| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.sshd.server.auth.pubkey; |
| |
| import java.security.PublicKey; |
| import java.security.SignatureException; |
| import java.util.Collection; |
| import java.util.List; |
| |
| import org.apache.sshd.common.NamedFactory; |
| import org.apache.sshd.common.NamedResource; |
| import org.apache.sshd.common.RuntimeSshException; |
| import org.apache.sshd.common.SshConstants; |
| import org.apache.sshd.common.config.keys.KeyUtils; |
| import org.apache.sshd.common.signature.Signature; |
| import org.apache.sshd.common.signature.SignatureFactoriesManager; |
| import org.apache.sshd.common.util.GenericUtils; |
| import org.apache.sshd.common.util.ValidateUtils; |
| import org.apache.sshd.common.util.buffer.Buffer; |
| import org.apache.sshd.common.util.buffer.BufferUtils; |
| import org.apache.sshd.common.util.buffer.ByteArrayBuffer; |
| import org.apache.sshd.server.auth.AbstractUserAuth; |
| import org.apache.sshd.server.session.ServerSession; |
| |
| /** |
| * TODO Add javadoc |
| * |
| * @author <a href="mailto:dev@mina.apache.org">Apache MINA SSHD Project</a> |
| */ |
| public class UserAuthPublicKey extends AbstractUserAuth implements SignatureFactoriesManager { |
| public static final String NAME = UserAuthPublicKeyFactory.NAME; |
| |
| private List<NamedFactory<Signature>> factories; |
| |
| public UserAuthPublicKey() { |
| this(null); |
| } |
| |
| public UserAuthPublicKey(List<NamedFactory<Signature>> factories) { |
| super(NAME); |
| this.factories = factories; // OK if null/empty |
| } |
| |
| @Override |
| public List<NamedFactory<Signature>> getSignatureFactories() { |
| return factories; |
| } |
| |
| @Override |
| public void setSignatureFactories(List<NamedFactory<Signature>> factories) { |
| this.factories = factories; |
| } |
| |
| @Override |
| public Boolean doAuth(Buffer buffer, boolean init) throws Exception { |
| ValidateUtils.checkTrue(init, "Instance not initialized"); |
| |
| boolean hasSig = buffer.getBoolean(); |
| String alg = buffer.getString(); |
| int oldLim = buffer.wpos(); |
| int oldPos = buffer.rpos(); |
| int len = buffer.getInt(); |
| buffer.wpos(buffer.rpos() + len); |
| |
| ServerSession session = getServerSession(); |
| String username = getUsername(); |
| PublicKey key = buffer.getRawPublicKey(); |
| Collection<NamedFactory<Signature>> factories = |
| ValidateUtils.checkNotNullAndNotEmpty( |
| SignatureFactoriesManager.resolveSignatureFactories(this, session), |
| "No signature factories for session=%s", |
| session); |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth({}@{}) verify key type={}, factories={}, fingerprint={}", |
| username, session, alg, NamedResource.Utils.getNames(factories), KeyUtils.getFingerPrint(key)); |
| } |
| |
| Signature verifier = ValidateUtils.checkNotNull( |
| NamedFactory.Utils.create(factories, alg), |
| "No verifier located for algorithm=%s", |
| alg); |
| verifier.initVerifier(key); |
| buffer.wpos(oldLim); |
| |
| byte[] sig = hasSig ? buffer.getBytes() : null; |
| PublickeyAuthenticator authenticator = session.getPublickeyAuthenticator(); |
| if (authenticator == null) { |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth({}@{}) key type={}, fingerprint={} - no authenticator", |
| username, session, alg, KeyUtils.getFingerPrint(key)); |
| } |
| return Boolean.FALSE; |
| } |
| |
| boolean authed; |
| try { |
| authed = authenticator.authenticate(username, key, session); |
| } catch (Error e) { |
| log.warn("doAuth({}@{}) failed ({}) to consult delegate for {} key={}: {}", |
| username, session, e.getClass().getSimpleName(), alg, KeyUtils.getFingerPrint(key), e.getMessage()); |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth(" + username + "@" + session + ") delegate failure details", e); |
| } |
| |
| throw new RuntimeSshException(e); |
| } |
| |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth({}@{}) key type={}, fingerprint={} - authentication result: {}", |
| username, session, alg, KeyUtils.getFingerPrint(key), authed); |
| } |
| |
| if (!authed) { |
| return Boolean.FALSE; |
| } |
| |
| if (!hasSig) { |
| sendPublicKeyResponse(session, username, alg, key, buffer.array(), oldPos, 4 + len, buffer); |
| return null; |
| } |
| |
| buffer.rpos(oldPos); |
| buffer.wpos(oldPos + 4 + len); |
| if (!verifySignature(session, getService(), getName(), username, alg, key, buffer, verifier, sig)) { |
| throw new SignatureException("Key verification failed"); |
| } |
| |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth({}@{}) key type={}, fingerprint={} - verified", |
| username, session, alg, KeyUtils.getFingerPrint(key)); |
| } |
| |
| return Boolean.TRUE; |
| } |
| |
| protected boolean verifySignature(ServerSession session, String service, String name, String username, |
| String alg, PublicKey key, Buffer buffer, Signature verifier, byte[] sig) throws Exception { |
| byte[] id = session.getSessionId(); |
| Buffer buf = new ByteArrayBuffer(id.length + username.length() + service.length() + name.length() |
| + alg.length() + ByteArrayBuffer.DEFAULT_SIZE + Long.SIZE, false); |
| buf.putBytes(id); |
| buf.putByte(SshConstants.SSH_MSG_USERAUTH_REQUEST); |
| buf.putString(username); |
| buf.putString(service); |
| buf.putString(name); |
| buf.putBoolean(true); |
| buf.putString(alg); |
| buf.putBuffer(buffer); |
| |
| if (log.isTraceEnabled()) { |
| log.trace("verifySignature({}@{})[{}][{}] key type={}, fingerprint={} - verification data={}", |
| username, session, service, name, alg, KeyUtils.getFingerPrint(key), buf.toHex()); |
| log.trace("verifySignature({}@{})[{}][{}] key type={}, fingerprint={} - expected signature={}", |
| username, session, service, name, alg, KeyUtils.getFingerPrint(key), BufferUtils.toHex(sig)); |
| } |
| |
| verifier.update(buf.array(), buf.rpos(), buf.available()); |
| return verifier.verify(sig); |
| } |
| |
| protected void sendPublicKeyResponse(ServerSession session, String username, String alg, PublicKey key, |
| byte[] keyBlob, int offset, int blobLen, Buffer buffer) throws Exception { |
| if (log.isDebugEnabled()) { |
| log.debug("doAuth({}@{}) send SSH_MSG_USERAUTH_PK_OK for key type={}, fingerprint={}", |
| username, session, alg, KeyUtils.getFingerPrint(key)); |
| } |
| |
| Buffer buf = session.createBuffer(SshConstants.SSH_MSG_USERAUTH_PK_OK, |
| GenericUtils.length(alg) + blobLen + Integer.SIZE); |
| buf.putString(alg); |
| buf.putRawBytes(keyBlob, offset, blobLen); |
| session.writePacket(buf); |
| } |
| } |