Line | Count | Source (jump to first uncovered line) |
1 | | /* $OpenBSD: compat.c,v 1.126 2023/03/06 12:14:48 dtucker Exp $ */ |
2 | | /* |
3 | | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. |
4 | | * |
5 | | * Redistribution and use in source and binary forms, with or without |
6 | | * modification, are permitted provided that the following conditions |
7 | | * are met: |
8 | | * 1. Redistributions of source code must retain the above copyright |
9 | | * notice, this list of conditions and the following disclaimer. |
10 | | * 2. Redistributions in binary form must reproduce the above copyright |
11 | | * notice, this list of conditions and the following disclaimer in the |
12 | | * documentation and/or other materials provided with the distribution. |
13 | | * |
14 | | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
15 | | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
16 | | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
17 | | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
18 | | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
19 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
20 | | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
21 | | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
22 | | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
23 | | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
24 | | */ |
25 | | |
26 | | #include "includes.h" |
27 | | |
28 | | #include <sys/types.h> |
29 | | |
30 | | #include <stdlib.h> |
31 | | #include <string.h> |
32 | | #include <stdarg.h> |
33 | | |
34 | | #include "xmalloc.h" |
35 | | #include "packet.h" |
36 | | #include "compat.h" |
37 | | #include "log.h" |
38 | | #include "match.h" |
39 | | |
40 | | /* determine bug flags from SSH protocol banner */ |
41 | | void |
42 | | compat_banner(struct ssh *ssh, const char *version) |
43 | 25.3k | { |
44 | 25.3k | int i; |
45 | 25.3k | static struct { |
46 | 25.3k | char *pat; |
47 | 25.3k | int bugs; |
48 | 25.3k | } check[] = { |
49 | 25.3k | { "OpenSSH_2.*," |
50 | 25.3k | "OpenSSH_3.0*," |
51 | 25.3k | "OpenSSH_3.1*", SSH_BUG_EXTEOF|SSH_OLD_FORWARD_ADDR| |
52 | 25.3k | SSH_BUG_SIGTYPE}, |
53 | 25.3k | { "OpenSSH_3.*", SSH_OLD_FORWARD_ADDR|SSH_BUG_SIGTYPE }, |
54 | 25.3k | { "Sun_SSH_1.0*", SSH_BUG_NOREKEY|SSH_BUG_EXTEOF| |
55 | 25.3k | SSH_BUG_SIGTYPE}, |
56 | 25.3k | { "OpenSSH_2*," |
57 | 25.3k | "OpenSSH_3*," |
58 | 25.3k | "OpenSSH_4*", SSH_BUG_SIGTYPE }, |
59 | 25.3k | { "OpenSSH_5*", SSH_NEW_OPENSSH|SSH_BUG_DYNAMIC_RPORT| |
60 | 25.3k | SSH_BUG_SIGTYPE}, |
61 | 25.3k | { "OpenSSH_6.6.1*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE}, |
62 | 25.3k | { "OpenSSH_6.5*," |
63 | 25.3k | "OpenSSH_6.6*", SSH_NEW_OPENSSH|SSH_BUG_CURVE25519PAD| |
64 | 25.3k | SSH_BUG_SIGTYPE}, |
65 | 25.3k | { "OpenSSH_7.4*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE| |
66 | 25.3k | SSH_BUG_SIGTYPE74}, |
67 | 25.3k | { "OpenSSH_7.0*," |
68 | 25.3k | "OpenSSH_7.1*," |
69 | 25.3k | "OpenSSH_7.2*," |
70 | 25.3k | "OpenSSH_7.3*," |
71 | 25.3k | "OpenSSH_7.5*," |
72 | 25.3k | "OpenSSH_7.6*," |
73 | 25.3k | "OpenSSH_7.7*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE}, |
74 | 25.3k | { "OpenSSH*", SSH_NEW_OPENSSH }, |
75 | 25.3k | { "*MindTerm*", 0 }, |
76 | 25.3k | { "3.0.*", SSH_BUG_DEBUG }, |
77 | 25.3k | { "3.0 SecureCRT*", SSH_OLD_SESSIONID }, |
78 | 25.3k | { "1.7 SecureFX*", SSH_OLD_SESSIONID }, |
79 | 25.3k | { "Cisco-1.*", SSH_BUG_DHGEX_LARGE| |
80 | 25.3k | SSH_BUG_HOSTKEYS }, |
81 | 25.3k | { "*SSH_Version_Mapper*", |
82 | 25.3k | SSH_BUG_SCANNER }, |
83 | 25.3k | { "PuTTY_Local:*," /* dev versions < Sep 2014 */ |
84 | 25.3k | "PuTTY-Release-0.5*," /* 0.50-0.57, DH-GEX in >=0.52 */ |
85 | 25.3k | "PuTTY_Release_0.5*," /* 0.58-0.59 */ |
86 | 25.3k | "PuTTY_Release_0.60*," |
87 | 25.3k | "PuTTY_Release_0.61*," |
88 | 25.3k | "PuTTY_Release_0.62*," |
89 | 25.3k | "PuTTY_Release_0.63*," |
90 | 25.3k | "PuTTY_Release_0.64*", |
91 | 25.3k | SSH_OLD_DHGEX }, |
92 | 25.3k | { "FuTTY*", SSH_OLD_DHGEX }, /* Putty Fork */ |
93 | 25.3k | { "Probe-*", |
94 | 25.3k | SSH_BUG_PROBE }, |
