net-ssh-backports 6.3.0.backports
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.github/workflows/ci.yml +93 -0
- data/.gitignore +13 -0
- data/.rubocop.yml +21 -0
- data/.rubocop_todo.yml +1074 -0
- data/.travis.yml +51 -0
- data/CHANGES.txt +698 -0
- data/Gemfile +13 -0
- data/Gemfile.noed25519 +12 -0
- data/ISSUE_TEMPLATE.md +30 -0
- data/LICENSE.txt +19 -0
- data/Manifest +132 -0
- data/README.md +287 -0
- data/Rakefile +105 -0
- data/THANKS.txt +110 -0
- data/appveyor.yml +58 -0
- data/lib/net/ssh/authentication/agent.rb +284 -0
- data/lib/net/ssh/authentication/certificate.rb +183 -0
- data/lib/net/ssh/authentication/constants.rb +20 -0
- data/lib/net/ssh/authentication/ed25519.rb +185 -0
- data/lib/net/ssh/authentication/ed25519_loader.rb +31 -0
- data/lib/net/ssh/authentication/key_manager.rb +297 -0
- data/lib/net/ssh/authentication/methods/abstract.rb +69 -0
- data/lib/net/ssh/authentication/methods/hostbased.rb +72 -0
- data/lib/net/ssh/authentication/methods/keyboard_interactive.rb +77 -0
- data/lib/net/ssh/authentication/methods/none.rb +34 -0
- data/lib/net/ssh/authentication/methods/password.rb +80 -0
- data/lib/net/ssh/authentication/methods/publickey.rb +95 -0
- data/lib/net/ssh/authentication/pageant.rb +497 -0
- data/lib/net/ssh/authentication/pub_key_fingerprint.rb +43 -0
- data/lib/net/ssh/authentication/session.rb +163 -0
- data/lib/net/ssh/buffer.rb +434 -0
- data/lib/net/ssh/buffered_io.rb +202 -0
- data/lib/net/ssh/config.rb +406 -0
- data/lib/net/ssh/connection/channel.rb +695 -0
- data/lib/net/ssh/connection/constants.rb +33 -0
- data/lib/net/ssh/connection/event_loop.rb +123 -0
- data/lib/net/ssh/connection/keepalive.rb +59 -0
- data/lib/net/ssh/connection/session.rb +712 -0
- data/lib/net/ssh/connection/term.rb +180 -0
- data/lib/net/ssh/errors.rb +106 -0
- data/lib/net/ssh/key_factory.rb +218 -0
- data/lib/net/ssh/known_hosts.rb +264 -0
- data/lib/net/ssh/loggable.rb +62 -0
- data/lib/net/ssh/packet.rb +106 -0
- data/lib/net/ssh/prompt.rb +62 -0
- data/lib/net/ssh/proxy/command.rb +123 -0
- data/lib/net/ssh/proxy/errors.rb +16 -0
