2019-08-18 06:34:03 +02:00
#!/usr/bin/env python3
2015-12-23 04:01:24 +01:00
# -*- coding: utf-8 -*-
"""
The MIT License ( MIT )
2020-02-09 00:44:42 +01:00
Copyright ( C ) 2017 - 2020 Joe Testa ( jtesta @positronsecurity.com )
2017-03-26 05:31:06 +02:00
Copyright ( C ) 2017 Andris Raugulis ( moo @arthepsy.eu )
2015-12-23 04:01:24 +01:00
Permission is hereby granted , free of charge , to any person obtaining a copy
of this software and associated documentation files ( the " Software " ) , to deal
in the Software without restriction , including without limitation the rights
to use , copy , modify , merge , publish , distribute , sublicense , and / or sell
copies of the Software , and to permit persons to whom the Software is
furnished to do so , subject to the following conditions :
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software .
THE SOFTWARE IS PROVIDED " AS IS " , WITHOUT WARRANTY OF ANY KIND , EXPRESS OR
IMPLIED , INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY ,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT . IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM , DAMAGES OR OTHER
LIABILITY , WHETHER IN AN ACTION OF CONTRACT , TORT OR OTHERWISE , ARISING FROM ,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE .
"""
from __future__ import print_function
2019-11-07 22:08:09 +01:00
import base64 , binascii , errno , hashlib , getopt , io , os , random , re , select , socket , struct , sys , json
2016-10-19 19:47:13 +02:00
2020-02-09 00:44:42 +01:00
2020-03-18 17:19:05 +01:00
VERSION = ' v2.2.1-dev '
2019-09-28 00:14:36 +02:00
SSH_HEADER = ' SSH- {0} -OpenSSH_8.0 ' # SSH software to impersonate
2019-08-18 02:59:23 +02:00
if sys . version_info . major < 3 :
print ( " \n !!!! NOTE: Python 2 is being considered for deprecation. If you have a good reason to need continued Python 2 support, please e-mail jtesta@positronsecurity.com with your rationale. \n \n " )
2016-10-19 19:47:13 +02:00
2016-10-26 17:33:00 +02:00
if sys . version_info > = ( 3 , ) : # pragma: nocover
2016-10-19 19:47:13 +02:00
StringIO , BytesIO = io . StringIO , io . BytesIO
text_type = str
binary_type = bytes
2016-10-26 17:33:00 +02:00
else : # pragma: nocover
2016-10-20 19:00:51 +02:00
import StringIO as _StringIO # pylint: disable=import-error
2016-10-19 19:47:13 +02:00
StringIO = BytesIO = _StringIO . StringIO
2016-10-20 16:06:23 +02:00
text_type = unicode # pylint: disable=undefined-variable
2016-10-19 19:47:13 +02:00
binary_type = str
2016-10-26 17:33:00 +02:00
try : # pragma: nocover
2016-10-20 16:06:23 +02:00
# pylint: disable=unused-import
2017-03-23 22:17:35 +01:00
from typing import Dict , List , Set , Sequence , Tuple , Iterable
2016-10-26 17:33:00 +02:00
from typing import Callable , Optional , Union , Any
2016-10-25 12:53:51 +02:00
except ImportError : # pragma: nocover
2016-10-17 19:31:13 +02:00
pass
2016-10-26 17:33:00 +02:00
try : # pragma: nocover
2016-10-25 10:50:12 +02:00
from colorama import init as colorama_init
2020-02-09 00:44:42 +01:00
colorama_init ( strip = False ) # pragma: nocover
2016-10-25 12:53:51 +02:00
except ImportError : # pragma: nocover
2016-10-25 10:50:12 +02:00
pass
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
def usage ( err = None ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[str]) -> None
2016-10-20 19:00:51 +02:00
uout = Output ( )
2015-12-23 04:01:24 +01:00
p = os . path . basename ( sys . argv [ 0 ] )
2019-08-18 02:59:23 +02:00
uout . head ( ' # {0} {1} , https://github.com/jtesta/ssh-audit \n ' . format ( p , VERSION ) )
2017-04-06 04:27:13 +02:00
if err is not None and len ( err ) > 0 :
2016-10-20 19:00:51 +02:00
uout . fail ( ' \n ' + err )
2019-11-07 22:08:09 +01:00
uout . info ( ' usage: {0} [-1246pbcnjvlt] <host> \n ' . format ( p ) )
2016-10-20 19:00:51 +02:00
uout . info ( ' -h, --help print this help ' )
uout . info ( ' -1, --ssh1 force ssh version 1 only ' )
uout . info ( ' -2, --ssh2 force ssh version 2 only ' )
2016-10-26 17:33:00 +02:00
uout . info ( ' -4, --ipv4 enable IPv4 (order of precedence) ' )
uout . info ( ' -6, --ipv6 enable IPv6 (order of precedence) ' )
uout . info ( ' -p, --port=<port> port to connect ' )
2016-10-20 19:00:51 +02:00
uout . info ( ' -b, --batch batch output ' )
2019-11-07 02:40:25 +01:00
uout . info ( ' -c, --client-audit starts a server on port 2222 to audit client \n software config (use -p to change port; \n use -t to change timeout) ' )
2016-10-20 19:00:51 +02:00
uout . info ( ' -n, --no-colors disable colors ' )
2019-11-07 22:08:09 +01:00
uout . info ( ' -j, --json JSON output ' )
2016-10-20 19:00:51 +02:00
uout . info ( ' -v, --verbose verbose output ' )
uout . info ( ' -l, --level=<level> minimum output level (info|warn|fail) ' )
2019-09-28 00:14:36 +02:00
uout . info ( ' -t, --timeout=<secs> timeout (in seconds) for connection and reading \n (default: 5) ' )
2016-10-20 19:00:51 +02:00
uout . sep ( )
2015-12-23 04:01:24 +01:00
sys . exit ( 1 )
2016-09-02 16:22:00 +02:00
2016-09-16 13:55:27 +02:00
class AuditConf ( object ) :
2016-10-26 17:33:00 +02:00
# pylint: disable=too-many-instance-attributes
2016-10-07 18:55:31 +02:00
def __init__ ( self , host = None , port = 22 ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[str], int) -> None
2016-10-07 18:55:31 +02:00
self . host = host
self . port = port
self . ssh1 = True
self . ssh2 = True
self . batch = False
2019-09-28 00:14:36 +02:00
self . client_audit = False
2016-10-07 18:55:31 +02:00
self . colors = True
2019-11-07 22:08:09 +01:00
self . json = False
2016-10-07 18:55:31 +02:00
self . verbose = False
2017-04-10 18:11:12 +02:00
self . level = ' info '
2016-10-26 17:33:00 +02:00
self . ipvo = ( ) # type: Sequence[int]
self . ipv4 = False
self . ipv6 = False
2017-10-29 22:48:04 +01:00
self . timeout = 5.0
2019-11-07 02:40:25 +01:00
self . timeout_set = False # Set to True when the user explicitly sets it.
2017-10-29 22:48:04 +01:00
2016-10-07 18:55:31 +02:00
def __setattr__ ( self , name , value ) :
2016-10-26 17:33:00 +02:00
# type: (str, Union[str, int, bool, Sequence[int]]) -> None
2016-10-07 18:55:31 +02:00
valid = False
2019-11-07 22:08:09 +01:00
if name in [ ' ssh1 ' , ' ssh2 ' , ' batch ' , ' client_audit ' , ' colors ' , ' verbose ' , ' timeout_set ' , ' json ' ] :
2017-04-06 04:27:13 +02:00
valid , value = True , True if bool ( value ) else False
2016-10-26 17:33:00 +02:00
elif name in [ ' ipv4 ' , ' ipv6 ' ] :
valid = False
2017-04-06 04:27:13 +02:00
value = True if bool ( value ) else False
2016-10-26 17:33:00 +02:00
ipv = 4 if name == ' ipv4 ' else 6
if value :
value = tuple ( list ( self . ipvo ) + [ ipv ] )
2017-03-26 04:58:39 +02:00
else : # pylint: disable=else-if-used
2016-10-26 17:33:00 +02:00
if len ( self . ipvo ) == 0 :
value = ( 6 , ) if ipv == 4 else ( 4 , )
else :
2017-03-26 04:54:14 +02:00
value = tuple ( [ x for x in self . ipvo if x != ipv ] )
2016-10-26 17:33:00 +02:00
self . __setattr__ ( ' ipvo ' , value )
elif name == ' ipvo ' :
if isinstance ( value , ( tuple , list ) ) :
uniq_value = utils . unique_seq ( value )
2017-03-26 04:54:14 +02:00
value = tuple ( [ x for x in uniq_value if x in ( 4 , 6 ) ] )
2016-10-26 17:33:00 +02:00
valid = True
ipv_both = len ( value ) == 0
object . __setattr__ ( self , ' ipv4 ' , ipv_both or 4 in value )
object . __setattr__ ( self , ' ipv6 ' , ipv_both or 6 in value )
2016-10-07 18:55:31 +02:00
elif name == ' port ' :
valid , port = True , utils . parse_int ( value )
if port < 1 or port > 65535 :
raise ValueError ( ' invalid port: {0} ' . format ( value ) )
value = port
2017-04-10 18:11:12 +02:00
elif name in [ ' level ' ] :
2016-10-07 18:55:31 +02:00
if value not in ( ' info ' , ' warn ' , ' fail ' ) :
raise ValueError ( ' invalid level: {0} ' . format ( value ) )
valid = True
elif name == ' host ' :
valid = True
2017-10-29 22:48:04 +01:00
elif name == ' timeout ' :
value = utils . parse_float ( value )
if value == - 1.0 :
raise ValueError ( ' invalid timeout: {0} ' . format ( value ) )
valid = True
2016-10-07 18:55:31 +02:00
if valid :
object . __setattr__ ( self , name , value )
2016-09-16 13:55:27 +02:00
2016-10-07 18:55:31 +02:00
@classmethod
def from_cmdline ( cls , args , usage_cb ) :
2016-10-19 19:47:13 +02:00
# type: (List[str], Callable[..., None]) -> AuditConf
2016-10-20 19:00:51 +02:00
# pylint: disable=too-many-branches
aconf = cls ( )
2016-10-07 18:55:31 +02:00
try :
2019-11-07 22:08:09 +01:00
sopts = ' h1246p:bcnjvl:t: '
2020-02-22 07:21:54 +01:00
lopts = [ ' help ' , ' ssh1 ' , ' ssh2 ' , ' ipv4 ' , ' ipv6 ' , ' port= ' , ' json ' ,
2019-09-28 00:14:36 +02:00
' batch ' , ' client-audit ' , ' no-colors ' , ' verbose ' , ' level= ' , ' timeout= ' ]
2019-06-05 22:19:33 +02:00
opts , args = getopt . gnu_getopt ( args , sopts , lopts )
2016-10-07 18:55:31 +02:00
except getopt . GetoptError as err :
usage_cb ( str ( err ) )
2016-10-20 19:00:51 +02:00
aconf . ssh1 , aconf . ssh2 = False , False
2016-10-26 17:33:00 +02:00
oport = None
2016-10-07 18:55:31 +02:00
for o , a in opts :
if o in ( ' -h ' , ' --help ' ) :
usage_cb ( )
elif o in ( ' -1 ' , ' --ssh1 ' ) :
2016-10-20 19:00:51 +02:00
aconf . ssh1 = True
2016-10-07 18:55:31 +02:00
elif o in ( ' -2 ' , ' --ssh2 ' ) :
2016-10-20 19:00:51 +02:00
aconf . ssh2 = True
2016-10-26 17:33:00 +02:00
elif o in ( ' -4 ' , ' --ipv4 ' ) :
aconf . ipv4 = True
elif o in ( ' -6 ' , ' --ipv6 ' ) :
aconf . ipv6 = True
elif o in ( ' -p ' , ' --port ' ) :
oport = a
2016-10-07 18:55:31 +02:00
elif o in ( ' -b ' , ' --batch ' ) :
2016-10-20 19:00:51 +02:00
aconf . batch = True
aconf . verbose = True
2019-09-28 00:14:36 +02:00
elif o in ( ' -c ' , ' --client-audit ' ) :
aconf . client_audit = True
2016-10-07 18:55:31 +02:00
elif o in ( ' -n ' , ' --no-colors ' ) :
2016-10-20 19:00:51 +02:00
aconf . colors = False
2019-11-07 22:08:09 +01:00
elif o in ( ' -j ' , ' --json ' ) :
aconf . json = True
2016-10-07 18:55:31 +02:00
elif o in ( ' -v ' , ' --verbose ' ) :
2016-10-20 19:00:51 +02:00
aconf . verbose = True
2016-10-07 18:55:31 +02:00
elif o in ( ' -l ' , ' --level ' ) :
if a not in ( ' info ' , ' warn ' , ' fail ' ) :
usage_cb ( ' level {0} is not valid ' . format ( a ) )
2017-04-10 18:11:12 +02:00
aconf . level = a
2017-10-29 22:48:04 +01:00
elif o in ( ' -t ' , ' --timeout ' ) :
aconf . timeout = float ( a )
2019-11-07 02:40:25 +01:00
aconf . timeout_set = True
2019-09-28 00:14:36 +02:00
if len ( args ) == 0 and aconf . client_audit == False :
2016-10-07 18:55:31 +02:00
usage_cb ( )
2019-09-28 00:14:36 +02:00
if aconf . client_audit == False :
if oport is not None :
host = args [ 0 ]
2016-10-26 17:33:00 +02:00
else :
2019-09-28 00:14:36 +02:00
mx = re . match ( r ' ^ \ [([^ \ ]]+) \ ](?::(.*))?$ ' , args [ 0 ] )
if bool ( mx ) :
host , oport = mx . group ( 1 ) , mx . group ( 2 )
2017-05-05 13:12:45 +02:00
else :
2019-09-28 00:14:36 +02:00
s = args [ 0 ] . split ( ' : ' )
if len ( s ) > 2 :
host , oport = args [ 0 ] , ' 22 '
else :
host , oport = s [ 0 ] , s [ 1 ] if len ( s ) > 1 else ' 22 '
if not host :
usage_cb ( ' host is empty ' )
else :
host = None
if oport is None :
oport = ' 2222 '
2017-05-05 13:12:45 +02:00
port = utils . parse_int ( oport )
2016-10-07 18:55:31 +02:00
if port < = 0 or port > 65535 :
2016-10-26 17:33:00 +02:00
usage_cb ( ' port {0} is not valid ' . format ( oport ) )
2016-10-20 19:00:51 +02:00
aconf . host = host
aconf . port = port
if not ( aconf . ssh1 or aconf . ssh2 ) :
aconf . ssh1 , aconf . ssh2 = True , True
return aconf
2016-09-16 13:55:27 +02:00
2016-09-16 23:30:04 +02:00
2015-12-23 04:01:24 +01:00
class Output ( object ) :
2017-04-10 18:11:12 +02:00
LEVELS = ( ' info ' , ' warn ' , ' fail ' ) # type: Sequence[str]
2016-09-02 15:25:57 +02:00
COLORS = { ' head ' : 36 , ' good ' : 32 , ' warn ' : 33 , ' fail ' : 31 }
def __init__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-09-02 15:25:57 +02:00
self . batch = False
self . verbose = False
2017-04-10 18:11:12 +02:00
self . use_colors = True
2019-11-07 22:08:09 +01:00
self . json = False
2017-04-10 18:11:12 +02:00
self . __level = 0
2017-04-05 15:31:43 +02:00
self . __colsupport = ' colorama ' in sys . modules or os . name == ' posix '
2016-09-02 15:25:57 +02:00
@property
2017-04-10 18:11:12 +02:00
def level ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2017-04-10 18:11:12 +02:00
if self . __level < len ( self . LEVELS ) :
return self . LEVELS [ self . __level ]
2016-10-06 14:18:39 +02:00
return ' unknown '
2016-09-02 16:22:00 +02:00
2017-04-10 18:11:12 +02:00
@level.setter
def level ( self , name ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> None
2017-04-10 18:11:12 +02:00
self . __level = self . get_level ( name )
2016-09-02 16:22:00 +02:00
2017-04-10 18:11:12 +02:00
def get_level ( self , name ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> int
2016-09-02 15:25:57 +02:00
cname = ' info ' if name == ' good ' else name
2016-09-02 16:22:00 +02:00
if cname not in self . LEVELS :
2016-09-02 15:25:57 +02:00
return sys . maxsize
return self . LEVELS . index ( cname )
2015-12-23 04:01:24 +01:00
def sep ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-09-02 15:25:57 +02:00
if not self . batch :
print ( )
2016-09-02 16:22:00 +02:00
2016-10-25 10:50:12 +02:00
@property
def colors_supported ( self ) :
# type: () -> bool
2017-04-05 15:31:43 +02:00
return self . __colsupport
2016-10-25 10:50:12 +02:00
2016-10-20 16:06:23 +02:00
@staticmethod
def _colorized ( color ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> Callable[[text_type], None]
2016-09-02 15:25:57 +02:00
return lambda x : print ( u ' {0} {1} \033 [0m ' . format ( color , x ) )
2016-09-02 16:22:00 +02:00
2015-12-23 04:01:24 +01:00
def __getattr__ ( self , name ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> Callable[[text_type], None]
2016-09-02 15:25:57 +02:00
if name == ' head ' and self . batch :
return lambda x : None
2017-04-10 18:11:12 +02:00
if not self . get_level ( name ) > = self . __level :
2016-09-02 15:25:57 +02:00
return lambda x : None
2017-04-10 18:11:12 +02:00
if self . use_colors and self . colors_supported and name in self . COLORS :
2016-10-19 19:47:13 +02:00
color = ' \033 [0; {0} m ' . format ( self . COLORS [ name ] )
2015-12-23 04:01:24 +01:00
return self . _colorized ( color )
else :
2016-09-02 15:25:57 +02:00
return lambda x : print ( u ' {0} ' . format ( x ) )
2016-09-02 16:22:00 +02:00
2016-09-02 15:25:57 +02:00
class OutputBuffer ( list ) :
def __enter__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> OutputBuffer
2016-10-20 19:00:51 +02:00
# pylint: disable=attribute-defined-outside-init
2016-10-19 19:47:13 +02:00
self . __buf = StringIO ( )
2016-09-02 15:25:57 +02:00
self . __stdout = sys . stdout
sys . stdout = self . __buf
return self
2016-09-02 16:22:00 +02:00
2019-08-22 21:47:37 +02:00
def flush ( self , sort_lines = False ) :
# Lines must be sorted in some cases to ensure consistent testing.
if sort_lines :
self . sort ( )
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-09-02 15:25:57 +02:00
for line in self :
print ( line )
2016-09-02 16:22:00 +02:00
2016-09-02 15:25:57 +02:00
def __exit__ ( self , * args ) :
2016-10-19 19:47:13 +02:00
# type: (*Any) -> None
2016-09-02 15:25:57 +02:00
self . extend ( self . __buf . getvalue ( ) . splitlines ( ) )
sys . stdout = self . __stdout
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
2016-10-20 19:00:51 +02:00
class SSH2 ( object ) : # pylint: disable=too-few-public-methods
2016-11-03 18:10:49 +01:00
class KexDB ( object ) : # pylint: disable=too-few-public-methods
# pylint: disable=bad-whitespace
2017-01-24 11:45:53 +01:00
WARN_OPENSSH74_UNSAFE = ' disabled (in client) since OpenSSH 7.4, unsafe algorithm '
2016-11-03 18:10:49 +01:00
WARN_OPENSSH72_LEGACY = ' disabled (in client) since OpenSSH 7.2, legacy algorithm '
FAIL_OPENSSH70_LEGACY = ' removed since OpenSSH 7.0, legacy algorithm '
FAIL_OPENSSH70_WEAK = ' removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm '
FAIL_OPENSSH70_LOGJAM = ' disabled (in client) since OpenSSH 7.0, logjam attack '
INFO_OPENSSH69_CHACHA = ' default cipher since OpenSSH 6.9. '
FAIL_OPENSSH67_UNSAFE = ' removed (in server) since OpenSSH 6.7, unsafe algorithm '
FAIL_OPENSSH61_REMOVE = ' removed since OpenSSH 6.1, removed from specification '
FAIL_OPENSSH31_REMOVE = ' removed since OpenSSH 3.1 '
FAIL_DBEAR67_DISABLED = ' disabled since Dropbear SSH 2015.67 '
FAIL_DBEAR53_DISABLED = ' disabled since Dropbear SSH 0.53 '
2017-10-11 21:13:58 +02:00
FAIL_DEPRECATED_CIPHER = ' deprecated cipher '
2017-10-11 21:47:01 +02:00
FAIL_WEAK_CIPHER = ' using weak cipher '
2020-03-18 17:19:05 +01:00
FAIL_WEAK_ALGORITHM = ' using weak/obsolete algorithm '
2016-11-03 18:10:49 +01:00
FAIL_PLAINTEXT = ' no encryption/integrity '
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
FAIL_DEPRECATED_MAC = ' deprecated MAC '
2016-11-03 18:10:49 +01:00
WARN_CURVES_WEAK = ' using weak elliptic curves '
WARN_RNDSIG_KEY = ' using weak random number generator could reveal the key '
WARN_MODULUS_SIZE = ' using small 1024-bit modulus '
WARN_HASH_WEAK = ' using weak hashing algorithm '
WARN_CIPHER_MODE = ' using weak cipher mode '
WARN_BLOCK_SIZE = ' using small 64-bit block size '
WARN_CIPHER_WEAK = ' using weak cipher '
WARN_ENCRYPT_AND_MAC = ' using encrypt-and-MAC mode '
WARN_TAG_SIZE = ' using small 64-bit tag size '
2019-09-20 04:19:26 +02:00
WARN_TAG_SIZE_96 = ' using small 96-bit tag size '
2019-08-18 06:16:42 +02:00
WARN_EXPERIMENTAL = ' using experimental algorithm '
2016-11-03 18:10:49 +01:00
ALGORITHMS = {
2019-08-18 06:32:59 +02:00
# Format: 'algorithm_name': [['version_first_appeared_in'], [reason_for_failure1, reason_for_failure2, ...], [warning1, warning2, ...]]
