFEFOJnx/ZgcA4g+vbrgGi5cM0W470mbGw2CkfJQUafdoIgAIUF+2I9kZe
  80. 2FTBuC9uacqczDlc+0k=
  81. -----END DSA PRIVATE KEY-----`,
  82. "ssh_host_rsa_key": `-----BEGIN RSA PRIVATE KEY-----
  83. MIIEowIBAAKCAQEAuf76Ue2Wtae9oDtaS6rIJgO7iCFTsZUTW9LBsvx/2nli6jKU
  84. d9tUbBRzgdbnRLJ32UljXhERuB/axlrX8/lBzUZ+oYiM0KkEEOXY1z/bcMxdRxGF
  85. XHuf4uXvyC2XyA4+ZvBeS4j1QFyIHZ62o7gAlKMTjiek3B4AQEJAlCLmhH3jB8wc
  86. K/IYXAOlNGM5G44/ZLQpTi8diOV6DLs7tJ7rtEQedOEJfZng5rwp0USFkqcbfDbe
  87. 9/hk0J32jZvOtZNBokYtBb4YEdIiWBzzNtHzU3Dzw61+TKVXaH5HaIvzL9iMrw9f
  88. kJbJyogfZk9BJfemEN+xqP72jlhE8LXNhpTxFQIDAQABAoIBAHbdf+Y5+5XuNF6h
  89. b8xpwW2h9whBnDYiOnP1VfroKWFbMB7R4lZS4joMO+FfkP8zOyqvHwTvza4pFWys
  90. g9SUmDvy8FyVYsC7MzEFYzX0xm3o/Te898ip7P1Zy4rXsGeWysSImwqU5X+TYx3i
  91. 33/zyNM1APtZVJ+jwK9QZ+sD/uPuZK2yS03HGSMZq6ebdoOSaYhluKrxXllSLO1J
  92. KJxDiDdy2lEFw0W8HcI3ly1lg6OI+TRqqaCcLVNF4fNJmYIFM+2VEI9BdgynIh0Q
  93. pMZlJKgaEBcSqCymnTK81ohYD1cV4st2B0km3Sw35Rl04Ij5ITeiya3hp8VfE6UY
  94. PljkA6UCgYEA4811FTFj+kzNZ86C4OW1T5sM4NZt8gcz6CSvVnl+bDzbEOMMyzP7
  95. 2I9zKsR5ApdodH2m8d+RUw1Oe0bNGW5xig/DH/hn9lLQaO52JAi0we8A94dUUMSq
  96. fUk9jKZEXpP/MlfTdJaPos9mxT7z8jREQxIiqH9AV0rLVDOCfDbSWj8CgYEA0QTE
  97. IAUuki3UUqYKzLQrh/QmhY5KTx5amNW9XZ2VGtJvDPJrtBSBZlPEuXZAc4eBWEc7
  98. U3Y9QwsalzupU6Yi6+gmofaXs8xJnj+jKth1DnJvrbLLGlSmf2Ijnwt22TyFUOtt
  99. UAknpjHutDjQPf7pUGWaCPgwwKFsdB8EBjpJF6sCgYAfXesBQAvEK08dPBJJZVfR
  100. 3kenrd71tIgxLtv1zETcIoUHjjv0vvOunhH9kZAYC0EWyTZzl5UrGmn0D4uuNMbt
  101. e74iaNHn2P9Zc3xQ+eHp0j8P1lKFzI6tMaiH9Vz0qOw6wl0bcJ/WizhbcI+migvc
  102. MGMVUHBLlMDqly0gbWwJgQKBgQCgtb9ut01FjANSwORQ3L8Tu3/a9Lrh9n7GQKFn
  103. V4CLrP1BwStavOF5ojMCPo/zxF6JV8ufsqwL3n/FhFP/QyBarpb1tTqTPiHkkR2O
  104. Ffx67TY9IdnUFv4lt3mYEiKBiW0f+MSF42Qe/wmAfKZw5IzUCirTdrFVi0huSGK5
  105. vxrwHQKBgHZ7RoC3I2f6F5fflA2ZAe9oJYC7XT624rY7VeOBwK0W0F47iV3euPi/
  106. pKvLIBLcWL1Lboo+girnmSZtIYg2iLS3b4T9VFcKWg0y4AVwmhMWe9jWIltfWAAX
  107. 9l0lNikMRGAx3eXudKXEtbGt3/cUzPVaQUHy5LiBxkxnFxgaJPXs
  108. -----END RSA PRIVATE KEY-----`,
  109. "ssh_host_ecdsa_key": `-----BEGIN EC PRIVATE KEY-----
  110. MHcCAQEEINGWx0zo6fhJ/0EAfrPzVFyFC9s18lBt3cRoEDhS3ARooAoGCCqGSM49
  111. AwEHoUQDQgAEi9Hdw6KvZcWxfg2IDhA7UkpDtzzt6ZqJXSsFdLd+Kx4S3Sx4cVO+
  112. 6/ZOXRnPmNAlLUqjShUsUBBngG0u2fqEqA==
  113. -----END EC PRIVATE KEY-----`,
