net-ssh-backports 6.3.0.backports

Sign up to get free protection for your applications and to get access to all the features.
Files changed (111) hide show
  1. checksums.yaml +7 -0
  2. data/.github/workflows/ci.yml +93 -0
  3. data/.gitignore +13 -0
  4. data/.rubocop.yml +21 -0
  5. data/.rubocop_todo.yml +1074 -0
  6. data/.travis.yml +51 -0
  7. data/CHANGES.txt +698 -0
  8. data/Gemfile +13 -0
  9. data/Gemfile.noed25519 +12 -0
  10. data/ISSUE_TEMPLATE.md +30 -0
  11. data/LICENSE.txt +19 -0
  12. data/Manifest +132 -0
  13. data/README.md +287 -0
  14. data/Rakefile +105 -0
  15. data/THANKS.txt +110 -0
  16. data/appveyor.yml +58 -0
  17. data/lib/net/ssh/authentication/agent.rb +284 -0
  18. data/lib/net/ssh/authentication/certificate.rb +183 -0
  19. data/lib/net/ssh/authentication/constants.rb +20 -0
  20. data/lib/net/ssh/authentication/ed25519.rb +185 -0
  21. data/lib/net/ssh/authentication/ed25519_loader.rb +31 -0
  22. data/lib/net/ssh/authentication/key_manager.rb +297 -0
  23. data/lib/net/ssh/authentication/methods/abstract.rb +69 -0
  24. data/lib/net/ssh/authentication/methods/hostbased.rb +72 -0
  25. data/lib/net/ssh/authentication/methods/keyboard_interactive.rb +77 -0
  26. data/lib/net/ssh/authentication/methods/none.rb +34 -0
  27. data/lib/net/ssh/authentication/methods/password.rb +80 -0
  28. data/lib/net/ssh/authentication/methods/publickey.rb +95 -0
  29. data/lib/net/ssh/authentication/pageant.rb +497 -0
  30. data/lib/net/ssh/authentication/pub_key_fingerprint.rb +43 -0
  31. data/lib/net/ssh/authentication/session.rb +163 -0
  32. data/lib/net/ssh/buffer.rb +434 -0
  33. data/lib/net/ssh/buffered_io.rb +202 -0
  34. data/lib/net/ssh/config.rb +406 -0
  35. data/lib/net/ssh/connection/channel.rb +695 -0
  36. data/lib/net/ssh/connection/constants.rb +33 -0
  37. data/lib/net/ssh/connection/event_loop.rb +123 -0
  38. data/lib/net/ssh/connection/keepalive.rb +59 -0
  39. data/lib/net/ssh/connection/session.rb +712 -0
  40. data/lib/net/ssh/connection/term.rb +180 -0
  41. data/lib/net/ssh/errors.rb +106 -0
  42. data/lib/net/ssh/key_factory.rb +218 -0
  43. data/lib/net/ssh/known_hosts.rb +264 -0
  44. data/lib/net/ssh/loggable.rb +62 -0
  45. data/lib/net/ssh/packet.rb +106 -0
  46. data/lib/net/ssh/prompt.rb +62 -0
  47. data/lib/net/ssh/proxy/command.rb +123 -0
  48. data/lib/net/ssh/proxy/errors.rb +16 -0
  49. data/lib/net/ssh/proxy/http.rb +98 -0
  50. data/lib/net/ssh/proxy/https.rb +50 -0
  51. data/lib/net/ssh/proxy/jump.rb +54 -0
  52. data/lib/net/ssh/proxy/socks4.rb +67 -0
  53. data/lib/net/ssh/proxy/socks5.rb +140 -0
  54. data/lib/net/ssh/service/forward.rb +426 -0
  55. data/lib/net/ssh/test/channel.rb +147 -0
  56. data/lib/net/ssh/test/extensions.rb +173 -0
  57. data/lib/net/ssh/test/kex.rb +46 -0
  58. data/lib/net/ssh/test/local_packet.rb +53 -0
  59. data/lib/net/ssh/test/packet.rb +101 -0
  60. data/lib/net/ssh/test/remote_packet.rb +40 -0
  61. data/lib/net/ssh/test/script.rb +180 -0
  62. data/lib/net/ssh/test/socket.rb +65 -0
  63. data/lib/net/ssh/test.rb +94 -0
  64. data/lib/net/ssh/transport/algorithms.rb +502 -0
  65. data/lib/net/ssh/transport/cipher_factory.rb +103 -0
  66. data/lib/net/ssh/transport/constants.rb +40 -0
  67. data/lib/net/ssh/transport/ctr.rb +115 -0
  68. data/lib/net/ssh/transport/hmac/abstract.rb +97 -0