2016-11-03 18:10:49 +01:00
' kex ' : {
' diffie-hellman-group1-sha1 ' : [ [ ' 2.3.0,d0.28,l10.2 ' , ' 6.6 ' , ' 6.9 ' ] , [ FAIL_OPENSSH67_UNSAFE , FAIL_OPENSSH70_LOGJAM ] , [ WARN_MODULUS_SIZE , WARN_HASH_WEAK ] ] ,
2019-09-20 02:08:10 +02:00
' gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g== ' : [ [ ] , [ FAIL_OPENSSH67_UNSAFE , FAIL_OPENSSH70_LOGJAM ] , [ WARN_MODULUS_SIZE , WARN_HASH_WEAK ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g== ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
2020-02-09 00:44:42 +01:00
' gss-gex-sha1- ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' gss-group1-sha1- ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' gss-group14-sha1- ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g== ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g== ' : [ [ ] ] ,
' gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g== ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' diffie-hellman-group14-sha1 ' : [ [ ' 3.9,d0.53,l10.6.0 ' ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' diffie-hellman-group14-sha256 ' : [ [ ' 7.3,d2016.73 ' ] ] ,
2020-02-09 00:44:42 +01:00
' diffie-hellman-group14-sha256@ssh.com ' : [ [ ] ] ,
2019-09-04 02:41:53 +02:00
' diffie-hellman-group15-sha256 ' : [ [ ] ] ,
2020-02-09 00:44:42 +01:00
' diffie-hellman-group15-sha256@ssh.com ' : [ [ ] ] ,
' diffie-hellman-group15-sha384@ssh.com ' : [ [ ] ] ,
2017-10-11 21:13:58 +02:00
' diffie-hellman-group15-sha512 ' : [ [ ] ] ,
2019-08-26 21:28:37 +02:00
' diffie-hellman-group16-sha256 ' : [ [ ] ] ,
2020-02-09 00:44:42 +01:00
' diffie-hellman-group16-sha384@ssh.com ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' diffie-hellman-group16-sha512 ' : [ [ ' 7.3,d2016.73 ' ] ] ,
2020-02-09 00:44:42 +01:00
' diffie-hellman-group16-sha512@ssh.com ' : [ [ ] ] ,
2019-08-26 21:19:49 +02:00
' diffie-hellman-group17-sha512 ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' diffie-hellman-group18-sha512 ' : [ [ ' 7.3 ' ] ] ,
2020-02-09 00:44:42 +01:00
' diffie-hellman-group18-sha512@ssh.com ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' diffie-hellman-group-exchange-sha1 ' : [ [ ' 2.3.0 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_HASH_WEAK ] ] ,
2017-09-22 04:44:34 +02:00
' diffie-hellman-group-exchange-sha256 ' : [ [ ' 4.4 ' ] ] ,
2019-08-22 21:47:37 +02:00
' diffie-hellman-group-exchange-sha256@ssh.com ' : [ [ ] ] ,
2019-08-26 21:28:37 +02:00
' diffie-hellman-group-exchange-sha512@ssh.com ' : [ [ ] ] ,
2020-02-09 00:44:42 +01:00
' ecdh-sha2-curve25519 ' : [ [ ] , [ ] ] ,
' ecdh-sha2-nistb233 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistb409 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistk163 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistk233 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistk283 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistk409 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistp192 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistp224 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
2016-11-03 18:10:49 +01:00
' ecdh-sha2-nistp256 ' : [ [ ' 5.7,d2013.62,l10.6.0 ' ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistp384 ' : [ [ ' 5.7,d2013.62 ' ] , [ WARN_CURVES_WEAK ] ] ,
' ecdh-sha2-nistp521 ' : [ [ ' 5.7,d2013.62 ' ] , [ WARN_CURVES_WEAK ] ] ,
2020-02-09 00:44:42 +01:00
' ecdh-sha2-nistt571 ' : [ [ ] , [ WARN_CURVES_WEAK ] ] ,
2019-09-20 04:19:26 +02:00
' ecdh-sha2-1.3.132.0.10 ' : [ [ ] ] , # ECDH over secp256k1 (i.e.: the Bitcoin curve)
2016-11-03 18:10:49 +01:00
' curve25519-sha256@libssh.org ' : [ [ ' 6.5,d2013.62,l10.6.0 ' ] ] ,
2019-10-21 17:50:23 +02:00
' curve25519-sha256 ' : [ [ ' 7.4,d2018.76 ' ] ] ,
2019-09-20 04:19:26 +02:00
' curve448-sha512 ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' kexguess2@matt.ucc.asn.au ' : [ [ ' d2013.57 ' ] ] ,
2017-10-11 21:47:01 +02:00
' rsa1024-sha1 ' : [ [ ] , [ ] , [ WARN_MODULUS_SIZE , WARN_HASH_WEAK ] ] ,
' rsa2048-sha256 ' : [ [ ] ] ,
2019-08-18 06:16:42 +02:00
' sntrup4591761x25519-sha512@tinyssh.org ' : [ [ ' 8.0 ' ] , [ ] , [ WARN_EXPERIMENTAL ] ] ,
2019-09-28 00:14:36 +02:00
' ext-info-c ' : [ [ ] ] , # Extension negotiation (RFC 8308)
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' ext-info-s ' : [ [ ] ] , # Extension negotiation (RFC 8308)
2016-11-03 18:10:49 +01:00
} ,
' key ' : {
2020-03-18 17:19:05 +01:00
' ssh-rsa1 ' : [ [ ] , [ FAIL_WEAK_ALGORITHM ] ] ,
2016-11-03 18:10:49 +01:00
' rsa-sha2-256 ' : [ [ ' 7.2 ' ] ] ,
' rsa-sha2-512 ' : [ [ ' 7.2 ' ] ] ,
' ssh-ed25519 ' : [ [ ' 6.5,l10.7.0 ' ] ] ,
' ssh-ed25519-cert-v01@openssh.com ' : [ [ ' 6.5 ' ] ] ,
2020-02-09 05:56:54 +01:00
' ssh-rsa ' : [ [ ' 2.5.0,d0.28,l10.2 ' ] , [ WARN_HASH_WEAK ] ] ,
2016-11-03 18:10:49 +01:00
' ssh-dss ' : [ [ ' 2.1.0,d0.28,l10.2 ' , ' 6.9 ' ] , [ FAIL_OPENSSH70_WEAK ] , [ WARN_MODULUS_SIZE , WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp256 ' : [ [ ' 5.7,d2013.62,l10.6.4 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp384 ' : [ [ ' 5.7,d2013.62,l10.6.4 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp521 ' : [ [ ' 5.7,d2013.62,l10.6.4 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
2020-02-09 00:44:42 +01:00
' ecdsa-sha2-1.3.132.0.10 ' : [ [ ] , [ ] , [ WARN_RNDSIG_KEY ] ] , # ECDSA over secp256k1 (i.e.: the Bitcoin curve)
' x509v3-sign-dss ' : [ [ ] , [ FAIL_OPENSSH70_WEAK ] , [ WARN_MODULUS_SIZE , WARN_RNDSIG_KEY ] ] ,
' x509v3-sign-rsa ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' x509v3-sign-rsa-sha256@ssh.com ' : [ [ ] ] ,
' x509v3-ssh-dss ' : [ [ ] , [ FAIL_OPENSSH70_WEAK ] , [ WARN_MODULUS_SIZE , WARN_RNDSIG_KEY ] ] ,
' x509v3-ssh-rsa ' : [ [ ] , [ ] , [ WARN_HASH_WEAK ] ] ,
2016-11-03 18:10:49 +01:00
' ssh-rsa-cert-v00@openssh.com ' : [ [ ' 5.4 ' , ' 6.9 ' ] , [ FAIL_OPENSSH70_LEGACY ] , [ ] ] ,
' ssh-dss-cert-v00@openssh.com ' : [ [ ' 5.4 ' , ' 6.9 ' ] , [ FAIL_OPENSSH70_LEGACY ] , [ WARN_MODULUS_SIZE , WARN_RNDSIG_KEY ] ] ,
' ssh-rsa-cert-v01@openssh.com ' : [ [ ' 5.6 ' ] ] ,
' ssh-dss-cert-v01@openssh.com ' : [ [ ' 5.6 ' , ' 6.9 ' ] , [ FAIL_OPENSSH70_WEAK ] , [ WARN_MODULUS_SIZE , WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp256-cert-v01@openssh.com ' : [ [ ' 5.7 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp384-cert-v01@openssh.com ' : [ [ ' 5.7 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' ecdsa-sha2-nistp521-cert-v01@openssh.com ' : [ [ ' 5.7 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
2019-11-14 22:45:40 +01:00
' rsa-sha2-256-cert-v01@openssh.com ' : [ [ ' 7.8 ' ] ] ,
' rsa-sha2-512-cert-v01@openssh.com ' : [ [ ' 7.8 ' ] ] ,
2017-10-11 21:13:58 +02:00
' ssh-rsa-sha256@ssh.com ' : [ [ ] ] ,
2019-09-20 04:19:26 +02:00
' ecdsa-sha2-1.3.132.0.10 ' : [ [ ] , [ ] , [ WARN_RNDSIG_KEY ] ] , # ECDSA over secp256k1 (i.e.: the Bitcoin curve)
2020-02-09 01:05:36 +01:00
' sk-ecdsa-sha2-nistp256-cert-v01@openssh.com ' : [ [ ' 8.2 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' sk-ecdsa-sha2-nistp256@openssh.com ' : [ [ ' 8.2 ' ] , [ WARN_CURVES_WEAK ] , [ WARN_RNDSIG_KEY ] ] ,
' sk-ssh-ed25519-cert-v01@openssh.com ' : [ [ ' 8.2 ' ] ] ,
' sk-ssh-ed25519@openssh.com ' : [ [ ' 8.2 ' ] ] ,
2016-11-03 18:10:49 +01:00
} ,
' enc ' : {
' none ' : [ [ ' 1.2.2,d2013.56,l10.2 ' ] , [ FAIL_PLAINTEXT ] ] ,
2019-11-19 02:22:12 +01:00
' des ' : [ [ ] , [ FAIL_WEAK_CIPHER ] , [ WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
2017-10-11 21:47:01 +02:00
' des-cbc ' : [ [ ] , [ FAIL_WEAK_CIPHER ] , [ WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' des-cbc-ssh1 ' : [ [ ] , [ FAIL_WEAK_CIPHER ] , [ WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
2019-11-19 02:22:12 +01:00
' 3des ' : [ [ ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH74_UNSAFE , WARN_CIPHER_WEAK , WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
2017-01-24 11:45:53 +01:00
' 3des-cbc ' : [ [ ' 1.2.2,d0.28,l10.2 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH74_UNSAFE , WARN_CIPHER_WEAK , WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
2019-08-26 20:44:35 +02:00
' 3des-ctr ' : [ [ ' d0.52 ' ] , [ FAIL_WEAK_CIPHER ] ] ,
2020-03-18 17:19:05 +01:00
' blowfish ' : [ [ ] , [ FAIL_WEAK_ALGORITHM ] , [ WARN_BLOCK_SIZE ] ] ,
2016-11-03 18:10:49 +01:00
' blowfish-cbc ' : [ [ ' 1.2.2,d0.28,l10.2 ' , ' 6.6,d0.52 ' , ' 7.1,d0.52 ' ] , [ FAIL_OPENSSH67_UNSAFE , FAIL_DBEAR53_DISABLED ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' blowfish-ctr ' : [ [ ] , [ FAIL_OPENSSH67_UNSAFE , FAIL_DBEAR53_DISABLED ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
2016-11-03 18:10:49 +01:00
' twofish-cbc ' : [ [ ' d0.28 ' , ' d2014.66 ' ] , [ FAIL_DBEAR67_DISABLED ] , [ WARN_CIPHER_MODE ] ] ,
' twofish128-cbc ' : [ [ ' d0.47 ' , ' d2014.66 ' ] , [ FAIL_DBEAR67_DISABLED ] , [ WARN_CIPHER_MODE ] ] ,
2017-10-11 21:13:58 +02:00
' twofish192-cbc ' : [ [ ] , [ ] , [ WARN_CIPHER_MODE ] ] ,
2016-11-03 18:10:49 +01:00
' twofish256-cbc ' : [ [ ' d0.47 ' , ' d2014.66 ' ] , [ FAIL_DBEAR67_DISABLED ] , [ WARN_CIPHER_MODE ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' twofish-ctr ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' twofish128-ctr ' : [ [ ' d2015.68 ' ] ] ,
2017-10-11 21:13:58 +02:00
' twofish192-ctr ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' twofish256-ctr ' : [ [ ' d2015.68 ' ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' serpent128-cbc ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] , [ WARN_CIPHER_MODE ] ] ,
' serpent192-cbc ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] , [ WARN_CIPHER_MODE ] ] ,
' serpent256-cbc ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] , [ WARN_CIPHER_MODE ] ] ,
2017-10-11 21:13:58 +02:00
' serpent128-ctr ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] ] ,
' serpent192-ctr ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] ] ,
' serpent256-ctr ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' idea-cbc ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] , [ WARN_CIPHER_MODE ] ] ,
2017-10-11 21:13:58 +02:00
' idea-ctr ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] ] ,
' cast128-ctr ' : [ [ ] , [ FAIL_DEPRECATED_CIPHER ] ] ,
2016-11-03 18:10:49 +01:00
' cast128-cbc ' : [ [ ' 2.1.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_MODE , WARN_BLOCK_SIZE ] ] ,
' arcfour ' : [ [ ' 2.1.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_WEAK ] ] ,
' arcfour128 ' : [ [ ' 4.2 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_WEAK ] ] ,
' arcfour256 ' : [ [ ' 4.2 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_WEAK ] ] ,
' aes128-cbc ' : [ [ ' 2.3.0,d0.28,l10.2 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_CIPHER_MODE ] ] ,
' aes192-cbc ' : [ [ ' 2.3.0,l10.2 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_CIPHER_MODE ] ] ,
' aes256-cbc ' : [ [ ' 2.3.0,d0.47,l10.2 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_CIPHER_MODE ] ] ,
' rijndael128-cbc ' : [ [ ' 2.3.0 ' , ' 3.0.2 ' ] , [ FAIL_OPENSSH31_REMOVE ] , [ WARN_CIPHER_MODE ] ] ,
' rijndael192-cbc ' : [ [ ' 2.3.0 ' , ' 3.0.2 ' ] , [ FAIL_OPENSSH31_REMOVE ] , [ WARN_CIPHER_MODE ] ] ,
' rijndael256-cbc ' : [ [ ' 2.3.0 ' , ' 3.0.2 ' ] , [ FAIL_OPENSSH31_REMOVE ] , [ WARN_CIPHER_MODE ] ] ,
' rijndael-cbc@lysator.liu.se ' : [ [ ' 2.3.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_CIPHER_MODE ] ] ,
' aes128-ctr ' : [ [ ' 3.7,d0.52,l10.4.1 ' ] ] ,
' aes192-ctr ' : [ [ ' 3.7,l10.4.1 ' ] ] ,
' aes256-ctr ' : [ [ ' 3.7,d0.52,l10.4.1 ' ] ] ,
2020-02-09 00:44:42 +01:00
' aes128-gcm ' : [ [ ] ] ,
' aes256-gcm ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
' aes128-gcm@openssh.com ' : [ [ ' 6.2 ' ] ] ,
' aes256-gcm@openssh.com ' : [ [ ' 6.2 ' ] ] ,
2020-02-09 00:44:42 +01:00
' chacha20-poly1305 ' : [ [ ] , [ ] , [ ] , [ INFO_OPENSSH69_CHACHA ] ] ,
2016-11-03 18:10:49 +01:00
' chacha20-poly1305@openssh.com ' : [ [ ' 6.5 ' ] , [ ] , [ ] , [ INFO_OPENSSH69_CHACHA ] ] ,
2020-03-11 00:22:15 +01:00
' camellia128-cbc ' : [ [ ] , [ ] , [ WARN_CIPHER_MODE ] ] ,
' camellia128-ctr ' : [ [ ] ] ,
' camellia192-cbc ' : [ [ ] , [ ] , [ WARN_CIPHER_MODE ] ] ,
' camellia192-ctr ' : [ [ ] ] ,
' camellia256-cbc ' : [ [ ] , [ ] , [ WARN_CIPHER_MODE ] ] ,
' camellia256-ctr ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
} ,
' mac ' : {
' none ' : [ [ ' d2013.56 ' ] , [ FAIL_PLAINTEXT ] ] ,
' hmac-sha1 ' : [ [ ' 2.1.0,d0.28,l10.2 ' ] , [ ] , [ WARN_ENCRYPT_AND_MAC , WARN_HASH_WEAK ] ] ,
' hmac-sha1-96 ' : [ [ ' 2.5.0,d0.47 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC , WARN_HASH_WEAK ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' hmac-sha2-56 ' : [ [ ] , [ ] , [ WARN_TAG_SIZE , WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha2-224 ' : [ [ ] , [ ] , [ WARN_TAG_SIZE , WARN_ENCRYPT_AND_MAC ] ] ,
2016-11-03 18:10:49 +01:00
' hmac-sha2-256 ' : [ [ ' 5.9,d2013.56,l10.7.0 ' ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha2-256-96 ' : [ [ ' 5.9 ' , ' 6.0 ' ] , [ FAIL_OPENSSH61_REMOVE ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' hmac-sha2-384 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
2016-11-03 18:10:49 +01:00
' hmac-sha2-512 ' : [ [ ' 5.9,d2013.56,l10.7.0 ' ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha2-512-96 ' : [ [ ' 5.9 ' , ' 6.0 ' ] , [ FAIL_OPENSSH61_REMOVE ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' hmac-sha3-256 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha3-384 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha3-512 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha256 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' hmac-sha256-96@ssh.com ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC , WARN_TAG_SIZE ] ] ,
Added 1 kex (diffie-hellman-group-exchange-sha256@ssh.com), 3 encryption algs (des-cbc-ssh1, blowfish-ctr, twofish-ctr), and 8 macs (hmac-sha2-56, hmac-sha2-224, hmac-sha2-384, hmac-sha3-256, hmac-sha3-384, hmac-sha3-512, hmac-sha256, hmac-sha256@ssh.com).
2019-08-18 20:38:39 +02:00
' hmac-sha256@ssh.com ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
2019-08-26 21:19:49 +02:00
' hmac-sha512 ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha512@ssh.com ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
2016-11-03 18:10:49 +01:00
' hmac-md5 ' : [ [ ' 2.1.0,d0.28 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC , WARN_HASH_WEAK ] ] ,
' hmac-md5-96 ' : [ [ ' 2.5.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC , WARN_HASH_WEAK ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' hmac-ripemd ' : [ [ ] , [ FAIL_DEPRECATED_MAC ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC ] ] ,
2016-11-03 18:10:49 +01:00
' hmac-ripemd160 ' : [ [ ' 2.5.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-ripemd160@openssh.com ' : [ [ ' 2.1.0 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_ENCRYPT_AND_MAC ] ] ,
' umac-64@openssh.com ' : [ [ ' 4.7 ' ] , [ ] , [ WARN_ENCRYPT_AND_MAC , WARN_TAG_SIZE ] ] ,
' umac-128@openssh.com ' : [ [ ' 6.2 ' ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] ,
' hmac-sha1-etm@openssh.com ' : [ [ ' 6.2 ' ] , [ ] , [ WARN_HASH_WEAK ] ] ,
' hmac-sha1-96-etm@openssh.com ' : [ [ ' 6.2 ' , ' 6.6 ' , None ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_HASH_WEAK ] ] ,
2019-09-20 04:19:26 +02:00
' hmac-sha2-256-96-etm@openssh.com ' : [ [ ] , [ ] , [ WARN_TAG_SIZE_96 ] ] , # Despite the @openssh.com tag, it doesn't appear that this was ever shipped with OpenSSH; it is only implemented in AsyncSSH (?).
' hmac-sha2-512-96-etm@openssh.com ' : [ [ ] , [ ] , [ WARN_TAG_SIZE_96 ] ] , # Despite the @openssh.com tag, it doesn't appear that this was ever shipped with OpenSSH; it is only implemented in AsyncSSH (?).
2016-11-03 18:10:49 +01:00
' hmac-sha2-256-etm@openssh.com ' : [ [ ' 6.2 ' ] ] ,
' hmac-sha2-512-etm@openssh.com ' : [ [ ' 6.2 ' ] ] ,
' hmac-md5-etm@openssh.com ' : [ [ ' 6.2 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_HASH_WEAK ] ] ,
' hmac-md5-96-etm@openssh.com ' : [ [ ' 6.2 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY , WARN_HASH_WEAK ] ] ,
' hmac-ripemd160-etm@openssh.com ' : [ [ ' 6.2 ' , ' 6.6 ' , ' 7.1 ' ] , [ FAIL_OPENSSH67_UNSAFE ] , [ WARN_OPENSSH72_LEGACY ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' umac-32@openssh.com ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC , WARN_TAG_SIZE ] ] , # Despite having the @openssh.com suffix, this may never have shipped with OpenSSH (!).
2016-11-03 18:10:49 +01:00
' umac-64-etm@openssh.com ' : [ [ ' 6.2 ' ] , [ ] , [ WARN_TAG_SIZE ] ] ,
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
' umac-96@openssh.com ' : [ [ ] , [ ] , [ WARN_ENCRYPT_AND_MAC ] ] , # Despite having the @openssh.com suffix, this may never have shipped with OpenSSH (!).
2016-11-03 18:10:49 +01:00
' umac-128-etm@openssh.com ' : [ [ ' 6.2 ' ] ] ,
2020-02-09 00:44:42 +01:00
' aes128-gcm ' : [ [ ] ] ,
' aes256-gcm ' : [ [ ] ] ,
2016-11-03 18:10:49 +01:00
}
} # type: Dict[str, Dict[str, List[List[Optional[str]]]]]
2016-10-06 01:59:15 +02:00
class KexParty ( object ) :
def __init__ ( self , enc , mac , compression , languages ) :
2016-10-19 19:47:13 +02:00
# type: (List[text_type], List[text_type], List[text_type], List[text_type]) -> None
2016-10-06 01:59:15 +02:00
self . __enc = enc
self . __mac = mac
self . __compression = compression
self . __languages = languages
@property
def encryption ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __enc
@property
def mac ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __mac
@property
def compression ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __compression
@property
def languages ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __languages
2015-12-23 04:01:24 +01:00
2016-10-06 01:59:15 +02:00
class Kex ( object ) :
def __init__ ( self , cookie , kex_algs , key_algs , cli , srv , follows , unused = 0 ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type, List[text_type], List[text_type], SSH2.KexParty, SSH2.KexParty, bool, int) -> None
2016-10-06 01:59:15 +02:00
self . __cookie = cookie
self . __kex_algs = kex_algs
self . __key_algs = key_algs
self . __client = cli
self . __server = srv
self . __follows = follows
self . __unused = unused
2017-09-22 04:44:34 +02:00
self . __rsa_key_sizes = { }
self . __dh_modulus_sizes = { }
2019-08-22 21:47:37 +02:00
self . __host_keys = { }
2017-09-22 04:44:34 +02:00
2016-10-06 01:59:15 +02:00
@property
def cookie ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-10-06 01:59:15 +02:00
return self . __cookie
@property
def kex_algorithms ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __kex_algs
@property
def key_algorithms ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-10-06 01:59:15 +02:00
return self . __key_algs
# client_to_server
@property
def client ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> SSH2.KexParty
2016-10-06 01:59:15 +02:00
return self . __client
# server_to_client
@property
def server ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> SSH2.KexParty
2016-10-06 01:59:15 +02:00
return self . __server
@property
def follows ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> bool
2016-10-06 01:59:15 +02:00
return self . __follows
@property
def unused ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-10-06 01:59:15 +02:00
return self . __unused
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
def set_rsa_key_size ( self , rsa_type , hostkey_size , ca_size = - 1 ) :
self . __rsa_key_sizes [ rsa_type ] = ( hostkey_size , ca_size )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
def rsa_key_sizes ( self ) :
2017-09-22 04:44:34 +02:00
return self . __rsa_key_sizes
def set_dh_modulus_size ( self , gex_alg , modulus_size ) :
2017-09-27 02:46:00 +02:00
self . __dh_modulus_sizes [ gex_alg ] = ( modulus_size , - 1 )
2017-09-22 04:44:34 +02:00
def dh_modulus_sizes ( self ) :
return self . __dh_modulus_sizes
2019-08-22 21:47:37 +02:00
def set_host_key ( self , key_type , hostkey ) :
self . __host_keys [ key_type ] = hostkey
def host_keys ( self ) :
return self . __host_keys
2016-10-13 16:53:39 +02:00
def write ( self , wbuf ) :
2016-10-19 19:47:13 +02:00
# type: (WriteBuf) -> None
2016-10-13 16:53:39 +02:00
wbuf . write ( self . cookie )
wbuf . write_list ( self . kex_algorithms )
wbuf . write_list ( self . key_algorithms )
wbuf . write_list ( self . client . encryption )
wbuf . write_list ( self . server . encryption )
wbuf . write_list ( self . client . mac )
wbuf . write_list ( self . server . mac )
wbuf . write_list ( self . client . compression )
wbuf . write_list ( self . server . compression )
wbuf . write_list ( self . client . languages )
wbuf . write_list ( self . server . languages )
wbuf . write_bool ( self . follows )
wbuf . write_int ( self . __unused )
@property
def payload ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-10-13 16:53:39 +02:00
wbuf = WriteBuf ( )
self . write ( wbuf )
return wbuf . write_flush ( )
2016-10-06 01:59:15 +02:00
@classmethod
def parse ( cls , payload ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> SSH2.Kex
2016-10-06 01:59:15 +02:00
buf = ReadBuf ( payload )
cookie = buf . read ( 16 )
kex_algs = buf . read_list ( )
key_algs = buf . read_list ( )
cli_enc = buf . read_list ( )
srv_enc = buf . read_list ( )
cli_mac = buf . read_list ( )
srv_mac = buf . read_list ( )
cli_compression = buf . read_list ( )
srv_compression = buf . read_list ( )
cli_languages = buf . read_list ( )
srv_languages = buf . read_list ( )
follows = buf . read_bool ( )
unused = buf . read_int ( )
cli = SSH2 . KexParty ( cli_enc , cli_mac , cli_compression , cli_languages )
srv = SSH2 . KexParty ( srv_enc , srv_mac , srv_compression , srv_languages )
kex = cls ( cookie , kex_algs , key_algs , cli , srv , follows , unused )
return kex
2015-12-23 04:01:24 +01:00
2019-08-22 21:47:37 +02:00
# Obtains host keys, checks their size, and derives their fingerprints.
class HostKeyTest ( object ) :
# Tracks the RSA host key types. As of this writing, testing one in this family yields valid results for the rest.
RSA_FAMILY = [ ' ssh-rsa ' , ' rsa-sha2-256 ' , ' rsa-sha2-512 ' ]
# Dict holding the host key types we should extract & parse. 'cert' is True to denote that a host key type handles certificates (thus requires additional parsing). 'variable_key_len' is True for host key types that can have variable sizes (True only for RSA types, as the rest are of fixed-size). After the host key type is fully parsed, the key 'parsed' is added with a value of True.
HOST_KEY_TYPES = {
' ssh-rsa ' : { ' cert ' : False , ' variable_key_len ' : True } ,
' rsa-sha2-256 ' : { ' cert ' : False , ' variable_key_len ' : True } ,
' rsa-sha2-512 ' : { ' cert ' : False , ' variable_key_len ' : True } ,
' ssh-rsa-cert-v01@openssh.com ' : { ' cert ' : True , ' variable_key_len ' : True } ,
' ssh-ed25519 ' : { ' cert ' : False , ' variable_key_len ' : False } ,
' ssh-ed25519-cert-v01@openssh.com ' : { ' cert ' : True , ' variable_key_len ' : False } ,
}
2017-09-22 04:44:34 +02:00
@staticmethod
2017-09-27 02:46:00 +02:00
def run ( s , server_kex ) :
2017-09-22 04:44:34 +02:00
KEX_TO_DHGROUP = {
' diffie-hellman-group1-sha1 ' : KexGroup1 ,
' diffie-hellman-group14-sha1 ' : KexGroup14_SHA1 ,
' diffie-hellman-group14-sha256 ' : KexGroup14_SHA256 ,
' curve25519-sha256 ' : KexCurve25519_SHA256 ,
' curve25519-sha256@libssh.org ' : KexCurve25519_SHA256 ,
' diffie-hellman-group16-sha512 ' : KexGroup16_SHA512 ,
' diffie-hellman-group18-sha512 ' : KexGroup18_SHA512 ,
' diffie-hellman-group-exchange-sha1 ' : KexGroupExchange_SHA1 ,
' diffie-hellman-group-exchange-sha256 ' : KexGroupExchange_SHA256 ,
' ecdh-sha2-nistp256 ' : KexNISTP256 ,
' ecdh-sha2-nistp384 ' : KexNISTP384 ,
' ecdh-sha2-nistp521 ' : KexNISTP521 ,
#'kexguess2@matt.ucc.asn.au': ???