  114. "authorized_keys": `ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEX/dPu4PmtvgK3La9zioCEDrJyUr6xEIK7Pr+rLgydcqWTU/kt7w7gKjOw4vvzgHfjKl09CWyvgb+y5dCiTk9MxI+erGNhs3pwaoS+EavAbawB7iEqYyTep3YaJK+4RJ4OX7ZlXMAIMrTL+UVrK89t56hCkFYaAgo3VY+z6rb/b3bDBYtE1Y2tS7C3au73aDgeb9psIrSV86ucKBTl5X62FnYiyGd++xCnLB6uLximM5OKXfLzJQNS/QyZyk12g3D8y69Xw1GzCSKX1u1+MQboyf0HJcG2ryUCLHdcDVppApyHx2OLq53hlkQ/yxdflDqCqAE4j+doagSsIfC1T2T user@host`,
  115. }
  116. )
  117. func TestMarshalParsePublicKey(t *testing.T) {
  118. pub := getTestPublicKey(t)
  119. authKeys := ssh.MarshalAuthorizedKey(pub)
  120. actualFields := strings.Fields(string(authKeys))
  121. if len(actualFields) == 0 {
  122. t.Fatalf("failed authKeys: %v", authKeys)
  123. }
  124. // drop the comment
  125. expectedFields := strings.Fields(keys["authorized_keys"])[0:2]
  126. if !reflect.DeepEqual(actualFields, expectedFields) {
  127. t.Errorf("got %v, expected %v", actualFields, expectedFields)
  128. }
  129. actPub, _, _, _, ok := ssh.ParseAuthorizedKey([]byte(keys["authorized_keys"]))
  130. if !ok {
  131. t.Fatalf("cannot parse %v", keys["authorized_keys"])
  132. }
  133. if !reflect.DeepEqual(actPub, pub) {
  134. t.Errorf("got %v, expected %v", actPub, pub)
  135. }
  136. }
  137. type authResult struct {
  138. pubKey interface{} //*rsa.PublicKey
  139. options []string
  140. comments string
  141. rest string
  142. ok bool
  143. }
  144. func testAuthorizedKeys(t *testing.T, authKeys []byte, expected []authResult) {
  145. rest := authKeys
  146. var values []authResult
  147. for len(rest) > 0 {
  148. var r authResult
  149. r.pubKey, r.comments, r.options, rest, r.ok = ssh.ParseAuthorizedKey(rest)
  150. r.rest = string(rest)
  151. values = append(values, r)
  152. }
  153. if !reflect.DeepEqual(values, expected) {
  154. t.Errorf("got %q, expected %q", values, expected)
  155. }
  156. }
  157. func getTestPublicKey(t *testing.T) *rsa.PublicKey {
  158. block, _ := pem.Decode([]byte(testClientPrivateKey))
  159. if block == nil {
  160. t.Fatalf("pem.Decode: %v", testClientPrivateKey)
  161. }
  162. priv, err := x509.ParsePKCS1PrivateKey(block.Bytes)
  163. if err != nil {
  164. t.Fatalf("x509.ParsePKCS1PrivateKey: %v", err)
  165. }
  166. return &priv.PublicKey
  167. }
  168. func TestAuth(t *testing.T) {
  169. pub := getTestPublicKey(t)
  170. rest2 := strings.Join(authWithOptions[3:], "\n")
  171. rest3 := strings.Join(authWithOptions[6:], "\n")
  172. testAuthorizedKeys(t, []byte(authOptions), []authResult{
