client_auth_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472
  1. // Copyright 2011 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "os"
  11. "strings"
  12. "testing"
  13. )
  14. type keyboardInteractive map[string]string
  15. func (cr keyboardInteractive) Challenge(user string, instruction string, questions []string, echos []bool) ([]string, error) {
  16. var answers []string
  17. for _, q := range questions {
  18. answers = append(answers, cr[q])
  19. }
  20. return answers, nil
  21. }
  22. // reused internally by tests
  23. var clientPassword = "tiger"
  24. // tryAuth runs a handshake with a given config against an SSH server
  25. // with config serverConfig
  26. func tryAuth(t *testing.T, config *ClientConfig) error {
  27. c1, c2, err := netPipe()
  28. if err != nil {
  29. t.Fatalf("netPipe: %v", err)
  30. }
  31. defer c1.Close()
  32. defer c2.Close()
  33. certChecker := CertChecker{
  34. IsAuthority: func(k PublicKey) bool {
  35. return bytes.Equal(k.Marshal(), testPublicKeys["ecdsa"].Marshal())
  36. },
  37. UserKeyFallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  38. if conn.User() == "testuser" && bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) {
  39. return nil, nil
  40. }
  41. return nil, fmt.Errorf("pubkey for %q not acceptable", conn.User())
  42. },
  43. IsRevoked: func(c *Certificate) bool {
  44. return c.Serial == 666
  45. },
  46. }
  47. serverConfig := &ServerConfig{
  48. PasswordCallback: func(conn ConnMetadata, pass []byte) (*Permissions, error) {
  49. if conn.User() == "testuser" && string(pass) == clientPassword {
  50. return nil, nil
  51. }
  52. return nil, errors.New("password auth failed")
  53. },
  54. PublicKeyCallback: certChecker.Authenticate,
  55. KeyboardInteractiveCallback: func(conn ConnMetadata, challenge KeyboardInteractiveChallenge) (*Permissions, error) {
  56. ans, err := challenge("user",
  57. "instruction",
  58. []string{"question1", "question2"},
  59. []bool{true, true})
  60. if err != nil {
  61. return nil, err
  62. }
  63. ok := conn.User() == "testuser" && ans[0] == "answer1" && ans[1] == "answer2"
  64. if ok {
  65. challenge("user", "motd", nil, nil)
  66. return nil, nil
  67. }
  68. return nil, errors.New("keyboard-interactive failed")
  69. },
  70. AuthLogCallback: func(conn ConnMetadata, method string, err error) {
  71. t.Logf("user %q, method %q: %v", conn.User(), method, err)
  72. },
  73. }
  74. serverConfig.AddHostKey(testSigners["rsa"])
  75. go newServer(c1, serverConfig)
  76. _, _, _, err = NewClientConn(c2, "", config)
  77. return err
  78. }
  79. func TestClientAuthPublicKey(t *testing.T) {
  80. config := &ClientConfig{
  81. User: "testuser",
  82. Auth: []AuthMethod{
  83. PublicKeys(testSigners["rsa"]),
  84. },
  85. }
  86. if err := tryAuth(t, config); err != nil {
  87. t.Fatalf("unable to dial remote side: %s", err)
  88. }
  89. }
  90. func TestAuthMethodPassword(t *testing.T) {
  91. config := &ClientConfig{
  92. User: "testuser",
  93. Auth: []AuthMethod{
  94. Password(clientPassword),
  95. },
  96. }
  97. if err := tryAuth(t, config); err != nil {
  98. t.Fatalf("unable to dial remote side: %s", err)
  99. }
  100. }
  101. func TestAuthMethodFallback(t *testing.T) {
  102. var passwordCalled bool
  103. config := &ClientConfig{
  104. User: "testuser",
  105. Auth: []AuthMethod{
  106. PublicKeys(testSigners["rsa"]),
  107. PasswordCallback(
  108. func() (string, error) {
  109. passwordCalled = true
  110. return "WRONG", nil
  111. }),
  112. },
  113. }
  114. if err := tryAuth(t, config); err != nil {
  115. t.Fatalf("unable to dial remote side: %s", err)
  116. }
  117. if passwordCalled {
  118. t.Errorf("password auth tried before public-key auth.")