  69. data/lib/net/ssh/transport/hmac/md5.rb +10 -0
  70. data/lib/net/ssh/transport/hmac/md5_96.rb +9 -0
  71. data/lib/net/ssh/transport/hmac/none.rb +13 -0
  72. data/lib/net/ssh/transport/hmac/ripemd160.rb +11 -0
  73. data/lib/net/ssh/transport/hmac/sha1.rb +11 -0
  74. data/lib/net/ssh/transport/hmac/sha1_96.rb +9 -0
  75. data/lib/net/ssh/transport/hmac/sha2_256.rb +11 -0
  76. data/lib/net/ssh/transport/hmac/sha2_256_96.rb +9 -0
  77. data/lib/net/ssh/transport/hmac/sha2_256_etm.rb +12 -0
  78. data/lib/net/ssh/transport/hmac/sha2_512.rb +11 -0
  79. data/lib/net/ssh/transport/hmac/sha2_512_96.rb +9 -0
  80. data/lib/net/ssh/transport/hmac/sha2_512_etm.rb +12 -0
  81. data/lib/net/ssh/transport/hmac.rb +47 -0
  82. data/lib/net/ssh/transport/identity_cipher.rb +57 -0
  83. data/lib/net/ssh/transport/kex/abstract.rb +130 -0
  84. data/lib/net/ssh/transport/kex/abstract5656.rb +72 -0
  85. data/lib/net/ssh/transport/kex/curve25519_sha256.rb +39 -0
  86. data/lib/net/ssh/transport/kex/curve25519_sha256_loader.rb +30 -0
  87. data/lib/net/ssh/transport/kex/diffie_hellman_group14_sha1.rb +37 -0
  88. data/lib/net/ssh/transport/kex/diffie_hellman_group14_sha256.rb +11 -0
  89. data/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +122 -0
  90. data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +72 -0
  91. data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha256.rb +11 -0
  92. data/lib/net/ssh/transport/kex/ecdh_sha2_nistp256.rb +39 -0
  93. data/lib/net/ssh/transport/kex/ecdh_sha2_nistp384.rb +21 -0
  94. data/lib/net/ssh/transport/kex/ecdh_sha2_nistp521.rb +21 -0
  95. data/lib/net/ssh/transport/kex.rb +31 -0
  96. data/lib/net/ssh/transport/key_expander.rb +30 -0
  97. data/lib/net/ssh/transport/openssl.rb +253 -0
  98. data/lib/net/ssh/transport/packet_stream.rb +280 -0
  99. data/lib/net/ssh/transport/server_version.rb +77 -0
  100. data/lib/net/ssh/transport/session.rb +354 -0
  101. data/lib/net/ssh/transport/state.rb +208 -0
  102. data/lib/net/ssh/verifiers/accept_new.rb +33 -0
  103. data/lib/net/ssh/verifiers/accept_new_or_local_tunnel.rb +33 -0
  104. data/lib/net/ssh/verifiers/always.rb +58 -0
  105. data/lib/net/ssh/verifiers/never.rb +19 -0
  106. data/lib/net/ssh/version.rb +68 -0
  107. data/lib/net/ssh.rb +330 -0
  108. data/net-ssh-public_cert.pem +20 -0
  109. data/net-ssh.gemspec +44 -0
  110. data/support/ssh_tunnel_bug.rb +65 -0
  111. metadata +271 -0
@@ -0,0 +1,19 @@
1
+ module Net
2
+ module SSH
3
+ module Verifiers
4
+ # This host key verifier simply allows every key it sees, without
5
+ # any verification. This is simple, but very insecure because it
6
+ # exposes you to MiTM attacks.
7
+ class Never
8
+ # Returns true.
9
+ def verify(arguments)
10
+ true
11
+ end
12
+
13
+ def verify_signature(&block)
14
+ true
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,68 @@
1
+ module Net
2
+ module SSH
3
+ # A class for describing the current version of a library. The version
4
+ # consists of three parts: the +major+ number, the +minor+ number, and the
5
+ # +tiny+ (or +patch+) number.
6
+ #
7
+ # Two Version instances may be compared, so that you can test that a version
8
+ # of a library is what you require:
9
+ #
10
+ # require 'net/ssh/version'
11
+ #
12
+ # if Net::SSH::Version::CURRENT < Net::SSH::Version[2,1,0]
13
+ # abort "your software is too old!"
