blob: cbfe893242d3293c495b21f4cccba1e57ea35b6d [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.sshd.client.auth.pubkey;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.util.ArrayList;
import java.util.List;
import org.apache.sshd.client.SshClient;
import org.apache.sshd.client.session.ClientSession;
import org.apache.sshd.common.auth.UserAuthMethodFactory;
import org.apache.sshd.common.config.keys.KeyUtils;
import org.apache.sshd.server.SshServer;
import org.apache.sshd.server.auth.hostbased.RejectAllHostBasedAuthenticator;
import org.apache.sshd.server.auth.password.RejectAllPasswordAuthenticator;
import org.apache.sshd.util.test.BaseTestSupport;
import org.apache.sshd.util.test.CoreTestSupportUtils;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
public class InvalidRsaKeyAuthTest extends BaseTestSupport {
private SshServer sshd;
private SshClient client;
private int port;
private KeyPair ecKeyUser;
public InvalidRsaKeyAuthTest() {
super();
}
@Before
public void setupClientAndServer() throws Exception {
sshd = CoreTestSupportUtils.setupTestServer(InvalidRsaKeyAuthTest.class);
sshd.setPasswordAuthenticator(RejectAllPasswordAuthenticator.INSTANCE);
sshd.setHostBasedAuthenticator(RejectAllHostBasedAuthenticator.INSTANCE);
// Generate an EC key to be used as real user key. Just any non-RSA key will do.
KeyPairGenerator generator = KeyPairGenerator.getInstance(KeyUtils.EC_ALGORITHM);
generator.initialize(256);
ecKeyUser = generator.generateKeyPair();
sshd.setPublickeyAuthenticator((username, key, session) -> KeyUtils.compareKeys(key, ecKeyUser.getPublic()));
sshd.start();
port = sshd.getPort();
client = CoreTestSupportUtils.setupTestClient(InvalidRsaKeyAuthTest.class);
client.setUserAuthFactoriesNames(UserAuthMethodFactory.PUBLIC_KEY);
client.start();
}
@After
public void teardownClientAndServer() throws Exception {
if (sshd != null) {
try {
sshd.stop(true);
} finally {
sshd = null;
}
}
if (client != null) {
try {
client.stop();
} finally {
client = null;
}
}
}
// SSHD-1231
@Test
public void testConnectWithWrongRsaKeyFirst() throws Exception {
// Generate an RSA key the client will try first, and which the server will reject.
KeyPairGenerator generator = KeyPairGenerator.getInstance(KeyUtils.RSA_ALGORITHM);
generator.initialize(2048);
KeyPair rsaKey = generator.generateKeyPair();
try (ClientSession session = createClientSession(client, port)) {
session.setKeyIdentityProvider(ctx -> {
List<KeyPair> result = new ArrayList<>();
result.add(rsaKey);
result.add(ecKeyUser);
return result;
});
session.auth().verify(AUTH_TIMEOUT);
}
// Fails with an exception in SSHD-1231; if fixed authentication succeeds.
}
}