  119. }
  120. }
  121. func TestAuthMethodWrongPassword(t *testing.T) {
  122. config := &ClientConfig{
  123. User: "testuser",
  124. Auth: []AuthMethod{
  125. Password("wrong"),
  126. PublicKeys(testSigners["rsa"]),
  127. },
  128. }
  129. if err := tryAuth(t, config); err != nil {
  130. t.Fatalf("unable to dial remote side: %s", err)
  131. }
  132. }
  133. func TestAuthMethodKeyboardInteractive(t *testing.T) {
  134. answers := keyboardInteractive(map[string]string{
  135. "question1": "answer1",
  136. "question2": "answer2",
  137. })
  138. config := &ClientConfig{
  139. User: "testuser",
  140. Auth: []AuthMethod{
  141. KeyboardInteractive(answers.Challenge),
  142. },
  143. }
  144. if err := tryAuth(t, config); err != nil {
  145. t.Fatalf("unable to dial remote side: %s", err)
  146. }
  147. }
  148. func TestAuthMethodWrongKeyboardInteractive(t *testing.T) {
  149. answers := keyboardInteractive(map[string]string{
  150. "question1": "answer1",
  151. "question2": "WRONG",
  152. })
  153. config := &ClientConfig{
  154. User: "testuser",
  155. Auth: []AuthMethod{
  156. KeyboardInteractive(answers.Challenge),
  157. },
  158. }
  159. if err := tryAuth(t, config); err == nil {
  160. t.Fatalf("wrong answers should not have authenticated with KeyboardInteractive")
  161. }
  162. }
  163. // the mock server will only authenticate ssh-rsa keys
  164. func TestAuthMethodInvalidPublicKey(t *testing.T) {
  165. config := &ClientConfig{
  166. User: "testuser",
  167. Auth: []AuthMethod{
  168. PublicKeys(testSigners["dsa"]),
  169. },
  170. }
  171. if err := tryAuth(t, config); err == nil {
  172. t.Fatalf("dsa private key should not have authenticated with rsa public key")
  173. }
  174. }
  175. // the client should authenticate with the second key
  176. func TestAuthMethodRSAandDSA(t *testing.T) {
  177. config := &ClientConfig{
  178. User: "testuser",
  179. Auth: []AuthMethod{
  180. PublicKeys(testSigners["dsa"], testSigners["rsa"]),
  181. },
  182. }
  183. if err := tryAuth(t, config); err != nil {
  184. t.Fatalf("client could not authenticate with rsa key: %v", err)
  185. }
  186. }
  187. func TestClientHMAC(t *testing.T) {
  188. for _, mac := range supportedMACs {
  189. config := &ClientConfig{
  190. User: "testuser",
  191. Auth: []AuthMethod{
  192. PublicKeys(testSigners["rsa"]),
  193. },
  194. Config: Config{
  195. MACs: []string{mac},
  196. },
  197. }
  198. if err := tryAuth(t, config); err != nil {
  199. t.Fatalf("client could not authenticate with mac algo %s: %v", mac, err)
  200. }
  201. }
  202. }
  203. // issue 4285.
