Line | Count | Source |
1 | | /* $OpenBSD: compat.c,v 1.127 2026/02/14 00:18:34 jsg Exp $ */ |
2 | | /* |
3 | | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. |
4 | | * |
5 | | * Redistribution and use in source and binary forms, with or without |
6 | | * modification, are permitted provided that the following conditions |
7 | | * are met: |
8 | | * 1. Redistributions of source code must retain the above copyright |
9 | | * notice, this list of conditions and the following disclaimer. |
10 | | * 2. Redistributions in binary form must reproduce the above copyright |
11 | | * notice, this list of conditions and the following disclaimer in the |
12 | | * documentation and/or other materials provided with the distribution. |
13 | | * |
14 | | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
15 | | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
16 | | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
17 | | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
18 | | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
19 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
20 | | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
21 | | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
22 | | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
23 | | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
24 | | */ |
25 | | |
26 | | #include "includes.h" |
27 | | |
28 | | #include <sys/types.h> |
29 | | |
30 | | #include <stdlib.h> |
31 | | #include <stdarg.h> |
32 | | |
33 | | #include "xmalloc.h" |
34 | | #include "packet.h" |
35 | | #include "compat.h" |
36 | | #include "log.h" |
37 | | #include "match.h" |
38 | | |
39 | | /* determine bug flags from SSH protocol banner */ |
40 | | void |
41 | | compat_banner(struct ssh *ssh, const char *version) |
42 | 98.9k | { |
43 | 98.9k | int i; |
44 | 98.9k | static struct { |
45 | 98.9k | char *pat; |
46 | 98.9k | int bugs; |
47 | 98.9k | } check[] = { |
48 | 98.9k | { "OpenSSH_2.*," |
49 | 98.9k | "OpenSSH_3.0*," |
50 | 98.9k | "OpenSSH_3.1*", SSH_BUG_EXTEOF|SSH_OLD_FORWARD_ADDR| |
51 | 98.9k | SSH_BUG_SIGTYPE}, |
52 | 98.9k | { "OpenSSH_3.*", SSH_OLD_FORWARD_ADDR|SSH_BUG_SIGTYPE }, |
53 | 98.9k | { "Sun_SSH_1.0*", SSH_BUG_NOREKEY|SSH_BUG_EXTEOF| |
54 | 98.9k | SSH_BUG_SIGTYPE}, |
55 | 98.9k | { "OpenSSH_2*," |
56 | 98.9k | "OpenSSH_3*," |
57 | 98.9k | "OpenSSH_4*", SSH_BUG_SIGTYPE }, |
58 | 98.9k | { "OpenSSH_5*", SSH_NEW_OPENSSH|SSH_BUG_DYNAMIC_RPORT| |
59 | 98.9k | SSH_BUG_SIGTYPE}, |
60 | 98.9k | { "OpenSSH_6.6.1*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE}, |
61 | 98.9k | { "OpenSSH_6.5*," |
62 | 98.9k | "OpenSSH_6.6*", SSH_NEW_OPENSSH|SSH_BUG_CURVE25519PAD| |
63 | 98.9k | SSH_BUG_SIGTYPE}, |
64 | 98.9k | { "OpenSSH_7.4*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE| |
65 | 98.9k | SSH_BUG_SIGTYPE74}, |
66 | 98.9k | { "OpenSSH_7.0*," |
67 | 98.9k | "OpenSSH_7.1*," |
68 | 98.9k | "OpenSSH_7.2*," |
69 | 98.9k | "OpenSSH_7.3*," |
70 | 98.9k | "OpenSSH_7.5*," |
71 | 98.9k | "OpenSSH_7.6*," |
72 | 98.9k | "OpenSSH_7.7*", SSH_NEW_OPENSSH|SSH_BUG_SIGTYPE}, |
73 | 98.9k | { "OpenSSH*", SSH_NEW_OPENSSH }, |
74 | 98.9k | { "*MindTerm*", 0 }, |
75 | 98.9k | { "3.0.*", SSH_BUG_DEBUG }, |
76 | 98.9k | { "3.0 SecureCRT*", SSH_OLD_SESSIONID }, |
77 | 98.9k | { "1.7 SecureFX*", SSH_OLD_SESSIONID }, |
78 | 98.9k | { "Cisco-1.*", SSH_BUG_DHGEX_LARGE| |