}
# Pick the first kex algorithm that the server supports, which we
# happen to support as well.
2017-09-27 02:46:00 +02:00
kex_str = None
2017-09-22 04:44:34 +02:00
kex_group = None
2017-09-27 02:46:00 +02:00
for server_kex_alg in server_kex . kex_algorithms :
2017-09-22 04:44:34 +02:00
if server_kex_alg in KEX_TO_DHGROUP :
2017-09-27 02:46:00 +02:00
kex_str = server_kex_alg
kex_group = KEX_TO_DHGROUP [ kex_str ] ( )
2017-09-22 04:44:34 +02:00
break
2017-09-27 02:46:00 +02:00
if kex_str is not None :
2019-08-22 21:47:37 +02:00
SSH2 . HostKeyTest . __test ( s , server_kex , kex_str , kex_group , SSH2 . HostKeyTest . HOST_KEY_TYPES )
2017-09-27 02:46:00 +02:00
@staticmethod
2019-08-22 21:47:37 +02:00
def __test ( s , server_kex , kex_str , kex_group , host_key_types ) :
2017-09-27 02:46:00 +02:00
hostkey_modulus_size = 0
ca_modulus_size = 0
2017-09-22 04:44:34 +02:00
2019-08-22 21:47:37 +02:00
# For each host key type...
for host_key_type in host_key_types :
# Skip those already handled (i.e.: those in the RSA family, as testing one tests them all).
if ' parsed ' in host_key_types [ host_key_type ] and host_key_types [ host_key_type ] [ ' parsed ' ] :
continue
2017-09-27 02:46:00 +02:00
2019-08-22 21:47:37 +02:00
# If this host key type is supported by the server, we test it.
if host_key_type in server_kex . key_algorithms :
cert = host_key_types [ host_key_type ] [ ' cert ' ]
variable_key_len = host_key_types [ host_key_type ] [ ' variable_key_len ' ]
# If the connection is closed, re-open it and get the kex again.
if not s . is_connected ( ) :
s . connect ( )
unused = None # pylint: disable=unused-variable
unused , unused , err = s . get_banner ( )
if err is not None :
s . close ( )
return
2017-09-27 02:46:00 +02:00
2019-08-22 21:47:37 +02:00
# Parse the server's initial KEX.
packet_type = 0 # pylint: disable=unused-variable
packet_type , payload = s . read_packet ( )
SSH2 . Kex . parse ( payload )
2017-09-27 02:46:00 +02:00
# Send the server our KEXINIT message, using only our
2019-08-22 21:47:37 +02:00
# selected kex and host key type. Send the server's own
2017-09-27 02:46:00 +02:00
# list of ciphers and MACs back to it (this doesn't
# matter, really).
2019-08-22 21:47:37 +02:00
client_kex = SSH2 . Kex ( os . urandom ( 16 ) , [ kex_str ] , [ host_key_type ] , server_kex . client , server_kex . server , 0 , 0 )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
s . write_byte ( SSH . Protocol . MSG_KEXINIT )
client_kex . write ( s )
s . send_packet ( )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Do the initial DH exchange. The server responds back
2019-08-22 21:47:37 +02:00
# with the host key and its length. Bingo. We also get back the host key fingerprint.
2017-09-27 02:46:00 +02:00
kex_group . send_init ( s )
2019-08-22 21:47:37 +02:00
host_key = kex_group . recv_reply ( s , variable_key_len )
server_kex . set_host_key ( host_key_type , host_key )
2017-09-27 02:46:00 +02:00
hostkey_modulus_size = kex_group . get_hostkey_size ( )
ca_modulus_size = kex_group . get_ca_size ( )
2019-08-22 21:47:37 +02:00
# Close the socket, as the connection has
# been put in a state that later tests can't use.
s . close ( )
2017-09-27 02:46:00 +02:00
2019-08-22 21:47:37 +02:00
# If the host key modulus or CA modulus was successfully parsed, check to see that its a safe size.
if hostkey_modulus_size > 0 or ca_modulus_size > 0 :
# Set the hostkey size for all RSA key types since 'ssh-rsa',
# 'rsa-sha2-256', etc. are all using the same host key.
# Note, however, that this may change in the future.
if cert is False and host_key_type in SSH2 . HostKeyTest . RSA_FAMILY :
for rsa_type in SSH2 . HostKeyTest . RSA_FAMILY :
server_kex . set_rsa_key_size ( rsa_type , hostkey_modulus_size )
elif cert is True :
server_kex . set_rsa_key_size ( host_key_type , hostkey_modulus_size , ca_modulus_size )
# Keys smaller than 2048 result in a failure. Update the database accordingly.
if ( cert is False ) and ( hostkey_modulus_size < 2048 ) :
for rsa_type in SSH2 . HostKeyTest . RSA_FAMILY :
alg_list = SSH2 . KexDB . ALGORITHMS [ ' key ' ] [ rsa_type ]
alg_list . append ( [ ' using small %d -bit modulus ' % hostkey_modulus_size ] )
elif ( cert is True ) and ( ( hostkey_modulus_size < 2048 ) or ( ca_modulus_size > 0 and ca_modulus_size < 2048 ) ) :
alg_list = SSH2 . KexDB . ALGORITHMS [ ' key ' ] [ host_key_type ]
min_modulus = min ( hostkey_modulus_size , ca_modulus_size )
min_modulus = min_modulus if min_modulus > 0 else max ( hostkey_modulus_size , ca_modulus_size )
alg_list . append ( [ ' using small %d -bit modulus ' % min_modulus ] )
# If this host key type is in the RSA family, then mark them all as parsed (since results in one are valid for them all).
if host_key_type in SSH2 . HostKeyTest . RSA_FAMILY :
for rsa_type in SSH2 . HostKeyTest . RSA_FAMILY :
host_key_types [ rsa_type ] [ ' parsed ' ] = True
2017-09-27 02:46:00 +02:00
else :
2019-08-22 21:47:37 +02:00
host_key_types [ host_key_type ] [ ' parsed ' ] = True
2017-09-27 02:46:00 +02:00
2017-09-22 04:44:34 +02:00
# Performs DH group exchanges to find what moduli are supported, and checks
# their size.
class GEXTest ( object ) :
# Creates a new connection to the server. Returns an SSH.Socket, or
# None on failure.
@staticmethod
2017-09-27 02:46:00 +02:00
def reconnect ( s , gex_alg ) :
if s . is_connected ( ) :
return
s . connect ( )
2017-09-28 04:22:42 +02:00
unused = None # pylint: disable=unused-variable
2017-09-22 04:44:34 +02:00
unused , unused , err = s . get_banner ( )
if err is not None :
s . close ( )
2017-09-27 02:46:00 +02:00
return False
2017-09-22 04:44:34 +02:00
# Parse the server's initial KEX.
2017-09-28 04:22:42 +02:00
packet_type = 0 # pylint: disable=unused-variable
2017-09-22 04:44:34 +02:00
packet_type , payload = s . read_packet ( 2 )
kex = SSH2 . Kex . parse ( payload )
# Send our KEX using the specified group-exchange and most of the
# server's own values.
client_kex = SSH2 . Kex ( os . urandom ( 16 ) , [ gex_alg ] , kex . key_algorithms , kex . client , kex . server , 0 , 0 )
s . write_byte ( SSH . Protocol . MSG_KEXINIT )
client_kex . write ( s )
s . send_packet ( )
2017-09-27 02:46:00 +02:00
return True
2017-09-22 04:44:34 +02:00
# Runs the DH moduli test against the specified target.
@staticmethod
2017-09-27 02:46:00 +02:00
def run ( s , kex ) :
2017-09-22 04:44:34 +02:00
GEX_ALGS = {
' diffie-hellman-group-exchange-sha1 ' : KexGroupExchange_SHA1 ,
' diffie-hellman-group-exchange-sha256 ' : KexGroupExchange_SHA256 ,
}
2017-09-27 02:46:00 +02:00
# The previous RSA tests put the server in a state we can't
# test. So we need a new connection to start with a clean
# slate.
if s . is_connected ( ) :
s . close ( )
2017-09-22 04:44:34 +02:00
# Check if the server supports any of the group-exchange
# algorithms. If so, test each one.
for gex_alg in GEX_ALGS :
if gex_alg in kex . kex_algorithms :
2017-09-27 02:46:00 +02:00
if SSH2 . GEXTest . reconnect ( s , gex_alg ) is False :
2017-09-22 04:44:34 +02:00
break
kex_group = GEX_ALGS [ gex_alg ] ( )
smallest_modulus = - 1
# First try a range of weak sizes.
try :
2017-09-28 03:27:08 +02:00
kex_group . send_init_gex ( s , 512 , 1024 , 1536 )
2019-08-22 21:47:37 +02:00
kex_group . recv_reply ( s , False )
2017-09-22 04:44:34 +02:00
# Its been observed that servers will return a group
# larger than the requested max. So just because we
# got here, doesn't mean the server is vulnerable...
2017-09-27 02:46:00 +02:00
smallest_modulus = kex_group . get_dh_modulus_size ( )
2019-08-22 21:47:37 +02:00
except Exception as e : # pylint: disable=bare-except
pass
2017-09-22 04:44:34 +02:00
finally :
s . close ( )
# Try an array of specific modulus sizes... one at a time.
reconnect_failed = False
for bits in [ 512 , 768 , 1024 , 1536 , 2048 , 3072 , 4096 ] :
# If we found one modulus size already, but we're about
# to test a larger one, don't bother.
if smallest_modulus > 0 and bits > = smallest_modulus :
break
2017-09-27 02:46:00 +02:00
if SSH2 . GEXTest . reconnect ( s , gex_alg ) is False :
reconnect_failed = True
break
2017-09-22 04:44:34 +02:00
try :
2017-09-28 03:27:08 +02:00
kex_group . send_init_gex ( s , bits , bits , bits )
2019-08-22 21:47:37 +02:00
kex_group . recv_reply ( s , False )
2017-09-27 02:46:00 +02:00
smallest_modulus = kex_group . get_dh_modulus_size ( )
2019-08-22 21:47:37 +02:00
except Exception as e : # pylint: disable=bare-except
#import traceback
#print(traceback.format_exc())
pass
2017-09-22 04:44:34 +02:00
finally :
2017-09-27 02:46:00 +02:00
# The server is in a state that is not re-testable,
# so there's nothing else to do with this open
# connection.
2017-09-22 04:44:34 +02:00
s . close ( )
2017-09-27 02:46:00 +02:00
2017-09-22 04:44:34 +02:00
if smallest_modulus > 0 :
kex . set_dh_modulus_size ( gex_alg , smallest_modulus )
# We flag moduli smaller than 2048 as a failure.
if smallest_modulus < 2048 :
text = ' using small %d -bit modulus ' % smallest_modulus
lst = SSH2 . KexDB . ALGORITHMS [ ' kex ' ] [ gex_alg ]
# For 'diffie-hellman-group-exchange-sha256', add
# a failure reason.
if len ( lst ) == 1 :
2017-09-27 02:46:00 +02:00
lst . append ( [ text ] )
2017-09-22 04:44:34 +02:00
# For 'diffie-hellman-group-exchange-sha1', delete
# the existing failure reason (which is vague), and
# insert our own.
else :
del lst [ 1 ]
lst . insert ( 1 , [ text ] )
if reconnect_failed :
break
2016-09-02 16:22:00 +02:00
2016-09-15 17:00:09 +02:00
class SSH1 ( object ) :
class CRC32 ( object ) :
def __init__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-09-15 17:00:09 +02:00
self . _table = [ 0 ] * 256
for i in range ( 256 ) :
crc = 0
n = i
2016-10-20 19:00:51 +02:00
for _ in range ( 8 ) :
2016-09-15 17:00:09 +02:00
x = ( crc ^ n ) & 1
crc = ( crc >> 1 ) ^ ( x * 0xedb88320 )
n = n >> 1
self . _table [ i ] = crc
def calc ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> int
2016-09-15 17:00:09 +02:00
crc , l = 0 , len ( v )
for i in range ( l ) :
n = ord ( v [ i : i + 1 ] )
n = n ^ ( crc & 0xff )
crc = ( crc >> 8 ) ^ self . _table [ n ]
return crc
2016-10-19 19:47:13 +02:00
_crc32 = None # type: Optional[SSH1.CRC32]
2016-09-17 18:33:03 +02:00
CIPHERS = [ ' none ' , ' idea ' , ' des ' , ' 3des ' , ' tss ' , ' rc4 ' , ' blowfish ' ]
2016-11-03 18:10:49 +01:00
AUTHS = [ ' none ' , ' rhosts ' , ' rsa ' , ' password ' , ' rhosts_rsa ' , ' tis ' , ' kerberos ' ]
2016-09-15 17:00:09 +02:00
@classmethod
def crc32 ( cls , v ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> int
2016-10-05 13:56:36 +02:00
if cls . _crc32 is None :
cls . _crc32 = cls . CRC32 ( )
2016-09-15 17:00:09 +02:00
return cls . _crc32 . calc ( v )
2016-10-20 19:00:51 +02:00
class KexDB ( object ) : # pylint: disable=too-few-public-methods
# pylint: disable=bad-whitespace
2016-09-17 18:33:03 +02:00
FAIL_PLAINTEXT = ' no encryption/integrity '
FAIL_OPENSSH37_REMOVE = ' removed since OpenSSH 3.7 '
FAIL_NA_BROKEN = ' not implemented in OpenSSH, broken algorithm '
FAIL_NA_UNSAFE = ' not implemented in OpenSSH (server), unsafe algorithm '
TEXT_CIPHER_IDEA = ' cipher used by commercial SSH '
ALGORITHMS = {
2016-09-17 19:21:18 +02:00
' key ' : {
' ssh-rsa1 ' : [ [ ' 1.2.2 ' ] ] ,
} ,
2016-09-17 18:33:03 +02:00
' enc ' : {
' none ' : [ [ ' 1.2.2 ' ] , [ FAIL_PLAINTEXT ] ] ,
' idea ' : [ [ None ] , [ ] , [ ] , [ TEXT_CIPHER_IDEA ] ] ,
' des ' : [ [ ' 2.3.0C ' ] , [ FAIL_NA_UNSAFE ] ] ,
' 3des ' : [ [ ' 1.2.2 ' ] ] ,
' tss ' : [ [ ' ' ] , [ FAIL_NA_BROKEN ] ] ,
' rc4 ' : [ [ ] , [ FAIL_NA_BROKEN ] ] ,
' blowfish ' : [ [ ' 1.2.2 ' ] ] ,
} ,
' aut ' : {
' rhosts ' : [ [ ' 1.2.2 ' , ' 3.6 ' ] , [ FAIL_OPENSSH37_REMOVE ] ] ,
' rsa ' : [ [ ' 1.2.2 ' ] ] ,
' password ' : [ [ ' 1.2.2 ' ] ] ,
' rhosts_rsa ' : [ [ ' 1.2.2 ' ] ] ,
' tis ' : [ [ ' 1.2.2 ' ] ] ,
' kerberos ' : [ [ ' 1.2.2 ' , ' 3.6 ' ] , [ FAIL_OPENSSH37_REMOVE ] ] ,
}
2016-11-03 18:10:49 +01:00
} # type: Dict[str, Dict[str, List[List[Optional[str]]]]]
2016-09-17 18:33:03 +02:00
2016-09-15 17:00:09 +02:00
class PublicKeyMessage ( object ) :
def __init__ ( self , cookie , skey , hkey , pflags , cmask , amask ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type, Tuple[int, int, int], Tuple[int, int, int], int, int, int) -> None
2017-04-05 15:02:40 +02:00
if len ( skey ) != 3 :
raise ValueError ( ' invalid server key pair: {0} ' . format ( skey ) )
if len ( hkey ) != 3 :
raise ValueError ( ' invalid host key pair: {0} ' . format ( hkey ) )
2016-09-15 17:00:09 +02:00
self . __cookie = cookie
self . __server_key = skey
self . __host_key = hkey
self . __protocol_flags = pflags
self . __supported_ciphers_mask = cmask
self . __supported_authentications_mask = amask
@property
def cookie ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-09-15 17:00:09 +02:00
return self . __cookie
@property
def server_key_bits ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __server_key [ 0 ]
@property
def server_key_public_exponent ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __server_key [ 1 ]
@property
def server_key_public_modulus ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __server_key [ 2 ]
@property
def host_key_bits ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __host_key [ 0 ]
@property
def host_key_public_exponent ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __host_key [ 1 ]
@property
def host_key_public_modulus ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __host_key [ 2 ]
2016-09-17 19:15:47 +02:00
@property
def host_key_fingerprint_data ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-10-20 19:00:51 +02:00
# pylint: disable=protected-access
2016-09-17 19:15:47 +02:00
mod = WriteBuf . _create_mpint ( self . host_key_public_modulus , False )
e = WriteBuf . _create_mpint ( self . host_key_public_exponent , False )
return mod + e
2016-09-15 17:00:09 +02:00
@property
def protocol_flags ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __protocol_flags
@property
def supported_ciphers_mask ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __supported_ciphers_mask
@property
def supported_ciphers ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-09-15 17:00:09 +02:00
ciphers = [ ]
for i in range ( len ( SSH1 . CIPHERS ) ) :
if self . __supported_ciphers_mask & ( 1 << i ) != 0 :
2016-10-19 19:47:13 +02:00
ciphers . append ( utils . to_utext ( SSH1 . CIPHERS [ i ] ) )
2016-09-15 17:00:09 +02:00
return ciphers
@property
def supported_authentications_mask ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 17:00:09 +02:00
return self . __supported_authentications_mask
@property
def supported_authentications ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2016-09-15 17:00:09 +02:00
auths = [ ]
2016-09-17 18:33:03 +02:00
for i in range ( 1 , len ( SSH1 . AUTHS ) ) :
2016-09-15 17:00:09 +02:00
if self . __supported_authentications_mask & ( 1 << i ) != 0 :
2016-10-19 19:47:13 +02:00
auths . append ( utils . to_utext ( SSH1 . AUTHS [ i ] ) )
2016-09-15 17:00:09 +02:00
return auths
2016-10-13 16:53:39 +02:00
def write ( self , wbuf ) :
2016-10-19 19:47:13 +02:00
# type: (WriteBuf) -> None
2016-10-13 16:53:39 +02:00
wbuf . write ( self . cookie )
wbuf . write_int ( self . server_key_bits )
wbuf . write_mpint1 ( self . server_key_public_exponent )
wbuf . write_mpint1 ( self . server_key_public_modulus )
wbuf . write_int ( self . host_key_bits )
wbuf . write_mpint1 ( self . host_key_public_exponent )
wbuf . write_mpint1 ( self . host_key_public_modulus )
wbuf . write_int ( self . protocol_flags )
wbuf . write_int ( self . supported_ciphers_mask )
wbuf . write_int ( self . supported_authentications_mask )
@property
def payload ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-10-13 16:53:39 +02:00
wbuf = WriteBuf ( )
self . write ( wbuf )
return wbuf . write_flush ( )
2016-09-15 17:00:09 +02:00
@classmethod
def parse ( cls , payload ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> SSH1.PublicKeyMessage
2016-09-15 17:00:09 +02:00
buf = ReadBuf ( payload )
cookie = buf . read ( 8 )
server_key_bits = buf . read_int ( )
server_key_exponent = buf . read_mpint1 ( )
server_key_modulus = buf . read_mpint1 ( )
skey = ( server_key_bits , server_key_exponent , server_key_modulus )
host_key_bits = buf . read_int ( )
host_key_exponent = buf . read_mpint1 ( )
host_key_modulus = buf . read_mpint1 ( )
hkey = ( host_key_bits , host_key_exponent , host_key_modulus )
pflags = buf . read_int ( )
cmask = buf . read_int ( )
amask = buf . read_int ( )
pkm = cls ( cookie , skey , hkey , pflags , cmask , amask )
return pkm
2015-12-29 16:28:08 +01:00
class ReadBuf ( object ) :
2016-09-02 16:22:00 +02:00
def __init__ ( self , data = None ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[binary_type]) -> None
2016-04-01 16:56:06 +02:00
super ( ReadBuf , self ) . __init__ ( )
2017-04-05 17:12:26 +02:00
self . _buf = BytesIO ( data ) if data is not None else BytesIO ( )
self . _len = len ( data ) if data is not None else 0
2015-12-29 16:28:08 +01:00
@property
def unread_len ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2015-12-29 16:28:08 +01:00
return self . _len - self . _buf . tell ( )
2016-01-05 13:10:02 +01:00
def read ( self , size ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> binary_type
2015-12-29 16:28:08 +01:00
return self . _buf . read ( size )
2016-09-14 15:33:38 +02:00
def read_byte ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2017-03-23 22:17:35 +01:00
v = struct . unpack ( ' B ' , self . read ( 1 ) ) [ 0 ] # type: int
return v
2016-09-14 15:33:38 +02:00
def read_bool ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> bool
2016-09-14 15:33:38 +02:00
return self . read_byte ( ) != 0
2015-12-29 16:28:08 +01:00
def read_int ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2017-03-23 22:17:35 +01:00
v = struct . unpack ( ' >I ' , self . read ( 4 ) ) [ 0 ] # type: int
return v
2015-12-29 16:28:08 +01:00
def read_list ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> List[text_type]
2015-12-29 16:28:08 +01:00
list_size = self . read_int ( )
2016-10-25 12:53:51 +02:00
return self . read ( list_size ) . decode ( ' utf-8 ' , ' replace ' ) . split ( ' , ' )
2016-09-14 15:33:38 +02:00
def read_string ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-09-14 15:33:38 +02:00
n = self . read_int ( )
return self . read ( n )
2016-09-15 14:52:16 +02:00
@classmethod
2017-04-05 17:12:26 +02:00
def _parse_mpint ( cls , v , pad , f ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type, binary_type, str) -> int
2016-09-15 05:09:08 +02:00
r = 0
2017-04-05 17:12:26 +02:00
if len ( v ) % 4 != 0 :
2016-09-14 15:33:38 +02:00
v = pad * ( 4 - ( len ( v ) % 4 ) ) + v
for i in range ( 0 , len ( v ) , 4 ) :
2017-04-05 17:12:26 +02:00
r = ( r << 32 ) | struct . unpack ( f , v [ i : i + 4 ] ) [ 0 ]
2016-09-14 15:33:38 +02:00
return r
2016-09-15 05:09:08 +02:00
def read_mpint1 ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 05:09:08 +02:00
# NOTE: Data Type Enc @ http://www.snailbook.com/docs/protocol-1.5.txt
bits = struct . unpack ( ' >H ' , self . read ( 2 ) ) [ 0 ]
n = ( bits + 7 ) / / 8
return self . _parse_mpint ( self . read ( n ) , b ' \x00 ' , ' >I ' )
def read_mpint2 ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> int
2016-09-15 05:09:08 +02:00
# NOTE: Section 5 @ https://www.ietf.org/rfc/rfc4251.txt
v = self . read_string ( )
if len ( v ) == 0 :
return 0
2017-04-05 17:12:26 +02:00
pad , f = ( b ' \xff ' , ' >i ' ) if ord ( v [ 0 : 1 ] ) & 0x80 != 0 else ( b ' \x00 ' , ' >I ' )
return self . _parse_mpint ( v , pad , f )
2016-09-14 15:33:38 +02:00
def read_line ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> text_type
2016-10-25 12:53:51 +02:00
return self . _buf . readline ( ) . rstrip ( ) . decode ( ' utf-8 ' , ' replace ' )
2015-12-23 04:01:24 +01:00
2017-09-27 02:46:00 +02:00
def reset ( self ) :
self . _buf = BytesIO ( )
self . _len = 0
super ( ReadBuf , self ) . reset ( )
2016-09-02 16:22:00 +02:00
2016-04-01 17:30:54 +02:00
class WriteBuf ( object ) :
2016-09-02 16:22:00 +02:00
def __init__ ( self , data = None ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[binary_type]) -> None
2016-04-01 17:30:54 +02:00
super ( WriteBuf , self ) . __init__ ( )
2017-04-05 17:12:26 +02:00
self . _wbuf = BytesIO ( data ) if data is not None else BytesIO ( )
2016-04-01 17:30:54 +02:00
def write ( self , data ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> WriteBuf
2016-04-01 17:30:54 +02:00
self . _wbuf . write ( data )
2016-09-14 15:33:38 +02:00
return self
2016-04-01 17:30:54 +02:00
def write_byte ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> WriteBuf
2016-09-14 15:33:38 +02:00
return self . write ( struct . pack ( ' B ' , v ) )
2016-04-01 17:30:54 +02:00
def write_bool ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (bool) -> WriteBuf
2016-09-14 15:33:38 +02:00
return self . write_byte ( 1 if v else 0 )
2016-04-01 17:30:54 +02:00
def write_int ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> WriteBuf
2016-09-14 15:33:38 +02:00
return self . write ( struct . pack ( ' >I ' , v ) )
2016-04-01 17:30:54 +02:00
def write_string ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (Union[binary_type, text_type]) -> WriteBuf
2016-04-01 17:30:54 +02:00
if not isinstance ( v , bytes ) :
v = bytes ( bytearray ( v , ' utf-8 ' ) )
2016-09-14 15:33:38 +02:00
self . write_int ( len ( v ) )
return self . write ( v )
2016-04-01 17:30:54 +02:00
def write_list ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (List[text_type]) -> WriteBuf
2016-10-05 05:06:26 +02:00
return self . write_string ( u ' , ' . join ( v ) )
2016-04-01 17:30:54 +02:00
2016-09-15 14:52:16 +02:00
@classmethod
def _bitlength ( cls , n ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> int
2016-09-15 14:52:16 +02:00
try :
return n . bit_length ( )
except AttributeError :
return len ( bin ( n ) ) - ( 2 if n > 0 else 3 )
@classmethod
2016-09-17 18:23:24 +02:00
def _create_mpint ( cls , n , signed = True , bits = None ) :
2016-10-19 19:47:13 +02:00
# type: (int, bool, Optional[int]) -> binary_type
2016-09-15 14:52:16 +02:00
if bits is None :
bits = cls . _bitlength ( n )
length = bits / / 8 + ( 1 if n != 0 else 0 )
2016-09-15 05:09:08 +02:00
ql = ( length + 7 ) / / 8
2016-10-19 19:47:13 +02:00
fmt , v2 = ' > {0} Q ' . format ( ql ) , [ 0 ] * ql
2016-09-15 05:09:08 +02:00
for i in range ( ql ) :
2017-04-05 15:13:35 +02:00
v2 [ ql - i - 1 ] = n & 0xffffffffffffffff
2016-09-15 14:52:16 +02:00
n >> = 64
2016-09-15 05:09:08 +02:00
data = bytes ( struct . pack ( fmt , * v2 ) [ - length : ] )
2016-09-17 18:23:24 +02:00
if not signed :
data = data . lstrip ( b ' \x00 ' )
elif data . startswith ( b ' \xff \x80 ' ) :
2016-09-15 05:09:08 +02:00
data = data [ 1 : ]
return data
2016-09-15 14:52:16 +02:00
def write_mpint1 ( self , n ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> WriteBuf
2016-09-15 05:09:08 +02:00
# NOTE: Data Type Enc @ http://www.snailbook.com/docs/protocol-1.5.txt
2016-09-15 14:52:16 +02:00
bits = self . _bitlength ( n )
2016-09-17 18:23:24 +02:00
data = self . _create_mpint ( n , False , bits )
2016-09-15 14:52:16 +02:00
self . write ( struct . pack ( ' >H ' , bits ) )
2016-09-15 05:09:08 +02:00
return self . write ( data )
2016-09-15 14:52:16 +02:00