- data/lib/net/ssh/proxy/http.rb +98 -0
- data/lib/net/ssh/proxy/https.rb +50 -0
- data/lib/net/ssh/proxy/jump.rb +54 -0
- data/lib/net/ssh/proxy/socks4.rb +67 -0
- data/lib/net/ssh/proxy/socks5.rb +140 -0
- data/lib/net/ssh/service/forward.rb +426 -0
- data/lib/net/ssh/test/channel.rb +147 -0
- data/lib/net/ssh/test/extensions.rb +173 -0
- data/lib/net/ssh/test/kex.rb +46 -0
- data/lib/net/ssh/test/local_packet.rb +53 -0
- data/lib/net/ssh/test/packet.rb +101 -0
- data/lib/net/ssh/test/remote_packet.rb +40 -0
- data/lib/net/ssh/test/script.rb +180 -0
- data/lib/net/ssh/test/socket.rb +65 -0
- data/lib/net/ssh/test.rb +94 -0
- data/lib/net/ssh/transport/algorithms.rb +502 -0
- data/lib/net/ssh/transport/cipher_factory.rb +103 -0
- data/lib/net/ssh/transport/constants.rb +40 -0
- data/lib/net/ssh/transport/ctr.rb +115 -0
- data/lib/net/ssh/transport/hmac/abstract.rb +97 -0
- data/lib/net/ssh/transport/hmac/md5.rb +10 -0
- data/lib/net/ssh/transport/hmac/md5_96.rb +9 -0
- data/lib/net/ssh/transport/hmac/none.rb +13 -0
- data/lib/net/ssh/transport/hmac/ripemd160.rb +11 -0
- data/lib/net/ssh/transport/hmac/sha1.rb +11 -0
- data/lib/net/ssh/transport/hmac/sha1_96.rb +9 -0
- data/lib/net/ssh/transport/hmac/sha2_256.rb +11 -0
- data/lib/net/ssh/transport/hmac/sha2_256_96.rb +9 -0
- data/lib/net/ssh/transport/hmac/sha2_256_etm.rb +12 -0
- data/lib/net/ssh/transport/hmac/sha2_512.rb +11 -0
- data/lib/net/ssh/transport/hmac/sha2_512_96.rb +9 -0
- data/lib/net/ssh/transport/hmac/sha2_512_etm.rb +12 -0
- data/lib/net/ssh/transport/hmac.rb +47 -0
- data/lib/net/ssh/transport/identity_cipher.rb +57 -0
- data/lib/net/ssh/transport/kex/abstract.rb +130 -0
- data/lib/net/ssh/transport/kex/abstract5656.rb +72 -0
- data/lib/net/ssh/transport/kex/curve25519_sha256.rb +39 -0
- data/lib/net/ssh/transport/kex/curve25519_sha256_loader.rb +30 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group14_sha1.rb +37 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group14_sha256.rb +11 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +122 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +72 -0
