net-ssh 1.1.4 → 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (297) hide show
  1. data/CHANGELOG.rdoc +37 -0
  2. data/Manifest +101 -0
  3. data/README.rdoc +110 -0
  4. data/Rakefile +26 -0
  5. data/{THANKS → THANKS.rdoc} +2 -5
  6. data/lib/net/ssh.rb +189 -57
  7. data/lib/net/ssh/authentication/agent.rb +175 -0
  8. data/lib/net/ssh/authentication/constants.rb +18 -0
  9. data/lib/net/ssh/authentication/key_manager.rb +166 -0
  10. data/lib/net/ssh/authentication/methods/abstract.rb +60 -0
  11. data/lib/net/ssh/authentication/methods/hostbased.rb +71 -0
  12. data/lib/net/ssh/authentication/methods/keyboard_interactive.rb +66 -0
  13. data/lib/net/ssh/authentication/methods/password.rb +39 -0
  14. data/lib/net/ssh/authentication/methods/publickey.rb +92 -0
  15. data/lib/net/ssh/authentication/pageant.rb +176 -0
  16. data/lib/net/ssh/authentication/session.rb +116 -0
  17. data/lib/net/ssh/buffer.rb +339 -0
  18. data/lib/net/ssh/buffered_io.rb +149 -0
  19. data/lib/net/ssh/config.rb +173 -0
  20. data/lib/net/ssh/connection/channel.rb +575 -454
  21. data/lib/net/ssh/connection/constants.rb +31 -45
  22. data/lib/net/ssh/connection/session.rb +569 -0
  23. data/lib/net/ssh/connection/term.rb +176 -88
  24. data/lib/net/ssh/errors.rb +83 -61
  25. data/lib/net/ssh/key_factory.rb +85 -0
  26. data/lib/net/ssh/known_hosts.rb +129 -0
  27. data/lib/net/ssh/loggable.rb +61 -0
  28. data/lib/net/ssh/packet.rb +102 -0
  29. data/lib/net/ssh/prompt.rb +93 -0
  30. data/lib/net/ssh/proxy/errors.rb +8 -28
  31. data/lib/net/ssh/proxy/http.rb +75 -107
  32. data/lib/net/ssh/proxy/socks4.rb +35 -48
  33. data/lib/net/ssh/proxy/socks5.rb +76 -108
  34. data/lib/net/ssh/service/forward.rb +267 -0
  35. data/lib/net/ssh/test.rb +89 -0
  36. data/lib/net/ssh/test/channel.rb +129 -0
  37. data/lib/net/ssh/test/extensions.rb +152 -0
  38. data/lib/net/ssh/test/kex.rb +44 -0
  39. data/lib/net/ssh/test/local_packet.rb +51 -0
  40. data/lib/net/ssh/test/packet.rb +81 -0
  41. data/lib/net/ssh/test/remote_packet.rb +38 -0
  42. data/lib/net/ssh/test/script.rb +157 -0
  43. data/lib/net/ssh/test/socket.rb +59 -0
  44. data/lib/net/ssh/transport/algorithms.rb +384 -0
  45. data/lib/net/ssh/transport/cipher_factory.rb +72 -0
  46. data/lib/net/ssh/transport/constants.rb +22 -58
  47. data/lib/net/ssh/transport/hmac.rb +31 -0
  48. data/lib/net/ssh/transport/hmac/abstract.rb +48 -0
  49. data/lib/net/ssh/transport/hmac/md5.rb +12 -0
  50. data/lib/net/ssh/transport/hmac/md5_96.rb +11 -0
  51. data/lib/net/ssh/transport/hmac/none.rb +15 -0
  52. data/lib/net/ssh/transport/hmac/sha1.rb +13 -0
  53. data/lib/net/ssh/transport/hmac/sha1_96.rb +11 -0
  54. data/lib/net/ssh/transport/identity_cipher.rb +40 -0
  55. data/lib/net/ssh/transport/kex.rb +13 -0
  56. data/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +208 -0
  57. data/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +77 -0
  58. data/lib/net/ssh/{util → transport}/openssl.rb +22 -40
  59. data/lib/net/ssh/transport/packet_stream.rb +230 -0
  60. data/lib/net/ssh/transport/server_version.rb +61 -0
  61. data/lib/net/ssh/transport/session.rb +225 -303
  62. data/lib/net/ssh/transport/state.rb +170 -0
  63. data/lib/net/ssh/verifiers/lenient.rb +30 -0
  64. data/lib/net/ssh/verifiers/null.rb +12 -0
  65. data/lib/net/ssh/verifiers/strict.rb +53 -0
  66. data/lib/net/ssh/version.rb +57 -26
  67. data/net-ssh.gemspec +54 -0
  68. data/setup.rb +1585 -0
  69. data/test/authentication/methods/common.rb +28 -0
  70. data/test/authentication/methods/test_abstract.rb +51 -0
  71. data/test/authentication/methods/test_hostbased.rb +108 -0
  72. data/test/authentication/methods/test_keyboard_interactive.rb +98 -0
  73. data/test/authentication/methods/test_password.rb +50 -0
  74. data/test/authentication/methods/test_publickey.rb +123 -0
  75. data/test/authentication/test_agent.rb +205 -0
  76. data/test/authentication/test_key_manager.rb +100 -0
  77. data/test/authentication/test_session.rb +93 -0
  78. data/test/common.rb +106 -0
  79. data/test/configs/exact_match +8 -0
  80. data/test/configs/wild_cards +14 -0