14
+ # end
15
+ class Version
16
+ include Comparable
17
+
18
+ # A convenience method for instantiating a new Version instance with the
19
+ # given +major+, +minor+, and +tiny+ components.
20
+ def self.[](major, minor, tiny, pre = nil)
21
+ new(major, minor, tiny, pre)
22
+ end
23
+
24
+ attr_reader :major, :minor, :tiny
25
+
26
+ # Create a new Version object with the given components.
27
+ def initialize(major, minor, tiny, pre = nil)
28
+ @major, @minor, @tiny, @pre = major, minor, tiny, pre
29
+ end
30
+
31
+ # Compare this version to the given +version+ object.
32
+ def <=>(version)
33
+ to_i <=> version.to_i
34
+ end
35
+
36
+ # Converts this version object to a string, where each of the three
37
+ # version components are joined by the '.' character. E.g., 2.0.0.
38
+ def to_s
39
+ @to_s ||= [@major, @minor, @tiny, @pre].compact.join(".")
40
+ end
41
+
42
+ # Converts this version to a canonical integer that may be compared
43
+ # against other version objects.
44
+ def to_i
45
+ @to_i ||= @major * 1_000_000 + @minor * 1_000 + @tiny
46
+ end
47
+
48
+ # The major component of this version of the Net::SSH library
49
+ MAJOR = 6
50
+
51
+ # The minor component of this version of the Net::SSH library
52
+ MINOR = 3
53
+
54
+ # The tiny component of this version of the Net::SSH library
55
+ TINY = 0
56
+
57
+ # The prerelease component of this version of the Net::SSH library
58
+ # nil allowed
59
+ PRE = "backports"
60
+
61
+ # The current version of the Net::SSH library as a Version instance
62
+ CURRENT = new(*[MAJOR, MINOR, TINY, PRE].compact)
63
+
64
+ # The current version of the Net::SSH library as a String
65
+ STRING = CURRENT.to_s
66
+ end
67
+ end
68
+ end
data/lib/net/ssh.rb ADDED
@@ -0,0 +1,330 @@
1
+ # Make sure HOME is set, regardless of OS, so that File.expand_path works
2
+ # as expected with tilde characters.
3
+ ENV['HOME'] ||= ENV['HOMEPATH'] ? "#{ENV['HOMEDRIVE']}#{ENV['HOMEPATH']}" : Dir.pwd
4
+
5
+ require 'logger'
6
+ require 'etc'
7
+ require 'shellwords'
8
+
9
+ require 'net/ssh/config'
10
+ require 'net/ssh/errors'
11
+ require 'net/ssh/loggable'
12
+ require 'net/ssh/transport/session'
13
+ require 'net/ssh/authentication/session'
14
+ require 'net/ssh/connection/session'
15
+ require 'net/ssh/prompt'
16
+
17
+ module Net
18
+ # Net::SSH is a library for interacting, programmatically, with remote
19
+ # processes via the SSH2 protocol. Sessions are always initiated via
20
+ # Net::SSH.start. From there, a program interacts with the new SSH session
21
+ # via the convenience methods on Net::SSH::Connection::Session, by opening
22
+ # and interacting with new channels (Net::SSH::Connection:Session#open_channel
23
+ # and Net::SSH::Connection::Channel), or by forwarding local and/or
24
+ # remote ports through the connection (Net::SSH::Service::Forward).
25
+ #
26
+ # The SSH protocol is very event-oriented. Requests are sent from the client
27
+ # to the server, and are answered asynchronously. This gives great flexibility
28
+ # (since clients can have multiple requests pending at a time), but it also
29
+ # adds complexity. Net::SSH tries to manage this complexity by providing
30
+ # some simpler methods of synchronous communication (see Net::SSH::Connection::Session#exec!).
31
+ #
32
+ # In general, though, and if you want to do anything more complicated than
33
+ # simply executing commands and capturing their output, you'll need to use
34
+ # channels (Net::SSH::Connection::Channel) to build state machines that are
35
+ # executed while the event loop runs (Net::SSH::Connection::Session#loop).
36
+ #
37
+ # Net::SSH::Connection::Session and Net::SSH::Connection::Channel have more
38
+ # information about this technique.
39
+ #
40
+ # = "Um, all I want to do is X, just show me how!"