- data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha256.rb +11 -0
- data/lib/net/ssh/transport/kex/ecdh_sha2_nistp256.rb +39 -0
- data/lib/net/ssh/transport/kex/ecdh_sha2_nistp384.rb +21 -0
- data/lib/net/ssh/transport/kex/ecdh_sha2_nistp521.rb +21 -0
- data/lib/net/ssh/transport/kex.rb +31 -0
- data/lib/net/ssh/transport/key_expander.rb +30 -0
- data/lib/net/ssh/transport/openssl.rb +253 -0
- data/lib/net/ssh/transport/packet_stream.rb +280 -0
- data/lib/net/ssh/transport/server_version.rb +77 -0
- data/lib/net/ssh/transport/session.rb +354 -0
- data/lib/net/ssh/transport/state.rb +208 -0
- data/lib/net/ssh/verifiers/accept_new.rb +33 -0
- data/lib/net/ssh/verifiers/accept_new_or_local_tunnel.rb +33 -0
- data/lib/net/ssh/verifiers/always.rb +58 -0
- data/lib/net/ssh/verifiers/never.rb +19 -0
- data/lib/net/ssh/version.rb +68 -0
- data/lib/net/ssh.rb +330 -0
- data/net-ssh-public_cert.pem +20 -0
- data/net-ssh.gemspec +44 -0
- data/support/ssh_tunnel_bug.rb +65 -0
- metadata +271 -0
@@ -0,0 +1,180 @@
|
|
1
|
+
module Net
|
2
|
+
module SSH
|
3
|
+
module Connection
|
4
|
+
# These constants are used when requesting a pseudo-terminal (via
|
5
|
+
# Net::SSH::Connection::Channel#request_pty). The descriptions for each are
|
6
|
+
# taken directly from RFC 4254 ("The Secure Shell (SSH) Connection Protocol"),
|
7
|
+
# http://tools.ietf.org/html/rfc4254.
|
8
|
+
module Term
|
9
|
+
# Interrupt character; 255 if none. Similarly for the other characters.
|
10
|
+
# Not all of these characters are supported on all systems.
|
11
|
+
VINTR = 1
|
12
|
+
|
13
|
+
# The quit character (sends SIGQUIT signal on POSIX systems).
|
14
|
+
VQUIT = 2
|
15
|
+
|
16
|
+
# Erase the character to left of the cursor.
|
17
|
+
VERASE = 3
|
18
|
+
|
19
|
+
# Kill the current input line.
|
20
|
+
VKILL = 4
|
21
|
+
|
22
|
+
# End-of-file character (sends EOF from the terminal).
|
23
|
+
VEOF = 5
|
24
|
+
|
25
|
+
# End-of-line character in addition to carriage return and/or linefeed.
|
26
|
+
VEOL = 6
|
27
|
+
|
28
|
+
# Additional end-of-line character.
|
29
|
+
VEOL2 = 7
|
30
|
+
|
31
|
+
# Continues paused output (normally control-Q).
|
32
|
+
VSTART = 8
|
33
|
+
|
34
|
+
# Pauses output (normally control-S).
|
35
|
+
VSTOP = 9
|
36
|
+
|
37
|
+
# Suspends the current program.
|
38
|
+
VSUSP = 10
|
39
|
+
|
40
|
+
# Another suspend character.
|
41
|
+
VDSUSP = 11
|
42
|
+
|
43
|
+
# Reprints the current input line.
|
44
|
+
VREPRINT = 12
|
45
|
+
|
46
|
+
# Erases a word left of cursor.
|
47
|
+
VWERASE = 13
|
48
|
+
|
49
|
+
# Enter the next character typed literally, even if it is a special
|
50
|
+
# character.
|
51
|
+
VLNEXT = 14
|
52
|
+
|
53
|
+
# Character to flush output.
|
54
|
+
VFLUSH = 15
|
55
|
+
|
56
|
+
# Switch to a different shell layer.
|
57
|
+
VSWITCH = 16
|
58
|
+
|
59
|
+
# Prints system status line (load, command, pid, etc).
|
60
|
+
VSTATUS = 17
|
61
|
+
|
62
|
+
# Toggles the flushing of terminal output.
|
63
|
+
VDISCARD = 18
|
64
|
+
|
65
|
+
# The ignore parity flag. The parameter SHOULD be 0 if this flag is FALSE,
|
66
|
+
# and 1 if it is TRUE.
|
67
|
+
IGNPAR = 30
|
68
|
+
|
69
|
+
# Mark parity and framing errors.
|
70
|
+
PARMRK = 31
|
71
|
+