  81. data/test/connection/test_channel.rb +452 -0
  82. data/test/connection/test_session.rb +483 -0
  83. data/test/test_all.rb +6 -0
  84. data/test/test_buffer.rb +336 -0
  85. data/test/test_buffered_io.rb +63 -0
  86. data/test/test_config.rb +78 -0
  87. data/test/test_key_factory.rb +67 -0
  88. data/test/transport/hmac/test_md5.rb +34 -0
  89. data/test/transport/hmac/test_md5_96.rb +25 -0
  90. data/test/transport/hmac/test_none.rb +34 -0
  91. data/test/transport/hmac/test_sha1.rb +34 -0
  92. data/test/transport/hmac/test_sha1_96.rb +25 -0
  93. data/test/transport/kex/test_diffie_hellman_group1_sha1.rb +146 -0
  94. data/test/transport/kex/test_diffie_hellman_group_exchange_sha1.rb +92 -0
  95. data/test/transport/test_algorithms.rb +302 -0
  96. data/test/transport/test_cipher_factory.rb +163 -0
  97. data/test/transport/test_hmac.rb +34 -0
  98. data/test/transport/test_identity_cipher.rb +40 -0
  99. data/test/transport/test_packet_stream.rb +433 -0
  100. data/test/transport/test_server_version.rb +55 -0
  101. data/test/transport/test_session.rb +312 -0
  102. data/test/transport/test_state.rb +173 -0
  103. metadata +102 -253
  104. data/ChangeLog +0 -560
  105. data/LICENSE +0 -7
  106. data/NEWS +0 -152
  107. data/README +0 -14
  108. data/bin/rb-keygen +0 -210
  109. data/doc/LICENSE-BSD +0 -27
  110. data/doc/LICENSE-GPL +0 -280
  111. data/doc/LICENSE-RUBY +0 -56
  112. data/doc/manual-html/chapter-1.html +0 -388
  113. data/doc/manual-html/chapter-2.html +0 -552
  114. data/doc/manual-html/chapter-3.html +0 -470
  115. data/doc/manual-html/chapter-4.html +0 -413
  116. data/doc/manual-html/chapter-5.html +0 -525
  117. data/doc/manual-html/chapter-6.html +0 -456
  118. data/doc/manual-html/chapter-7.html +0 -343
  119. data/doc/manual-html/index.html +0 -235
  120. data/doc/manual-html/stylesheets/manual.css +0 -270
  121. data/doc/manual-html/stylesheets/ruby.css +0 -17
  122. data/doc/manual/chapter.erb +0 -38
  123. data/doc/manual/example.erb +0 -18
  124. data/doc/manual/index.erb +0 -29
  125. data/doc/manual/manual.rb +0 -311
  126. data/doc/manual/manual.yml +0 -73
  127. data/doc/manual/page.erb +0 -87
  128. data/doc/manual/parts/0000.txt +0 -5
  129. data/doc/manual/parts/0001.txt +0 -3
  130. data/doc/manual/parts/0002.txt +0 -40
  131. data/doc/manual/parts/0003.txt +0 -6
  132. data/doc/manual/parts/0004.txt +0 -7
  133. data/doc/manual/parts/0005.txt +0 -1
  134. data/doc/manual/parts/0006.txt +0 -49
  135. data/doc/manual/parts/0007.txt +0 -67
  136. data/doc/manual/parts/0008.txt +0 -43
  137. data/doc/manual/parts/0009.txt +0 -14
  138. data/doc/manual/parts/0010.txt +0 -7
  139. data/doc/manual/parts/0011.txt +0 -14
  140. data/doc/manual/parts/0012.txt +0 -3
  141. data/doc/manual/parts/0013.txt +0 -20
  142. data/doc/manual/parts/0014.txt +0 -32
  143. data/doc/manual/parts/0015.txt +0 -14
  144. data/doc/manual/parts/0016.txt +0 -28
  145. data/doc/manual/parts/0017.txt +0 -50
  146. data/doc/manual/parts/0018.txt +0 -35
  147. data/doc/manual/parts/0019.txt +0 -7
  148. data/doc/manual/parts/0020.txt +0 -72
  149. data/doc/manual/parts/0021.txt +0 -50
  150. data/doc/manual/parts/0022.txt +0 -42
  151. data/doc/manual/parts/0023.txt +0 -51
  152. data/doc/manual/parts/0024.txt +0 -18
  153. data/doc/manual/parts/0025.txt +0 -18
  154. data/doc/manual/parts/0026.txt +0 -15
  155. data/doc/manual/parts/0027.txt +0 -37
  156. data/doc/manual/parts/0028.txt +0 -16
  157. data/doc/manual/parts/0029.txt +0 -1
  158. data/doc/manual/parts/0030.txt +0 -52
  159. data/doc/manual/parts/0031.txt +0 -25
  160. data/doc/manual/stylesheets/manual.css +0 -270
  161. data/doc/manual/stylesheets/ruby.css +0 -17
  162. data/doc/manual/tutorial.erb +0 -30
  163. data/examples/auth-forward.rb +0 -41
  164. data/examples/channel-demo.rb +0 -81
  165. data/examples/port-forward.rb +0 -51
  166. data/examples/process-demo.rb +0 -91
  167. data/examples/remote-net-port-forward.rb +0 -45
  168. data/examples/remote-port-forward.rb +0 -80
  169. data/examples/shell-demo.rb +0 -46
  170. data/examples/ssh-client.rb +0 -67
  171. data/examples/sync-shell-demo.rb +0 -69