41
+ #
42
+ # == X == "execute a command and capture the output"
43
+ #
44
+ # Net::SSH.start("host", "user", password: "password") do |ssh|
45
+ # result = ssh.exec!("ls -l")
46
+ # puts result
47
+ # end
48
+ #
49
+ # == X == "forward connections on a local port to a remote host"
50
+ #
51
+ # Net::SSH.start("host", "user", password: "password") do |ssh|
52
+ # ssh.forward.local(1234, "www.google.com", 80)
53
+ # ssh.loop { true }
54
+ # end
55
+ #
56
+ # == X == "forward connections on a remote port to the local host"
57
+ #
58
+ # Net::SSH.start("host", "user", password: "password") do |ssh|
59
+ # ssh.forward.remote(80, "www.google.com", 1234)
60
+ # ssh.loop { true }
61
+ # end
62
+ module SSH
63
+ # This is the set of options that Net::SSH.start recognizes. See
64
+ # Net::SSH.start for a description of each option.
65
+ VALID_OPTIONS = %i[
66
+ auth_methods bind_address compression compression_level config
67
+ encryption forward_agent hmac host_key remote_user
68
+ keepalive keepalive_interval keepalive_maxcount kex keys key_data
69
+ keycerts languages logger paranoid password port proxy
70
+ rekey_blocks_limit rekey_limit rekey_packet_limit timeout verbose
71
+ known_hosts global_known_hosts_file user_known_hosts_file host_key_alias
72
+ host_name user properties passphrase keys_only max_pkt_size
73
+ max_win_size send_env set_env use_agent number_of_password_prompts
74
+ append_all_supported_algorithms non_interactive password_prompt
75
+ agent_socket_factory minimum_dh_bits verify_host_key
76
+ fingerprint_hash check_host_ip
77
+ ]
78
+
79
+ # The standard means of starting a new SSH connection. When used with a
80
+ # block, the connection will be closed when the block terminates, otherwise
81
+ # the connection will just be returned. The yielded (or returned) value
82
+ # will be an instance of Net::SSH::Connection::Session (q.v.). (See also
83
+ # Net::SSH::Connection::Channel and Net::SSH::Service::Forward.)
84
+ #
85
+ # Net::SSH.start("host", "user") do |ssh|
86
+ # ssh.exec! "cp /some/file /another/location"
87
+ # hostname = ssh.exec!("hostname")
88
+ #
89
+ # ssh.open_channel do |ch|
90
+ # ch.exec "sudo -p 'sudo password: ' ls" do |ch, success|
91
+ # abort "could not execute sudo ls" unless success
92
+ #
93
+ # ch.on_data do |ch, data|
94
+ # print data
95
+ # if data =~ /sudo password: /
96
+ # ch.send_data("password\n")
97
+ # end
98
+ # end
99
+ # end
100
+ # end
101
+ #
102
+ # ssh.loop
103
+ # end
104
+ #
105
+ # This method accepts the following options (all are optional):
106
+ #
107
+ # * :auth_methods => an array of authentication methods to try
108
+ # * :bind_address => the IP address on the connecting machine to use in
109
+ # establishing connection. (:bind_address is discarded if :proxy
110
+ # is set.)
111
+ # * :check_host_ip => Also ckeck IP address when connecting to remote host.
112
+ # Defaults to +true+.
113
+ # * :compression => the compression algorithm to use, or +true+ to use
114
+ # whatever is supported.
115
+ # * :compression_level => the compression level to use when sending data
116
+ # * :config => set to +true+ to load the default OpenSSH config files
117
+ # (~/.ssh/config, /etc/ssh_config), or to +false+ to not load them, or to
118
+ # a file-name (or array of file-names) to load those specific configuration
119
+ # files. Defaults to +true+.
120
+ # * :encryption => the encryption cipher (or ciphers) to use
121
+ # * :forward_agent => set to true if you want the SSH agent connection to
122
+ # be forwarded
123
+ # * :known_hosts => a custom object holding known hosts records.
124
+ # It must implement #search_for and `add` in a similiar manner as KnownHosts.
125
+ # * :global_known_hosts_file => the location of the global known hosts
126
+ # file. Set to an array if you want to specify multiple global known
127
+ # hosts files. Defaults to %w(/etc/ssh/ssh_known_hosts /etc/ssh/ssh_known_hosts2).
128
+ # * :hmac => the hmac algorithm (or algorithms) to use
129
+ # * :host_key => the host key algorithm (or algorithms) to use
130
+ # * :host_key_alias => the host name to use when looking up or adding a
131
+ # host to a known_hosts dictionary file
132
+ # * :host_name => the real host name or IP to log into. This is used
133
+ # instead of the +host+ parameter, and is primarily only useful when
134
+ # specified in an SSH configuration file. It lets you specify an
135
+ # "alias", similarly to adding an entry in /etc/hosts but without needing
136
+ # to modify /etc/hosts.