79 | 98.9k | SSH_BUG_HOSTKEYS }, |
80 | 98.9k | { "*SSH_Version_Mapper*", |
81 | 98.9k | SSH_BUG_SCANNER }, |
82 | 98.9k | { "PuTTY_Local:*," /* dev versions < Sep 2014 */ |
83 | 98.9k | "PuTTY-Release-0.5*," /* 0.50-0.57, DH-GEX in >=0.52 */ |
84 | 98.9k | "PuTTY_Release_0.5*," /* 0.58-0.59 */ |
85 | 98.9k | "PuTTY_Release_0.60*," |
86 | 98.9k | "PuTTY_Release_0.61*," |
87 | 98.9k | "PuTTY_Release_0.62*," |
88 | 98.9k | "PuTTY_Release_0.63*," |
89 | 98.9k | "PuTTY_Release_0.64*", |
90 | 98.9k | SSH_OLD_DHGEX }, |
91 | 98.9k | { "FuTTY*", SSH_OLD_DHGEX }, /* Putty Fork */ |
92 | 98.9k | { "Probe-*", |
93 | 98.9k | SSH_BUG_PROBE }, |
94 | 98.9k | { "TeraTerm SSH*," |
95 | 98.9k | "TTSSH/1.5.*," |
96 | 98.9k | "TTSSH/2.1*," |
97 | 98.9k | "TTSSH/2.2*," |
98 | 98.9k | "TTSSH/2.3*," |
99 | 98.9k | "TTSSH/2.4*," |
100 | 98.9k | "TTSSH/2.5*," |
101 | 98.9k | "TTSSH/2.6*," |
102 | 98.9k | "TTSSH/2.70*," |
103 | 98.9k | "TTSSH/2.71*," |
104 | 98.9k | "TTSSH/2.72*", SSH_BUG_HOSTKEYS }, |
105 | 98.9k | { "WinSCP_release_4*," |
106 | 98.9k | "WinSCP_release_5.0*," |
107 | 98.9k | "WinSCP_release_5.1," |
108 | 98.9k | "WinSCP_release_5.1.*," |
109 | 98.9k | "WinSCP_release_5.5," |
110 | 98.9k | "WinSCP_release_5.5.*," |
111 | 98.9k | "WinSCP_release_5.6," |
112 | 98.9k | "WinSCP_release_5.6.*," |
113 | 98.9k | "WinSCP_release_5.7," |
114 | 98.9k | "WinSCP_release_5.7.1," |
115 | 98.9k | "WinSCP_release_5.7.2," |
116 | 98.9k | "WinSCP_release_5.7.3," |
117 | 98.9k | "WinSCP_release_5.7.4", |
118 | 98.9k | SSH_OLD_DHGEX }, |
119 | 98.9k | { "ConfD-*", |
120 | 98.9k | SSH_BUG_UTF8TTYMODE }, |
121 | 98.9k | { "Twisted_*", 0 }, |
122 | 98.9k | { "Twisted*", SSH_BUG_DEBUG }, |
123 | 98.9k | { NULL, 0 } |
124 | 98.9k | }; |
125 | | |
126 | | /* process table, return first match */ |
127 | 98.9k | ssh->compat = 0; |
128 | 2.27M | for (i = 0; check[i].pat; i++) { |
129 | 2.18M | if (match_pattern_list(version, check[i].pat, 0) == 1) { |
130 | 13.1k | debug_f("match: %s pat %s compat 0x%08x", |
131 | 13.1k | version, check[i].pat, check[i].bugs); |
132 | 13.1k | ssh->compat = check[i].bugs; |
133 | 13.1k | return; |
134 | 13.1k | } |
135 | 2.18M | } |
136 | 85.7k | debug_f("no match: %s", version); |
137 | 85.7k | } |
138 | | |
139 | | /* Always returns pointer to allocated memory, caller must free. */ |
140 | | char * |
141 | | compat_kex_proposal(struct ssh *ssh, const char *p) |
142 | 191k | { |
143 | 191k | char *cp = NULL, *cp2 = NULL; |
144 | | |
145 | 191k | if ((ssh->compat & (SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX)) == 0) |
146 | 191k | return xstrdup(p); |
147 | 0 | debug2_f("original KEX proposal: %s", p); |
148 | 0 | if ((ssh->compat & SSH_BUG_CURVE25519PAD) != 0) |
149 | 0 | if ((cp = match_filter_denylist(p, |
150 | 0 | "curve25519-sha256@libssh.org")) == NULL) |
151 | 0 | fatal("match_filter_denylist failed"); |
152 | 0 | if ((ssh->compat & SSH_OLD_DHGEX) != 0) { |
153 | 0 | if ((cp2 = match_filter_denylist(cp ? cp : p, |
154 | 0 | "diffie-hellman-group-exchange-sha256," |
155 | 0 | "diffie-hellman-group-exchange-sha1")) == NULL) |
156 | 0 | fatal("match_filter_denylist failed"); |
157 | 0 | free(cp); |
158 | 0 | cp = cp2; |
159 | 0 | } |
160 | 0 | if (cp == NULL || *cp == '\0') |
161 | 0 | fatal("No supported key exchange algorithms found"); |
162 | 0 | debug2_f("compat KEX proposal: %s", cp); |
163 | 0 | return cp; |
164 | 0 | } |
165 | | |