def write_mpint2 ( self , n ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> WriteBuf
2016-09-15 05:09:08 +02:00
# NOTE: Section 5 @ https://www.ietf.org/rfc/rfc4251.txt
2016-09-15 14:52:16 +02:00
data = self . _create_mpint ( n )
2016-09-14 15:33:38 +02:00
return self . write_string ( data )
2016-10-05 05:06:26 +02:00
def write_line ( self , v ) :
2016-10-19 19:47:13 +02:00
# type: (Union[binary_type, str]) -> WriteBuf
2016-10-05 05:06:26 +02:00
if not isinstance ( v , bytes ) :
v = bytes ( bytearray ( v , ' utf-8 ' ) )
v + = b ' \r \n '
return self . write ( v )
2016-09-14 15:33:38 +02:00
def write_flush ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> binary_type
2016-09-14 15:33:38 +02:00
payload = self . _wbuf . getvalue ( )
self . _wbuf . truncate ( 0 )
self . _wbuf . seek ( 0 )
return payload
2016-04-01 17:30:54 +02:00
2017-09-27 02:46:00 +02:00
def reset ( self ) :
self . _wbuf = BytesIO ( )
2016-09-02 16:22:00 +02:00
2016-10-20 19:00:51 +02:00
class SSH ( object ) : # pylint: disable=too-few-public-methods
class Protocol ( object ) : # pylint: disable=too-few-public-methods
# pylint: disable=bad-whitespace
2016-09-15 17:00:09 +02:00
SMSG_PUBLIC_KEY = 2
2019-09-20 02:08:10 +02:00
MSG_DEBUG = 4
2016-09-08 13:55:58 +02:00
MSG_KEXINIT = 20
MSG_NEWKEYS = 21
MSG_KEXDH_INIT = 30
2017-09-22 04:44:34 +02:00
MSG_KEXDH_REPLY = 31
MSG_KEXDH_GEX_REQUEST = 34
MSG_KEXDH_GEX_GROUP = 31
MSG_KEXDH_GEX_INIT = 32
MSG_KEXDH_GEX_REPLY = 33
2016-09-08 13:55:58 +02:00
2016-10-20 19:00:51 +02:00
class Product ( object ) : # pylint: disable=too-few-public-methods
2016-09-08 13:55:58 +02:00
OpenSSH = ' OpenSSH '
DropbearSSH = ' Dropbear SSH '
2016-10-04 09:27:27 +02:00
LibSSH = ' libssh '
2019-08-27 23:02:03 +02:00
TinySSH = ' TinySSH '
2019-09-28 00:14:36 +02:00
PuTTY = ' PuTTY '
2015-12-29 16:28:08 +01:00
2016-09-07 18:26:33 +02:00
class Software ( object ) :
2016-10-20 19:00:51 +02:00
def __init__ ( self , vendor , product , version , patch , os_version ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[str], str, str, Optional[str], Optional[str]) -> None
2016-09-07 18:26:33 +02:00
self . __vendor = vendor
self . __product = product
self . __version = version
self . __patch = patch
2016-10-20 19:00:51 +02:00
self . __os = os_version
2016-09-07 18:26:33 +02:00
@property
def vendor ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> Optional[str]
2016-09-07 18:26:33 +02:00
return self . __vendor
@property
def product ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2016-09-07 18:26:33 +02:00
return self . __product
@property
def version ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2016-09-07 18:26:33 +02:00
return self . __version
@property
def patch ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> Optional[str]
2016-09-07 18:26:33 +02:00
return self . __patch
@property
def os ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> Optional[str]
2016-09-07 18:26:33 +02:00
return self . __os
2016-09-12 18:21:57 +02:00
def compare_version ( self , other ) :
2016-10-19 19:47:13 +02:00
# type: (Union[None, SSH.Software, text_type]) -> int
2016-10-20 19:00:51 +02:00
# pylint: disable=too-many-branches
2016-09-12 18:21:57 +02:00
if other is None :
return 1
2016-10-19 19:47:13 +02:00
if isinstance ( other , SSH . Software ) :
2016-10-05 03:09:50 +02:00
other = ' {0} {1} ' . format ( other . version , other . patch or ' ' )
2016-09-12 18:21:57 +02:00
else :
other = str ( other )
mx = re . match ( r ' ^([ \ d \ .]+ \ d+)(.*)$ ' , other )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-12 18:21:57 +02:00
oversion , opatch = mx . group ( 1 ) , mx . group ( 2 ) . strip ( )
else :
oversion , opatch = other , ' '
if self . version < oversion :
return - 1
elif self . version > oversion :
return 1
2016-09-28 15:58:58 +02:00
spatch = self . patch or ' '
2016-09-12 18:21:57 +02:00
if self . product == SSH . Product . DropbearSSH :
if not re . match ( r ' ^test \ d.*$ ' , opatch ) :
opatch = ' z {0} ' . format ( opatch )
2016-09-28 15:58:58 +02:00
if not re . match ( r ' ^test \ d.*$ ' , spatch ) :
spatch = ' z {0} ' . format ( spatch )
2016-09-13 11:38:05 +02:00
elif self . product == SSH . Product . OpenSSH :
mx1 = re . match ( r ' ^p \ d(.*) ' , opatch )
2016-09-28 15:58:58 +02:00
mx2 = re . match ( r ' ^p \ d(.*) ' , spatch )
2017-04-06 04:27:13 +02:00
if not ( bool ( mx1 ) and bool ( mx2 ) ) :
if bool ( mx1 ) :
2016-09-13 11:38:05 +02:00
opatch = mx1 . group ( 1 )
2017-04-06 04:27:13 +02:00
if bool ( mx2 ) :
2016-09-13 11:38:05 +02:00
spatch = mx2 . group ( 1 )
if spatch < opatch :
return - 1
elif spatch > opatch :
return 1
2016-09-12 18:21:57 +02:00
return 0
def between_versions ( self , vfrom , vtill ) :
2016-10-19 19:47:13 +02:00
# type: (str, str) -> bool
2017-04-06 04:27:13 +02:00
if bool ( vfrom ) and self . compare_version ( vfrom ) < 0 :
2016-09-08 17:50:19 +02:00
return False
2017-04-06 04:27:13 +02:00
if bool ( vtill ) and self . compare_version ( vtill ) > 0 :
2016-09-08 17:50:19 +02:00
return False
return True
2016-09-28 15:58:58 +02:00
def display ( self , full = True ) :
2016-10-19 19:47:13 +02:00
# type: (bool) -> str
2017-04-06 04:27:13 +02:00
r = ' {0} ' . format ( self . vendor ) if bool ( self . vendor ) else ' '
2016-10-20 19:00:51 +02:00
r + = self . product
2017-04-06 04:27:13 +02:00
if bool ( self . version ) :
2016-10-20 19:00:51 +02:00
r + = ' {0} ' . format ( self . version )
2016-09-28 15:58:58 +02:00
if full :
patch = self . patch or ' '
if self . product == SSH . Product . OpenSSH :
2016-10-20 15:27:11 +02:00
mx = re . match ( r ' ^(p \ d)(.*)$ ' , patch )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-10-20 19:00:51 +02:00
r + = mx . group ( 1 )
2016-09-28 15:58:58 +02:00
patch = mx . group ( 2 ) . strip ( )
2017-04-06 04:27:13 +02:00
if bool ( patch ) :
2016-10-20 19:00:51 +02:00
r + = ' ( {0} ) ' . format ( patch )
2017-04-06 04:27:13 +02:00
if bool ( self . os ) :
2016-10-20 19:00:51 +02:00
r + = ' running on {0} ' . format ( self . os )
return r
2016-09-07 18:26:33 +02:00
2016-09-28 15:58:58 +02:00
def __str__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2016-09-28 15:58:58 +02:00
return self . display ( )
2016-09-07 18:26:33 +02:00
def __repr__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2017-04-06 04:27:13 +02:00
r = ' vendor= {0} , ' . format ( self . vendor ) if bool ( self . vendor ) else ' '
r + = ' product= {0} ' . format ( self . product )
if bool ( self . version ) :
2016-10-20 19:00:51 +02:00
r + = ' , version= {0} ' . format ( self . version )
2017-04-06 04:27:13 +02:00
if bool ( self . patch ) :
2016-10-20 19:00:51 +02:00
r + = ' , patch= {0} ' . format ( self . patch )
2017-04-06 04:27:13 +02:00
if bool ( self . os ) :
2016-10-20 19:00:51 +02:00
r + = ' , os= {0} ' . format ( self . os )
return ' < {0} ( {1} )> ' . format ( self . __class__ . __name__ , r )
2016-09-07 18:26:33 +02:00
@staticmethod
def _fix_patch ( patch ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> Optional[str]
2016-10-05 02:27:43 +02:00
return re . sub ( r ' ^[-_ \ .]+ ' , ' ' , patch ) or None
2016-09-07 18:26:33 +02:00
@staticmethod
def _fix_date ( d ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> Optional[str]
2016-09-07 18:26:33 +02:00
if d is not None and len ( d ) == 8 :
return ' {0} - {1} - {2} ' . format ( d [ : 4 ] , d [ 4 : 6 ] , d [ 6 : 8 ] )
else :
return None
@classmethod
2016-10-20 19:00:51 +02:00
def _extract_os_version ( cls , c ) :
2016-11-03 18:10:49 +01:00
# type: (Optional[str]) -> Optional[str]
2016-09-07 18:26:33 +02:00
if c is None :
return None
mx = re . match ( r ' ^NetBSD(?:_Secure_Shell)?(?:[ \ s-]+( \ d {8} )(.*))?$ ' , c )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
d = cls . _fix_date ( mx . group ( 1 ) )
return ' NetBSD ' if d is None else ' NetBSD ( {0} ) ' . format ( d )
mx = re . match ( r ' ^FreeBSD(?: \ slocalisations)?[ \ s-]+( \ d {8} )(.*)$ ' , c )
2017-04-06 04:27:13 +02:00
if not bool ( mx ) :
2016-09-07 18:26:33 +02:00
mx = re . match ( r ' ^[^@]+@FreeBSD \ .org[ \ s-]+( \ d {8} )(.*)$ ' , c )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
d = cls . _fix_date ( mx . group ( 1 ) )
return ' FreeBSD ' if d is None else ' FreeBSD ( {0} ) ' . format ( d )
2016-09-07 18:40:30 +02:00
w = [ ' RemotelyAnywhere ' , ' DesktopAuthority ' , ' RemoteSupportManager ' ]
for win_soft in w :
2016-10-20 15:27:11 +02:00
mx = re . match ( r ' ^in ' + win_soft + r ' ([ \ d \ .]+ \ d)$ ' , c )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:40:30 +02:00
ver = mx . group ( 1 )
return ' Microsoft Windows ( {0} {1} ) ' . format ( win_soft , ver )
2016-09-07 18:26:33 +02:00
generic = [ ' NetBSD ' , ' FreeBSD ' ]
for g in generic :
if c . startswith ( g ) or c . endswith ( g ) :
return g
return None
@classmethod
def parse ( cls , banner ) :
2016-11-03 18:10:49 +01:00
# type: (SSH.Banner) -> Optional[SSH.Software]
2016-10-20 19:00:51 +02:00
# pylint: disable=too-many-return-statements
2016-09-07 18:26:33 +02:00
software = str ( banner . software )
2016-09-12 18:21:57 +02:00
mx = re . match ( r ' ^dropbear_([ \ d \ .]+ \ d+)(.*) ' , software )
2016-11-03 18:10:49 +01:00
v = None # type: Optional[str]
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
patch = cls . _fix_patch ( mx . group ( 2 ) )
2016-09-08 13:55:58 +02:00
v , p = ' Matt Johnston ' , SSH . Product . DropbearSSH
2016-09-07 18:26:33 +02:00
v = None
return cls ( v , p , mx . group ( 1 ) , patch , None )
mx = re . match ( r ' ^OpenSSH[_ \ .-]+([ \ d \ .]+ \ d+)(.*) ' , software )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
patch = cls . _fix_patch ( mx . group ( 2 ) )
2016-09-08 13:55:58 +02:00
v , p = ' OpenBSD ' , SSH . Product . OpenSSH
2016-09-07 18:26:33 +02:00
v = None
2016-10-20 19:00:51 +02:00
os_version = cls . _extract_os_version ( banner . comments )
return cls ( v , p , mx . group ( 1 ) , patch , os_version )
2016-10-04 09:27:27 +02:00
mx = re . match ( r ' ^libssh-([ \ d \ .]+ \ d+)(.*) ' , software )
2019-08-18 05:11:03 +02:00
if bool ( mx ) :
patch = cls . _fix_patch ( mx . group ( 2 ) )
v , p = None , SSH . Product . LibSSH
os_version = cls . _extract_os_version ( banner . comments )
return cls ( v , p , mx . group ( 1 ) , patch , os_version )
mx = re . match ( r ' ^libssh_([ \ d \ .]+ \ d+)(.*) ' , software )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-10-04 09:27:27 +02:00
patch = cls . _fix_patch ( mx . group ( 2 ) )
v , p = None , SSH . Product . LibSSH
2016-10-20 19:00:51 +02:00
os_version = cls . _extract_os_version ( banner . comments )
return cls ( v , p , mx . group ( 1 ) , patch , os_version )
2016-09-16 15:09:49 +02:00
mx = re . match ( r ' ^RomSShell_([ \ d \ .]+ \ d+)(.*) ' , software )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-16 15:09:49 +02:00
patch = cls . _fix_patch ( mx . group ( 2 ) )
v , p = ' Allegro Software ' , ' RomSShell '
return cls ( v , p , mx . group ( 1 ) , patch , None )
2016-09-07 18:26:33 +02:00
mx = re . match ( r ' ^mpSSH_([ \ d \ .]+ \ d+) ' , software )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
v , p = ' HP ' , ' iLO (Integrated Lights-Out) sshd '
return cls ( v , p , mx . group ( 1 ) , None , None )
mx = re . match ( r ' ^Cisco-([ \ d \ .]+ \ d+) ' , software )
2017-04-06 04:27:13 +02:00
if bool ( mx ) :
2016-09-07 18:26:33 +02:00
v , p = ' Cisco ' , ' IOS/PIX sshd '
return cls ( v , p , mx . group ( 1 ) , None , None )
2019-08-27 23:02:03 +02:00
mx = re . match ( r ' ^tinyssh_(.*) ' , software )
if bool ( mx ) :
return cls ( None , SSH . Product . TinySSH , mx . group ( 1 ) , None , None )
2019-09-28 00:14:36 +02:00
mx = re . match ( r ' ^PuTTY_Release_(.*) ' , software )
if bool ( mx ) :
return cls ( None , SSH . Product . PuTTY , mx . group ( 1 ) , None , None )
2016-09-07 18:26:33 +02:00
return None
2016-09-06 17:55:17 +02:00
class Banner ( object ) :
2016-10-05 02:25:54 +02:00
_RXP , _RXR = r ' SSH- \ d \ . \ s*? \ d+ ' , r ' (- \ s*([^ \ s]*)(?: \ s+(.*))?)? '
2016-10-20 15:27:11 +02:00
RX_PROTOCOL = re . compile ( re . sub ( r ' \\ d( \ +?) ' , r ' ( \\ d \ g<1>) ' , _RXP ) )
2016-09-07 18:22:47 +02:00
RX_BANNER = re . compile ( r ' ^( {0} (?:(?:- {0} )*)) {1} $ ' . format ( _RXP , _RXR ) )
2016-09-07 11:58:03 +02:00
2016-10-19 19:47:13 +02:00
def __init__ ( self , protocol , software , comments , valid_ascii ) :
2016-11-03 18:10:49 +01:00
# type: (Tuple[int, int], Optional[str], Optional[str], bool) -> None
2016-09-06 17:55:17 +02:00
self . __protocol = protocol
self . __software = software
self . __comments = comments
2016-10-19 19:47:13 +02:00
self . __valid_ascii = valid_ascii
2016-09-06 17:55:17 +02:00
@property
def protocol ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> Tuple[int, int]
2016-09-06 17:55:17 +02:00
return self . __protocol
@property
def software ( self ) :
2016-11-03 18:10:49 +01:00
# type: () -> Optional[str]
2016-09-06 17:55:17 +02:00
return self . __software
@property
def comments ( self ) :
2016-11-03 18:10:49 +01:00
# type: () -> Optional[str]
2016-09-06 17:55:17 +02:00
return self . __comments
2016-10-19 19:47:13 +02:00
@property
def valid_ascii ( self ) :
# type: () -> bool
return self . __valid_ascii
2016-09-06 17:55:17 +02:00
def __str__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2016-10-20 19:00:51 +02:00
r = ' SSH- {0} . {1} ' . format ( self . protocol [ 0 ] , self . protocol [ 1 ] )
2016-09-06 17:55:17 +02:00
if self . software is not None :
2016-10-20 19:00:51 +02:00
r + = ' - {0} ' . format ( self . software )
2017-04-06 04:27:13 +02:00
if bool ( self . comments ) :
2016-10-20 19:00:51 +02:00
r + = ' {0} ' . format ( self . comments )
return r
2016-09-06 17:55:17 +02:00
def __repr__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> str
2016-09-06 17:55:17 +02:00
p = ' {0} . {1} ' . format ( self . protocol [ 0 ] , self . protocol [ 1 ] )
2016-10-20 19:00:51 +02:00
r = ' protocol= {0} ' . format ( p )
2017-04-06 04:27:13 +02:00
if self . software is not None :
2016-10-20 19:00:51 +02:00
r + = ' , software= {0} ' . format ( self . software )
2017-04-06 04:27:13 +02:00
if bool ( self . comments ) :
2016-10-20 19:00:51 +02:00
r + = ' , comments= {0} ' . format ( self . comments )
return ' < {0} ( {1} )> ' . format ( self . __class__ . __name__ , r )
2016-09-06 17:55:17 +02:00
@classmethod
def parse ( cls , banner ) :
2017-04-06 04:27:13 +02:00
# type: (text_type) -> Optional[SSH.Banner]
2016-11-02 17:25:13 +01:00
valid_ascii = utils . is_print_ascii ( banner )
ascii_banner = utils . to_print_ascii ( banner )
2016-10-19 19:47:13 +02:00
mx = cls . RX_BANNER . match ( ascii_banner )
2017-04-06 04:27:13 +02:00
if not bool ( mx ) :
2016-09-06 17:55:17 +02:00
return None
2016-09-07 18:22:47 +02:00
protocol = min ( re . findall ( cls . RX_PROTOCOL , mx . group ( 1 ) ) )
2016-09-07 12:00:53 +02:00
protocol = ( int ( protocol [ 0 ] ) , int ( protocol [ 1 ] ) )
2016-09-07 18:22:47 +02:00
software = ( mx . group ( 3 ) or ' ' ) . strip ( ) or None
if software is None and ( mx . group ( 2 ) or ' ' ) . startswith ( ' - ' ) :
2016-09-06 17:55:17 +02:00
software = ' '
2016-09-07 18:22:47 +02:00
comments = ( mx . group ( 4 ) or ' ' ) . strip ( ) or None
2016-10-05 02:25:54 +02:00
if comments is not None :
2016-10-20 15:27:11 +02:00
comments = re . sub ( r ' \ s+ ' , ' ' , comments )
2016-10-19 19:47:13 +02:00
return cls ( protocol , software , comments , valid_ascii )
2016-09-06 17:55:17 +02:00
2016-09-17 19:15:47 +02:00
class Fingerprint ( object ) :
def __init__ ( self , fpd ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> None
2016-09-17 19:15:47 +02:00
self . __fpd = fpd
@property
def md5 ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> text_type
2016-09-17 19:15:47 +02:00
h = hashlib . md5 ( self . __fpd ) . hexdigest ( )
2016-10-19 19:47:13 +02:00
r = u ' : ' . join ( h [ i : i + 2 ] for i in range ( 0 , len ( h ) , 2 ) )
return u ' MD5: {0} ' . format ( r )
2016-09-17 19:15:47 +02:00
@property
def sha256 ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> text_type
2016-09-17 19:15:47 +02:00
h = base64 . b64encode ( hashlib . sha256 ( self . __fpd ) . digest ( ) )
2016-10-19 19:47:13 +02:00
r = h . decode ( ' ascii ' ) . rstrip ( ' = ' )
return u ' SHA256: {0} ' . format ( r )
2016-09-17 19:15:47 +02:00
2016-11-03 18:10:49 +01:00
class Algorithm ( object ) :
2017-04-10 12:20:32 +02:00
class Timeframe ( object ) :
def __init__ ( self ) :
# type: () -> None
self . __storage = { } # type: Dict[str, List[Optional[str]]]
def __contains__ ( self , product ) :
# type: (str) -> bool
return product in self . __storage
def __getitem__ ( self , product ) :
# type: (str) -> Sequence[Optional[str]]
return tuple ( self . __storage . get ( product , [ None ] * 4 ) )
def __str__ ( self ) :
# type: () -> str
return self . __storage . __str__ ( )
def __repr__ ( self ) :
# type: () -> str
return self . __str__ ( )
def get_from ( self , product , for_server = True ) :
# type: (str, bool) -> Optional[str]
return self [ product ] [ 0 if bool ( for_server ) else 2 ]
def get_till ( self , product , for_server = True ) :
# type: (str, bool) -> Optional[str]
return self [ product ] [ 1 if bool ( for_server ) else 3 ]
def _update ( self , versions , pos ) :
# type: (Optional[str], int) -> None
ssh_versions = { } # type: Dict[str, str]
for_srv , for_cli = pos < 2 , pos > 1
for v in ( versions or ' ' ) . split ( ' , ' ) :
ssh_prod , ssh_ver , is_cli = SSH . Algorithm . get_ssh_version ( v )
if ( not ssh_ver or
( is_cli and for_srv ) or
( not is_cli and for_cli and ssh_prod in ssh_versions ) ) :
continue
ssh_versions [ ssh_prod ] = ssh_ver
for ssh_product , ssh_version in ssh_versions . items ( ) :
if ssh_product not in self . __storage :
self . __storage [ ssh_product ] = [ None ] * 4
prev = self [ ssh_product ] [ pos ]
if ( prev is None or
( prev < ssh_version and pos % 2 == 0 ) or
( prev > ssh_version and pos % 2 == 1 ) ) :
self . __storage [ ssh_product ] [ pos ] = ssh_version
def update ( self , versions , for_server = None ) :
# type: (List[Optional[str]], Optional[bool]) -> SSH.Algorithm.Timeframe
for_cli = for_server is None or for_server is False
for_srv = for_server is None or for_server is True
vlen = len ( versions )
for i in range ( min ( 3 , vlen ) ) :
if for_srv and i < 2 :
self . _update ( versions [ i ] , i )
if for_cli and ( i % 2 == 0 or vlen == 2 ) :
self . _update ( versions [ i ] , 3 - 0 * * i )
return self
2016-11-03 18:10:49 +01:00
@staticmethod
def get_ssh_version ( version_desc ) :
2017-04-10 12:20:32 +02:00
# type: (str) -> Tuple[str, str, bool]
is_client = version_desc . endswith ( ' C ' )
if is_client :
version_desc = version_desc [ : - 1 ]
2016-11-03 18:10:49 +01:00
if version_desc . startswith ( ' d ' ) :
2017-04-10 12:20:32 +02:00
return SSH . Product . DropbearSSH , version_desc [ 1 : ] , is_client
2016-11-03 18:10:49 +01:00
elif version_desc . startswith ( ' l1 ' ) :
2017-04-10 12:20:32 +02:00
return SSH . Product . LibSSH , version_desc [ 2 : ] , is_client
2016-11-03 18:10:49 +01:00
else :
2017-04-10 12:20:32 +02:00
return SSH . Product . OpenSSH , version_desc , is_client
2016-11-03 18:10:49 +01:00
@classmethod
def get_since_text ( cls , versions ) :
# type: (List[Optional[str]]) -> Optional[text_type]
tv = [ ]
if len ( versions ) == 0 or versions [ 0 ] is None :
return None
for v in versions [ 0 ] . split ( ' , ' ) :
2017-04-10 12:20:32 +02:00
ssh_prod , ssh_ver , is_cli = cls . get_ssh_version ( v )
if not ssh_ver :
2016-11-03 18:10:49 +01:00
continue
2017-04-10 12:20:32 +02:00
if ssh_prod in [ SSH . Product . LibSSH ] :
2016-11-03 18:10:49 +01:00
continue
2017-04-10 12:20:32 +02:00
if is_cli :
ssh_ver = ' {0} (client only) ' . format ( ssh_ver )
tv . append ( ' {0} {1} ' . format ( ssh_prod , ssh_ver ) )
2016-11-03 18:10:49 +01:00
if len ( tv ) == 0 :
return None
return ' available since ' + ' , ' . join ( tv ) . rstrip ( ' , ' )
class Algorithms ( object ) :
def __init__ ( self , pkm , kex ) :
# type: (Optional[SSH1.PublicKeyMessage], Optional[SSH2.Kex]) -> None
self . __ssh1kex = pkm
self . __ssh2kex = kex
@property
def ssh1kex ( self ) :
# type: () -> Optional[SSH1.PublicKeyMessage]
return self . __ssh1kex
@property
def ssh2kex ( self ) :
# type: () -> Optional[SSH2.Kex]
return self . __ssh2kex
@property
def ssh1 ( self ) :
# type: () -> Optional[SSH.Algorithms.Item]
if self . ssh1kex is None :
return None
item = SSH . Algorithms . Item ( 1 , SSH1 . KexDB . ALGORITHMS )
item . add ( ' key ' , [ u ' ssh-rsa1 ' ] )
item . add ( ' enc ' , self . ssh1kex . supported_ciphers )
item . add ( ' aut ' , self . ssh1kex . supported_authentications )
return item
@property
def ssh2 ( self ) :
# type: () -> Optional[SSH.Algorithms.Item]
if self . ssh2kex is None :
return None
item = SSH . Algorithms . Item ( 2 , SSH2 . KexDB . ALGORITHMS )
item . add ( ' kex ' , self . ssh2kex . kex_algorithms )
item . add ( ' key ' , self . ssh2kex . key_algorithms )
item . add ( ' enc ' , self . ssh2kex . server . encryption )
item . add ( ' mac ' , self . ssh2kex . server . mac )
return item
@property
def values ( self ) :
# type: () -> Iterable[SSH.Algorithms.Item]
for item in [ self . ssh1 , self . ssh2 ] :
if item is not None :
yield item
@property
def maxlen ( self ) :
# type: () -> int
2017-04-05 15:31:43 +02:00
def _ml ( items ) :
2017-03-23 22:17:35 +01:00
# type: (Sequence[text_type]) -> int
return max ( len ( i ) for i in items )
2017-03-25 07:44:37 +01:00
maxlen = 0
2016-11-03 18:10:49 +01:00
if self . ssh1kex is not None :
2017-04-05 15:31:43 +02:00
maxlen = max ( _ml ( self . ssh1kex . supported_ciphers ) ,
_ml ( self . ssh1kex . supported_authentications ) ,
2017-01-23 18:34:06 +01:00
maxlen )
2016-11-03 18:10:49 +01:00
if self . ssh2kex is not None :
2017-04-05 15:31:43 +02:00
maxlen = max ( _ml ( self . ssh2kex . kex_algorithms ) ,
_ml ( self . ssh2kex . key_algorithms ) ,
_ml ( self . ssh2kex . server . encryption ) ,
_ml ( self . ssh2kex . server . mac ) ,
2017-01-23 18:34:06 +01:00
maxlen )
2016-11-03 18:10:49 +01:00
return maxlen
2017-04-10 12:20:32 +02:00
def get_ssh_timeframe ( self , for_server = None ) :
# type: (Optional[bool]) -> SSH.Algorithm.Timeframe
timeframe = SSH . Algorithm . Timeframe ( )
2016-11-03 18:10:49 +01:00
for alg_pair in self . values :
alg_db = alg_pair . db
for alg_type , alg_list in alg_pair . items ( ) :
for alg_name in alg_list :
alg_name_native = utils . to_ntext ( alg_name )
alg_desc = alg_db [ alg_type ] . get ( alg_name_native )
if alg_desc is None :
continue
versions = alg_desc [ 0 ]
2017-04-10 12:20:32 +02:00
timeframe . update ( versions , for_server )
return timeframe
2016-11-03 18:10:49 +01:00
def get_recommendations ( self , software , for_server = True ) :
# type: (Optional[SSH.Software], bool) -> Tuple[Optional[SSH.Software], Dict[int, Dict[str, Dict[str, Dict[str, int]]]]]
# pylint: disable=too-many-locals,too-many-statements
vproducts = [ SSH . Product . OpenSSH ,
2017-01-23 18:34:06 +01:00
SSH . Product . DropbearSSH ,
2019-08-27 23:02:03 +02:00
SSH . Product . LibSSH ,
SSH . Product . TinySSH ]
2019-08-28 06:37:55 +02:00
# Set to True if server is not one of vproducts, above.
unknown_software = False
2016-11-03 18:10:49 +01:00
if software is not None :
if software . product not in vproducts :