  204. func TestClientUnsupportedCipher(t *testing.T) {
  205. config := &ClientConfig{
  206. User: "testuser",
  207. Auth: []AuthMethod{
  208. PublicKeys(),
  209. },
  210. Config: Config{
  211. Ciphers: []string{"aes128-cbc"}, // not currently supported
  212. },
  213. }
  214. if err := tryAuth(t, config); err == nil {
  215. t.Errorf("expected no ciphers in common")
  216. }
  217. }
  218. func TestClientUnsupportedKex(t *testing.T) {
  219. if os.Getenv("GO_BUILDER_NAME") != "" {
  220. t.Skip("skipping known-flaky test on the Go build dashboard; see golang.org/issue/15198")
  221. }
  222. config := &ClientConfig{
  223. User: "testuser",
  224. Auth: []AuthMethod{
  225. PublicKeys(),
  226. },
  227. Config: Config{
  228. KeyExchanges: []string{"diffie-hellman-group-exchange-sha256"}, // not currently supported
  229. },
  230. }
  231. if err := tryAuth(t, config); err == nil || !strings.Contains(err.Error(), "common algorithm") {
  232. t.Errorf("got %v, expected 'common algorithm'", err)
  233. }
  234. }
  235. func TestClientLoginCert(t *testing.T) {
  236. cert := &Certificate{
  237. Key: testPublicKeys["rsa"],
  238. ValidBefore: CertTimeInfinity,
  239. CertType: UserCert,
  240. }
  241. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  242. certSigner, err := NewCertSigner(cert, testSigners["rsa"])
  243. if err != nil {
  244. t.Fatalf("NewCertSigner: %v", err)
  245. }
  246. clientConfig := &ClientConfig{
  247. User: "user",
  248. }
  249. clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner))
  250. t.Log("should succeed")
  251. if err := tryAuth(t, clientConfig); err != nil {
  252. t.Errorf("cert login failed: %v", err)
  253. }
  254. t.Log("corrupted signature")
  255. cert.Signature.Blob[0]++
  256. if err := tryAuth(t, clientConfig); err == nil {
  257. t.Errorf("cert login passed with corrupted sig")
  258. }
  259. t.Log("revoked")
  260. cert.Serial = 666
  261. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  262. if err := tryAuth(t, clientConfig); err == nil {
  263. t.Errorf("revoked cert login succeeded")
  264. }
  265. cert.Serial = 1
  266. t.Log("sign with wrong key")
  267. cert.SignCert(rand.Reader, testSigners["dsa"])
  268. if err := tryAuth(t, clientConfig); err == nil {
  269. t.Errorf("cert login passed with non-authoritative key")
  270. }
  271. t.Log("host cert")
  272. cert.CertType = HostCert
  273. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  274. if err := tryAuth(t, clientConfig); err == nil {
  275. t.Errorf("cert login passed with wrong type")
  276. }
  277. cert.CertType = UserCert
  278. t.Log("principal specified")
  279. cert.ValidPrincipals = []string{"user"}
  280. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  281. if err := tryAuth(t, clientConfig); err != nil {
  282. t.Errorf("cert login failed: %v", err)
  283. }
  284. t.Log("wrong principal specified")
  285. cert.ValidPrincipals = []string{"fred"}
  286. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  287. if err := tryAuth(t, clientConfig); err == nil {
  288. t.Errorf("cert login passed with wrong principal")
  289. }
  290. cert.ValidPrincipals = nil
  291. t.Log("added critical option")
  292. cert.CriticalOptions = map[string]string{"root-access": "yes"}
  293. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  294. if err := tryAuth(t, clientConfig); err == nil {
  295. t.Errorf("cert login passed with unrecognized critical option")
  296. }
  297. t.Log("allowed source address")
  298. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42/24"}
  299. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  300. if err := tryAuth(t, clientConfig); err != nil {
  301. t.Errorf("cert login with source-address failed: %v", err)