  173. {pub, []string{`env="HOME=/home/root"`, "no-port-forwarding"}, "user@host", rest2, true},
  174. {pub, []string{`env="HOME=/home/root2"`}, "user2@host2", rest3, true},
  175. {nil, nil, "", "", false},
  176. })
  177. }
  178. func TestAuthWithCRLF(t *testing.T) {
  179. pub := getTestPublicKey(t)
  180. rest2 := strings.Join(authWithOptions[3:], "\r\n")
  181. rest3 := strings.Join(authWithOptions[6:], "\r\n")
  182. testAuthorizedKeys(t, []byte(authWithCRLF), []authResult{
  183. {pub, []string{`env="HOME=/home/root"`, "no-port-forwarding"}, "user@host", rest2, true},
  184. {pub, []string{`env="HOME=/home/root2"`}, "user2@host2", rest3, true},
  185. {nil, nil, "", "", false},
  186. })
  187. }
  188. func TestAuthWithQuotedSpaceInEnv(t *testing.T) {
  189. pub := getTestPublicKey(t)
  190. testAuthorizedKeys(t, []byte(authWithQuotedSpaceInEnv), []authResult{
  191. {pub, []string{`env="HOME=/home/root dir"`, "no-port-forwarding"}, "user@host", "", true},
  192. })
  193. }
  194. func TestAuthWithQuotedCommaInEnv(t *testing.T) {
  195. pub := getTestPublicKey(t)
  196. testAuthorizedKeys(t, []byte(authWithQuotedCommaInEnv), []authResult{
  197. {pub, []string{`env="HOME=/home/root,dir"`, "no-port-forwarding"}, "user@host", "", true},
  198. })
  199. }
  200. func TestAuthWithQuotedQuoteInEnv(t *testing.T) {
  201. pub := getTestPublicKey(t)
  202. testAuthorizedKeys(t, []byte(authWithQuotedQuoteInEnv), []authResult{
  203. {pub, []string{`env="HOME=/home/\"root dir"`, "no-port-forwarding"}, "user@host", "", true},
  204. })
  205. testAuthorizedKeys(t, []byte(authWithDoubleQuotedQuote), []authResult{
  206. {pub, []string{"no-port-forwarding", `env="HOME=/home/ \"root dir\""`}, "user@host", "", true},
  207. })
  208. }
  209. func TestAuthWithInvalidSpace(t *testing.T) {
  210. testAuthorizedKeys(t, []byte(authWithInvalidSpace), []authResult{
  211. {nil, nil, "", "", false},
  212. })
  213. }
  214. func TestAuthWithMissingQuote(t *testing.T) {
  215. pub := getTestPublicKey(t)
  216. testAuthorizedKeys(t, []byte(authWithMissingQuote), []authResult{
  217. {pub, []string{`env="HOME=/home/root"`, `shared-control`}, "user@host", "", true},
  218. })
  219. }
  220. func TestInvalidEntry(t *testing.T) {
  221. _, _, _, _, ok := ssh.ParseAuthorizedKey(authInvalid)
  222. if ok {
  223. t.Errorf("Expected invalid entry, returned valid entry")
  224. }
  225. }