|
72
|
+
# Enable checking of parity errors.
|
73
|
+
INPCK = 32
|
74
|
+
|
75
|
+
# Strip 8th bit off characters.
|
76
|
+
ISTRIP = 33
|
77
|
+
|
78
|
+
# Map NL into CR on input.
|
79
|
+
INCLR = 34
|
80
|
+
|
81
|
+
# Ignore CR on input.
|
82
|
+
IGNCR = 35
|
83
|
+
|
84
|
+
# Map CR to NL on input.
|
85
|
+
ICRNL = 36
|
86
|
+
|
87
|
+
# Translate uppercase characters to lowercase.
|
88
|
+
IUCLC = 37
|
89
|
+
|
90
|
+
# Enable output flow control.
|
91
|
+
IXON = 38
|
92
|
+
|
93
|
+
# Any char will restart after stop.
|
94
|
+
IXANY = 39
|
95
|
+
|
96
|
+
# Enable input flow control.
|
97
|
+
IXOFF = 40
|
98
|
+
|
99
|
+
# Ring bell on input queue full.
|
100
|
+
IMAXBEL = 41
|
101
|
+
|
102
|
+
# Enable signals INTR, QUIT, [D]SUSP.
|
103
|
+
ISIG = 50
|
104
|
+
|
105
|
+
# Canonicalize input lines.
|
106
|
+
ICANON = 51
|
107
|
+
|
108
|
+
# Enable input and output of uppercase characters by preceding their
|
109
|
+
# lowercase equivalents with "\".
|
110
|
+
XCASE = 52
|
111
|
+
|
112
|
+
# Enable echoing.
|
113
|
+
ECHO = 53
|
114
|
+
|
115
|
+
# Visually erase chars.
|
116
|
+
ECHOE = 54
|
117
|
+
|
118
|
+
# Kill character discards current line.
|
119
|
+
ECHOK = 55
|
120
|
+
|
121
|
+
# Echo NL even if ECHO is off.
|
122
|
+
ECHONL = 56
|
123
|
+
|
124
|
+
# Don't flush after interrupt.
|
125
|
+
NOFLSH = 57
|
126
|
+
|
127
|
+
# Stop background jobs from output.
|
128
|
+
TOSTOP = 58
|
129
|
+
|
130
|
+
# Enable extensions.
|
131
|
+
IEXTEN = 59
|
132
|
+
|
133
|
+
# Echo control characters as ^(Char).
|
134
|
+
ECHOCTL = 60
|
135
|
+
|
136
|
+
# Visual erase for line kill.
|
137
|
+
ECHOKE = 61
|
138
|
+
|
139
|
+
# Retype pending input.
|
140
|
+
PENDIN = 62
|
141
|
+
|
142
|
+
# Enable output processing.
|
143
|
+
OPOST = 70
|
144
|
+
|
145
|
+
# Convert lowercase to uppercase.
|
146
|
+
OLCUC = 71
|
147
|
+
|
148
|
+
# Map NL to CR-NL.
|
149
|
+
ONLCR = 72
|
150
|
+
|
151
|
+
# Translate carriage return to newline (output).
|
152
|
+
OCRNL = 73
|
153
|
+
|
154
|
+
# Translate newline to carriage return-newline (output).
|
155
|
+
ONOCR = 74
|
156
|
+
|
157
|
+
# Newline performs a carriage return (output).
|
158
|
+
ONLRET = 75
|
159
|
+
|
160
|
+
# 7 bit mode.
|
161
|
+
CS7 = 90
|
162
|
+
|
163
|
+
# 8 bit mode.
|
164
|
+
CS8 = 91
|
165
|
+
|
166
|
+
# Parity enable.
|
167
|
+
PARENB = 92
|
168
|
+
|
169
|
+
# Odd parity, else even.
|
170
|
+
PARODD = 93
|
171
|
+
|
172
|
+
# Specifies the input baud rate in bits per second.
|
173
|
+
TTY_OP_ISPEED = 128
|
174
|
+
|
175
|
+
# Specifies the output baud rate in bits per second.
|
176
|
+
TTY_OP_OSPEED = 129
|
177
|
+
end
|
178
|
+
end
|
179
|
+
end
|
180
|
+
end
|
@@ -0,0 +1,106 @@
|
|
1
|
+
module Net
|
2
|
+
module SSH
|
3
|
+
# A general exception class, to act as the ancestor of all other Net::SSH
|
4
|
+
# exception classes.
|
5
|
+
class Exception < ::RuntimeError; end
|
6
|
+
|
7
|
+
# This exception is raised when authentication fails (whether it be
|
8
|
+
# public key authentication, password authentication, or whatever).
|
9
|
+
class AuthenticationFailed < Net::SSH::Exception; end
|
10
|
+
|
11
|
+
# This exception is raised when a connection attempt times out.
|
12
|
+