  172. data/examples/tail-demo.rb +0 -49
  173. data/lib/net/ssh/connection/driver.rb +0 -446
  174. data/lib/net/ssh/connection/services.rb +0 -72
  175. data/lib/net/ssh/host-key-verifier.rb +0 -52
  176. data/lib/net/ssh/known-hosts.rb +0 -96
  177. data/lib/net/ssh/lenient-host-key-verifier.rb +0 -25
  178. data/lib/net/ssh/null-host-key-verifier.rb +0 -14
  179. data/lib/net/ssh/service/agentforward/driver.rb +0 -78
  180. data/lib/net/ssh/service/agentforward/services.rb +0 -41
  181. data/lib/net/ssh/service/forward/driver.rb +0 -319
  182. data/lib/net/ssh/service/forward/local-network-handler.rb +0 -71
  183. data/lib/net/ssh/service/forward/remote-network-handler.rb +0 -83
  184. data/lib/net/ssh/service/forward/services.rb +0 -76
  185. data/lib/net/ssh/service/process/driver.rb +0 -153
  186. data/lib/net/ssh/service/process/open.rb +0 -193
  187. data/lib/net/ssh/service/process/popen3.rb +0 -178
  188. data/lib/net/ssh/service/process/services.rb +0 -66
  189. data/lib/net/ssh/service/services.rb +0 -60
  190. data/lib/net/ssh/service/shell/driver.rb +0 -86
  191. data/lib/net/ssh/service/shell/services.rb +0 -54
  192. data/lib/net/ssh/service/shell/shell.rb +0 -222
  193. data/lib/net/ssh/service/shell/sync.rb +0 -114
  194. data/lib/net/ssh/session.rb +0 -305
  195. data/lib/net/ssh/transport/algorithm-negotiator.rb +0 -275
  196. data/lib/net/ssh/transport/compress/compressor.rb +0 -53
  197. data/lib/net/ssh/transport/compress/decompressor.rb +0 -53
  198. data/lib/net/ssh/transport/compress/none-compressor.rb +0 -39
  199. data/lib/net/ssh/transport/compress/none-decompressor.rb +0 -39
  200. data/lib/net/ssh/transport/compress/services.rb +0 -68
  201. data/lib/net/ssh/transport/compress/zlib-compressor.rb +0 -60
  202. data/lib/net/ssh/transport/compress/zlib-decompressor.rb +0 -52
  203. data/lib/net/ssh/transport/errors.rb +0 -47
  204. data/lib/net/ssh/transport/identity-cipher.rb +0 -61
  205. data/lib/net/ssh/transport/kex/dh-gex.rb +0 -106
  206. data/lib/net/ssh/transport/kex/dh.rb +0 -249
  207. data/lib/net/ssh/transport/kex/services.rb +0 -62
  208. data/lib/net/ssh/transport/ossl/buffer-factory.rb +0 -52
  209. data/lib/net/ssh/transport/ossl/buffer.rb +0 -87
  210. data/lib/net/ssh/transport/ossl/cipher-factory.rb +0 -98
  211. data/lib/net/ssh/transport/ossl/digest-factory.rb +0 -51
  212. data/lib/net/ssh/transport/ossl/hmac-factory.rb +0 -71
  213. data/lib/net/ssh/transport/ossl/hmac/hmac.rb +0 -62
  214. data/lib/net/ssh/transport/ossl/hmac/md5-96.rb +0 -44
  215. data/lib/net/ssh/transport/ossl/hmac/md5.rb +0 -46
  216. data/lib/net/ssh/transport/ossl/hmac/none.rb +0 -46
  217. data/lib/net/ssh/transport/ossl/hmac/services.rb +0 -68
  218. data/lib/net/ssh/transport/ossl/hmac/sha1-96.rb +0 -44
  219. data/lib/net/ssh/transport/ossl/hmac/sha1.rb +0 -45
  220. data/lib/net/ssh/transport/ossl/key-factory.rb +0 -116
  221. data/lib/net/ssh/transport/ossl/services.rb +0 -149
  222. data/lib/net/ssh/transport/packet-stream.rb +0 -236
  223. data/lib/net/ssh/transport/services.rb +0 -146
  224. data/lib/net/ssh/transport/version-negotiator.rb +0 -73
  225. data/lib/net/ssh/userauth/agent.rb +0 -222
  226. data/lib/net/ssh/userauth/constants.rb +0 -35
  227. data/lib/net/ssh/userauth/driver.rb +0 -183
  228. data/lib/net/ssh/userauth/methods/hostbased.rb +0 -119
  229. data/lib/net/ssh/userauth/methods/keyboard-interactive.rb +0 -104
  230. data/lib/net/ssh/userauth/methods/password.rb +0 -70
  231. data/lib/net/ssh/userauth/methods/publickey.rb +0 -137
  232. data/lib/net/ssh/userauth/methods/services.rb +0 -90
  233. data/lib/net/ssh/userauth/pageant.rb +0 -197
  234. data/lib/net/ssh/userauth/services.rb +0 -141
  235. data/lib/net/ssh/userauth/userkeys.rb +0 -258
  236. data/lib/net/ssh/util/buffer.rb +0 -274
  237. data/lib/net/ssh/util/prompter.rb +0 -73
  238. data/test/ALL-TESTS.rb +0 -18
  239. data/test/connection/tc_channel.rb +0 -136
  240. data/test/connection/tc_driver.rb +0 -287
  241. data/test/connection/tc_integration.rb +0 -87
  242. data/test/proxy/tc_http.rb +0 -209
  243. data/test/proxy/tc_socks4.rb +0 -148
