2020-10-15 20:34:23 +02:00
"""
The MIT License ( MIT )
2021-01-20 21:27:38 +01:00
Copyright ( C ) 2017 - 2021 Joe Testa ( jtesta @positronsecurity.com )
2020-10-15 20:34:23 +02:00
Permission is hereby granted , free of charge , to any person obtaining a copy
of this software and associated documentation files ( the " Software " ) , to deal
in the Software without restriction , including without limitation the rights
to use , copy , modify , merge , publish , distribute , sublicense , and / or sell
copies of the Software , and to permit persons to whom the Software is
furnished to do so , subject to the following conditions :
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software .
THE SOFTWARE IS PROVIDED " AS IS " , WITHOUT WARRANTY OF ANY KIND , EXPRESS OR
IMPLIED , INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY ,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT . IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM , DAMAGES OR OTHER
LIABILITY , WHETHER IN AN ACTION OF CONTRACT , TORT OR OTHERWISE , ARISING FROM ,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE .
"""
2022-03-14 01:58:22 +01:00
import traceback
2020-10-15 20:34:23 +02:00
# pylint: disable=unused-import
from typing import Dict , List , Set , Sequence , Tuple , Iterable # noqa: F401
from typing import Callable , Optional , Union , Any # noqa: F401
from ssh_audit . kexdh import KexGroupExchange_SHA1 , KexGroupExchange_SHA256
from ssh_audit . ssh2_kexdb import SSH2_KexDB
from ssh_audit . ssh2_kex import SSH2_Kex
from ssh_audit . ssh_socket import SSH_Socket
2021-03-02 17:06:40 +01:00
from ssh_audit . outputbuffer import OutputBuffer
2022-02-16 22:01:22 +01:00
from ssh_audit import exitcodes
2020-10-15 20:34:23 +02:00
# Performs DH group exchanges to find what moduli are supported, and checks
# their size.
class GEXTest :
# Creates a new connection to the server. Returns True on success, or False.
@staticmethod
2021-03-02 17:06:40 +01:00
def reconnect ( out : ' OutputBuffer ' , s : ' SSH_Socket ' , kex : ' SSH2_Kex ' , gex_alg : str ) - > bool :
2020-10-15 20:34:23 +02:00
if s . is_connected ( ) :
return True
2021-03-02 17:25:37 +01:00
err = s . connect ( )
2020-10-15 20:34:23 +02:00
if err is not None :
2021-03-02 17:06:40 +01:00
out . v ( err , write_now = True )
2020-10-15 20:34:23 +02:00
return False
2021-03-02 17:25:37 +01:00
_ , _ , err = s . get_banner ( )
2020-10-15 20:34:23 +02:00
if err is not None :
2021-03-02 17:06:40 +01:00
out . v ( err , write_now = True )
2020-10-15 20:34:23 +02:00
s . close ( )
return False
# Send our KEX using the specified group-exchange and most of the
# server's own values.
2021-03-02 17:25:37 +01:00
s . send_kexinit ( key_exchanges = [ gex_alg ] , hostkeys = kex . key_algorithms , ciphers = kex . server . encryption , macs = kex . server . mac , compressions = kex . server . compression , languages = kex . server . languages )
2021-01-20 21:27:38 +01:00
2021-05-25 01:50:25 +02:00
try :
# Parse the server's KEX.
_ , payload = s . read_packet ( 2 )
SSH2_Kex . parse ( payload )
except Exception :
out . v ( " Failed to parse server ' s kex. Stack trace: \n %s " % str ( traceback . format_exc ( ) ) , write_now = True )
return False
2021-01-20 21:27:38 +01:00
2020-10-15 20:34:23 +02:00
return True
2022-02-16 22:01:22 +01:00
@staticmethod
2022-03-14 01:58:22 +01:00
def granular_modulus_size_test ( out : ' OutputBuffer ' , s : ' SSH_Socket ' , kex : ' SSH2_Kex ' , bits_min : int , bits_pref : int , bits_max : int , modulus_dict : Dict [ str , List [ int ] ] ) - > int :
2022-02-16 22:01:22 +01:00
'''
2022-03-14 01:58:22 +01:00
Tests for granular modulus sizes .
