/* * This file is part of the SSH Library * * Copyright (c) 2010 by Aris Adamantiadis * * The SSH Library is free software; you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation; either version 2.1 of the License, or (at your * option) any later version. * * The SSH Library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public * License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with the SSH Library; see the file COPYING. If not, write to * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, * MA 02111-1307, USA. */ #include "config.h" #define LIBSSH_STATIC #include "torture.h" #include "torture_key.h" #include #include #include #include "session.c" #include "known_hosts.c" #define TMP_FILE_TEMPLATE "known_hosts_XXXXXX" #define BADRSA "AAAAB3NzaC1yc2EAAAADAQABAAABAQChm5" \ "a6Av65O8cKtx5YXOnui3wJnYE6A6J/I4kZSAibbn14Jcl+34VJQwv96f25AxNmo" \ "NwoiZV93IzdypQmiuieh6s6wB9WhYjU9K/6CkIpNhpCxswA90b3ePjS7LnR9B9J" \ "slPSbG1H0KC1c5lb7G3utXteXtM+4YvCvpN5VdC4CpghT+p0cwN2Na8Md5vRItz" \ "YgIytryNn7LLiwYfoSxvWigFrTTZsrVtCOYyNgklmffpGdzuC43wdANvTewfI9G" \ "o71r8EXmEc228CrYPmb8Scv3mpXFK/BosohSGkPlEHu9lf3YjnknBicDaVtJOYp" \ "wnXJPjZo2EhG79HxDRpjJHH" #define BADED25519 "AAAAC3NzaC1lZDI1NTE5AAAAIE74wHmKKkrxpW/dZ69pKPlMoWG9VvWfrNnUkWRQqaDa" static int sshd_setup(void **state) { torture_setup_sshd_server(state, false); return 0; } static int sshd_teardown(void **state) { torture_teardown_sshd_server(state); return 0; } static int session_setup(void **state) { struct torture_state *s = *state; int verbosity = torture_libssh_verbosity(); struct passwd *pwd; bool process_config = false; int rc; pwd = getpwnam("bob"); assert_non_null(pwd); rc = setuid(pwd->pw_uid); assert_return_code(rc, errno); s->ssh.session = ssh_new(); assert_non_null(s->ssh.session); ssh_options_set(s->ssh.session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); ssh_options_set(s->ssh.session, SSH_OPTIONS_PROCESS_CONFIG, &process_config); ssh_options_set(s->ssh.session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); ssh_options_set(s->ssh.session, SSH_OPTIONS_USER, TORTURE_SSH_USER_ALICE); return 0; } static int session_teardown(void **state) { struct torture_state *s = *state; ssh_disconnect(s->ssh.session); ssh_free(s->ssh.session); return 0; } static void torture_knownhosts_port(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; char buffer[200]; char *p; FILE *file; int rc; bool process_config = false; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_connect(session); assert_ssh_return_code(session, rc); session->opts.port = 1234; rc = ssh_write_knownhost(session); assert_ssh_return_code(session, rc); file = fopen(known_hosts_file, "r"); assert_non_null(file); p = fgets(buffer, sizeof(buffer), file); assert_non_null(p); fclose(file); buffer[sizeof(buffer) - 1] = '\0'; assert_non_null(strstr(buffer,"[127.0.0.10]:1234 ")); ssh_disconnect(session); ssh_free(session); /* Now, connect back to the ssh server and verify the known host line */ s->ssh.session = session = ssh_new(); ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &process_config); ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); free(known_hosts_file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); session->opts.port = 1234; rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_OK); } static void torture_knownhosts_wildcard(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; const char *key = NULL; FILE *file; int rc; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); file = fopen(known_hosts_file, "w"); assert_non_null(file); key = torture_get_testkey_pub(SSH_KEYTYPE_RSA); fprintf(file, "[127.0.0.10]:* %s\n", key); fclose(file); rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); free(known_hosts_file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_OK); } static void torture_knownhosts_standard_port(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; const char *key = NULL; FILE *file; int rc; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); file = fopen(known_hosts_file, "w"); assert_non_null(file); key = torture_get_testkey_pub(SSH_KEYTYPE_RSA); fprintf(file, "[127.0.0.10]:22 %s\n", key); fclose(file); rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); free(known_hosts_file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_OK); } static void torture_knownhosts_fail(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; FILE *file; int rc; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256"); assert_ssh_return_code(session, rc); file = fopen(known_hosts_file, "w"); assert_non_null(file); free(known_hosts_file); fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA); fclose(file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_CHANGED); } static void torture_knownhosts_other(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; FILE *file; int rc; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ecdsa-sha2-nistp521"); assert_ssh_return_code(session, rc); file = fopen(known_hosts_file, "w"); assert_non_null(file); free(known_hosts_file); fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA); fclose(file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_FOUND_OTHER); } static void torture_knownhosts_other_auto(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; int rc; bool process_config = false; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ecdsa-sha2-nistp521"); assert_ssh_return_code(session, rc); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_NOT_KNOWN); rc = ssh_write_knownhost(session); assert_ssh_return_code(session, rc); ssh_disconnect(session); ssh_free(session); /* connect again and check host key */ session = ssh_new(); assert_non_null(session); s->ssh.session = session; rc = ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &process_config); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_connect(session); assert_ssh_return_code(session, rc); /* ssh-rsa is the default but libssh should try ssh-ed25519 instead */ rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_OK); /* session will be freed by session_teardown() */ free(known_hosts_file); } static void torture_knownhosts_conflict(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; FILE *file; int rc; bool process_config = false; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256"); assert_ssh_return_code(session, rc); file = fopen(known_hosts_file, "w"); assert_non_null(file); fprintf(file, "127.0.0.10 ssh-rsa %s\n", BADRSA); fprintf(file, "127.0.0.10 ssh-ed25519 %s\n", BADED25519); fclose(file); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_CHANGED); rc = ssh_write_knownhost(session); assert_ssh_return_code(session, rc); ssh_disconnect(session); ssh_free(session); /* connect again and check host key */ session = ssh_new(); assert_non_null(session); s->ssh.session = session; rc = ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &process_config); assert_ssh_return_code(session, rc); ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256"); assert_ssh_return_code(session, rc); rc = ssh_connect(session); assert_ssh_return_code(session, rc); rc = ssh_is_server_known(session); assert_int_equal(rc, SSH_SERVER_KNOWN_OK); /* session will be freed by session_teardown() */ free(known_hosts_file); } static void torture_knownhosts_no_hostkeychecking(void **state) { struct torture_state *s = *state; ssh_session session = s->ssh.session; char tmp_file[1024] = {0}; char *known_hosts_file = NULL; enum ssh_known_hosts_e found; int strict_host_key_checking = 0; int rc; snprintf(tmp_file, sizeof(tmp_file), "%s/%s", s->socket_dir, TMP_FILE_TEMPLATE); known_hosts_file = torture_create_temp_file(tmp_file); assert_non_null(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); assert_ssh_return_code(session, rc); free(known_hosts_file); rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "ecdsa-sha2-nistp521"); assert_ssh_return_code(session, rc); rc = ssh_connect(session); assert_ssh_return_code(session, rc); found = ssh_session_is_known_server(session); assert_int_equal(found, SSH_KNOWN_HOSTS_UNKNOWN); rc = ssh_options_set(session, SSH_OPTIONS_STRICTHOSTKEYCHECK, &strict_host_key_checking); assert_ssh_return_code(session, rc); found = ssh_session_is_known_server(session); assert_int_equal(found, SSH_KNOWN_HOSTS_OK); } int torture_run_tests(void) { int rc; struct CMUnitTest tests[] = { cmocka_unit_test_setup_teardown(torture_knownhosts_wildcard, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_standard_port, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_port, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_fail, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_other, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_other_auto, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_conflict, session_setup, session_teardown), cmocka_unit_test_setup_teardown(torture_knownhosts_no_hostkeychecking, session_setup, session_teardown), }; ssh_init(); torture_filter_tests(tests); rc = cmocka_run_group_tests(tests, sshd_setup, sshd_teardown); ssh_finalize(); return rc; }