  302. }
  303. t.Log("disallowed source address")
  304. cert.CriticalOptions = map[string]string{"source-address": "127.0.0.42"}
  305. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  306. if err := tryAuth(t, clientConfig); err == nil {
  307. t.Errorf("cert login with source-address succeeded")
  308. }
  309. }
  310. func testPermissionsPassing(withPermissions bool, t *testing.T) {
  311. serverConfig := &ServerConfig{
  312. PublicKeyCallback: func(conn ConnMetadata, key PublicKey) (*Permissions, error) {
  313. if conn.User() == "nopermissions" {
  314. return nil, nil
  315. } else {
  316. return &Permissions{}, nil
  317. }
  318. },
  319. }
  320. serverConfig.AddHostKey(testSigners["rsa"])
  321. clientConfig := &ClientConfig{
  322. Auth: []AuthMethod{
  323. PublicKeys(testSigners["rsa"]),
  324. },
  325. }
  326. if withPermissions {
  327. clientConfig.User = "permissions"
  328. } else {
  329. clientConfig.User = "nopermissions"
  330. }
  331. c1, c2, err := netPipe()
  332. if err != nil {
  333. t.Fatalf("netPipe: %v", err)
  334. }
  335. defer c1.Close()
  336. defer c2.Close()
  337. go NewClientConn(c2, "", clientConfig)
  338. serverConn, err := newServer(c1, serverConfig)
  339. if err != nil {
  340. t.Fatal(err)
  341. }
  342. if p := serverConn.Permissions; (p != nil) != withPermissions {
  343. t.Fatalf("withPermissions is %t, but Permissions object is %#v", withPermissions, p)
  344. }
  345. }
  346. func TestPermissionsPassing(t *testing.T) {
  347. testPermissionsPassing(true, t)
  348. }
  349. func TestNoPermissionsPassing(t *testing.T) {
  350. testPermissionsPassing(false, t)
  351. }
  352. func TestRetryableAuth(t *testing.T) {
  353. n := 0
  354. passwords := []string{"WRONG1", "WRONG2"}
  355. config := &ClientConfig{
  356. User: "testuser",
  357. Auth: []AuthMethod{
  358. RetryableAuthMethod(PasswordCallback(func() (string, error) {
  359. p := passwords[n]
  360. n++
  361. return p, nil
  362. }), 2),
  363. PublicKeys(testSigners["rsa"]),
  364. },
  365. }
  366. if err := tryAuth(t, config); err != nil {
  367. t.Fatalf("unable to dial remote side: %s", err)
  368. }
  369. if n != 2 {
  370. t.Fatalf("Did not try all passwords")
  371. }
  372. }
  373. func ExampleRetryableAuthMethod(t *testing.T) {
  374. user := "testuser"
  375. NumberOfPrompts := 3
  376. // Normally this would be a callback that prompts the user to answer the
  377. // provided questions
  378. Cb := func(user, instruction string, questions []string, echos []bool) (answers []string, err error) {
  379. return []string{"answer1", "answer2"}, nil
  380. }
  381. config := &ClientConfig{
  382. User: user,
  383. Auth: []AuthMethod{
  384. RetryableAuthMethod(KeyboardInteractiveChallenge(Cb), NumberOfPrompts),
  385. },
  386. }
  387. if err := tryAuth(t, config); err != nil {
  388. t.Fatalf("unable to dial remote side: %s", err)
  389. }
  390. }
  391. // Test if username is received on server side when NoClientAuth is used
  392. func TestClientAuthNone(t *testing.T) {
  393. user := "testuser"
  394. serverConfig := &ServerConfig{
  395. NoClientAuth: true,
  396. }
  397. serverConfig.AddHostKey(testSigners["rsa"])
  398. clientConfig := &ClientConfig{
  399. User: user,
  400. }
  401. c1, c2, err := netPipe()
  402. if err != nil {
  403. t.Fatalf("netPipe: %v", err)
  404. }
  405. defer c1.Close()
  406. defer c2.Close()
  407. go NewClientConn(c2, "", clientConfig)
  408. serverConn, err := newServer(c1, serverConfig)
  409. if err != nil {
  410. t.Fatal("newServer: %v", err)
  411. }
  412. if serverConn.User() != user {
  413. t.Fatalf("server: got %q, want %q", serverConn.User(), user)
  414. }
  415. }