2019-08-28 06:37:55 +02:00
unknown_software = True
#
# The code below is commented out because it would try to guess what the server is,
# usually resulting in wild & incorrect recommendations.
#
# if software is None:
# ssh_timeframe = self.get_ssh_timeframe(for_server)
# for product in vproducts:
# if product not in ssh_timeframe:
# continue
# version = ssh_timeframe.get_from(product, for_server)
# if version is not None:
# software = SSH.Software(None, product, version, None, None)
# break
2016-11-03 18:10:49 +01:00
rec = { } # type: Dict[int, Dict[str, Dict[str, Dict[str, int]]]]
if software is None :
2019-08-28 06:37:55 +02:00
unknown_software = True
2016-11-03 18:10:49 +01:00
for alg_pair in self . values :
sshv , alg_db = alg_pair . sshv , alg_pair . db
rec [ sshv ] = { }
for alg_type , alg_list in alg_pair . items ( ) :
if alg_type == ' aut ' :
continue
2017-09-27 02:46:00 +02:00
rec [ sshv ] [ alg_type ] = { ' add ' : { } , ' del ' : { } , ' chg ' : { } }
2016-11-03 18:10:49 +01:00
for n , alg_desc in alg_db [ alg_type ] . items ( ) :
versions = alg_desc [ 0 ]
2020-03-11 00:22:15 +01:00
empty_version = False
2016-11-03 18:10:49 +01:00
if len ( versions ) == 0 or versions [ 0 ] is None :
2020-03-11 00:22:15 +01:00
empty_version = True
if not empty_version :
matches = False
if unknown_software :
matches = True
for v in versions [ 0 ] . split ( ' , ' ) :
ssh_prefix , ssh_version , is_cli = SSH . Algorithm . get_ssh_version ( v )
if not ssh_version :
continue
if ( software is not None ) and ( ssh_prefix != software . product ) :
continue
if is_cli and for_server :
continue
if ( software is not None ) and ( software . compare_version ( ssh_version ) < 0 ) :
continue
matches = True
break
if not matches :
2017-04-10 12:20:32 +02:00
continue
2016-11-03 18:10:49 +01:00
adl , faults = len ( alg_desc ) , 0
for i in range ( 1 , 3 ) :
if not adl > i :
continue
fc = len ( alg_desc [ i ] )
if fc > 0 :
faults + = pow ( 10 , 2 - i ) * fc
if n not in alg_list :
2020-03-11 00:22:15 +01:00
if faults > 0 or ( alg_type == ' key ' and ' -cert- ' in n ) or empty_version :
2016-11-03 18:10:49 +01:00
continue
rec [ sshv ] [ alg_type ] [ ' add ' ] [ n ] = 0
else :
if faults == 0 :
continue
2020-02-09 05:56:54 +01:00
if n in [ ' diffie-hellman-group-exchange-sha256 ' , ' rsa-sha2-256 ' , ' rsa-sha2-512 ' , ' ssh-rsa-cert-v01@openssh.com ' ] :
2017-09-27 02:46:00 +02:00
rec [ sshv ] [ alg_type ] [ ' chg ' ] [ n ] = faults
else :
rec [ sshv ] [ alg_type ] [ ' del ' ] [ n ] = faults
2019-08-28 06:37:55 +02:00
# If we are working with unknown software, drop all add recommendations, because we don't know if they're valid.
if unknown_software :
rec [ sshv ] [ alg_type ] [ ' add ' ] = { }
2016-11-03 18:10:49 +01:00
add_count = len ( rec [ sshv ] [ alg_type ] [ ' add ' ] )
del_count = len ( rec [ sshv ] [ alg_type ] [ ' del ' ] )
2017-09-27 02:46:00 +02:00
chg_count = len ( rec [ sshv ] [ alg_type ] [ ' chg ' ] )
2016-11-03 18:10:49 +01:00
new_alg_count = len ( alg_list ) + add_count - del_count
if new_alg_count < 1 and del_count > 0 :
mf = min ( rec [ sshv ] [ alg_type ] [ ' del ' ] . values ( ) )
new_del = { }
for k , cf in rec [ sshv ] [ alg_type ] [ ' del ' ] . items ( ) :
if cf != mf :
new_del [ k ] = cf
if del_count != len ( new_del ) :
rec [ sshv ] [ alg_type ] [ ' del ' ] = new_del
new_alg_count + = del_count - len ( new_del )
if new_alg_count < 1 :
del rec [ sshv ] [ alg_type ]
else :
if add_count == 0 :
del rec [ sshv ] [ alg_type ] [ ' add ' ]
if del_count == 0 :
del rec [ sshv ] [ alg_type ] [ ' del ' ]
2017-09-27 02:46:00 +02:00
if chg_count == 0 :
del rec [ sshv ] [ alg_type ] [ ' chg ' ]
2016-11-03 18:10:49 +01:00
if len ( rec [ sshv ] [ alg_type ] ) == 0 :
del rec [ sshv ] [ alg_type ]
if len ( rec [ sshv ] ) == 0 :
del rec [ sshv ]
return software , rec
class Item ( object ) :
def __init__ ( self , sshv , db ) :
# type: (int, Dict[str, Dict[str, List[List[Optional[str]]]]]) -> None
self . __sshv = sshv
self . __db = db
self . __storage = { } # type: Dict[str, List[text_type]]
@property
def sshv ( self ) :
# type: () -> int
return self . __sshv
@property
def db ( self ) :
# type: () -> Dict[str, Dict[str, List[List[Optional[str]]]]]
return self . __db
def add ( self , key , value ) :
# type: (str, List[text_type]) -> None
self . __storage [ key ] = value
def items ( self ) :
# type: () -> Iterable[Tuple[str, List[text_type]]]
return self . __storage . items ( )
2016-10-20 19:00:51 +02:00
class Security ( object ) : # pylint: disable=too-few-public-methods
2019-08-18 05:11:03 +02:00
# Format: [starting_vuln_version, last_vuln_version, affected, CVE_ID, CVSSv2, description]
# affected: 1 = server, 2 = client, 4 = local
# Example: if it affects servers, both remote & local, then affected
# = 1. If it affects servers, but is a local issue only,
# then affected = 1 + 4 = 5.
2016-10-20 19:00:51 +02:00
# pylint: disable=bad-whitespace
2016-09-08 17:50:19 +02:00
CVE = {
' Dropbear SSH ' : [
2019-08-18 05:11:03 +02:00
[ ' 0.0 ' , ' 2018.76 ' , 1 , ' CVE-2018-15599 ' , 5.0 , ' remote users may enumerate users on the system ' ] ,
[ ' 0.0 ' , ' 2017.74 ' , 5 , ' CVE-2017-9079 ' , 4.7 , ' local users can read certain files as root ' ] ,
[ ' 0.0 ' , ' 2017.74 ' , 5 , ' CVE-2017-9078 ' , 9.3 , ' local users may elevate privileges to root under certain conditions ' ] ,
[ ' 0.0 ' , ' 2016.73 ' , 5 , ' CVE-2016-7409 ' , 2.1 , ' local users can read process memory under limited conditions ' ] ,
[ ' 0.0 ' , ' 2016.73 ' , 1 , ' CVE-2016-7408 ' , 6.5 , ' remote users can execute arbitrary code ' ] ,
[ ' 0.0 ' , ' 2016.73 ' , 5 , ' CVE-2016-7407 ' , 10.0 , ' local users can execute arbitrary code ' ] ,
[ ' 0.0 ' , ' 2016.73 ' , 1 , ' CVE-2016-7406 ' , 10.0 , ' remote users can execute arbitrary code ' ] ,
2016-10-04 09:27:27 +02:00
[ ' 0.44 ' , ' 2015.71 ' , 1 , ' CVE-2016-3116 ' , 5.5 , ' bypass command restrictions via xauth command injection ' ] ,
[ ' 0.28 ' , ' 2013.58 ' , 1 , ' CVE-2013-4434 ' , 5.0 , ' discover valid usernames through different time delays ' ] ,
2017-01-23 16:45:25 +01:00
[ ' 0.28 ' , ' 2013.58 ' , 1 , ' CVE-2013-4421 ' , 5.0 , ' cause DoS via a compressed packet (memory consumption) ' ] ,
2016-10-04 09:27:27 +02:00
[ ' 0.52 ' , ' 2011.54 ' , 1 , ' CVE-2012-0920 ' , 7.1 , ' execute arbitrary code or bypass command restrictions ' ] ,
[ ' 0.40 ' , ' 0.48.1 ' , 1 , ' CVE-2007-1099 ' , 7.5 , ' conduct a MitM attack (no warning for hostkey mismatch) ' ] ,
2017-01-23 16:45:25 +01:00
[ ' 0.28 ' , ' 0.47 ' , 1 , ' CVE-2006-1206 ' , 7.5 , ' cause DoS via large number of connections (slot exhaustion) ' ] ,
2016-10-04 09:27:27 +02:00
[ ' 0.39 ' , ' 0.47 ' , 1 , ' CVE-2006-0225 ' , 4.6 , ' execute arbitrary commands via scp with crafted filenames ' ] ,
[ ' 0.28 ' , ' 0.46 ' , 1 , ' CVE-2005-4178 ' , 6.5 , ' execute arbitrary code via buffer overflow vulnerability ' ] ,
[ ' 0.28 ' , ' 0.42 ' , 1 , ' CVE-2004-2486 ' , 7.5 , ' execute arbitrary code via DSS verification code ' ] ] ,
' libssh ' : [
2019-08-18 05:11:03 +02:00
[ ' 0.6.4 ' , ' 0.6.4 ' , 1 , ' CVE-2018-10933 ' , 6.4 , ' authentication bypass ' ] ,
[ ' 0.7.0 ' , ' 0.7.5 ' , 1 , ' CVE-2018-10933 ' , 6.4 , ' authentication bypass ' ] ,
[ ' 0.8.0 ' , ' 0.8.3 ' , 1 , ' CVE-2018-10933 ' , 6.4 , ' authentication bypass ' ] ,
2016-10-04 09:27:27 +02:00
[ ' 0.1 ' , ' 0.7.2 ' , 1 , ' CVE-2016-0739 ' , 4.3 , ' conduct a MitM attack (weakness in DH key generation) ' ] ,
[ ' 0.5.1 ' , ' 0.6.4 ' , 1 , ' CVE-2015-3146 ' , 5.0 , ' cause DoS via kex packets (null pointer dereference) ' ] ,
[ ' 0.5.1 ' , ' 0.6.3 ' , 1 , ' CVE-2014-8132 ' , 5.0 , ' cause DoS via kex init packet (dangling pointer) ' ] ,
[ ' 0.4.7 ' , ' 0.6.2 ' , 1 , ' CVE-2014-0017 ' , 1.9 , ' leak data via PRNG state reuse on forking servers ' ] ,
[ ' 0.4.7 ' , ' 0.5.3 ' , 1 , ' CVE-2013-0176 ' , 4.3 , ' cause DoS via kex packet (null pointer dereference) ' ] ,
[ ' 0.4.7 ' , ' 0.5.2 ' , 1 , ' CVE-2012-6063 ' , 7.5 , ' cause DoS or execute arbitrary code via sftp (double free) ' ] ,
[ ' 0.4.7 ' , ' 0.5.2 ' , 1 , ' CVE-2012-4562 ' , 7.5 , ' cause DoS or execute arbitrary code (overflow check) ' ] ,
[ ' 0.4.7 ' , ' 0.5.2 ' , 1 , ' CVE-2012-4561 ' , 5.0 , ' cause DoS via unspecified vectors (invalid pointer) ' ] ,
[ ' 0.4.7 ' , ' 0.5.2 ' , 1 , ' CVE-2012-4560 ' , 7.5 , ' cause DoS or execute arbitrary code (buffer overflow) ' ] ,
2017-01-23 16:45:25 +01:00
[ ' 0.4.7 ' , ' 0.5.2 ' , 1 , ' CVE-2012-4559 ' , 6.8 , ' cause DoS or execute arbitrary code (double free) ' ] ] ,
' OpenSSH ' : [
2017-03-25 07:44:37 +01:00
[ ' 7.2 ' , ' 7.2p2 ' , 1 , ' CVE-2016-6515 ' , 7.8 , ' cause DoS via long password string (crypt CPU consumption) ' ] ,
[ ' 1.2.2 ' , ' 7.2 ' , 1 , ' CVE-2016-3115 ' , 5.5 , ' bypass command restrictions via crafted X11 forwarding data ' ] ,
[ ' 5.4 ' , ' 7.1 ' , 1 , ' CVE-2016-1907 ' , 5.0 , ' cause DoS via crafted network traffic (out of bounds read) ' ] ,
[ ' 5.4 ' , ' 7.1p1 ' , 2 , ' CVE-2016-0778 ' , 4.6 , ' cause DoS via requesting many forwardings (heap based buffer overflow) ' ] ,
[ ' 5.0 ' , ' 7.1p1 ' , 2 , ' CVE-2016-0777 ' , 4.0 , ' leak data via allowing transfer of entire buffer ' ] ,
[ ' 6.0 ' , ' 7.2p2 ' , 5 , ' CVE-2015-8325 ' , 7.2 , ' privilege escalation via triggering crafted environment ' ] ,
[ ' 6.8 ' , ' 6.9 ' , 5 , ' CVE-2015-6565 ' , 7.2 , ' cause DoS via writing to a device (terminal disruption) ' ] ,
[ ' 5.0 ' , ' 6.9 ' , 5 , ' CVE-2015-6564 ' , 6.9 , ' privilege escalation via leveraging sshd uid ' ] ,
[ ' 5.0 ' , ' 6.9 ' , 5 , ' CVE-2015-6563 ' , 1.9 , ' conduct impersonation attack ' ] ,
[ ' 6.9p1 ' , ' 6.9p1 ' , 1 , ' CVE-2015-5600 ' , 8.5 , ' cause Dos or aid in conduct brute force attack (CPU consumption) ' ] ,
[ ' 6.0 ' , ' 6.6 ' , 1 , ' CVE-2015-5352 ' , 4.3 , ' bypass access restrictions via a specific connection ' ] ,
[ ' 6.0 ' , ' 6.6 ' , 2 , ' CVE-2014-2653 ' , 5.8 , ' bypass SSHFP DNS RR check via unacceptable host certificate ' ] ,
[ ' 5.0 ' , ' 6.5 ' , 1 , ' CVE-2014-2532 ' , 5.8 , ' bypass environment restrictions via specific string before wildcard ' ] ,
[ ' 1.2 ' , ' 6.4 ' , 1 , ' CVE-2014-1692 ' , 7.5 , ' cause DoS via triggering error condition (memory corruption) ' ] ,
[ ' 6.2 ' , ' 6.3 ' , 1 , ' CVE-2013-4548 ' , 6.0 , ' bypass command restrictions via crafted packet data ' ] ,
[ ' 1.2 ' , ' 5.6 ' , 1 , ' CVE-2012-0814 ' , 3.5 , ' leak data via debug messages ' ] ,
[ ' 1.2 ' , ' 5.8 ' , 1 , ' CVE-2011-5000 ' , 3.5 , ' cause DoS via large value in certain length field (memory consumption) ' ] ,
[ ' 5.6 ' , ' 5.7 ' , 2 , ' CVE-2011-0539 ' , 5.0 , ' leak data or conduct hash collision attack ' ] ,
[ ' 1.2 ' , ' 6.1 ' , 1 , ' CVE-2010-5107 ' , 5.0 , ' cause DoS via large number of connections (slot exhaustion) ' ] ,
[ ' 1.2 ' , ' 5.8 ' , 1 , ' CVE-2010-4755 ' , 4.0 , ' cause DoS via crafted glob expression (CPU and memory consumption) ' ] ,
[ ' 1.2 ' , ' 5.6 ' , 1 , ' CVE-2010-4478 ' , 7.5 , ' bypass authentication check via crafted values ' ] ,
[ ' 4.3 ' , ' 4.8 ' , 1 , ' CVE-2009-2904 ' , 6.9 , ' privilege escalation via hard links to setuid programs ' ] ,
[ ' 4.0 ' , ' 5.1 ' , 1 , ' CVE-2008-5161 ' , 2.6 , ' recover plaintext data from ciphertext ' ] ,
[ ' 1.2 ' , ' 4.6 ' , 1 , ' CVE-2008-4109 ' , 5.0 , ' cause DoS via multiple login attempts (slot exhaustion) ' ] ,
[ ' 1.2 ' , ' 4.8 ' , 1 , ' CVE-2008-1657 ' , 6.5 , ' bypass command restrictions via modifying session file ' ] ,
[ ' 1.2.2 ' , ' 4.9 ' , 1 , ' CVE-2008-1483 ' , 6.9 , ' hijack forwarded X11 connections ' ] ,
[ ' 4.0 ' , ' 4.6 ' , 1 , ' CVE-2007-4752 ' , 7.5 , ' privilege escalation via causing an X client to be trusted ' ] ,
[ ' 4.3p2 ' , ' 4.3p2 ' , 1 , ' CVE-2007-3102 ' , 4.3 , ' allow attacker to write random data to audit log ' ] ,
[ ' 1.2 ' , ' 4.6 ' , 1 , ' CVE-2007-2243 ' , 5.0 , ' discover valid usernames through different responses ' ] ,
[ ' 4.4 ' , ' 4.4 ' , 1 , ' CVE-2006-5794 ' , 7.5 , ' bypass authentication ' ] ,
[ ' 4.1 ' , ' 4.1p1 ' , 1 , ' CVE-2006-5229 ' , 2.6 , ' discover valid usernames through different time delays ' ] ,
[ ' 1.2 ' , ' 4.3p2 ' , 1 , ' CVE-2006-5052 ' , 5.0 , ' discover valid usernames through different responses ' ] ,
[ ' 1.2 ' , ' 4.3p2 ' , 1 , ' CVE-2006-5051 ' , 9.3 , ' cause DoS or execute arbitrary code (double free) ' ] ,
[ ' 4.5 ' , ' 4.5 ' , 1 , ' CVE-2006-4925 ' , 5.0 , ' cause DoS via invalid protocol sequence (crash) ' ] ,
[ ' 1.2 ' , ' 4.3p2 ' , 1 , ' CVE-2006-4924 ' , 7.8 , ' cause DoS via crafted packet (CPU consumption) ' ] ,
[ ' 3.8.1p1 ' , ' 3.8.1p1 ' , 1 , ' CVE-2006-0883 ' , 5.0 , ' cause DoS via connecting multiple times (client connection refusal) ' ] ,
[ ' 3.0 ' , ' 4.2p1 ' , 1 , ' CVE-2006-0225 ' , 4.6 , ' execute arbitrary code ' ] ,
[ ' 2.1 ' , ' 4.1p1 ' , 1 , ' CVE-2005-2798 ' , 5.0 , ' leak data about authentication credentials ' ] ,
[ ' 3.5 ' , ' 3.5p1 ' , 1 , ' CVE-2004-2760 ' , 6.8 , ' leak data through different connection states ' ] ,
[ ' 2.3 ' , ' 3.7.1p2 ' , 1 , ' CVE-2004-2069 ' , 5.0 , ' cause DoS via large number of connections (slot exhaustion) ' ] ,
[ ' 3.0 ' , ' 3.4p1 ' , 1 , ' CVE-2004-0175 ' , 4.3 , ' leak data through directoy traversal ' ] ,
[ ' 1.2 ' , ' 3.9p1 ' , 1 , ' CVE-2003-1562 ' , 7.6 , ' leak data about authentication credentials ' ] ,
[ ' 3.1p1 ' , ' 3.7.1p1 ' , 1 , ' CVE-2003-0787 ' , 7.5 , ' privilege escalation via modifying stack ' ] ,
[ ' 3.1p1 ' , ' 3.7.1p1 ' , 1 , ' CVE-2003-0786 ' , 10.0 , ' privilege escalation via bypassing authentication ' ] ,
[ ' 1.0 ' , ' 3.7.1 ' , 1 , ' CVE-2003-0695 ' , 7.5 , ' cause DoS or execute arbitrary code ' ] ,
[ ' 1.0 ' , ' 3.7 ' , 1 , ' CVE-2003-0693 ' , 10.0 , ' execute arbitrary code ' ] ,
[ ' 3.0 ' , ' 3.6.1p2 ' , 1 , ' CVE-2003-0386 ' , 7.5 , ' bypass address restrictions for connection ' ] ,
[ ' 3.1p1 ' , ' 3.6.1p1 ' , 1 , ' CVE-2003-0190 ' , 5.0 , ' discover valid usernames through different time delays ' ] ,
[ ' 3.2.2 ' , ' 3.2.2 ' , 1 , ' CVE-2002-0765 ' , 7.5 , ' bypass authentication ' ] ,
[ ' 1.2.2 ' , ' 3.3p1 ' , 1 , ' CVE-2002-0640 ' , 10.0 , ' execute arbitrary code ' ] ,
[ ' 1.2.2 ' , ' 3.3p1 ' , 1 , ' CVE-2002-0639 ' , 10.0 , ' execute arbitrary code ' ] ,
[ ' 2.1 ' , ' 3.2 ' , 1 , ' CVE-2002-0575 ' , 7.5 , ' privilege escalation ' ] ,
[ ' 2.1 ' , ' 3.0.2p1 ' , 2 , ' CVE-2002-0083 ' , 10.0 , ' privilege escalation ' ] ,
[ ' 3.0 ' , ' 3.0p1 ' , 1 , ' CVE-2001-1507 ' , 7.5 , ' bypass authentication ' ] ,
[ ' 1.2.3 ' , ' 3.0.1p1 ' , 5 , ' CVE-2001-0872 ' , 7.2 , ' privilege escalation via crafted environment variables ' ] ,
[ ' 1.2.3 ' , ' 2.1.1 ' , 1 , ' CVE-2001-0361 ' , 4.0 , ' recover plaintext from ciphertext ' ] ,
2019-09-28 00:14:36 +02:00
[ ' 1.2 ' , ' 2.1 ' , 1 , ' CVE-2000-0525 ' , 10.0 , ' execute arbitrary code (improper privileges) ' ] ] ,
' PuTTY ' : [
2019-11-19 04:08:17 +01:00
[ ' 0.0 ' , ' 0.72 ' , 2 , ' CVE-2019-17069 ' , 5.0 , ' potential DOS by remote SSHv1 server ' ] ,
[ ' 0.71 ' , ' 0.72 ' , 2 , ' CVE-2019-17068 ' , 5.0 , ' xterm bracketed paste mode command injection ' ] ,
[ ' 0.52 ' , ' 0.72 ' , 2 , ' CVE-2019-17067 ' , 7.5 , ' port rebinding weakness in port forward tunnel handling ' ] ,
2019-09-28 00:14:36 +02:00
[ ' 0.0 ' , ' 0.71 ' , 2 , ' CVE-2019-XXXX ' , 5.0 , ' undefined vulnerability in obsolete SSHv1 protocol handling ' ] ,
[ ' 0.0 ' , ' 0.71 ' , 6 , ' CVE-2019-XXXX ' , 5.0 , ' local privilege escalation in Pageant ' ] ,
[ ' 0.0 ' , ' 0.70 ' , 2 , ' CVE-2019-9898 ' , 7.5 , ' potential recycling of random numbers ' ] ,
[ ' 0.0 ' , ' 0.70 ' , 2 , ' CVE-2019-9897 ' , 5.0 , ' multiple denial-of-service issues from writing to the terminal ' ] ,
[ ' 0.0 ' , ' 0.70 ' , 6 , ' CVE-2019-9896 ' , 4.6 , ' local application hijacking through malicious Windows help file ' ] ,
[ ' 0.0 ' , ' 0.70 ' , 2 , ' CVE-2019-9894 ' , 6.4 , ' buffer overflow in RSA key exchange ' ] ,
[ ' 0.0 ' , ' 0.69 ' , 6 , ' CVE-2016-6167 ' , 4.4 , ' local application hijacking through untrusted DLL loading ' ] ,
[ ' 0.0 ' , ' 0.67 ' , 2 , ' CVE-2017-6542 ' , 7.5 , ' buffer overflow in UNIX client that can result in privilege escalation or denial-of-service ' ] ,
[ ' 0.0 ' , ' 0.66 ' , 2 , ' CVE-2016-2563 ' , 7.5 , ' buffer overflow in SCP command-line utility ' ] ,
[ ' 0.0 ' , ' 0.65 ' , 2 , ' CVE-2015-5309 ' , 4.3 , ' integer overflow in terminal-handling code ' ] ,
]
2016-10-19 19:47:13 +02:00
} # type: Dict[str, List[List[Any]]]
2016-09-08 19:04:48 +02:00
TXT = {
' Dropbear SSH ' : [
2016-10-04 09:27:27 +02:00
[ ' 0.28 ' , ' 0.34 ' , 1 , ' remote root exploit ' , ' remote format string buffer overflow exploit (exploit-db#387) ' ] ] ,
' libssh ' : [
[ ' 0.3.3 ' , ' 0.3.3 ' , 1 , ' null pointer check ' , ' missing null pointer check in " crypt_set_algorithms_server " ' ] ,
[ ' 0.3.3 ' , ' 0.3.3 ' , 1 , ' integer overflow ' , ' integer overflow in " buffer_get_data " ' ] ,
[ ' 0.3.3 ' , ' 0.3.3 ' , 3 , ' heap overflow ' , ' heap overflow in " packet_decrypt " ' ] ]
2016-10-19 19:47:13 +02:00
} # type: Dict[str, List[List[Any]]]
2016-09-08 17:50:19 +02:00
2016-04-01 17:30:54 +02:00
class Socket ( ReadBuf , WriteBuf ) :
2016-09-15 17:00:09 +02:00
class InsufficientReadException ( Exception ) :
pass
2016-04-01 17:19:18 +02:00
SM_BANNER_SENT = 1
2019-11-07 02:40:25 +01:00
def __init__ ( self , host , port , ipvo , timeout , timeout_set ) :
2016-11-03 18:10:49 +01:00
# type: (Optional[str], int) -> None
2016-10-26 17:33:00 +02:00
super ( SSH . Socket , self ) . __init__ ( )
2016-11-03 18:10:49 +01:00
self . __sock = None # type: Optional[socket.socket]
2019-10-10 04:29:56 +02:00
self . __sock_map = { }
2016-04-01 17:30:54 +02:00
self . __block_size = 8
2016-04-01 17:19:18 +02:00
self . __state = 0
2016-10-19 19:47:13 +02:00
self . __header = [ ] # type: List[text_type]
self . __banner = None # type: Optional[SSH.Banner]
2019-09-28 00:14:36 +02:00
# if host is None:
# raise ValueError('undefined host')
2016-11-03 18:10:49 +01:00
nport = utils . parse_int ( port )
if nport < 1 or nport > 65535 :
raise ValueError ( ' invalid port: {0} ' . format ( port ) )
2016-10-26 17:33:00 +02:00
self . __host = host
2016-11-03 18:10:49 +01:00
self . __port = nport
2017-10-31 21:49:19 +01:00
if ipvo is not None :
self . __ipvo = ipvo
else :
self . __ipvo = ( )
self . __timeout = timeout
2019-11-07 02:40:25 +01:00
self . __timeout_set = timeout_set
2019-11-14 19:52:36 +01:00
self . client_host = None
self . client_port = None
2017-10-31 21:49:19 +01:00
2016-04-01 16:56:06 +02:00
2016-10-26 17:33:00 +02:00
def _resolve ( self , ipvo ) :