137
+ # * :keepalive => set to +true+ to send a keepalive packet to the SSH server
138
+ # when there's no traffic between the SSH server and Net::SSH client for
139
+ # the keepalive_interval seconds. Defaults to +false+.
140
+ # * :keepalive_interval => the interval seconds for keepalive.
141
+ # Defaults to +300+ seconds.
142
+ # * :keepalive_maxcount => the maximun number of keepalive packet miss allowed.
143
+ # Defaults to 3
144
+ # * :kex => the key exchange algorithm (or algorithms) to use
145
+ # * :keys => an array of file names of private keys to use for publickey
146
+ # and hostbased authentication
147
+ # * :keycerts => an array of file names of key certificates to use
148
+ # with publickey authentication
149
+ # * :key_data => an array of strings, with each element of the array being
150
+ # a raw private key in PEM format.
151
+ # * :keys_only => set to +true+ to use only private keys from +keys+ and
152
+ # +key_data+ parameters, even if ssh-agent offers more identities. This
153
+ # option is intended for situations where ssh-agent offers many different
154
+ # identites.
155
+ # * :logger => the logger instance to use when logging
156
+ # * :max_pkt_size => maximum size we tell the other side that is supported per
157
+ # packet. Default is 0x8000 (32768 bytes). Increase to 0x10000 (65536 bytes)
158
+ # for better performance if your SSH server supports it (most do).
159
+ # * :max_win_size => maximum size we tell the other side that is supported for
160
+ # the window.
161
+ # * :non_interactive => set to true if your app is non interactive and prefers
162
+ # authentication failure vs password prompt. Non-interactive applications
163
+ # should set it to true to prefer failing a password/etc auth methods vs.
164
+ # asking for password.
165
+ # * :paranoid => deprecated alias for :verify_host_key
166
+ # * :passphrase => the passphrase to use when loading a private key (default
167
+ # is +nil+, for no passphrase)
168
+ # * :password => the password to use to login
169
+ # * :port => the port to use when connecting to the remote host
170
+ # * :properties => a hash of key/value pairs to add to the new connection's
171
+ # properties (see Net::SSH::Connection::Session#properties)
172
+ # * :proxy => a proxy instance (see Proxy) to use when connecting
173
+ # * :rekey_blocks_limit => the max number of blocks to process before rekeying
174
+ # * :rekey_limit => the max number of bytes to process before rekeying
175
+ # * :rekey_packet_limit => the max number of packets to process before rekeying
176
+ # * :send_env => an array of local environment variable names to export to the
177
+ # remote environment. Names may be given as String or Regexp.
178
+ # * :set_env => a hash of environment variable names and values to set to the
179
+ # remote environment. Override the ones if specified in +send_env+.
180
+ # * :timeout => how long to wait for the initial connection to be made
181
+ # * :user => the user name to log in as; this overrides the +user+
182
+ # parameter, and is primarily only useful when provided via an SSH
183
+ # configuration file.
184
+ # * :remote_user => used for substitution into the '%r' part of a ProxyCommand
185
+ # * :user_known_hosts_file => the location of the user known hosts file.
186
+ # Set to an array to specify multiple user known hosts files.
187
+ # Defaults to %w(~/.ssh/known_hosts ~/.ssh/known_hosts2).
188
+ # * :use_agent => Set false to disable the use of ssh-agent. Defaults to
189
+ # true
190
+ # * :verbose => how verbose to be (Logger verbosity constants, Logger::DEBUG
191
+ # is very verbose, Logger::FATAL is all but silent). Logger::FATAL is the
192
+ # default. The symbols :debug, :info, :warn, :error, and :fatal are also
193
+ # supported and are translated to the corresponding Logger constant.
194
+ # * :append_all_supported_algorithms => set to +true+ to append all supported
195
+ # algorithms by net-ssh. Was the default behaviour until 2.10
196
+ # * :number_of_password_prompts => Number of prompts for the password
197
+ # authentication method defaults to 3 set to 0 to disable prompt for
198
+ # password auth method
199
+ # * :password_prompt => a custom prompt object with ask method. See Net::SSH::Prompt
200
+ #
201
+ # * :agent_socket_factory => enables the user to pass a lambda/block that will serve as the socket factory
202
+ # Net::SSH.start(host,user,agent_socket_factory: ->{ UNIXSocket.open('/foo/bar') })
203
+ # example: ->{ UNIXSocket.open('/foo/bar')}
204
+ # * :verify_host_key => specify how strict host-key verification should be.