  244. data/test/proxy/tc_socks5.rb +0 -214
  245. data/test/service/agentforward/tc_driver.rb +0 -138
  246. data/test/service/forward/tc_driver.rb +0 -289
  247. data/test/service/forward/tc_local_network_handler.rb +0 -123
  248. data/test/service/forward/tc_remote_network_handler.rb +0 -111
  249. data/test/service/process/tc_driver.rb +0 -79
  250. data/test/service/process/tc_integration.rb +0 -119
  251. data/test/service/process/tc_open.rb +0 -179
  252. data/test/service/process/tc_popen3.rb +0 -164
  253. data/test/tc_integration.rb +0 -80
  254. data/test/transport/compress/tc_none_compress.rb +0 -41
  255. data/test/transport/compress/tc_none_decompress.rb +0 -45
  256. data/test/transport/compress/tc_zlib_compress.rb +0 -61
  257. data/test/transport/compress/tc_zlib_decompress.rb +0 -48
  258. data/test/transport/kex/tc_dh.rb +0 -312
  259. data/test/transport/kex/tc_dh_gex.rb +0 -71
  260. data/test/transport/ossl/fixtures/dsa-encrypted +0 -15
  261. data/test/transport/ossl/fixtures/dsa-encrypted-bad +0 -15
  262. data/test/transport/ossl/fixtures/dsa-unencrypted +0 -12
  263. data/test/transport/ossl/fixtures/dsa-unencrypted-bad +0 -12
  264. data/test/transport/ossl/fixtures/dsa-unencrypted.pub +0 -1
  265. data/test/transport/ossl/fixtures/not-a-private-key +0 -4
  266. data/test/transport/ossl/fixtures/not-supported +0 -2
  267. data/test/transport/ossl/fixtures/rsa-encrypted +0 -18
  268. data/test/transport/ossl/fixtures/rsa-encrypted-bad +0 -18
  269. data/test/transport/ossl/fixtures/rsa-unencrypted +0 -15
  270. data/test/transport/ossl/fixtures/rsa-unencrypted-bad +0 -15
  271. data/test/transport/ossl/fixtures/rsa-unencrypted.pub +0 -1
  272. data/test/transport/ossl/hmac/tc_hmac.rb +0 -58
  273. data/test/transport/ossl/hmac/tc_md5.rb +0 -50
  274. data/test/transport/ossl/hmac/tc_md5_96.rb +0 -50
  275. data/test/transport/ossl/hmac/tc_none.rb +0 -50
  276. data/test/transport/ossl/hmac/tc_sha1.rb +0 -50
  277. data/test/transport/ossl/hmac/tc_sha1_96.rb +0 -50
  278. data/test/transport/ossl/tc_buffer.rb +0 -97
  279. data/test/transport/ossl/tc_buffer_factory.rb +0 -67
  280. data/test/transport/ossl/tc_cipher_factory.rb +0 -84
  281. data/test/transport/ossl/tc_digest_factory.rb +0 -39
  282. data/test/transport/ossl/tc_hmac_factory.rb +0 -72
  283. data/test/transport/ossl/tc_key_factory.rb +0 -199
  284. data/test/transport/tc_algorithm_negotiator.rb +0 -170
  285. data/test/transport/tc_identity_cipher.rb +0 -52
  286. data/test/transport/tc_integration.rb +0 -115
  287. data/test/transport/tc_packet_stream.rb +0 -184
  288. data/test/transport/tc_session.rb +0 -296
  289. data/test/transport/tc_version_negotiator.rb +0 -86
  290. data/test/userauth/methods/tc_hostbased.rb +0 -136
  291. data/test/userauth/methods/tc_password.rb +0 -89
  292. data/test/userauth/methods/tc_publickey.rb +0 -167
  293. data/test/userauth/tc_agent.rb +0 -223
  294. data/test/userauth/tc_driver.rb +0 -190
  295. data/test/userauth/tc_integration.rb +0 -97
  296. data/test/userauth/tc_userkeys.rb +0 -265
  297. data/test/util/tc_buffer.rb +0 -217
@@ -1,19 +1,3 @@
1
- #--
2
- # =============================================================================
3
- # Copyright (c) 2004,2005 Jamis Buck (jamis@37signals.com)
4
- # All rights reserved.
5
- #
6
- # This source file is distributed as part of the Net::SSH Secure Shell Client
7
- # library for Ruby. This file (and the library as a whole) may be used only as
8
- # allowed by either the BSD license, or the Ruby license (or, by association
9
- # with the Ruby license, the GPL). See the "doc" subdirectory of the Net::SSH
10
- # distribution for the texts of these licenses.
11
- # -----------------------------------------------------------------------------
12
- # net-ssh website : http://net-ssh.rubyforge.org
13
- # project website: http://rubyforge.org/projects/net-ssh
14
- # =============================================================================
15
- #++
16
-
17
1
  require 'socket'
18
2
  require 'resolv'
19
3
  require 'ipaddr'
@@ -23,25 +7,39 @@ module Net
23
7
  module SSH
24
8
  module Proxy
25
9
 