# type: (Sequence[int]) -> Iterable[Tuple[int, Tuple[Any, ...]]]
2017-03-26 04:54:14 +02:00
ipvo = tuple ( [ x for x in utils . unique_seq ( ipvo ) if x in ( 4 , 6 ) ] )
2016-10-26 17:33:00 +02:00
ipvo_len = len ( ipvo )
prefer_ipvo = ipvo_len > 0
prefer_ipv4 = prefer_ipvo and ipvo [ 0 ] == 4
2017-03-23 22:17:35 +01:00
if ipvo_len == 1 :
family = socket . AF_INET if ipvo [ 0 ] == 4 else socket . AF_INET6
2016-10-26 17:33:00 +02:00
else :
family = socket . AF_UNSPEC
try :
stype = socket . SOCK_STREAM
r = socket . getaddrinfo ( self . __host , self . __port , family , stype )
if prefer_ipvo :
r = sorted ( r , key = lambda x : x [ 0 ] , reverse = not prefer_ipv4 )
check = any ( stype == rline [ 2 ] for rline in r )
2017-04-05 15:13:35 +02:00
for af , socktype , _proto , _canonname , addr in r :
2016-10-26 17:33:00 +02:00
if not check or socktype == socket . SOCK_STREAM :
2017-04-05 15:13:35 +02:00
yield af , addr
2016-10-26 17:33:00 +02:00
except socket . error as e :
out . fail ( ' [exception] {0} ' . format ( e ) )
sys . exit ( 1 )
2019-09-28 00:14:36 +02:00
# Listens on a server socket and accepts one connection (used for
# auditing client connections).
def listen_and_accept ( self ) :
2019-10-10 04:29:56 +02:00
2019-10-11 05:09:45 +02:00
try :
# Socket to listen on all IPv4 addresses.
s = socket . socket ( socket . AF_INET , socket . SOCK_STREAM )
s . setsockopt ( socket . SOL_SOCKET , socket . SO_REUSEADDR , 1 )
s . bind ( ( ' 0.0.0.0 ' , self . __port ) )
s . listen ( )
self . __sock_map [ s . fileno ( ) ] = s
except Exception as e :
print ( " Warning: failed to listen on any IPv4 interfaces. " )
pass
try :
# Socket to listen on all IPv6 addresses.
s = socket . socket ( socket . AF_INET6 , socket . SOCK_STREAM )
s . setsockopt ( socket . SOL_SOCKET , socket . SO_REUSEADDR , 1 )
s . setsockopt ( socket . IPPROTO_IPV6 , socket . IPV6_V6ONLY , 1 )
s . bind ( ( ' :: ' , self . __port ) )
s . listen ( )
self . __sock_map [ s . fileno ( ) ] = s
except Exception as e :
print ( " Warning: failed to listen on any IPv6 interfaces. " )
pass
# If we failed to listen on any interfaces, terminate.
if len ( self . __sock_map . keys ( ) ) == 0 :
print ( " Error: failed to listen on any IPv4 and IPv6 interfaces! " )
exit ( - 1 )
2019-10-10 04:29:56 +02:00
2019-11-07 02:40:25 +01:00
# Wait for an incoming connection. If a timeout was explicitly
# set by the user, terminate when it elapses.
fds = None
time_elapsed = 0.0
interval = 1.0
while True :
# Wait for a connection on either socket.
fds = select . select ( self . __sock_map . keys ( ) , [ ] , [ ] , interval )
time_elapsed + = interval
# We have incoming data on at least one of the sockets.
if len ( fds [ 0 ] ) > 0 :
break
if self . __timeout_set and time_elapsed > = self . __timeout :
print ( " Timeout elapsed. Terminating... " )
exit ( - 1 )
2019-09-28 00:14:36 +02:00
2019-10-10 04:29:56 +02:00
# Accept the connection.
c , addr = self . __sock_map [ fds [ 0 ] [ 0 ] ] . accept ( )
2019-09-28 00:14:36 +02:00
self . client_host = addr [ 0 ]
self . client_port = addr [ 1 ]
c . settimeout ( self . __timeout )
self . __sock = c
2017-10-31 21:49:19 +01:00
def connect ( self ) :
# type: () -> None
2016-10-26 17:33:00 +02:00
err = None
2017-09-27 02:46:00 +02:00
for af , addr in self . _resolve ( self . __ipvo ) :
2016-10-26 17:33:00 +02:00
s = None
try :
s = socket . socket ( af , socket . SOCK_STREAM )
2017-10-31 21:49:19 +01:00
s . settimeout ( self . __timeout )
2016-10-26 17:33:00 +02:00
s . connect ( addr )
self . __sock = s
return
except socket . error as e :
err = e
self . _close_socket ( s )
if err is None :
errm = ' host {0} has no DNS records ' . format ( self . __host )
else :
errt = ( self . __host , self . __port , err )
errm = ' cannot connect to {0} port {1} : {2} ' . format ( * errt )
out . fail ( ' [exception] {0} ' . format ( errm ) )
sys . exit ( 1 )
2016-09-15 17:00:09 +02:00
def get_banner ( self , sshv = 2 ) :
2016-11-02 12:00:24 +01:00
# type: (int) -> Tuple[Optional[SSH.Banner], List[text_type], Optional[str]]
2016-11-03 18:10:49 +01:00
if self . __sock is None :
return self . __banner , self . __header , ' not connected '
2019-09-28 00:14:36 +02:00
banner = SSH_HEADER . format ( ' 1.5 ' if sshv == 1 else ' 2.0 ' )
2016-04-01 17:19:18 +02:00
if self . __state < self . SM_BANNER_SENT :
2016-09-15 17:00:09 +02:00
self . send_banner ( banner )
2019-09-28 00:14:36 +02:00
# rto = self.__sock.gettimeout()
# self.__sock.settimeout(0.7)
2016-09-07 13:32:40 +02:00
s , e = self . recv ( )
2019-09-28 00:14:36 +02:00
# self.__sock.settimeout(rto)
2016-09-07 13:32:40 +02:00
if s < 0 :
2016-11-02 12:00:24 +01:00
return self . __banner , self . __header , e
e = None
2016-08-12 15:20:32 +02:00
while self . __banner is None :
2016-09-08 14:01:57 +02:00
if not s > 0 :
s , e = self . recv ( )
if s < 0 :
break
2016-08-12 15:20:32 +02:00
while self . __banner is None and self . unread_len > 0 :
line = self . read_line ( )
if len ( line . strip ( ) ) == 0 :
continue
2016-09-06 17:55:17 +02:00
if self . __banner is None :
self . __banner = SSH . Banner . parse ( line )
if self . __banner is not None :
continue
self . __header . append ( line )
2016-09-13 12:17:41 +02:00
s = 0
2016-11-02 12:00:24 +01:00
return self . __banner , self . __header , e
2016-04-01 17:19:18 +02:00
2016-09-02 16:22:00 +02:00
def recv ( self , size = 2048 ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> Tuple[int, Optional[str]]
2016-11-03 18:10:49 +01:00
if self . __sock is None :
2017-04-05 15:13:35 +02:00
return - 1 , ' not connected '
2016-08-12 15:20:32 +02:00
try :
data = self . __sock . recv ( size )
2016-10-17 19:31:13 +02:00
except socket . timeout :
2017-04-05 15:13:35 +02:00
return - 1 , ' timed out '
2016-08-12 15:20:32 +02:00
except socket . error as e :
2016-10-17 19:31:13 +02:00
if e . args [ 0 ] in ( errno . EAGAIN , errno . EWOULDBLOCK ) :
2017-04-05 15:13:35 +02:00
return 0 , ' retry '
return - 1 , str ( e . args [ - 1 ] )
2016-08-12 15:20:32 +02:00
if len ( data ) == 0 :
2017-04-05 15:13:35 +02:00
return - 1 , None
2016-04-01 16:56:06 +02:00
pos = self . _buf . tell ( )
self . _buf . seek ( 0 , 2 )
self . _buf . write ( data )
self . _len + = len ( data )
self . _buf . seek ( pos , 0 )
2017-04-05 15:13:35 +02:00
return len ( data ) , None
2016-04-01 16:56:06 +02:00
def send ( self , data ) :
2016-10-19 19:47:13 +02:00
# type: (binary_type) -> Tuple[int, Optional[str]]
2016-11-03 18:10:49 +01:00
if self . __sock is None :
2017-04-05 15:13:35 +02:00
return - 1 , ' not connected '
2016-08-12 15:20:32 +02:00
try :
self . __sock . send ( data )
2017-04-05 15:13:35 +02:00
return 0 , None
2016-08-12 15:20:32 +02:00
except socket . error as e :
2017-04-05 15:13:35 +02:00
return - 1 , str ( e . args [ - 1 ] )
2016-04-01 16:56:06 +02:00
self . __sock . send ( data )
2016-09-15 17:00:09 +02:00
def send_banner ( self , banner ) :
2016-10-19 19:47:13 +02:00
# type: (str) -> None
2016-04-01 17:19:18 +02:00
self . send ( banner . encode ( ) + b ' \r \n ' )
if self . __state < self . SM_BANNER_SENT :
self . __state = self . SM_BANNER_SENT
2016-09-15 17:00:09 +02:00
def ensure_read ( self , size ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> None
2016-09-15 17:00:09 +02:00
while self . unread_len < size :
2016-08-12 15:20:32 +02:00
s , e = self . recv ( )
if s < 0 :
2016-09-15 17:00:09 +02:00
raise SSH . Socket . InsufficientReadException ( e )
def read_packet ( self , sshv = 2 ) :
2016-10-19 19:47:13 +02:00
# type: (int) -> Tuple[int, binary_type]
2016-09-15 17:00:09 +02:00
try :
header = WriteBuf ( )
self . ensure_read ( 4 )
packet_length = self . read_int ( )
header . write_int ( packet_length )
# XXX: validate length
if sshv == 1 :
2017-04-05 15:13:35 +02:00
padding_length = 8 - packet_length % 8
2016-09-15 17:00:09 +02:00
self . ensure_read ( padding_length )
padding = self . read ( padding_length )
header . write ( padding )
payload_length = packet_length
check_size = padding_length + payload_length
else :
self . ensure_read ( 1 )
padding_length = self . read_byte ( )
header . write_byte ( padding_length )
payload_length = packet_length - padding_length - 1
check_size = 4 + 1 + payload_length + padding_length
if check_size % self . __block_size != 0 :
out . fail ( ' [exception] invalid ssh packet (block size) ' )
sys . exit ( 1 )
self . ensure_read ( payload_length )
if sshv == 1 :
payload = self . read ( payload_length - 4 )
header . write ( payload )
crc = self . read_int ( )
header . write_int ( crc )
else :
payload = self . read ( payload_length )
header . write ( payload )
packet_type = ord ( payload [ 0 : 1 ] )
if sshv == 1 :
rcrc = SSH1 . crc32 ( padding + payload )
if crc != rcrc :
out . fail ( ' [exception] packet checksum CRC32 mismatch. ' )
sys . exit ( 1 )
else :
self . ensure_read ( padding_length )
padding = self . read ( padding_length )
payload = payload [ 1 : ]
return packet_type , payload
except SSH . Socket . InsufficientReadException as ex :
if ex . args [ 0 ] is None :
header . write ( self . read ( self . unread_len ) )
e = header . write_flush ( ) . strip ( )
else :
2016-10-17 19:31:13 +02:00
e = ex . args [ 0 ] . encode ( ' utf-8 ' )
2017-04-05 15:13:35 +02:00
return - 1 , e
2016-04-01 16:56:06 +02:00
2016-04-01 17:30:54 +02:00
def send_packet ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> Tuple[int, Optional[str]]
2016-09-14 15:33:38 +02:00
payload = self . write_flush ( )
2016-04-01 17:30:54 +02:00
padding = - ( len ( payload ) + 5 ) % 8
if padding < 4 :
padding + = 8
plen = len ( payload ) + padding + 1
2016-04-01 17:37:20 +02:00
pad_bytes = b ' \x00 ' * padding
2016-04-01 17:30:54 +02:00
data = struct . pack ( ' >Ib ' , plen , padding ) + payload + pad_bytes
2016-08-12 15:20:32 +02:00
return self . send ( data )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Returns True if this Socket is connected, otherwise False.
def is_connected ( self ) :
return ( self . __sock is not None )
2017-09-22 04:44:34 +02:00
def close ( self ) :
self . __cleanup ( )
2017-09-27 02:46:00 +02:00
self . reset ( )
self . __state = 0
self . __header = [ ]
self . __banner = None
def reset ( self ) :
super ( SSH . Socket , self ) . reset ( )
2017-09-22 04:44:34 +02:00
2016-10-26 17:33:00 +02:00
def _close_socket ( self , s ) :
# type: (Optional[socket.socket]) -> None
try :
if s is not None :
s . shutdown ( socket . SHUT_RDWR )
2016-11-03 18:10:49 +01:00
s . close ( ) # pragma: nocover
2016-10-26 17:33:00 +02:00
except : # pylint: disable=bare-except
pass
2016-04-01 16:56:06 +02:00
def __del__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-04-01 16:56:06 +02:00
self . __cleanup ( )
def __cleanup ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-10-26 17:33:00 +02:00
self . _close_socket ( self . __sock )
2019-10-10 04:29:56 +02:00
for fd in self . __sock_map :
self . _close_socket ( self . __sock_map [ fd ] )
2017-09-27 02:46:00 +02:00
self . __sock = None
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
2016-11-03 18:10:49 +01:00
class KexDH ( object ) : # pragma: nocover
2017-09-22 04:44:34 +02:00
def __init__ ( self , kex_name , hash_alg , g , p ) :
2016-10-19 19:47:13 +02:00
# type: (str, int, int) -> None
2017-09-22 04:44:34 +02:00
self . __kex_name = kex_name
self . __hash_alg = hash_alg
2017-09-28 03:27:08 +02:00
self . __g = 0
self . __p = 0
self . __q = 0
self . __x = 0
self . __e = 0
2017-09-22 04:44:34 +02:00
self . set_params ( g , p )
self . __ed25519_pubkey = 0
self . __hostkey_type = None
self . __hostkey_e = 0
self . __hostkey_n = 0
2017-09-27 02:46:00 +02:00
self . __hostkey_n_len = 0 # Length of the host key modulus.
self . __ca_n_len = 0 # Length of the CA key modulus (if hostkey is a cert).
2017-09-22 04:44:34 +02:00
self . __f = 0
self . __h_sig = 0
2019-08-22 21:47:37 +02:00
2017-09-22 04:44:34 +02:00
def set_params ( self , g , p ) :
2016-04-01 17:37:20 +02:00
self . __g = g
self . __p = p
self . __q = ( self . __p - 1 ) / / 2
2016-11-03 18:10:49 +01:00
self . __x = 0
self . __e = 0
2017-09-22 04:44:34 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_INIT ) :
2016-10-19 19:47:13 +02:00
# type: (SSH.Socket) -> None
2016-04-01 17:37:20 +02:00
r = random . SystemRandom ( )
self . __x = r . randrange ( 2 , self . __q )
self . __e = pow ( self . __g , self . __x , self . __p )
2017-09-22 04:44:34 +02:00
s . write_byte ( init_msg )
2016-09-14 15:33:38 +02:00
s . write_mpint2 ( self . __e )
2016-04-01 17:37:20 +02:00
s . send_packet ( )
2017-09-22 04:44:34 +02:00
# Parse a KEXDH_REPLY or KEXDH_GEX_REPLY message from the server. This
2019-08-22 21:47:37 +02:00
# contains the host key, among other things. Function returns the host
# key blob (from which the fingerprint can be calculated).
def recv_reply ( self , s , parse_host_key_size = True ) :
2017-09-22 04:44:34 +02:00
packet_type , payload = s . read_packet ( 2 )
2019-09-20 04:25:30 +02:00
# Skip any & all MSG_DEBUG messages.
while packet_type == SSH . Protocol . MSG_DEBUG :
packet_type , payload = s . read_packet ( 2 )
2017-09-28 03:27:08 +02:00
if packet_type != - 1 and packet_type not in [ SSH . Protocol . MSG_KEXDH_REPLY , SSH . Protocol . MSG_KEXDH_GEX_REPLY ] :
2017-09-22 04:44:34 +02:00
# TODO: change Exception to something more specific.
raise Exception ( ' Expected MSG_KEXDH_REPLY ( %d ) or MSG_KEXDH_GEX_REPLY ( %d ), but got %d instead. ' % ( SSH . Protocol . MSG_KEXDH_REPLY , SSH . Protocol . MSG_KEXDH_GEX_REPLY , packet_type ) )
2017-09-28 03:27:08 +02:00
elif packet_type == - 1 :
# A connection error occurred. We can't parse anything, so just
# return. The host key modulus (and perhaps certificate modulus)
# will remain at length 0.
2019-08-22 21:47:37 +02:00
return None
2017-09-22 04:44:34 +02:00
2017-09-28 04:14:48 +02:00
hostkey_len = f_len = h_sig_len = 0 # pylint: disable=unused-variable
hostkey_type_len = hostkey_e_len = 0 # pylint: disable=unused-variable
key_id_len = principles_len = 0 # pylint: disable=unused-variable
critical_options_len = extensions_len = 0 # pylint: disable=unused-variable
nonce_len = ca_key_len = ca_key_type_len = 0 # pylint: disable=unused-variable
ca_key_len = ca_key_type_len = ca_key_e_len = 0 # pylint: disable=unused-variable
key_id = principles = None # pylint: disable=unused-variable
critical_options = extensions = None # pylint: disable=unused-variable
valid_after = valid_before = None # pylint: disable=unused-variable
nonce = ca_key = ca_key_type = None # pylint: disable=unused-variable
ca_key_e = ca_key_n = None # pylint: disable=unused-variable
2017-09-27 02:46:00 +02:00
# Get the host key blob, F, and signature.
ptr = 0
hostkey , hostkey_len , ptr = KexDH . __get_bytes ( payload , ptr )
2019-08-22 21:47:37 +02:00
# If we are not supposed to parse the host key size (i.e.: it is a type that is of fixed size such as ed25519), then stop here.
if not parse_host_key_size :
return hostkey
2017-09-27 02:46:00 +02:00
self . __f , f_len , ptr = KexDH . __get_bytes ( payload , ptr )
self . __h_sig , h_sig_len , ptr = KexDH . __get_bytes ( payload , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Now pick apart the host key blob.
# Get the host key type (i.e.: 'ssh-rsa', 'ssh-ed25519', etc).
ptr = 0
self . __hostkey_type , hostkey_type_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# If this is an RSA certificate, skip over the nonce.
2017-09-27 02:51:10 +02:00
if self . __hostkey_type . startswith ( b ' ssh-rsa-cert-v0 ' ) :
2017-09-27 02:46:00 +02:00
nonce , nonce_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# The public key exponent.
hostkey_e , hostkey_e_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
self . __hostkey_e = int ( binascii . hexlify ( hostkey_e ) , 16 )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Here is the modulus size & actual modulus of the host key public key.
hostkey_n , self . __hostkey_n_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
self . __hostkey_n = int ( binascii . hexlify ( hostkey_n ) , 16 )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# If this is an RSA certificate, continue parsing to extract the CA
# key.
2017-09-27 02:51:10 +02:00
if self . __hostkey_type . startswith ( b ' ssh-rsa-cert-v0 ' ) :
2017-09-27 02:46:00 +02:00
# Skip over the serial number.
ptr + = 8
2016-09-02 16:22:00 +02:00
2017-09-27 02:46:00 +02:00
# Get the certificate type.
cert_type = int ( binascii . hexlify ( hostkey [ ptr : ptr + 4 ] ) , 16 )
ptr + = 4
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Only SSH2_CERT_TYPE_HOST (2) makes sense in this context.
if cert_type == 2 :
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Skip the key ID (this is the serial number of the
# certificate).
key_id , key_id_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# The principles, which are... I don't know what.