95 | 25.3k | { "TeraTerm SSH*," |
96 | 25.3k | "TTSSH/1.5.*," |
97 | 25.3k | "TTSSH/2.1*," |
98 | 25.3k | "TTSSH/2.2*," |
99 | 25.3k | "TTSSH/2.3*," |
100 | 25.3k | "TTSSH/2.4*," |
101 | 25.3k | "TTSSH/2.5*," |
102 | 25.3k | "TTSSH/2.6*," |
103 | 25.3k | "TTSSH/2.70*," |
104 | 25.3k | "TTSSH/2.71*," |
105 | 25.3k | "TTSSH/2.72*", SSH_BUG_HOSTKEYS }, |
106 | 25.3k | { "WinSCP_release_4*," |
107 | 25.3k | "WinSCP_release_5.0*," |
108 | 25.3k | "WinSCP_release_5.1," |
109 | 25.3k | "WinSCP_release_5.1.*," |
110 | 25.3k | "WinSCP_release_5.5," |
111 | 25.3k | "WinSCP_release_5.5.*," |
112 | 25.3k | "WinSCP_release_5.6," |
113 | 25.3k | "WinSCP_release_5.6.*," |
114 | 25.3k | "WinSCP_release_5.7," |
115 | 25.3k | "WinSCP_release_5.7.1," |
116 | 25.3k | "WinSCP_release_5.7.2," |
117 | 25.3k | "WinSCP_release_5.7.3," |
118 | 25.3k | "WinSCP_release_5.7.4", |
119 | 25.3k | SSH_OLD_DHGEX }, |
120 | 25.3k | { "ConfD-*", |
121 | 25.3k | SSH_BUG_UTF8TTYMODE }, |
122 | 25.3k | { "Twisted_*", 0 }, |
123 | 25.3k | { "Twisted*", SSH_BUG_DEBUG }, |
124 | 25.3k | { NULL, 0 } |
125 | 25.3k | }; |
126 | | |
127 | | /* process table, return first match */ |
128 | 25.3k | ssh->compat = 0; |
129 | 576k | for (i = 0; check[i].pat; i++) { |
130 | 554k | if (match_pattern_list(version, check[i].pat, 0) == 1) { |
131 | 3.76k | debug_f("match: %s pat %s compat 0x%08x", |
132 | 3.76k | version, check[i].pat, check[i].bugs); |
133 | 3.76k | ssh->compat = check[i].bugs; |
134 | | /* Check to see if the remote side is OpenSSH and not HPN */ |
135 | | /* TODO: See if we can work this into the new method for bug checks */ |
136 | 3.76k | if (strstr(version, "OpenSSH") != NULL) { |
137 | 3.60k | if (strstr(version, "hpn")) { |
138 | 240 | ssh->compat |= SSH_HPNSSH; |
139 | 240 | debug("Remote is HPN enabled"); |
140 | 240 | } |
141 | | /* this checks to see if the remote |
142 | | * version string indicates that we |
143 | | * have access to hpn prefixed binaries |
144 | | * You'll need to change this to include |
145 | | * new major version numbers. Which is |
146 | | * why we should figure out how to make |
147 | | * the match pattern list work |
148 | | */ |
149 | 3.60k | if ((strstr(version, "hpn16") != NULL) || |
150 | 3.60k | (strstr(version, "hpn17") != NULL) || |
151 | 3.60k | (strstr(version, "hpn18") != NULL)) { |
152 | 180 | ssh->compat |= SSH_HPNSSH_PREFIX; |
153 | 180 | debug("Remote uses HPNSSH prefixes."); |
154 | 180 | break; |
155 | 180 | } |
156 | | /* if it's openssh and not hpn */ |
157 | 3.42k | if ((strstr(version, "OpenSSH_8.9") != NULL) || |
158 | 3.42k | (strstr(version, "OpenSSH_9") != NULL)) { |
159 | 180 | ssh->compat |= SSH_RESTRICT_WINDOW; |
160 | 180 | debug("Restricting adverstised window size."); |
161 | 180 | } |
162 | 3.42k | } |
163 | 3.58k | debug("ssh->compat is %u", ssh->compat); |
164 | 3.58k | return; |
165 | 3.76k | } |
166 | 554k | } |
167 | 21.8k | debug_f("no match: %s", version); |
168 | 21.8k | } |
169 | | |
170 | | /* Always returns pointer to allocated memory, caller must free. */ |
171 | | char * |
172 | | compat_kex_proposal(struct ssh *ssh, const char *p) |
173 | 69.2k | { |
174 | 69.2k | char *cp = NULL, *cp2 = NULL; |
175 | | |
176 | 69.2k | if ((ssh->compat & (SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX)) == 0) |
177 | 69.2k | return xstrdup(p); |
178 | 0 | debug2_f("original KEX proposal: %s", p); |
179 | 0 | if ((ssh->compat & SSH_BUG_CURVE25519PAD) != 0) |
180 | 0 | if ((cp = match_filter_denylist(p, |
181 | 0 | "curve25519-sha256@libssh.org")) == NULL) |
182 | 0 | fatal("match_filter_denylist failed"); |
183 | 0 | if ((ssh->compat & SSH_OLD_DHGEX) != 0) { |
184 | 0 | if ((cp2 = match_filter_denylist(cp ? cp : p, |
185 | 0 | "diffie-hellman-group-exchange-sha256," |
186 | 0 | "diffie-hellman-group-exchange-sha1")) == NULL) |
187 | 0 | fatal("match_filter_denylist failed"); |
188 | 0 | free(cp); |
189 | 0 | cp = cp2; |
190 | 0 | } |
191 | 0 | if (cp == NULL || *cp == '\0') |
192 | 0 | fatal("No supported key exchange algorithms found"); |
193 | 0 | debug2_f("compat KEX proposal: %s", cp); |
194 | 0 | return cp; |
195 | 0 | } |