class ConnectionTimeout < Net::SSH::Exception; end
|
13
|
+
|
14
|
+
# This exception is raised when the remote host has disconnected
|
15
|
+
# unexpectedly.
|
16
|
+
class Disconnect < Net::SSH::Exception; end
|
17
|
+
|
18
|
+
# This exception is raised when the remote host has disconnected/
|
19
|
+
# timeouted unexpectedly.
|
20
|
+
class Timeout < Disconnect; end
|
21
|
+
|
22
|
+
# This exception is primarily used internally, but if you have a channel
|
23
|
+
# request handler (see Net::SSH::Connection::Channel#on_request) that you
|
24
|
+
# want to fail in such a way that the server knows it failed, you can
|
25
|
+
# raise this exception in the handler and Net::SSH will translate that into
|
26
|
+
# a "channel failure" message.
|
27
|
+
class ChannelRequestFailed < Net::SSH::Exception; end
|
28
|
+
|
29
|
+
# This is exception is primarily used internally, but if you have a channel
|
30
|
+
# open handler (see Net::SSH::Connection::Session#on_open_channel) and you
|
31
|
+
# want to fail in such a way that the server knows it failed, you can
|
32
|
+
# raise this exception in the handler and Net::SSH will translate that into
|
33
|
+
# a "channel open failed" message.
|
34
|
+
class ChannelOpenFailed < Net::SSH::Exception
|
35
|
+
attr_reader :code, :reason
|
36
|
+
|
37
|
+
def initialize(code, reason)
|
38
|
+
@code, @reason = code, reason
|
39
|
+
super "#{reason} (#{code})"
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
# Base class for host key exceptions. When rescuing this exception, you can
|
44
|
+
# inspect the key fingerprint and, if you want to proceed anyway, simply call
|
45
|
+
# the remember_host! method on the exception, and then retry.
|
46
|
+
class HostKeyError < Net::SSH::Exception
|
47
|
+
# the callback to use when #remember_host! is called
|
48
|
+
attr_writer :callback #:nodoc:
|
49
|
+
|
50
|
+
# situation-specific data describing the host (see #host, #port, etc.)
|
51
|
+
attr_writer :data #:nodoc:
|
52
|
+
|
53
|
+
# An accessor for getting at the data that was used to look up the host
|
54
|
+
# (see also #fingerprint, #host, #port, #ip, and #key).
|
55
|
+
def [](key)
|
56
|
+
@data && @data[key]
|
57
|
+
end
|
58
|
+
|
59
|
+
# Returns the fingerprint of the key for the host, which either was not
|
60
|
+
# found or did not match.
|
61
|
+
def fingerprint
|
62
|
+
@data && @data[:fingerprint]
|
63
|
+
end
|
64
|
+
|
65
|
+
# Returns the host name for the remote host, as reported by the socket.
|
66
|
+
def host
|
67
|
+
@data && @data[:peer] && @data[:peer][:host]
|
68
|
+
end
|
69
|
+
|
70
|
+
# Returns the port number for the remote host, as reported by the socket.
|
71
|
+
def port
|
72
|
+
@data && @data[:peer] && @data[:peer][:port]
|
73
|
+
end
|
74
|
+
|
75
|
+
# Returns the IP address of the remote host, as reported by the socket.
|
76
|
+
def ip
|
77
|
+
@data && @data[:peer] && @data[:peer][:ip]
|
78
|
+
end
|
79
|
+
|
80
|
+
# Returns the key itself, as reported by the remote host.
|
81
|
+
def key
|
82
|
+
@data && @data[:key]
|
83
|
+
end
|
84
|
+
|
85
|
+
# Tell Net::SSH to record this host and key in the known hosts file, so
|
86
|
+
# that subsequent connections will remember them.
|
87
|
+
def remember_host!