2017-09-28 04:36:23 +02:00
principles , principles_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# The timestamp that this certificate is valid after.
valid_after = hostkey [ ptr : ptr + 8 ]
ptr + = 8
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# The timestamp that this certificate is valid before.
valid_before = hostkey [ ptr : ptr + 8 ]
ptr + = 8
# TODO: validate the principles, and time range.
# The critical options.
critical_options , critical_options_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
# Certificate extensions.
extensions , extensions_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
2017-09-22 04:44:34 +02:00
2017-09-27 02:46:00 +02:00
# Another nonce.
nonce , nonce_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
# Finally, we get to the CA key.
ca_key , ca_key_len , ptr = KexDH . __get_bytes ( hostkey , ptr )
# Last in the host key blob is the CA signature. It isn't
# interesting to us, so we won't bother parsing any further.
# The CA key has the modulus, however...
ptr = 0
# 'ssh-rsa', 'rsa-sha2-256', etc.
ca_key_type , ca_key_type_len , ptr = KexDH . __get_bytes ( ca_key , ptr )
# CA's public key exponent.
ca_key_e , ca_key_e_len , ptr = KexDH . __get_bytes ( ca_key , ptr )
# CA's modulus. Bingo.
ca_key_n , self . __ca_n_len , ptr = KexDH . __get_bytes ( ca_key , ptr )
2019-08-22 21:47:37 +02:00
return hostkey
2017-09-27 02:46:00 +02:00
@staticmethod
def __get_bytes ( buf , ptr ) :
num_bytes = struct . unpack ( ' >I ' , buf [ ptr : ptr + 4 ] ) [ 0 ]
ptr + = 4
return buf [ ptr : ptr + num_bytes ] , num_bytes , ptr + num_bytes
# Converts a modulus length in bytes to its size in bits, after some
# possible adjustments.
@staticmethod
def __adjust_key_size ( size ) :
size = size * 8
2017-09-22 04:44:34 +02:00
# Actual keys are observed to be about 8 bits bigger than expected
# (i.e.: 1024-bit keys have a 1032-bit modulus). Check if this is
# the case, and subtract 8 if so. This simply improves readability
# in the UI.
if ( size >> 3 ) % 2 != 0 :
size = size - 8
return size
2017-09-27 02:46:00 +02:00
# Returns the size of the hostkey, in bits.
def get_hostkey_size ( self ) :
return KexDH . __adjust_key_size ( self . __hostkey_n_len )
# Returns the size of the CA key, in bits.
def get_ca_size ( self ) :
return KexDH . __adjust_key_size ( self . __ca_n_len )
2017-09-22 04:44:34 +02:00
# Returns the size of the DH modulus, in bits.
2017-09-27 02:46:00 +02:00
def get_dh_modulus_size ( self ) :
2017-09-22 04:44:34 +02:00
# -2 to account for the '0b' prefix in the string.
return len ( bin ( self . __p ) ) - 2
2016-09-02 16:22:00 +02:00
2016-11-03 18:10:49 +01:00
class KexGroup1 ( KexDH ) : # pragma: nocover
2016-04-01 17:37:20 +02:00
def __init__ ( self ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-04-01 17:37:20 +02:00
# rfc2409: second oakley group
p = int ( ' ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67 '
' cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6d '
' f25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff '
' 5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece65381 '
' ffffffffffffffff ' , 16 )
2017-09-22 04:44:34 +02:00
super ( KexGroup1 , self ) . __init__ ( ' KexGroup1 ' , ' sha1 ' , 2 , p )
2016-04-01 17:37:20 +02:00
2016-09-02 16:22:00 +02:00
2016-11-03 18:10:49 +01:00
class KexGroup14 ( KexDH ) : # pragma: nocover
2017-09-22 04:44:34 +02:00
def __init__ ( self , hash_alg ) :
2016-10-19 19:47:13 +02:00
# type: () -> None
2016-04-01 17:37:20 +02:00
# rfc3526: 2048-bit modp group
p = int ( ' ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67 '
' cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6d '
' f25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff '
' 5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3d '
' c2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3 '
' ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08 '
' ca18217c32905e462e36ce3be39e772c180e86039b2783a2ec07a28fb5c5 '
' 5df06f4c52c9de2bcbf6955817183995497cea956ae515d2261898fa0510 '
' 15728e5a8aacaa68ffffffffffffffff ' , 16 )
2017-09-22 04:44:34 +02:00
super ( KexGroup14 , self ) . __init__ ( ' KexGroup14 ' , hash_alg , 2 , p )
2016-09-02 16:56:47 +02:00
2017-09-22 04:44:34 +02:00
class KexGroup14_SHA1 ( KexGroup14 ) :
def __init__ ( self ) :
super ( KexGroup14_SHA1 , self ) . __init__ ( ' sha1 ' )
2016-04-01 17:37:20 +02:00
2016-09-02 16:22:00 +02:00
2017-09-22 04:44:34 +02:00
class KexGroup14_SHA256 ( KexGroup14 ) :
def __init__ ( self ) :
super ( KexGroup14_SHA256 , self ) . __init__ ( ' sha256 ' )
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
2017-09-22 04:44:34 +02:00
class KexGroup16_SHA512 ( KexDH ) :
def __init__ ( self ) :
# rfc3526: 4096-bit modp group
p = int ( ' ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67 '
' cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6d '
' f25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff '
' 5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3d '
' c2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3 '
' ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08 '
' ca18217c32905e462e36ce3be39e772c180e86039b2783a2ec07a28fb5c5 '
' 5df06f4c52c9de2bcbf6955817183995497cea956ae515d2261898fa0510 '
' 15728e5a8aaac42dad33170d04507a33a85521abdf1cba64ecfb850458db '
' ef0a8aea71575d060c7db3970f85a6e1e4c7abf5ae8cdb0933d71e8c94e0 '
' 4a25619dcee3d2261ad2ee6bf12ffa06d98a0864d87602733ec86a64521f '
' 2b18177b200cbbe117577a615d6c770988c0bad946e208e24fa074e5ab31 '
' 43db5bfce0fd108e4b82d120a92108011a723c12a787e6d788719a10bdba '
' 5b2699c327186af4e23c1a946834b6150bda2583e9ca2ad44ce8dbbbc2db '
' 04de8ef92e8efc141fbecaa6287c59474e6bc05d99b2964fa090c3a2233b '
' a186515be7ed1f612970cee2d7afb81bdd762170481cd0069127d5b05aa9 '
' 93b4ea988d8fddc186ffb7dc90a6c08f4df435c934063199ffffffffffff '
' ffff ' , 16 )
super ( KexGroup16_SHA512 , self ) . __init__ ( ' KexGroup16_SHA512 ' , ' sha512 ' , 2 , p )
class KexGroup18_SHA512 ( KexDH ) :
def __init__ ( self ) :
# rfc3526: 8192-bit modp group
p = int ( ' ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67 '
' cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6d '
' f25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff '
' 5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3d '
' c2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3 '
' ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08 '
' ca18217c32905e462e36ce3be39e772c180e86039b2783a2ec07a28fb5c5 '
' 5df06f4c52c9de2bcbf6955817183995497cea956ae515d2261898fa0510 '
' 15728e5a8aaac42dad33170d04507a33a85521abdf1cba64ecfb850458db '
' ef0a8aea71575d060c7db3970f85a6e1e4c7abf5ae8cdb0933d71e8c94e0 '
' 4a25619dcee3d2261ad2ee6bf12ffa06d98a0864d87602733ec86a64521f '
' 2b18177b200cbbe117577a615d6c770988c0bad946e208e24fa074e5ab31 '
' 43db5bfce0fd108e4b82d120a92108011a723c12a787e6d788719a10bdba '
' 5b2699c327186af4e23c1a946834b6150bda2583e9ca2ad44ce8dbbbc2db '
' 04de8ef92e8efc141fbecaa6287c59474e6bc05d99b2964fa090c3a2233b '
' a186515be7ed1f612970cee2d7afb81bdd762170481cd0069127d5b05aa9 '
' 93b4ea988d8fddc186ffb7dc90a6c08f4df435c93402849236c3fab4d27c '
' 7026c1d4dcb2602646dec9751e763dba37bdf8ff9406ad9e530ee5db382f '
' 413001aeb06a53ed9027d831179727b0865a8918da3edbebcf9b14ed44ce '
' 6cbaced4bb1bdb7f1447e6cc254b332051512bd7af426fb8f401378cd2bf '
' 5983ca01c64b92ecf032ea15d1721d03f482d7ce6e74fef6d55e702f4698 '
' 0c82b5a84031900b1c9e59e7c97fbec7e8f323a97a7e36cc88be0f1d45b7 '
' ff585ac54bd407b22b4154aacc8f6d7ebf48e1d814cc5ed20f8037e0a797 '
' 15eef29be32806a1d58bb7c5da76f550aa3d8a1fbff0eb19ccb1a313d55c '
' da56c9ec2ef29632387fe8d76e3c0468043e8f663f4860ee12bf2d5b0b74 '
' 74d6e694f91e6dbe115974a3926f12fee5e438777cb6a932df8cd8bec4d0 '
' 73b931ba3bc832b68d9dd300741fa7bf8afc47ed2576f6936ba424663aab '
' 639c5ae4f5683423b4742bf1c978238f16cbe39d652de3fdb8befc848ad9 '
' 22222e04a4037c0713eb57a81a23f0c73473fc646cea306b4bcbc8862f83 '
' 85ddfa9d4b7fa2c087e879683303ed5bdd3a062b3cf5b3a278a66d2a13f8 '
' 3f44f82ddf310ee074ab6a364597e899a0255dc164f31cc50846851df9ab '
' 48195ded7ea1b1d510bd7ee74d73faf36bc31ecfa268359046f4eb879f92 '
' 4009438b481c6cd7889a002ed5ee382bc9190da6fc026e479558e4475677 '
' e9aa9e3050e2765694dfc81f56e880b96e7160c980dd98edd3dfffffffff '
' ffffffff ' , 16 )
super ( KexGroup18_SHA512 , self ) . __init__ ( ' KexGroup18_SHA512 ' , ' sha512 ' , 2 , p )
class KexCurve25519_SHA256 ( KexDH ) :
def __init__ ( self ) :
super ( KexCurve25519_SHA256 , self ) . __init__ ( ' KexCurve25519_SHA256 ' , ' sha256 ' , 0 , 0 )
# To start an ED25519 kex, we simply send a random 256-bit number as the
# public key.
2017-09-28 03:27:08 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_INIT ) :
2017-09-22 04:44:34 +02:00
self . __ed25519_pubkey = os . urandom ( 32 )
2017-09-28 03:27:08 +02:00
s . write_byte ( init_msg )
2017-09-22 04:44:34 +02:00
s . write_string ( self . __ed25519_pubkey )
s . send_packet ( )
class KexNISTP256 ( KexDH ) :
def __init__ ( self ) :
super ( KexNISTP256 , self ) . __init__ ( ' KexNISTP256 ' , ' sha256 ' , 0 , 0 )
# Because the server checks that the value sent here is valid (i.e.: it lies
# on the curve, among other things), we would have to write a lot of code
# or import an elliptic curve library in order to randomly generate a
# valid elliptic point each time. Hence, we will simply send a static
# value, which is enough for us to extract the server's host key.
2017-09-28 03:27:08 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_INIT ) :
s . write_byte ( init_msg )
2017-09-22 04:44:34 +02:00
s . write_string ( b ' \x04 \x0b \x60 \x44 \x9f \x8a \x11 \x9e \xc7 \x81 \x0c \xa9 \x98 \xfc \xb7 \x90 \xaa \x6b \x26 \x8c \x12 \x4a \xc0 \x09 \xbb \xdf \xc4 \x2c \x4c \x2c \x99 \xb6 \xe1 \x71 \xa0 \xd4 \xb3 \x62 \x47 \x74 \xb3 \x39 \x0c \xf2 \x88 \x4a \x84 \x6b \x3b \x15 \x77 \xa5 \x77 \xd2 \xa9 \xc9 \x94 \xf9 \xd5 \x66 \x19 \xcd \x02 \x34 \xd1 ' )
s . send_packet ( )
2016-04-01 17:37:20 +02:00
2016-09-02 16:22:00 +02:00
2017-09-22 04:44:34 +02:00
class KexNISTP384 ( KexDH ) :
def __init__ ( self ) :
super ( KexNISTP384 , self ) . __init__ ( ' KexNISTP384 ' , ' sha256 ' , 0 , 0 )
# See comment for KexNISTP256.send_init().
2017-09-28 03:27:08 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_INIT ) :
s . write_byte ( init_msg )
2017-09-22 04:44:34 +02:00
s . write_string ( b ' \x04 \xe2 \x9b \x84 \xce \xa1 \x39 \x50 \xfe \x1e \xa3 \x18 \x70 \x1c \xe2 \x7a \xe4 \xb5 \x6f \xdf \x93 \x9f \xd4 \xf4 \x08 \xcc \x9b \x02 \x10 \xa4 \xca \x77 \x9c \x2e \x51 \x44 \x1d \x50 \x7a \x65 \x4e \x7e \x2f \x10 \x2d \x2d \x4a \x32 \xc9 \x8e \x18 \x75 \x90 \x6c \x19 \x10 \xda \xcc \xa8 \xe9 \xf4 \xc4 \x3a \x53 \x80 \x35 \xf4 \x97 \x9c \x04 \x16 \xf9 \x5a \xdc \xcc \x05 \x94 \x29 \xfa \xc4 \xd6 \x87 \x4e \x13 \x21 \xdb \x3d \x12 \xac \xbd \x20 \x3b \x60 \xff \xe6 \x58 \x42 ' )
s . send_packet ( )
class KexNISTP521 ( KexDH ) :
def __init__ ( self ) :
super ( KexNISTP521 , self ) . __init__ ( ' KexNISTP521 ' , ' sha256 ' , 0 , 0 )
# See comment for KexNISTP256.send_init().
2017-09-28 03:27:08 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_INIT ) :
s . write_byte ( init_msg )
2017-09-22 04:44:34 +02:00
s . write_string ( b ' \x04 \x01 \x02 \x90 \x29 \xe9 \x8f \xa8 \x04 \xaf \x1c \x00 \xf9 \xc6 \x29 \xc0 \x39 \x74 \x8e \xea \x47 \x7e \x7c \xf7 \x15 \x6e \x43 \x3b \x59 \x13 \x53 \x43 \xb0 \xae \x0b \xe7 \xe6 \x7c \x55 \x73 \x52 \xa5 \x2a \xc1 \x42 \xde \xfc \xf4 \x1f \x8b \x5a \x8d \xfa \xcd \x0a \x65 \x77 \xa8 \xce \x68 \xd2 \xc6 \x26 \xb5 \x3f \xee \x4b \x01 \x7b \xd2 \x96 \x23 \x69 \x53 \xc7 \x01 \xe1 \x0d \x39 \xe9 \x87 \x49 \x3b \xc8 \xec \xda \x0c \xf9 \xca \xad \x89 \x42 \x36 \x6f \x93 \x78 \x78 \x31 \x55 \x51 \x09 \x51 \xc0 \x96 \xd7 \xea \x61 \xbf \xc2 \x44 \x08 \x80 \x43 \xed \xc6 \xbb \xfb \x94 \xbd \xf8 \xdf \x2b \xd8 \x0b \x2e \x29 \x1b \x8c \xc4 \x8a \x04 \x2d \x3a ' )
s . send_packet ( )
class KexGroupExchange ( KexDH ) :
def __init__ ( self , classname , hash_alg ) :
super ( KexGroupExchange , self ) . __init__ ( classname , hash_alg , 0 , 0 )
2017-09-28 03:27:08 +02:00
def send_init ( self , s , init_msg = SSH . Protocol . MSG_KEXDH_GEX_REQUEST ) :
self . send_init_gex ( s )
2017-09-22 04:44:34 +02:00
# The group exchange starts with sending a message to the server with
# the minimum, maximum, and preferred number of bits are for the DH group.
# The server responds with a generator and prime modulus that matches that,
# then the handshake continues on like a normal DH handshake (except the
# SSH message types differ).
2017-09-28 03:27:08 +02:00
def send_init_gex ( self , s , minbits = 1024 , prefbits = 2048 , maxbits = 8192 ) :
2017-09-22 04:44:34 +02:00
# Send the initial group exchange request. Tell the server what range
# of modulus sizes we will accept, along with our preference.
s . write_byte ( SSH . Protocol . MSG_KEXDH_GEX_REQUEST )
s . write_int ( minbits )
s . write_int ( prefbits )
s . write_int ( maxbits )
s . send_packet ( )
packet_type , payload = s . read_packet ( 2 )
2019-09-20 02:08:10 +02:00
if ( packet_type != SSH . Protocol . MSG_KEXDH_GEX_GROUP ) and ( packet_type != SSH . Protocol . MSG_DEBUG ) :
2017-09-22 04:44:34 +02:00
# TODO: replace with a better exception type.
raise Exception ( ' Expected MSG_KEXDH_GEX_REPLY ( %d ), but got %d instead. ' % ( SSH . Protocol . MSG_KEXDH_GEX_REPLY , packet_type ) )
2019-09-20 02:08:10 +02:00
# Skip any & all MSG_DEBUG messages.
while packet_type == SSH . Protocol . MSG_DEBUG :
packet_type , payload = s . read_packet ( 2 )
2017-09-22 04:44:34 +02:00
# Parse the modulus (p) and generator (g) values from the server.
ptr = 0
p_len = struct . unpack ( ' >I ' , payload [ ptr : ptr + 4 ] ) [ 0 ]
ptr + = 4
p = int ( binascii . hexlify ( payload [ ptr : ptr + p_len ] ) , 16 )
ptr + = p_len
g_len = struct . unpack ( ' >I ' , payload [ ptr : ptr + 4 ] ) [ 0 ]
ptr + = 4
g = int ( binascii . hexlify ( payload [ ptr : ptr + g_len ] ) , 16 )
ptr + = g_len
# Now that we got the generator and modulus, perform the DH exchange
# like usual.
2017-09-22 21:01:51 +02:00
super ( KexGroupExchange , self ) . set_params ( g , p )
super ( KexGroupExchange , self ) . send_init ( s , SSH . Protocol . MSG_KEXDH_GEX_INIT )
2017-09-22 04:44:34 +02:00
class KexGroupExchange_SHA1 ( KexGroupExchange ) :
def __init__ ( self ) :
super ( KexGroupExchange_SHA1 , self ) . __init__ ( ' KexGroupExchange_SHA1 ' , ' sha1 ' )
class KexGroupExchange_SHA256 ( KexGroupExchange ) :
def __init__ ( self ) :
super ( KexGroupExchange_SHA256 , self ) . __init__ ( ' KexGroupExchange_SHA256 ' , ' sha256 ' )
2019-08-18 21:20:16 +02:00
def output_algorithms ( title , alg_db , alg_type , algorithms , unknown_algs , maxlen = 0 , alg_sizes = None ) :
2016-11-03 18:10:49 +01:00
# type: (str, Dict[str, Dict[str, List[List[Optional[str]]]]], str, List[text_type], int) -> None
2016-09-02 15:25:57 +02:00
with OutputBuffer ( ) as obuf :
for algorithm in algorithms :
2019-08-18 21:20:16 +02:00
output_algorithm ( alg_db , alg_type , algorithm , unknown_algs , maxlen , alg_sizes )
2016-09-02 15:25:57 +02:00
if len ( obuf ) > 0 :
out . head ( ' # ' + title )
obuf . flush ( )
out . sep ( )
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
2019-08-18 21:20:16 +02:00
def output_algorithm ( alg_db , alg_type , alg_name , unknown_algs , alg_max_len = 0 , alg_sizes = None ) :
2016-11-03 18:10:49 +01:00
# type: (Dict[str, Dict[str, List[List[Optional[str]]]]], str, text_type, int) -> None
2015-12-23 04:01:24 +01:00
prefix = ' ( ' + alg_type + ' ) '
if alg_max_len == 0 :
alg_max_len = len ( alg_name )
2016-09-08 18:00:35 +02:00
padding = ' ' if out . batch else ' ' * ( alg_max_len - len ( alg_name ) )
2017-09-22 04:44:34 +02:00
# If this is an RSA host key or DH GEX, append the size to its name and fix
# the padding.
alg_name_with_size = None
if ( alg_sizes is not None ) and ( alg_name in alg_sizes ) :
2017-09-27 02:46:00 +02:00
hostkey_size , ca_size = alg_sizes [ alg_name ]
if ca_size > 0 :
alg_name_with_size = ' %s ( %d -bit cert/ %d -bit CA) ' % ( alg_name , hostkey_size , ca_size )
padding = padding [ 0 : - 15 ]
else :
alg_name_with_size = ' %s ( %d -bit) ' % ( alg_name , hostkey_size )
padding = padding [ 0 : - 11 ]
2017-09-22 04:44:34 +02:00
2015-12-23 04:01:24 +01:00
texts = [ ]
2016-10-06 15:22:09 +02:00
if len ( alg_name . strip ( ) ) == 0 :
return
2016-10-19 19:47:13 +02:00
alg_name_native = utils . to_ntext ( alg_name )
if alg_name_native in alg_db [ alg_type ] :
alg_desc = alg_db [ alg_type ] [ alg_name_native ]
2015-12-23 04:01:24 +01:00
ldesc = len ( alg_desc )
for idx , level in enumerate ( [ ' fail ' , ' warn ' , ' info ' ] ) :
if level == ' info ' :
2016-10-19 19:47:13 +02:00
versions = alg_desc [ 0 ]
2016-11-03 18:10:49 +01:00
since_text = SSH . Algorithm . get_since_text ( versions )
2017-04-06 04:27:13 +02:00
if since_text is not None and len ( since_text ) > 0 :
2016-09-16 23:30:04 +02:00
texts . append ( ( level , since_text ) )
2015-12-23 04:01:24 +01:00
idx = idx + 1
if ldesc > idx :
2016-09-02 16:22:00 +02:00
for t in alg_desc [ idx ] :
2016-11-03 18:10:49 +01:00
if t is None :
continue
2015-12-23 04:01:24 +01:00
texts . append ( ( level , t ) )
if len ( texts ) == 0 :
texts . append ( ( ' info ' , ' ' ) )
else :
texts . append ( ( ' warn ' , ' unknown algorithm ' ) )
2019-08-18 21:20:16 +02:00
unknown_algs . append ( alg_name )
2017-09-22 04:44:34 +02:00
alg_name = alg_name_with_size if alg_name_with_size is not None else alg_name
2015-12-23 04:01:24 +01:00
first = True
2017-04-05 15:13:35 +02:00
for level , text in texts :
2015-12-23 04:01:24 +01:00
f = getattr ( out , level )
2017-10-11 21:13:58 +02:00
comment = ( padding + ' -- [ ' + level + ' ] ' + text ) if text != ' ' else ' '
2015-12-23 04:01:24 +01:00
if first :
if first and level == ' info ' :
f = out . good
2017-10-11 21:13:58 +02:00
f ( prefix + alg_name + comment )
2015-12-23 04:01:24 +01:00
first = False
2017-03-26 04:58:39 +02:00
else : # pylint: disable=else-if-used
2015-12-23 04:01:24 +01:00
if out . verbose :
2017-10-11 21:13:58 +02:00
f ( prefix + alg_name + comment )
elif text != ' ' :
comment = ( padding + ' `- [ ' + level + ' ] ' + text )
f ( ' ' * len ( prefix + alg_name ) + comment )
2015-12-23 04:01:24 +01:00
2016-09-02 16:22:00 +02:00
2019-09-28 00:14:36 +02:00
def output_compatibility ( algs , client_audit , for_server = True ) :
2016-11-03 18:10:49 +01:00
# type: (SSH.Algorithms, bool) -> None
2019-09-28 00:14:36 +02:00
# Don't output any compatibility info if we're doing a client audit.
if client_audit :
return
2016-11-03 18:10:49 +01:00
ssh_timeframe = algs . get_ssh_timeframe ( for_server )
2016-08-12 03:28:46 +02:00
comp_text = [ ]
2017-04-10 12:20:32 +02:00
for ssh_prod in [ SSH . Product . OpenSSH , SSH . Product . DropbearSSH ] :
if ssh_prod not in ssh_timeframe :
2016-09-08 13:10:39 +02:00
continue
2017-04-10 12:20:32 +02:00
v_from = ssh_timeframe . get_from ( ssh_prod , for_server )
v_till = ssh_timeframe . get_till ( ssh_prod , for_server )
if v_from is None :
2016-11-03 18:10:49 +01:00
continue
2017-04-10 12:20:32 +02:00
if v_till is None :
comp_text . append ( ' {0} {1} + ' . format ( ssh_prod , v_from ) )
elif v_from == v_till :
comp_text . append ( ' {0} {1} ' . format ( ssh_prod , v_from ) )
2016-08-12 03:28:46 +02:00
else :
2017-04-10 12:20:32 +02:00
software = SSH . Software ( None , ssh_prod , v_from , None , None )
if software . compare_version ( v_till ) > 0 :
2016-09-02 15:25:57 +02:00
tfmt = ' {0} {1} + (some functionality from {2} ) '
2016-08-12 03:28:46 +02:00
else :
2016-09-02 15:25:57 +02:00
tfmt = ' {0} {1} - {2} '
2017-04-10 12:20:32 +02:00
comp_text . append ( tfmt . format ( ssh_prod , v_from , v_till ) )
2016-08-12 03:28:46 +02:00
if len ( comp_text ) > 0 :
2016-09-02 15:25:57 +02:00
out . good ( ' (gen) compatibility: ' + ' , ' . join ( comp_text ) )
2016-08-12 03:28:46 +02:00
2016-09-02 16:22:00 +02:00
2019-09-28 00:14:36 +02:00
def output_security_sub ( sub , software , client_audit , padlen ) :
2016-11-03 18:10:49 +01:00
# type: (str, Optional[SSH.Software], int) -> None
2016-09-13 12:01:38 +02:00
secdb = SSH . Security . CVE if sub == ' cve ' else SSH . Security . TXT
if software is None or software . product not in secdb :
2016-09-08 17:50:19 +02:00
return
2016-09-13 12:01:38 +02:00
for line in secdb [ software . product ] :
2016-10-19 19:47:13 +02:00
vfrom , vtill = line [ 0 : 2 ] # type: str, str
2016-09-12 18:21:57 +02:00
if not software . between_versions ( vfrom , vtill ) :
2016-09-08 17:50:19 +02:00
continue
2016-10-25 10:52:55 +02:00
target , name = line [ 2 : 4 ] # type: int, str
2017-03-26 05:24:07 +02:00
is_server = target & 1 == 1
2019-09-28 00:14:36 +02:00
is_client = target & 2 == 2
2017-03-26 05:24:07 +02:00
# is_local = target & 4 == 4
2019-09-28 00:14:36 +02:00
# If this security entry applies only to servers, but we're testing a client, then skip it. Similarly, skip entries that apply only to clients, but we're testing a server.
if ( is_server and not is_client and client_audit ) or ( is_client and not is_server and not client_audit ) :
2016-09-08 19:04:48 +02:00
continue
2016-09-13 12:01:38 +02:00
p = ' ' if out . batch else ' ' * ( padlen - len ( name ) )
if sub == ' cve ' :
2016-10-19 19:47:13 +02:00
cvss , descr = line [ 4 : 6 ] # type: float, str
2019-08-18 05:11:03 +02:00
# Critical CVSS scores (>= 8.0) are printed as a fail, otherwise they are printed as a warning.
out_func = out . warn
if cvss > = 8.0 :
out_func = out . fail
out_func ( ' (cve) {0} {1} -- (CVSSv2: {2} ) {3} ' . format ( name , p , cvss , descr ) )
2016-09-13 12:01:38 +02:00
else :
descr = line [ 4 ]
out . fail ( ' (sec) {0} {1} -- {2} ' . format ( name , p , descr ) )
2016-09-08 19:04:48 +02:00
2019-09-28 00:14:36 +02:00
def output_security ( banner , client_audit , padlen ) :
2016-11-03 18:10:49 +01:00
# type: (Optional[SSH.Banner], int) -> None
2016-09-08 17:50:19 +02:00
with OutputBuffer ( ) as obuf :
2016-11-03 18:10:49 +01:00
if banner is not None :
2016-09-13 12:17:41 +02:00
software = SSH . Software . parse ( banner )
2019-09-28 00:14:36 +02:00
output_security_sub ( ' cve ' , software , client_audit , padlen )
output_security_sub ( ' txt ' , software , client_audit , padlen )
2016-09-08 17:50:19 +02:00
if len ( obuf ) > 0 :
out . head ( ' # security ' )
obuf . flush ( )
out . sep ( )
2019-08-22 21:47:37 +02:00
def output_fingerprints ( algs , sha256 = True ) :
2016-11-03 18:10:49 +01:00
# type: (SSH.Algorithms, bool, int) -> None
2016-09-17 19:37:03 +02:00
with OutputBuffer ( ) as obuf :
fps = [ ]
2016-11-03 18:10:49 +01:00
if algs . ssh1kex is not None :
2016-09-17 19:37:03 +02:00
name = ' ssh-rsa1 '
2016-11-03 18:10:49 +01:00
fp = SSH . Fingerprint ( algs . ssh1kex . host_key_fingerprint_data )
2019-08-22 21:47:37 +02:00
#bits = algs.ssh1kex.host_key_bits
fps . append ( ( name , fp ) )
if algs . ssh2kex is not None :
host_keys = algs . ssh2kex . host_keys ( )
for host_key_type in algs . ssh2kex . host_keys ( ) :
2019-08-26 20:44:35 +02:00
if host_keys [ host_key_type ] is None :
continue
2019-08-22 21:47:37 +02:00
fp = SSH . Fingerprint ( host_keys [ host_key_type ] )
# Workaround for Python's order-indifference in dicts. We might get a random RSA type (ssh-rsa, rsa-sha2-256, or rsa-sha2-512), so running the tool against the same server three times may give three different host key types here. So if we have any RSA type, we will simply hard-code it to 'ssh-rsa'.
