client_auth_test.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto"
  8. "crypto/dsa"
  9. "crypto/rsa"
  10. _ "crypto/sha1"
  11. "crypto/x509"
  12. "encoding/pem"
  13. "errors"
  14. "io"
  15. "io/ioutil"
  16. "math/big"
  17. "testing"
  18. )
  19. // private key for mock server
  20. const testServerPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
  21. MIIEpAIBAAKCAQEA19lGVsTqIT5iiNYRgnoY1CwkbETW5cq+Rzk5v/kTlf31XpSU
  22. 70HVWkbTERECjaYdXM2gGcbb+sxpq6GtXf1M3kVomycqhxwhPv4Cr6Xp4WT/jkFx
  23. 9z+FFzpeodGJWjOH6L2H5uX1Cvr9EDdQp9t9/J32/qBFntY8GwoUI/y/1MSTmMiF
  24. tupdMODN064vd3gyMKTwrlQ8tZM6aYuyOPsutLlUY7M5x5FwMDYvnPDSeyT/Iw0z
  25. s3B+NCyqeeMd2T7YzQFnRATj0M7rM5LoSs7DVqVriOEABssFyLj31PboaoLhOKgc
  26. qoM9khkNzr7FHVvi+DhYM2jD0DwvqZLN6NmnLwIDAQABAoIBAQCGVj+kuSFOV1lT
  27. +IclQYA6bM6uY5mroqcSBNegVxCNhWU03BxlW//BE9tA/+kq53vWylMeN9mpGZea
  28. riEMIh25KFGWXqXlOOioH8bkMsqA8S7sBmc7jljyv+0toQ9vCCtJ+sueNPhxQQxH
  29. D2YvUjfzBQ04I9+wn30BByDJ1QA/FoPsunxIOUCcRBE/7jxuLYcpR+JvEF68yYIh
  30. atXRld4W4in7T65YDR8jK1Uj9XAcNeDYNpT/M6oFLx1aPIlkG86aCWRO19S1jLPT
  31. b1ZAKHHxPMCVkSYW0RqvIgLXQOR62D0Zne6/2wtzJkk5UCjkSQ2z7ZzJpMkWgDgN
  32. ifCULFPBAoGBAPoMZ5q1w+zB+knXUD33n1J+niN6TZHJulpf2w5zsW+m2K6Zn62M
  33. MXndXlVAHtk6p02q9kxHdgov34Uo8VpuNjbS1+abGFTI8NZgFo+bsDxJdItemwC4
  34. KJ7L1iz39hRN/ZylMRLz5uTYRGddCkeIHhiG2h7zohH/MaYzUacXEEy3AoGBANz8
  35. e/msleB+iXC0cXKwds26N4hyMdAFE5qAqJXvV3S2W8JZnmU+sS7vPAWMYPlERPk1
  36. D8Q2eXqdPIkAWBhrx4RxD7rNc5qFNcQWEhCIxC9fccluH1y5g2M+4jpMX2CT8Uv+
  37. 3z+NoJ5uDTXZTnLCfoZzgZ4nCZVZ+6iU5U1+YXFJAoGBANLPpIV920n/nJmmquMj
  38. orI1R/QXR9Cy56cMC65agezlGOfTYxk5Cfl5Ve+/2IJCfgzwJyjWUsFx7RviEeGw
  39. 64o7JoUom1HX+5xxdHPsyZ96OoTJ5RqtKKoApnhRMamau0fWydH1yeOEJd+TRHhc
  40. XStGfhz8QNa1dVFvENczja1vAoGABGWhsd4VPVpHMc7lUvrf4kgKQtTC2PjA4xoc
  41. QJ96hf/642sVE76jl+N6tkGMzGjnVm4P2j+bOy1VvwQavKGoXqJBRd5Apppv727g
  42. /SM7hBXKFc/zH80xKBBgP/i1DR7kdjakCoeu4ngeGywvu2jTS6mQsqzkK+yWbUxJ
  43. I7mYBsECgYB/KNXlTEpXtz/kwWCHFSYA8U74l7zZbVD8ul0e56JDK+lLcJ0tJffk
  44. gqnBycHj6AhEycjda75cs+0zybZvN4x65KZHOGW/O/7OAWEcZP5TPb3zf9ned3Hl
  45. NsZoFj52ponUM6+99A2CmezFCN16c4mbA//luWF+k3VVqR6BpkrhKw==
  46. -----END RSA PRIVATE KEY-----`
  47. const testClientPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
  48. MIIBOwIBAAJBALdGZxkXDAjsYk10ihwU6Id2KeILz1TAJuoq4tOgDWxEEGeTrcld
  49. r/ZwVaFzjWzxaf6zQIJbfaSEAhqD5yo72+sCAwEAAQJBAK8PEVU23Wj8mV0QjwcJ
  50. tZ4GcTUYQL7cF4+ezTCE9a1NrGnCP2RuQkHEKxuTVrxXt+6OF15/1/fuXnxKjmJC
  51. nxkCIQDaXvPPBi0c7vAxGwNY9726x01/dNbHCE0CBtcotobxpwIhANbbQbh3JHVW
  52. 2haQh4fAG5mhesZKAGcxTyv4mQ7uMSQdAiAj+4dzMpJWdSzQ+qGHlHMIBvVHLkqB
  53. y2VdEyF7DPCZewIhAI7GOI/6LDIFOvtPo6Bj2nNmyQ1HU6k/LRtNIXi4c9NJAiAr
  54. rrxx26itVhJmcvoUhOjwuzSlP2bE5VHAvkGB352YBg==
  55. -----END RSA PRIVATE KEY-----`
  56. // keychain implements the ClientPublickey interface
  57. type keychain struct {
  58. keys []interface{}
  59. }
  60. func (k *keychain) Key(i int) (interface{}, error) {
  61. if i < 0 || i >= len(k.keys) {
  62. return nil, nil
  63. }
  64. switch key := k.keys[i].(type) {
  65. case *rsa.PrivateKey:
  66. return key.PublicKey, nil
  67. case *dsa.PrivateKey:
  68. return key.PublicKey, nil
  69. }
  70. panic("unknown key type")
  71. }
  72. func (k *keychain) Sign(i int, rand io.Reader, data []byte) (sig []byte, err error) {