2022-02-16 22:01:22 +01:00
Builds a dictionary , where a key represents a DH algorithm name and the
values are the modulus sizes ( in bits ) that have been returned by the
target server .
Returns an exitcodes . * flag .
'''
retval = exitcodes . GOOD
out . d ( " Starting modulus_size_test... " )
out . d ( " Bits Min: " + str ( bits_min ) )
out . d ( " Bits Pref: " + str ( bits_pref ) )
out . d ( " Bits Max: " + str ( bits_max ) )
GEX_ALGS = {
' diffie-hellman-group-exchange-sha1 ' : KexGroupExchange_SHA1 ,
' diffie-hellman-group-exchange-sha256 ' : KexGroupExchange_SHA256 ,
}
# Check if the server supports any of the group-exchange
# algorithms. If so, test each one.
2022-03-14 01:58:22 +01:00
for gex_alg , kex_group_class in GEX_ALGS . items ( ) :
2022-02-16 22:01:22 +01:00
if gex_alg not in kex . kex_algorithms :
out . d ( ' Server does not support the algorithm " ' + gex_alg + ' " . ' , write_now = True )
else :
2022-03-14 01:58:22 +01:00
kex_group = kex_group_class ( )
2022-02-16 22:01:22 +01:00
out . d ( ' Preparing to perform DH group exchange using ' + gex_alg + ' with min, pref and max modulus sizes of ' + str ( bits_min ) + ' bits, ' + str ( bits_pref ) + ' bits and ' + str ( bits_max ) + ' bits... ' , write_now = True )
# It has been observed that reconnecting to some SSH servers
# multiple times in quick succession can eventually result
# in a "connection reset by peer" error. It may be possible
# to recover from such an error by sleeping for some time
# before continuing to issue reconnects.
if GEXTest . reconnect ( out , s , kex , gex_alg ) is False :
out . fail ( ' Reconnect failed. ' )
return exitcodes . FAILURE
try :
modulus_size_returned = None
kex_group . send_init_gex ( s , bits_min , bits_pref , bits_max )
kex_group . recv_reply ( s , False )
modulus_size_returned = kex_group . get_dh_modulus_size ( )
out . d ( ' Modulus size returned by server: ' + str ( modulus_size_returned ) + ' bits ' , write_now = True )
2022-03-14 01:58:22 +01:00
except Exception :
out . d ( ' [exception] ' + str ( traceback . format_exc ( ) ) , write_now = True )
2022-02-16 22:01:22 +01:00
finally :
# The server is in a state that is not re-testable,
# so there's nothing else to do with this open
# connection.
s . close ( )
if modulus_size_returned is not None :
if gex_alg in modulus_dict :
if modulus_size_returned not in modulus_dict [ gex_alg ] :
modulus_dict [ gex_alg ] . append ( modulus_size_returned )
else :
modulus_dict [ gex_alg ] = [ modulus_size_returned ]
return retval
2020-10-15 20:34:23 +02:00
# Runs the DH moduli test against the specified target.
@staticmethod
2021-03-02 17:06:40 +01:00
def run ( out : ' OutputBuffer ' , s : ' SSH_Socket ' , kex : ' SSH2_Kex ' ) - > None :
2020-10-15 20:34:23 +02:00
GEX_ALGS = {
' diffie-hellman-group-exchange-sha1 ' : KexGroupExchange_SHA1 ,
' diffie-hellman-group-exchange-sha256 ' : KexGroupExchange_SHA256 ,
}
# The previous RSA tests put the server in a state we can't
# test. So we need a new connection to start with a clean
# slate.
if s . is_connected ( ) :
s . close ( )