26
- # An implementation of a socket factory that returns a socket which
27
- # will tunnel the connection through a SOCKS4 proxy. It allows explicit
28
- # specification of the user, but if it is not given it will look in the
29
- # SOCKS_USER and CONNECT_USER environment variables as well.
10
+ # An implementation of a SOCKS4 proxy. To use it, instantiate it, then
11
+ # pass the instantiated object via the :proxy key to Net::SSH.start:
12
+ #
13
+ # require 'net/ssh/proxy/socks4'
14
+ #
15
+ # proxy = Net::SSH::Proxy::SOCKS4.new('proxy.host', proxy_port, :user => 'user')
16
+ # Net::SSH.start('host', 'user', :proxy => proxy) do |ssh|
17
+ # ...
18
+ # end
30
19
  class SOCKS4
31
20
 
32
- SOCKS_VERSION = 4
21
+ # The SOCKS protocol version used by this class
22
+ VERSION = 4
23
+
24
+ # The packet type for connection requests
25
+ CONNECT = 1
26
+
27
+ # The status code for a successful connection
28
+ GRANTED = 90
29
+
30
+ # The proxy's host name or IP address, as given to the constructor.
31
+ attr_reader :proxy_host
33
32
 
34
- SOCKS_CMD_CONNECT = 1
33
+ # The proxy's port number.
34
+ attr_reader :proxy_port
35
35
 