|
88
|
+
@callback.call
|
89
|
+
end
|
90
|
+
end
|
91
|
+
|
92
|
+
# Raised when the cached key for a particular host does not match the
|
93
|
+
# key given by the host, which can be indicative of a man-in-the-middle
|
94
|
+
# attack. When rescuing this exception, you can inspect the key fingerprint
|
95
|
+
# and, if you want to proceed anyway, simply call the remember_host!
|
96
|
+
# method on the exception, and then retry.
|
97
|
+
class HostKeyMismatch < HostKeyError; end
|
98
|
+
|
99
|
+
# Raised when there is no cached key for a particular host, which probably
|
100
|
+
# means that the host has simply not been seen before.
|
101
|
+
# When rescuing this exception, you can inspect the key fingerprint and, if
|
102
|
+
# you want to proceed anyway, simply call the remember_host! method on the
|
103
|
+
# exception, and then retry.
|
104
|
+
class HostKeyUnknown < HostKeyError; end
|
105
|
+
end
|
106
|
+
end
|
@@ -0,0 +1,218 @@
|
|
1
|
+
require 'net/ssh/transport/openssl'
|
2
|
+
require 'net/ssh/prompt'
|
3
|
+
|
4
|
+
require 'net/ssh/authentication/ed25519_loader'
|
5
|
+
|
6
|
+
module Net
|
7
|
+
module SSH
|
8
|
+
# A factory class for returning new Key classes. It is used for obtaining
|
9
|
+
# OpenSSL key instances via their SSH names, and for loading both public and
|
10
|
+
# private keys. It used used primarily by Net::SSH itself, internally, and
|
11
|
+
# will rarely (if ever) be directly used by consumers of the library.
|
12
|
+
#
|
13
|
+
# klass = Net::SSH::KeyFactory.get("rsa")
|
14
|
+
# assert klass.is_a?(OpenSSL::PKey::RSA)
|
15
|
+
#
|
16
|
+
# key = Net::SSH::KeyFactory.load_public_key("~/.ssh/id_dsa.pub")
|
17
|
+
class KeyFactory
|
18
|
+
# Specifies the mapping of SSH names to OpenSSL key classes.
|
19
|
+
MAP = {
|
20
|
+
'dh' => OpenSSL::PKey::DH,
|
21
|
+
'rsa' => OpenSSL::PKey::RSA,
|
22
|
+
'dsa' => OpenSSL::PKey::DSA,
|
23
|
+
'ecdsa' => OpenSSL::PKey::EC
|
24
|
+
}
|
25
|
+
MAP["ed25519"] = Net::SSH::Authentication::ED25519::PrivKey if defined? Net::SSH::Authentication::ED25519
|
26
|
+
|
27
|
+
class <<self
|
28
|
+
# Fetch an OpenSSL key instance by its SSH name. It will be a new,
|
29
|
+
# empty key of the given type.
|
30
|
+
def get(name)
|
31
|
+
MAP.fetch(name).new
|
32
|
+
end
|
33
|
+
|
34
|
+
# Loads a private key from a file. It will correctly determine
|
35
|
+
# whether the file describes an RSA or DSA key, and will load it
|
36
|
+
# appropriately. The new key is returned. If the key itself is
|
37
|
+
# encrypted (requiring a passphrase to use), the user will be
|
38
|
+
# prompted to enter their password unless passphrase works.
|
39
|
+
def load_private_key(filename, passphrase=nil, ask_passphrase=true, prompt=Prompt.default)
|
40
|
+
data = File.read(File.expand_path(filename))
|
41
|
+
load_data_private_key(data, passphrase, ask_passphrase, filename, prompt)
|
42
|
+
end
|
43
|
+
|
44
|
+
# Loads a private key. It will correctly determine
|
45
|
+
# whether the file describes an RSA or DSA key, and will load it
|
46
|
+
# appropriately. The new key is returned. If the key itself is
|
47
|
+
# encrypted (requiring a passphrase to use), the user will be
|
48
|
+
# prompted to enter their password unless passphrase works.
|
49
|
+
def load_data_private_key(data, passphrase=nil, ask_passphrase=true, filename="", prompt=Prompt.default)
|
50
|
+
key_type = classify_key(data, filename)
|
51
|
+
|
52
|
+
encrypted_key = nil
|
53
|
+
tries = 0
|
54
|
+
|
55
|
+
prompter = nil
|
56
|
+
result =
|
57
|
+
begin
|
58
|
+
key_type.read(data, passphrase || 'invalid')
|
59
|
+
rescue *key_type.error_classes => e
|
60
|
+
encrypted_key = !!key_type.encrypted_key?(data, e) if encrypted_key.nil?