if host_key_type in SSH2 . HostKeyTest . RSA_FAMILY :
host_key_type = ' ssh-rsa '
# Skip over certificate host types (or we would return invalid fingerprints).
if ' -cert- ' not in host_key_type :
fps . append ( ( host_key_type , fp ) )
# Similarly, the host keys can be processed in random order due to Python's order-indifference in dicts. So we sort this list before printing; this makes automated testing possible.
fps = sorted ( fps )
2016-09-17 19:37:03 +02:00
for fpp in fps :
2019-08-22 21:47:37 +02:00
name , fp = fpp
2016-10-19 19:47:13 +02:00
fpo = fp . sha256 if sha256 else fp . md5
2019-08-22 21:47:37 +02:00
#p = '' if out.batch else ' ' * (padlen - len(name))
#out.good('(fin) {0}{1} -- {2} {3}'.format(name, p, bits, fpo))
out . good ( ' (fin) {0} : {1} ' . format ( name , fpo ) )
2016-09-17 19:37:03 +02:00
if len ( obuf ) > 0 :
out . head ( ' # fingerprints ' )
obuf . flush ( )
out . sep ( )
2019-09-28 00:14:36 +02:00
# Returns True if no warnings or failures encountered in configuration.
2016-11-03 18:10:49 +01:00
def output_recommendations ( algs , software , padlen = 0 ) :
# type: (SSH.Algorithms, Optional[SSH.Software], int) -> None
2019-09-28 00:14:36 +02:00
ret = True
# PuTTY's algorithms cannot be modified, so there's no point in issuing recommendations.
2019-10-10 02:57:31 +02:00
if ( software is not None ) and ( software . product == SSH . Product . PuTTY ) :
2019-09-28 00:14:36 +02:00
max_vuln_version = 0.0
max_cvssv2_severity = 0.0
# Search the CVE database for the most recent vulnerable version and the max CVSSv2 score.
for cve_list in SSH . Security . CVE [ ' PuTTY ' ] :
vuln_version = float ( cve_list [ 1 ] )
cvssv2_severity = cve_list [ 4 ]
if vuln_version > max_vuln_version :
max_vuln_version = vuln_version
if cvssv2_severity > max_cvssv2_severity :
max_cvssv2_severity = cvssv2_severity
fn = out . warn
if max_cvssv2_severity > 8.0 :
fn = out . fail
# Assuming that PuTTY versions will always increment by 0.01, we can calculate the first safe version by adding 0.01 to the latest vulnerable version.
current_version = float ( software . version )
upgrade_to_version = max_vuln_version + 0.01
if current_version < upgrade_to_version :
out . head ( ' # recommendations ' )
fn ( ' (rec) Upgrade to PuTTY v %.2f ' % upgrade_to_version )
out . sep ( )
ret = False
return ret
2016-09-28 16:03:38 +02:00
for_server = True
with OutputBuffer ( ) as obuf :
2016-11-03 18:10:49 +01:00
software , alg_rec = algs . get_recommendations ( software , for_server )
2016-09-28 16:03:38 +02:00
for sshv in range ( 2 , 0 , - 1 ) :
if sshv not in alg_rec :
continue
for alg_type in [ ' kex ' , ' key ' , ' enc ' , ' mac ' ] :
if alg_type not in alg_rec [ sshv ] :
continue
2017-09-27 02:46:00 +02:00
for action in [ ' del ' , ' add ' , ' chg ' ] :
2016-09-28 16:03:38 +02:00
if action not in alg_rec [ sshv ] [ alg_type ] :
continue
for name in alg_rec [ sshv ] [ alg_type ] [ action ] :
p = ' ' if out . batch else ' ' * ( padlen - len ( name ) )
2017-09-27 02:46:00 +02:00
chg_additional_info = ' '
2016-09-28 16:03:38 +02:00
if action == ' del ' :
an , sg , fn = ' remove ' , ' - ' , out . warn
2019-09-28 00:14:36 +02:00
ret = False
2016-10-04 10:14:03 +02:00
if alg_rec [ sshv ] [ alg_type ] [ action ] [ name ] > = 10 :
fn = out . fail
2017-09-27 02:46:00 +02:00
elif action == ' add ' :
2016-09-28 16:03:38 +02:00
an , sg , fn = ' append ' , ' + ' , out . good
2017-09-27 02:46:00 +02:00
elif action == ' chg ' :
an , sg , fn = ' change ' , ' ! ' , out . fail
2019-09-28 00:14:36 +02:00
ret = False
2017-09-27 02:46:00 +02:00
chg_additional_info = ' (increase modulus size to 2048 bits or larger) '
2016-09-28 16:03:38 +02:00
b = ' (SSH {0} ) ' . format ( sshv ) if sshv == 1 else ' '
2017-09-27 02:46:00 +02:00
fm = ' (rec) {0} {1} {2} -- {3} algorithm to {4} {5} {6} '
fn ( fm . format ( sg , name , p , alg_type , an , chg_additional_info , b ) )
2016-09-28 16:03:38 +02:00
if len ( obuf ) > 0 :
2017-04-06 04:27:13 +02:00
if software is not None :
title = ' (for {0} ) ' . format ( software . display ( False ) )
else :
title = ' '
2016-09-28 16:03:38 +02:00
out . head ( ' # algorithm recommendations {0} ' . format ( title ) )
2019-08-22 21:47:37 +02:00
obuf . flush ( True ) # Sort the output so that it is always stable (needed for repeatable testing).
2016-09-28 16:03:38 +02:00
out . sep ( )
2019-09-28 00:14:36 +02:00
return ret
# Output additional information & notes.
def output_info ( algs , software , client_audit , any_problems , padlen = 0 ) :
with OutputBuffer ( ) as obuf :
# Tell user that PuTTY cannot be hardened at the protocol-level.
2019-10-10 02:57:31 +02:00
if client_audit and ( software is not None ) and ( software . product == SSH . Product . PuTTY ) :
2019-09-28 00:14:36 +02:00
out . warn ( ' (nfo) PuTTY does not have the option of restricting any algorithms during the SSH handshake. ' )
# If any warnings or failures were given, print a link to the hardening guides.
if any_problems :
out . warn ( ' (nfo) For hardening guides on common OSes, please see: <https://www.ssh-audit.com/hardening_guides.html> ' )
if len ( obuf ) > 0 :
out . head ( ' # additional info ' )
2016-09-28 16:03:38 +02:00
obuf . flush ( )
out . sep ( )
2019-11-14 19:52:36 +01:00
def output ( banner , header , client_host = None , kex = None , pkm = None ) :
2016-10-19 19:47:13 +02:00
# type: (Optional[SSH.Banner], List[text_type], Optional[SSH2.Kex], Optional[SSH1.PublicKeyMessage]) -> None
2019-11-14 19:52:36 +01:00
client_audit = ( client_host != None ) # If set, this is a client audit.
2017-04-05 17:12:26 +02:00
sshv = 1 if pkm is not None else 2
2016-11-03 18:10:49 +01:00
algs = SSH . Algorithms ( pkm , kex )
2016-09-02 15:25:57 +02:00
with OutputBuffer ( ) as obuf :
2019-11-14 19:52:36 +01:00
if client_audit :
out . good ( ' (gen) client IP: {0} ' . format ( client_host ) )
2016-09-02 15:25:57 +02:00
if len ( header ) > 0 :
out . info ( ' (gen) header: ' + ' \n ' . join ( header ) )
if banner is not None :
2016-09-06 17:55:17 +02:00
out . good ( ' (gen) banner: {0} ' . format ( banner ) )
2016-10-19 19:47:13 +02:00
if not banner . valid_ascii :
# NOTE: RFC 4253, Section 4.2
out . warn ( ' (gen) banner contains non-printable ASCII ' )
2016-09-15 17:00:09 +02:00
if sshv == 1 or banner . protocol [ 0 ] == 1 :
2016-09-02 15:25:57 +02:00
out . fail ( ' (gen) protocol SSH1 enabled ' )
2016-09-07 18:26:33 +02:00
software = SSH . Software . parse ( banner )
if software is not None :
out . good ( ' (gen) software: {0} ' . format ( software ) )
2016-09-28 16:03:38 +02:00
else :
software = None
2019-09-28 00:14:36 +02:00
output_compatibility ( algs , client_audit )
2016-09-02 15:25:57 +02:00
if kex is not None :
compressions = [ x for x in kex . server . compression if x != ' none ' ]
if len ( compressions ) > 0 :
cmptxt = ' enabled ( {0} ) ' . format ( ' , ' . join ( compressions ) )
else :
cmptxt = ' disabled '
2016-09-08 17:52:38 +02:00
out . good ( ' (gen) compression: {0} ' . format ( cmptxt ) )
2016-09-02 15:25:57 +02:00
if len ( obuf ) > 0 :
2016-08-12 15:20:32 +02:00
out . head ( ' # general ' )
2016-09-02 15:25:57 +02:00
obuf . flush ( )
out . sep ( )
2016-11-03 18:10:49 +01:00
maxlen = algs . maxlen + 1
2019-09-28 00:14:36 +02:00
output_security ( banner , client_audit , maxlen )
2019-08-18 21:20:16 +02:00
unknown_algorithms = [ ] # Filled in by output_algorithms() with unidentified algs.
2016-09-17 18:33:03 +02:00
if pkm is not None :
2016-09-17 19:24:53 +02:00
adb = SSH1 . KexDB . ALGORITHMS
2016-09-17 18:33:03 +02:00
ciphers = pkm . supported_ciphers
auths = pkm . supported_authentications
2016-09-17 19:24:53 +02:00
title , atype = ' SSH1 host-key algorithms ' , ' key '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , [ ' ssh-rsa1 ' ] , unknown_algorithms , maxlen )
2016-09-17 19:24:53 +02:00
title , atype = ' SSH1 encryption algorithms (ciphers) ' , ' enc '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , ciphers , unknown_algorithms , maxlen )
2016-09-17 19:24:53 +02:00
title , atype = ' SSH1 authentication types ' , ' aut '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , auths , unknown_algorithms , maxlen )
2016-09-17 19:24:53 +02:00
if kex is not None :
2016-11-03 18:10:49 +01:00
adb = SSH2 . KexDB . ALGORITHMS
2016-09-17 19:24:53 +02:00
title , atype = ' key exchange algorithms ' , ' kex '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , kex . kex_algorithms , unknown_algorithms , maxlen , kex . dh_modulus_sizes ( ) )
2016-09-17 19:24:53 +02:00
title , atype = ' host-key algorithms ' , ' key '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , kex . key_algorithms , unknown_algorithms , maxlen , kex . rsa_key_sizes ( ) )
2016-09-17 19:24:53 +02:00
title , atype = ' encryption algorithms (ciphers) ' , ' enc '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , kex . server . encryption , unknown_algorithms , maxlen )
2016-09-17 19:24:53 +02:00
title , atype = ' message authentication code algorithms ' , ' mac '
2019-08-18 21:20:16 +02:00
output_algorithms ( title , adb , atype , kex . server . mac , unknown_algorithms , maxlen )
2019-08-22 21:47:37 +02:00
output_fingerprints ( algs , True )
2019-09-28 00:14:36 +02:00
perfect_config = output_recommendations ( algs , software , maxlen )
output_info ( algs , software , client_audit , not perfect_config )
2015-12-23 04:01:24 +01:00
2019-08-18 21:20:16 +02:00
# If we encountered any unknown algorithms, ask the user to report them.
if len ( unknown_algorithms ) > 0 :
out . warn ( " \n \n !!! WARNING: unknown algorithm(s) found!: %s . Please email the full output above to the maintainer (jtesta@positronsecurity.com), or create a Github issue at <https://github.com/jtesta/ssh-audit/issues>. \n " % ' , ' . join ( unknown_algorithms ) )
2015-12-23 04:01:24 +01:00
2016-10-06 13:36:30 +02:00
class Utils ( object ) :
2016-10-19 19:47:13 +02:00
@classmethod
def _type_err ( cls , v , target ) :
# type: (Any, text_type) -> TypeError
return TypeError ( ' cannot convert {0} to {1} ' . format ( type ( v ) , target ) )
2016-10-06 13:36:30 +02:00
@classmethod
2016-10-19 19:47:13 +02:00
def to_bytes ( cls , v , enc = ' utf-8 ' ) :
# type: (Union[binary_type, text_type], str) -> binary_type
if isinstance ( v , binary_type ) :
return v
elif isinstance ( v , text_type ) :
return v . encode ( enc )
raise cls . _type_err ( v , ' bytes ' )
@classmethod
def to_utext ( cls , v , enc = ' utf-8 ' ) :
# type: (Union[text_type, binary_type], str) -> text_type
if isinstance ( v , text_type ) :
return v
elif isinstance ( v , binary_type ) :
return v . decode ( enc )
raise cls . _type_err ( v , ' unicode text ' )
@classmethod
def to_ntext ( cls , v , enc = ' utf-8 ' ) :
# type: (Union[text_type, binary_type], str) -> str
if isinstance ( v , str ) :
return v
elif isinstance ( v , text_type ) :
2016-11-02 17:23:55 +01:00
return v . encode ( enc ) # PY2 only
2016-10-19 19:47:13 +02:00
elif isinstance ( v , binary_type ) :
2016-11-02 17:23:55 +01:00
return v . decode ( enc ) # PY3 only
2016-10-19 19:47:13 +02:00
raise cls . _type_err ( v , ' native text ' )
2016-11-02 17:23:55 +01:00
@classmethod
def _is_ascii ( cls , v , char_filter = lambda x : x < = 127 ) :
# type: (Union[text_type, str], Callable[[int], bool]) -> bool
r = False
if isinstance ( v , ( text_type , str ) ) :
for c in v :
i = cls . ctoi ( c )
if not char_filter ( i ) :
return r
r = True
return r
@classmethod
def _to_ascii ( cls , v , char_filter = lambda x : x < = 127 , errors = ' replace ' ) :
# type: (Union[text_type, str], Callable[[int], bool], str) -> str
if isinstance ( v , ( text_type , str ) ) :
r = bytearray ( )
for c in v :
i = cls . ctoi ( c )
if char_filter ( i ) :
r . append ( i )
else :
if errors == ' ignore ' :
continue
r . append ( 63 )
return cls . to_ntext ( r . decode ( ' ascii ' ) )
raise cls . _type_err ( v , ' ascii ' )
2016-10-19 19:47:13 +02:00
@classmethod
2016-10-20 15:41:44 +02:00
def is_ascii ( cls , v ) :
2016-10-20 16:19:37 +02:00
# type: (Union[text_type, str]) -> bool
2016-11-02 17:23:55 +01:00
return cls . _is_ascii ( v )
2016-10-19 19:47:13 +02:00
@classmethod
def to_ascii ( cls , v , errors = ' replace ' ) :
# type: (Union[text_type, str], str) -> str
2016-11-02 17:23:55 +01:00
return cls . _to_ascii ( v , errors = errors )
@classmethod
def is_print_ascii ( cls , v ) :
# type: (Union[text_type, str]) -> bool
return cls . _is_ascii ( v , lambda x : x > = 32 and x < = 126 )
@classmethod
def to_print_ascii ( cls , v , errors = ' replace ' ) :
# type: (Union[text_type, str], str) -> str
return cls . _to_ascii ( v , lambda x : x > = 32 and x < = 126 , errors )
2016-10-06 13:36:30 +02:00
2016-10-26 17:33:00 +02:00
@classmethod
def unique_seq ( cls , seq ) :
# type: (Sequence[Any]) -> Sequence[Any]
seen = set ( ) # type: Set[Any]
def _seen_add ( x ) :
# type: (Any) -> bool
seen . add ( x )
return False
if isinstance ( seq , tuple ) :
return tuple ( x for x in seq if x not in seen and not _seen_add ( x ) )
else :
return [ x for x in seq if x not in seen and not _seen_add ( x ) ]
2016-11-02 17:23:55 +01:00
@classmethod
def ctoi ( cls , c ) :
# type: (Union[text_type, str, int]) -> int
if isinstance ( c , ( text_type , str ) ) :
return ord ( c [ 0 ] )
else :
return c
2016-10-06 13:36:30 +02:00
@staticmethod
def parse_int ( v ) :
2016-10-19 19:47:13 +02:00
# type: (Any) -> int
2016-10-06 13:36:30 +02:00
try :
return int ( v )
2016-10-20 19:00:51 +02:00
except : # pylint: disable=bare-except
2016-10-06 13:36:30 +02:00
return 0
2015-12-23 04:01:24 +01:00
2017-10-29 22:48:04 +01:00
@staticmethod
def parse_float ( v ) :
# type: (Any) -> float
try :
return float ( v )
except : # pylint: disable=bare-except
return - 1.0
2019-11-14 19:52:36 +01:00
def build_struct ( banner , kex = None , pkm = None , client_host = None ) :
2019-11-07 22:08:09 +01:00
res = {
" banner " : {
" raw " : str ( banner ) ,
" protocol " : banner . protocol ,
" software " : banner . software ,
" comments " : banner . comments ,
} ,
}
2019-11-14 19:52:36 +01:00
if client_host is not None :
res [ ' client_ip ' ] = client_host
2019-11-07 22:08:09 +01:00
if kex is not None :
res [ ' compression ' ] = kex . server . compression
res [ ' kex ' ] = [ ]
alg_sizes = kex . dh_modulus_sizes ( )
for algorithm in kex . kex_algorithms :
entry = {
' algorithm ' : algorithm ,
}
if ( alg_sizes is not None ) and ( algorithm in alg_sizes ) :
hostkey_size , ca_size = alg_sizes [ algorithm ]
entry [ ' keysize ' ] = hostkey_size
if ca_size > 0 :
entry [ ' casize ' ] = ca_size
res [ ' kex ' ] . append ( entry )
res [ ' key ' ] = [ ]
alg_sizes = kex . rsa_key_sizes ( )
for algorithm in kex . key_algorithms :
entry = {
' algorithm ' : algorithm ,
}
if ( alg_sizes is not None ) and ( algorithm in alg_sizes ) :
hostkey_size , ca_size = alg_sizes [ algorithm ]
entry [ ' keysize ' ] = hostkey_size
if ca_size > 0 :
entry [ ' casize ' ] = ca_size
res [ ' key ' ] . append ( entry )
res [ ' enc ' ] = kex . server . encryption
res [ ' mac ' ] = kex . server . mac
res [ ' fingerprints ' ] = [ ]
host_keys = kex . host_keys ( )
2019-11-09 00:40:32 +01:00
# Normalize all RSA key types to 'ssh-rsa'. Otherwise, due to Python's order-indifference dictionary types, we would iterate key types in unpredictable orders, which interferes with the docker testing framework (i.e.: tests would fail because elements are reported out of order, even though the output is semantically the same).
for host_key_type in host_keys . keys ( ) :
if host_key_type in SSH2 . HostKeyTest . RSA_FAMILY :
val = host_keys [ host_key_type ]
del ( host_keys [ host_key_type ] )
host_keys [ ' ssh-rsa ' ] = val
for host_key_type in sorted ( host_keys ) :
2019-11-07 22:08:09 +01:00
if host_keys [ host_key_type ] is None :
continue
fp = SSH . Fingerprint ( host_keys [ host_key_type ] )
# Skip over certificate host types (or we would return invalid fingerprints).
if ' -cert- ' in host_key_type :
continue
entry = {
' type ' : host_key_type ,
' fp ' : fp . sha256 ,
}
res [ ' fingerprints ' ] . append ( entry )
else :
res [ ' key ' ] = [ ' ssh-rsa1 ' ]
res [ ' enc ' ] = pkm . supported_ciphers
res [ ' aut ' ] = pkm . supported_authentications
res [ ' fingerprints ' ] = [ {
' type ' : ' ssh-rsa1 ' ,
' fp ' : SSH . Fingerprint ( pkm . host_key_fingerprint_data ) . sha256 ,
} ]
return res
2016-09-02 16:22:00 +02:00
2016-10-20 19:00:51 +02:00
def audit ( aconf , sshv = None ) :
2016-10-19 19:47:13 +02:00
# type: (AuditConf, Optional[int]) -> None
2016-10-20 19:00:51 +02:00
out . batch = aconf . batch
out . verbose = aconf . verbose
2017-04-10 18:11:12 +02:00
out . level = aconf . level
out . use_colors = aconf . colors
2019-11-07 02:40:25 +01:00
s = SSH . Socket ( aconf . host , aconf . port , aconf . ipvo , aconf . timeout , aconf . timeout_set )
2019-09-28 00:14:36 +02:00
if aconf . client_audit :
s . listen_and_accept ( )
else :
s . connect ( )
2016-09-16 13:55:27 +02:00
if sshv is None :
2016-10-20 19:00:51 +02:00
sshv = 2 if aconf . ssh2 else 1
2016-08-12 15:20:32 +02:00
err = None
2016-11-02 12:00:24 +01:00
banner , header , err = s . get_banner ( sshv )
2016-08-12 15:20:32 +02:00
if banner is None :
2016-11-02 12:00:24 +01:00
if err is None :
err = ' [exception] did not receive banner. '
else :
err = ' [exception] did not receive banner: {0} ' . format ( err )
2016-08-12 15:20:32 +02:00
if err is None :
2016-09-15 17:00:09 +02:00
packet_type , payload = s . read_packet ( sshv )
2016-08-12 15:20:32 +02:00
if packet_type < 0 :
2016-10-18 08:45:03 +02:00
try :
2017-04-06 04:27:13 +02:00
if payload is not None and len ( payload ) > 0 :
payload_txt = payload . decode ( ' utf-8 ' )
else :
payload_txt = u ' empty '
2016-10-18 08:45:03 +02:00
except UnicodeDecodeError :
2016-10-19 19:47:13 +02:00
payload_txt = u ' " {0} " ' . format ( repr ( payload ) . lstrip ( ' b ' ) [ 1 : - 1 ] )
if payload_txt == u ' Protocol major versions differ. ' :
2016-10-20 19:00:51 +02:00
if sshv == 2 and aconf . ssh1 :
audit ( aconf , 1 )
2016-09-15 17:00:09 +02:00
return
2016-10-19 19:47:13 +02:00
err = ' [exception] error reading packet ( {0} ) ' . format ( payload_txt )
2016-09-15 17:00:09 +02:00
else :
2016-10-19 19:47:13 +02:00
err_pair = None
2016-09-15 17:00:09 +02:00
if sshv == 1 and packet_type != SSH . Protocol . SMSG_PUBLIC_KEY :
2016-10-19 19:47:13 +02:00
err_pair = ( ' SMSG_PUBLIC_KEY ' , SSH . Protocol . SMSG_PUBLIC_KEY )
2016-09-15 17:00:09 +02:00
elif sshv == 2 and packet_type != SSH . Protocol . MSG_KEXINIT :
2016-10-19 19:47:13 +02:00
err_pair = ( ' MSG_KEXINIT ' , SSH . Protocol . MSG_KEXINIT )
if err_pair is not None :
2016-09-15 17:00:09 +02:00
fmt = ' [exception] did not receive {0} ( {1} ), ' + \
' instead received unknown message ( {2} ) '
2016-10-19 19:47:13 +02:00
err = fmt . format ( err_pair [ 0 ] , err_pair [ 1 ] , packet_type )
2017-04-05 17:12:26 +02:00
if err is not None :
2016-09-15 17:00:09 +02:00
output ( banner , header )
2016-08-12 15:20:32 +02:00
out . fail ( err )
2015-12-23 04:01:24 +01:00
sys . exit ( 1 )
2016-09-15 17:00:09 +02:00
if sshv == 1 :
pkm = SSH1 . PublicKeyMessage . parse ( payload )
2019-11-07 22:08:09 +01:00
if aconf . json :
2019-11-09 00:40:32 +01:00
print ( json . dumps ( build_struct ( banner , pkm = pkm ) , sort_keys = True ) )
2019-11-07 22:08:09 +01:00
else :
output ( banner , header , pkm = pkm )
2016-09-15 17:00:09 +02:00
elif sshv == 2 :
2016-10-06 01:59:15 +02:00
kex = SSH2 . Kex . parse ( payload )
2019-09-28 00:14:36 +02:00
if aconf . client_audit is False :
SSH2 . HostKeyTest . run ( s , kex )
SSH2 . GEXTest . run ( s , kex )
2019-11-07 22:08:09 +01:00
if aconf . json :
2019-11-14 19:52:36 +01:00
print ( json . dumps ( build_struct ( banner , kex = kex , client_host = s . client_host ) , sort_keys = True ) )
2019-11-07 22:08:09 +01:00
else :
2019-11-14 19:52:36 +01:00
output ( banner , header , client_host = s . client_host , kex = kex )
2016-09-15 17:00:09 +02:00
2016-10-19 19:47:13 +02:00
utils = Utils ( )
2016-10-13 16:53:01 +02:00
out = Output ( )
2019-09-04 21:05:07 +02:00
def main ( ) :
2016-10-07 18:55:31 +02:00
conf = AuditConf . from_cmdline ( sys . argv [ 1 : ] , usage )
2016-09-16 13:55:27 +02:00
audit ( conf )
2019-09-04 21:05:07 +02:00
if __name__ == ' __main__ ' : # pragma: nocover
main ( )