205
+ # In order of increasing strictness:
206
+ # * :never (very insecure) ::Net::SSH::Verifiers::Never
207
+ # * :accept_new_or_local_tunnel (insecure) ::Net::SSH::Verifiers::AcceptNewOrLocalTunnel
208
+ # * :accept_new (insecure) ::Net::SSH::Verifiers::AcceptNew
209
+ # * :always (secure) ::Net::SSH::Verifiers::Always
210
+ # You can also provide an own Object which responds to +verify+. The argument
211
+ # given to +verify+ is a hash consisting of the +:key+, the +:key_blob+,
212
+ # the +:fingerprint+ and the +:session+. Returning true accepts the host key,
213
+ # returning false declines it and closes the connection.
214
+ # * :fingerprint_hash => 'MD5' or 'SHA256', defaults to 'SHA256'
215
+ # If +user+ parameter is nil it defaults to USER from ssh_config, or
216
+ # local username
217
+ def self.start(host, user=nil, options={}, &block)
218
+ invalid_options = options.keys - VALID_OPTIONS
219
+ if invalid_options.any?
220
+ raise ArgumentError, "invalid option(s): #{invalid_options.join(', ')}"
221
+ end
222
+
223
+ assign_defaults(options)
224
+ _sanitize_options(options)
225
+
226
+ options[:user] = user if user
227
+ options = configuration_for(host, options.fetch(:config, true)).merge(options)
228
+ host = options.fetch(:host_name, host)
229
+
230
+ options[:check_host_ip] = true unless options.key?(:check_host_ip)
231
+
232
+ if options[:non_interactive]
233
+ options[:number_of_password_prompts] = 0
234
+ end
235
+
236
+ _support_deprecated_option_paranoid(options)
237
+
238
+ if options[:verbose]
239
+ options[:logger].level = case options[:verbose]
240
+ when Integer then options[:verbose]
241
+ when :debug then Logger::DEBUG
242
+ when :info then Logger::INFO
243
+ when :warn then Logger::WARN
244
+ when :error then Logger::ERROR
245
+ when :fatal then Logger::FATAL
246
+ else raise ArgumentError, "can't convert #{options[:verbose].inspect} to any of the Logger level constants"
247
+ end
248
+ end
249
+
250
+ transport = Transport::Session.new(host, options)
251
+ auth = Authentication::Session.new(transport, options)
252
+
253
+ user = options.fetch(:user, user) || Etc.getpwuid.name
254
+ if auth.authenticate("ssh-connection", user, options[:password])
255
+ connection = Connection::Session.new(transport, options)
256
+ if block_given?
257
+ begin
258
+ yield connection
259
+ ensure
260
+ connection.close unless connection.closed?
261
+ end
262
+ else
263
+ return connection
264
+ end
265
+ else
266
+ transport.close
267
+ raise AuthenticationFailed, "Authentication failed for user #{user}@#{host}"
268
+ end
269
+ end
270
+
271
+ # Returns a hash of the configuration options for the given host, as read
272
+ # from the SSH configuration file(s). If +use_ssh_config+ is true (the
273
+ # default), this will load configuration from both ~/.ssh/config and
274
+ # /etc/ssh_config. If +use_ssh_config+ is nil or false, nothing will be
275
+ # loaded (and an empty hash returned). Otherwise, +use_ssh_config+ may
276
+ # be a file name (or array of file names) of SSH configuration file(s)
277
+ # to read.
278
+ #
279
+ # See Net::SSH::Config for the full description of all supported options.
280
+ def self.configuration_for(host, use_ssh_config)
281
+ files = case use_ssh_config
282
+ when true then Net::SSH::Config.expandable_default_files
283
+ when false, nil then return {}
284
+ else Array(use_ssh_config)
285
+ end
286
+
287
+ Net::SSH::Config.for(host, files)
288
+ end
289
+
290
+ def self.assign_defaults(options)
291
+ if !options[:logger]
292
+ options[:logger] = Logger.new(STDERR)
293
+ options[:logger].level = Logger::FATAL
294
+ end
295
+
296
+ options[:password_prompt] ||= Prompt.default(options)
297
+
298
+ %i[password passphrase].each do |key|
299
+ options.delete(key) if options.key?(key) && options[key].nil?
300
+ end
301
+ end
302
+
303
+ def self._sanitize_options(options)
304
+ invalid_option_values = [nil,[nil]]
305
+ unless (options.values & invalid_option_values).empty?