|
61
|
+
if encrypted_key && ask_passphrase
|
62
|
+
tries += 1
|
63
|
+
if tries <= 3
|
64
|
+
prompter ||= prompt.start(type: 'private_key', filename: filename, sha: Digest::SHA256.digest(data))
|
65
|
+
passphrase = prompter.ask("Enter passphrase for #{filename}:", false)
|
66
|
+
retry
|
67
|
+
else
|
68
|
+
raise
|
69
|
+
end
|
70
|
+
else
|
71
|
+
raise
|
72
|
+
end
|
73
|
+
end
|
74
|
+
prompter.success if prompter
|
75
|
+
result
|
76
|
+
end
|
77
|
+
|
78
|
+
# Loads a public key from a file. It will correctly determine whether
|
79
|
+
# the file describes an RSA or DSA key, and will load it
|
80
|
+
# appropriately. The new public key is returned.
|
81
|
+
def load_public_key(filename)
|
82
|
+
data = File.read(File.expand_path(filename))
|
83
|
+
load_data_public_key(data, filename)
|
84
|
+
end
|
85
|
+
|
86
|
+
# Loads a public key. It will correctly determine whether
|
87
|
+
# the file describes an RSA or DSA key, and will load it
|
88
|
+
# appropriately. The new public key is returned.
|
89
|
+
def load_data_public_key(data, filename="")
|
90
|
+
fields = data.split(/ /)
|
91
|
+
|
92
|
+
blob = nil
|
93
|
+
begin
|
94
|
+
blob = fields.shift
|
95
|
+
end while !blob.nil? && !/^(ssh-(rsa|dss|ed25519)|ecdsa-sha2-nistp\d+)(-cert-v01@openssh\.com)?$/.match(blob)
|
96
|
+
blob = fields.shift
|
97
|
+
|
98
|
+
raise Net::SSH::Exception, "public key at #{filename} is not valid" if blob.nil?
|
99
|
+
|
100
|
+
blob = blob.unpack("m*").first
|
101
|
+
reader = Net::SSH::Buffer.new(blob)
|
102
|
+
reader.read_key or raise OpenSSL::PKey::PKeyError, "not a public key #{filename.inspect}"
|
103
|
+
end
|
104
|
+
|
105
|
+
private
|
106
|
+
|
107
|
+
# rubocop:disable Style/Documentation, Lint/DuplicateMethods
|
108
|
+
class KeyType
|
109
|
+
def self.read(key_data, passphrase)
|
110
|
+
raise Exception, "TODO subclasses should implement read"
|
111
|
+
end
|
112
|
+
|
113
|
+
def self.error_classes
|
114
|
+
raise Exception, "TODO subclasses should implement read"
|
115
|
+
end
|
116
|
+
|
117
|
+
def self.encrypted_key?(data, error)
|
118
|
+
raise Exception, "TODO subclasses should implement is_encrypted_key"
|
119
|
+
end
|
120
|
+
end
|
121
|
+
|
122
|
+
class OpenSSHPrivateKeyType < KeyType
|
123
|
+
def self.read(key_data, passphrase)
|
124
|
+
Net::SSH::Authentication::ED25519::OpenSSHPrivateKeyLoader.read(key_data, passphrase)
|
125
|
+
end
|
126
|
+
|
127
|
+
def self.error_classes
|
128
|
+
[Net::SSH::Authentication::ED25519::OpenSSHPrivateKeyLoader::DecryptError]
|
129
|
+
end
|
130
|
+
|
131
|
+
def self.encrypted_key?(key_data, decode_error)
|
132
|
+
decode_error.is_a?(Net::SSH::Authentication::ED25519::OpenSSHPrivateKeyLoader::DecryptError) && decode_error.encrypted_key?