  73. hashFunc := crypto.SHA1
  74. h := hashFunc.New()
  75. h.Write(data)
  76. digest := h.Sum(nil)
  77. switch key := k.keys[i].(type) {
  78. case *rsa.PrivateKey:
  79. return rsa.SignPKCS1v15(rand, key, hashFunc, digest)
  80. }
  81. return nil, errors.New("unknown key type")
  82. }
  83. func (k *keychain) loadPEM(file string) error {
  84. buf, err := ioutil.ReadFile(file)
  85. if err != nil {
  86. return err
  87. }
  88. block, _ := pem.Decode(buf)
  89. if block == nil {
  90. return errors.New("ssh: no key found")
  91. }
  92. r, err := x509.ParsePKCS1PrivateKey(block.Bytes)
  93. if err != nil {
  94. return err
  95. }
  96. k.keys = append(k.keys, r)
  97. return nil
  98. }
  99. // password implements the ClientPassword interface
  100. type password string
  101. func (p password) Password(user string) (string, error) {
  102. return string(p), nil
  103. }
  104. // reused internally by tests
  105. var (
  106. rsakey *rsa.PrivateKey
  107. dsakey *dsa.PrivateKey
  108. clientKeychain = new(keychain)
  109. clientPassword = password("tiger")
  110. serverConfig = &ServerConfig{
  111. PasswordCallback: func(user, pass string) bool {
  112. return user == "testuser" && pass == string(clientPassword)
  113. },
  114. PublicKeyCallback: func(user, algo string, pubkey []byte) bool {
  115. key := clientKeychain.keys[0].(*rsa.PrivateKey).PublicKey
  116. expected := []byte(serializePublickey(key))
  117. algoname := algoName(key)
  118. return user == "testuser" && algo == algoname && bytes.Equal(pubkey, expected)
  119. },
  120. }
  121. )
  122. func init() {
  123. if err := serverConfig.SetRSAPrivateKey([]byte(testServerPrivateKey)); err != nil {
  124. panic("unable to set private key: " + err.Error())
  125. }
  126. block, _ := pem.Decode([]byte(testClientPrivateKey))
  127. rsakey, _ = x509.ParsePKCS1PrivateKey(block.Bytes)
  128. clientKeychain.keys = append(clientKeychain.keys, rsakey)
  129. dsakey = new(dsa.PrivateKey)
  130. // taken from crypto/dsa/dsa_test.go
  131. dsakey.P, _ = new(big.Int).SetString("A9B5B793FB4785793D246BAE77E8FF63CA52F442DA763C440259919FE1BC1D6065A9350637A04F75A2F039401D49F08E066C4D275A5A65DA5684BC563C14289D7AB8A67163BFBF79D85972619AD2CFF55AB0EE77A9002B0EF96293BDD0F42685EBB2C66C327079F6C98000FBCB79AACDE1BC6F9D5C7B1A97E3D9D54ED7951FEF", 16)
  132. dsakey.Q, _ = new(big.Int).SetString("E1D3391245933D68A0714ED34BBCB7A1F422B9C1", 16)
  133. dsakey.G, _ = new(big.Int).SetString("634364FC25248933D01D1993ECABD0657CC0CB2CEED7ED2E3E8AECDFCDC4A25C3B15E9E3B163ACA2984B5539181F3EFF1A5E8903D71D5B95DA4F27202B77D2C44B430BB53741A8D59A8F86887525C9F2A6A5980A195EAA7F2FF910064301DEF89D3AA213E1FAC7768D89365318E370AF54A112EFBA9246D9158386BA1B4EEFDA", 16)
  134. dsakey.Y, _ = new(big.Int).SetString("32969E5780CFE1C849A1C276D7AEB4F38A23B591739AA2FE197349AEEBD31366AEE5EB7E6C6DDB7C57D02432B30DB5AA66D9884299FAA72568944E4EEDC92EA3FBC6F39F53412FBCC563208F7C15B737AC8910DBC2D9C9B8C001E72FDC40EB694AB1F06A5A2DBD18D9E36C66F31F566742F11EC0A52E9F7B89355C02FB5D32D2", 16)
  135. dsakey.X, _ = new(big.Int).SetString("5078D4D29795CBE76D3AACFE48C9AF0BCDBEE91A", 16)
  136. }
  137. // newMockAuthServer creates a new Server bound to
  138. // the loopback interface. The server exits after
  139. // processing one handshake.