# Check if the server supports any of the group-exchange
# algorithms. If so, test each one.
2021-08-25 19:28:30 +02:00
for gex_alg , kex_group_class in GEX_ALGS . items ( ) :
2020-10-15 20:34:23 +02:00
if gex_alg in kex . kex_algorithms :
2022-03-14 01:58:22 +01:00
out . d ( ' Preparing to perform DH group exchange using ' + gex_alg + ' with min, pref and max modulus sizes of 512 bits, 1024 bits and 1536 bits... ' , write_now = True )
2020-10-15 20:34:23 +02:00
2021-03-02 17:06:40 +01:00
if GEXTest . reconnect ( out , s , kex , gex_alg ) is False :
2020-10-15 20:34:23 +02:00
break
2021-08-25 19:28:30 +02:00
kex_group = kex_group_class ( )
2020-10-15 20:34:23 +02:00
smallest_modulus = - 1
# First try a range of weak sizes.
try :
2022-03-14 01:58:22 +01:00
kex_group . send_init_gex ( s , 512 , 1024 , 1536 )
2020-10-15 20:34:23 +02:00
kex_group . recv_reply ( s , False )
# Its been observed that servers will return a group
# larger than the requested max. So just because we
# got here, doesn't mean the server is vulnerable...
smallest_modulus = kex_group . get_dh_modulus_size ( )
2022-02-16 22:01:22 +01:00
out . d ( ' Modulus size returned by server: ' + str ( smallest_modulus ) + ' bits ' , write_now = True )
2020-10-15 20:34:23 +02:00
2022-03-14 01:58:22 +01:00
except Exception :
out . d ( ' [exception] ' + str ( traceback . format_exc ( ) ) , write_now = True )
2020-10-15 20:34:23 +02:00
finally :
s . close ( )
# Try an array of specific modulus sizes... one at a time.
reconnect_failed = False
for bits in [ 512 , 768 , 1024 , 1536 , 2048 , 3072 , 4096 ] :
# If we found one modulus size already, but we're about
# to test a larger one, don't bother.
if bits > = smallest_modulus > 0 :
break
2022-02-16 22:01:22 +01:00
out . d ( ' Preparing to perform DH group exchange using ' + gex_alg + ' with min, pref and max modulus sizes of ' + str ( bits ) + ' bits... ' , write_now = True )
2021-03-02 17:06:40 +01:00
if GEXTest . reconnect ( out , s , kex , gex_alg ) is False :
2020-10-15 20:34:23 +02:00
reconnect_failed = True
break
try :
kex_group . send_init_gex ( s , bits , bits , bits )
kex_group . recv_reply ( s , False )
smallest_modulus = kex_group . get_dh_modulus_size ( )
2022-02-16 22:01:22 +01:00
out . d ( ' Modulus size returned by server: ' + str ( smallest_modulus ) + ' bits ' , write_now = True )
2022-03-14 01:58:22 +01:00
except Exception :
out . d ( ' [exception] ' + str ( traceback . format_exc ( ) ) , write_now = True )
2020-10-15 20:34:23 +02:00
finally :
# The server is in a state that is not re-testable,
# so there's nothing else to do with this open
# connection.
s . close ( )
if smallest_modulus > 0 :
kex . set_dh_modulus_size ( gex_alg , smallest_modulus )
# We flag moduli smaller than 2048 as a failure.
if smallest_modulus < 2048 :
text = ' using small %d -bit modulus ' % smallest_modulus
lst = SSH2_KexDB . ALGORITHMS [ ' kex ' ] [ gex_alg ]
# For 'diffie-hellman-group-exchange-sha256', add
# a failure reason.
if len ( lst ) == 1 :
lst . append ( [ text ] )
# For 'diffie-hellman-group-exchange-sha1', delete
# the existing failure reason (which is vague), and
# insert our own.
else :
del lst [ 1 ]
lst . insert ( 1 , [ text ] )
if reconnect_failed :
break