|
133
|
+
end
|
134
|
+
end
|
135
|
+
|
136
|
+
class OpenSSLKeyTypeBase < KeyType
|
137
|
+
def self.open_ssl_class
|
138
|
+
raise Exception, "TODO: subclasses should implement"
|
139
|
+
end
|
140
|
+
|
141
|
+
def self.read(key_data, passphrase)
|
142
|
+
open_ssl_class.new(key_data, passphrase)
|
143
|
+
end
|
144
|
+
|
145
|
+
def self.encrypted_key?(key_data, error)
|
146
|
+
key_data.match(/ENCRYPTED/)
|
147
|
+
end
|
148
|
+
end
|
149
|
+
|
150
|
+
class OpenSSLPKeyType < OpenSSLKeyTypeBase
|
151
|
+
def self.read(key_data, passphrase)
|
152
|
+
open_ssl_class.read(key_data, passphrase)
|
153
|
+
end
|
154
|
+
|
155
|
+
def self.open_ssl_class
|
156
|
+
OpenSSL::PKey
|
157
|
+
end
|
158
|
+
|
159
|
+
def self.error_classes
|
160
|
+
[ArgumentError, OpenSSL::PKey::PKeyError]
|
161
|
+
end
|
162
|
+
end
|
163
|
+
|
164
|
+
class OpenSSLDSAKeyType < OpenSSLKeyTypeBase
|
165
|
+
def self.open_ssl_class
|
166
|
+
OpenSSL::PKey::DSA
|
167
|
+
end
|
168
|
+
|
169
|
+
def self.error_classes
|
170
|
+
[OpenSSL::PKey::DSAError]
|
171
|
+
end
|
172
|
+
end
|
173
|
+
|
174
|
+
class OpenSSLRSAKeyType < OpenSSLKeyTypeBase
|
175
|
+
def self.open_ssl_class
|
176
|
+
OpenSSL::PKey::RSA
|
177
|
+
end
|
178
|
+
|
179
|
+
def self.error_classes
|
180
|
+
[OpenSSL::PKey::RSAError]
|
181
|
+
end
|
182
|
+
end
|
183
|
+
|
184
|
+
class OpenSSLECKeyType < OpenSSLKeyTypeBase
|
185
|
+
def self.open_ssl_class
|
186
|
+
OpenSSL::PKey::EC
|
187
|
+
end
|
188
|
+
|
189
|
+
def self.error_classes
|
190
|
+
[OpenSSL::PKey::ECError]
|
191
|
+
end
|
192
|
+
end
|
193
|
+
# rubocop:enable Style/Documentation, Lint/DuplicateMethods
|
194
|
+
|
195
|
+
# Determine whether the file describes an RSA or DSA key, and return how load it
|
196
|
+
# appropriately.
|
197
|
+
def classify_key(data, filename)
|
198
|
+
if data.match(/-----BEGIN OPENSSH PRIVATE KEY-----/)
|
199
|
+
Net::SSH::Authentication::ED25519Loader.raiseUnlessLoaded("OpenSSH keys only supported if ED25519 is available")
|
200
|
+
return OpenSSHPrivateKeyType
|
201
|
+
elsif OpenSSL::PKey.respond_to?(:read)
|
202
|
+
return OpenSSLPKeyType
|
203
|
+
elsif data.match(/-----BEGIN DSA PRIVATE KEY-----/)
|
204
|
+
return OpenSSLDSAKeyType
|
205
|
+
elsif data.match(/-----BEGIN RSA PRIVATE KEY-----/)
|
206
|
+
return OpenSSLRSAKeyType
|
207
|
+
elsif data.match(/-----BEGIN EC PRIVATE KEY-----/)
|
208
|
+
return OpenSSLECKeyType
|
209
|
+
elsif data.match(/-----BEGIN (.+) PRIVATE KEY-----/)
|
210
|
+
raise OpenSSL::PKey::PKeyError, "not a supported key type '#{$1}'"
|
211
|
+
else
|
212
|
+
raise OpenSSL::PKey::PKeyError, "not a private key (#{filename})"
|
213
|
+
end
|
214
|
+
end
|
215
|
+
end
|
216
|
+
end
|
217
|
+
end
|
218
|
+
end
|