  140. func newMockAuthServer(t *testing.T) string {
  141. l, err := Listen("tcp", "127.0.0.1:0", serverConfig)
  142. if err != nil {
  143. t.Fatalf("unable to newMockAuthServer: %s", err)
  144. }
  145. go func() {
  146. defer l.Close()
  147. c, err := l.Accept()
  148. defer c.Close()
  149. if err != nil {
  150. t.Errorf("Unable to accept incoming connection: %v", err)
  151. return
  152. }
  153. if err := c.Handshake(); err != nil {
  154. // not Errorf because this is expected to
  155. // fail for some tests.
  156. t.Logf("Handshaking error: %v", err)
  157. return
  158. }
  159. }()
  160. return l.Addr().String()
  161. }
  162. func TestClientAuthPublickey(t *testing.T) {
  163. config := &ClientConfig{
  164. User: "testuser",
  165. Auth: []ClientAuth{
  166. ClientAuthKeyring(clientKeychain),
  167. },
  168. }
  169. c, err := Dial("tcp", newMockAuthServer(t), config)
  170. if err != nil {
  171. t.Fatalf("unable to dial remote side: %s", err)
  172. }
  173. c.Close()
  174. }
  175. func TestClientAuthPassword(t *testing.T) {
  176. config := &ClientConfig{
  177. User: "testuser",
  178. Auth: []ClientAuth{
  179. ClientAuthPassword(clientPassword),
  180. },
  181. }
  182. c, err := Dial("tcp", newMockAuthServer(t), config)
  183. if err != nil {
  184. t.Fatalf("unable to dial remote side: %s", err)
  185. }
  186. c.Close()
  187. }
  188. func TestClientAuthWrongPassword(t *testing.T) {
  189. wrongPw := password("wrong")
  190. config := &ClientConfig{
  191. User: "testuser",
  192. Auth: []ClientAuth{
  193. ClientAuthPassword(wrongPw),
  194. ClientAuthKeyring(clientKeychain),
  195. },
  196. }
  197. c, err := Dial("tcp", newMockAuthServer(t), config)
  198. if err != nil {
  199. t.Fatalf("unable to dial remote side: %s", err)
  200. }
  201. c.Close()
  202. }
  203. // the mock server will only authenticate ssh-rsa keys
  204. func TestClientAuthInvalidPublickey(t *testing.T) {
  205. kc := new(keychain)
  206. kc.keys = append(kc.keys, dsakey)
  207. config := &ClientConfig{
  208. User: "testuser",
  209. Auth: []ClientAuth{
  210. ClientAuthKeyring(kc),
  211. },
  212. }
  213. c, err := Dial("tcp", newMockAuthServer(t), config)
  214. if err == nil {
  215. c.Close()
  216. t.Fatalf("dsa private key should not have authenticated with rsa public key")
  217. }
  218. }
  219. // the client should authenticate with the second key
  220. func TestClientAuthRSAandDSA(t *testing.T) {
  221. kc := new(keychain)
  222. kc.keys = append(kc.keys, dsakey, rsakey)
  223. config := &ClientConfig{
  224. User: "testuser",
  225. Auth: []ClientAuth{
  226. ClientAuthKeyring(kc),
  227. },
  228. }
  229. c, err := Dial("tcp", newMockAuthServer(t), config)
  230. if err != nil {
  231. t.Fatalf("client could not authenticate with rsa key: %v", err)
  232. }
  233. c.Close()
  234. }