306
+ nil_options = options.select { |_k,v| invalid_option_values.include?(v) }.map(&:first)
307
+ Kernel.warn "#{caller_locations(2, 1)[0]}: Passing nil, or [nil] to Net::SSH.start is deprecated for keys: #{nil_options.join(', ')}"
308
+ end
309
+ end
310
+ private_class_method :_sanitize_options
311
+
312
+ def self._support_deprecated_option_paranoid(options)
313
+ if options.key?(:paranoid)
314
+ Kernel.warn(
315
+ ":paranoid is deprecated, please use :verify_host_key. Supported " \
316
+ "values are exactly the same, only the name of the option has changed."
317
+ )
318
+ if options.key?(:verify_host_key)
319
+ Kernel.warn(
320
+ "Both :paranoid and :verify_host_key were specified. " \
321
+ ":verify_host_key takes precedence, :paranoid will be ignored."
322
+ )
323
+ else
324
+ options[:verify_host_key] = options.delete(:paranoid)
325
+ end
326
+ end
327
+ end
328
+ private_class_method :_support_deprecated_option_paranoid
329
+ end
330
+ end
@@ -0,0 +1,20 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ MIIDQDCCAiigAwIBAgIBATANBgkqhkiG9w0BAQsFADAlMSMwIQYDVQQDDBpuZXRz
3
+ c2gvREM9c29sdXRpb3VzL0RDPWNvbTAeFw0yMTA4MTAwODMyMzBaFw0yMjA4MTAw
4
+ ODMyMzBaMCUxIzAhBgNVBAMMGm5ldHNzaC9EQz1zb2x1dGlvdXMvREM9Y29tMIIB
5
+ IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxieE22fR/qmdPKUHyYTyUx2g
6
+ wskLwrCkxay+Tvc97ZZUOwf85LDDDPqhQaTWLvRwnIOMgQE2nBPzwalVclK6a+pW
7
+ x/18KDeZY15vm3Qn5p42b0wi9hUxOqPm3J2hdCLCcgtENgdX21nVzejn39WVqFJO
8
+ lntgSDNW5+kCS8QaRsmIbzj17GKKkrsw39kiQw7FhWfJFeTjddzoZiWwc59KA/Bx
9
+ fBbmDnsMLAtAtauMOxORrbx3EOY7sHku/kSrMg3FXFay7jc6BkbbUij+MjJ/k82l
10
+ 4o8o0YO4BAnya90xgEmgOG0LCCxRhuXQFnMDuDjK2XnUe0h4/6NCn94C+z9GsQID
11
+ AQABo3sweTAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNVHQ4EFgQUBfKiwO2e
12
+ M4NEiRrVG793qEPLYyMwHwYDVR0RBBgwFoEUbmV0c3NoQHNvbHV0aW91cy5jb20w
13
+ HwYDVR0SBBgwFoEUbmV0c3NoQHNvbHV0aW91cy5jb20wDQYJKoZIhvcNAQELBQAD
14
+ ggEBABRChgo0Jo+iXSnTpODNongzZoU0sWqwx3/FQVo8nyAyr1qFuiqpSPb4bDbU
15
+ DsVnUn3t0X/gGA8qJhutlmfTpEQCjUeyj2x9rWpD3lvttlGWV6btQ0qN4Dfc2gsw
16
+ rCp9Jpful0HGWhiwfjWfsarqAdtLzIG0UC47IN7LGeCMRJIijOsXQhiZ915eNBEw
17
+ g9+WSSGHkMFt/7vi2pFkvXSC0+RF8ovvRWf4Zw2aYXtJ1GElgi4ZS/s6ZU0gmv20
18
+ i4SfC5m5UXIVZvOBYiMuZ/1B2m6R9xU41027zfOVwRFNtlVDiNfQRq6sDmz44At/
19
+ dv8pkxXDgySe41vzlRXFsgIgz5A=
20
+ -----END CERTIFICATE-----
data/net-ssh.gemspec ADDED
@@ -0,0 +1,44 @@
1
+ require_relative 'lib/net/ssh/version'
2
+
3
+ Gem::Specification.new do |spec|
4
+ spec.name = "net-ssh-backports"
5
+ spec.version = Net::SSH::Version::STRING
6
+ spec.authors = ["Jamis Buck", "Delano Mandelbaum", "Mikl\u{f3}s Fazekas"]
7
+ spec.email = ["net-ssh@solutious.com"]
8
+
9
+ if ENV['NET_SSH_BUILDGEM_SIGNED']
10
+ spec.cert_chain = ["net-ssh-public_cert.pem"]
11
+ spec.signing_key = "/mnt/gem/net-ssh-private_key.pem"
12
+ end
13
+
14
+ spec.summary = %q{Net::SSH: a pure-Ruby implementation of the SSH2 client protocol.}
15
+ spec.description = %q{Net::SSH: a pure-Ruby implementation of the SSH2 client protocol. It allows you to write programs that invoke and interact with processes on remote servers, via SSH2.}
16
+ spec.homepage = "https://github.com/net-ssh/net-ssh"
17
+ spec.license = "MIT"
18
+ spec.required_ruby_version = Gem::Requirement.new(">= 2.4.5")
19
+ spec.metadata = {
20
+ "changelog_uri" => "https://github.com/net-ssh/net-ssh/blob/master/CHANGES.txt"
21
+ }
22
+
23
+ spec.extra_rdoc_files = [
24
+ "LICENSE.txt",
25
+ "README.md"
26
+ ]
27
+
28
+ spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
29
+ spec.bindir = "exe"
30
+ spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
31
+ spec.require_paths = ["lib"]
32
+
33
+ unless ENV['NET_SSH_NO_ED25519']
34
+ spec.add_development_dependency("bcrypt_pbkdf", "~> 1.0") unless RUBY_PLATFORM == "java"
35
+ spec.add_development_dependency("ed25519", "~> 1.2")
36
+ spec.add_development_dependency('x25519') unless RUBY_PLATFORM == 'java'
37
+ end
38
+
39
+ spec.add_development_dependency "bundler", ">= 1.17"
40
+ spec.add_development_dependency "minitest", "~> 5.10"
41
+ spec.add_development_dependency "mocha", "~> 1.11.2"
42
+ spec.add_development_dependency "rake", "~> 12.0"
43
+ spec.add_development_dependency "rubocop", "~> 1.12.1"
44
+ end
@@ -0,0 +1,65 @@
1
+ #!/usr/bin/ruby
2
+
3
+ # SSH TUNNEL CONNECTION BUG
4
+ # from: http://net-ssh.lighthouseapp.com/projects/36253/tickets/7-an-existing-connection-was-forcibly-closed-by-the-remote-host#ticket-7-3
5
+ #
6
+ # Steps to reproduce:
7
+ #
8
+ # * Start HTTP Proxy
9
+ # * If running debian in EC2:
10
+ # * apt-get install squid
11
+ # * Add the following to /etc/squid/squid.conf:
12
+ # acl localnet src 1.2.3.0/255.255.255.0
13
+ # http_access allow localnet
14
+ # icp_access allow localnet
15
+ # visible_hostname netsshtest
16
+ # * Start squid squid -N -d 1 -D
17
+ # * Run this script
18
+ # * Configure browser proxy to use localhost with LOCAL_PORT.
19
+ # * Load any page, wait for it to load fully. If the page loads
20
+ # correctly, move on. If not, something needs to be corrected.
21
+ # * Refresh the page several times. This should cause this
22
+ # script to failed with the error: "closed stream". You may
23
+ # need to try a few times.
24
+ #
25
+
26
+ require 'highline/import'
27
+ require 'net/ssh'
28
+
29
+ LOCAL_PORT = 8080
30
+ PROXY_PORT = 3128
31
+
32
+ host, user = *ARGV
33
+ abort "Usage: #{$0} host user" unless ARGV.size == 2
34
+
35
+ puts "Connecting to #{user}@#{host}..."
36
+ pass = ask("Password: ") { |q| q.echo = "*" }
37
+ puts "Configure your browser proxy to localhost:#{LOCAL_PORT}"
38
+
39
+ begin
40
+ session = Net::SSH.start(host, user, password: pass)
41
+ session.forward.local(LOCAL_PORT, host, PROXY_PORT)
42
+ session.loop {true}
43
+ rescue StandardError => e
44
+ puts e.message
45
+ puts e.backtrace
46
+ end
47
+
48
+
49
+ __END__
50
+
51
+ $ ruby support/ssh_tunnel.rb host user
52
+ Connecting to user@host...
53
+ Password: ******
54
+ Configure your browser proxy to localhost:8080
55
+ closed stream
56
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/buffered_io.rb:99:in `send'
57
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/buffered_io.rb:99:in `send_pending'
58
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:236:in `block in postprocess'
59
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:235:in `each'
60
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:235:in `postprocess'
61
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:203:in `process'
62
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:161:in `block in loop'
63
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:161:in `loop'
64
+ /usr/local/lib/ruby/gems/1.9.1/gems/net-ssh-2.0.15/lib/net/ssh/connection/session.rb:161:in `loop'
65
+