36
- SOCKS_GRANTED = 90
37
- SOCKS_REJECTED = 91
38
- SOCKS_IDENTD_REJECT = 92
39
- SOCKS_IDENTD_BAD = 93
36
+ # The additional options that were given to the proxy's constructor.
37
+ attr_reader :options
40
38
 
41
39
  # Create a new proxy connection to the given proxy host and port.
42
- # Optionally, a @:user@ option may be given to identify the username
40
+ # Optionally, a :user key may be given to identify the username
43
41
  # with which to authenticate.
44
- def initialize( proxy_host, proxy_port=1080, options={} )
42
+ def initialize(proxy_host, proxy_port=1080, options={})
45
43
  @proxy_host = proxy_host
46
44
  @proxy_port = proxy_port
47
45
  @options = options
@@ -49,32 +47,21 @@ module Net
49
47
 
50
48
  # Return a new socket connected to the given host and port via the
51
49
  # proxy that was requested when the socket factory was instantiated.
52
- def open( host, port )
53
- sock = TCPSocket.new( @proxy_host, @proxy_port )
54
-
55
- ip_addr = IPAddr.new( Resolv.getaddress( host ) )
50
+ def open(host, port)
51
+ socket = TCPSocket.new(proxy_host, proxy_port)
52
+ ip_addr = IPAddr.new(Resolv.getaddress(host))
56
53
 
57
- packet = [ SOCKS_VERSION, SOCKS_CMD_CONNECT,
58
- port.to_i, ip_addr.to_i,
59
- proxy_user, 0 ].pack( "CCnNA*C" )
60
- sock.send packet, 0
54
+ packet = [VERSION, CONNECT, port.to_i, ip_addr.to_i, options[:user]].pack("CCnNZ*")
55
+ socket.send packet, 0
61
56
 
62
- version, status, port, ip = sock.recv( 8 ).unpack( "CCnN" )
63
- if status != SOCKS_GRANTED
64
- sock.close
57
+ version, status, port, ip = socket.recv(8).unpack("CCnN")
58
+ if status != GRANTED
59
+ socket.close
65
60
  raise ConnectError, "error connecting to proxy (#{status})"
66
61
  end
67
62
 
68
- return sock
69
- end
70
-
71
- def proxy_user
72
- return @options[ :user ] if @options[ :user ]
73
- return ENV['SOCKS_USER'] if ENV['SOCKS_USER']
74
- return ENV['CONNECT_USER'] if ENV['CONNECT_USER']
75
- return nil
63
+ return socket
76
64
  end
77
- private :proxy_user
78
65
 
79
66
  end
80
67
 
@@ -1,19 +1,3 @@
1
- #--
2
- # =============================================================================
3
- # Copyright (c) 2004,2005 Jamis Buck (jamis@37signals.com)
4
- # All rights reserved.
5
- #
6
- # This source file is distributed as part of the Net::SSH Secure Shell Client
7
- # library for Ruby. This file (and the library as a whole) may be used only as
8
- # allowed by either the BSD license, or the Ruby license (or, by association
9
- # with the Ruby license, the GPL). See the "doc" subdirectory of the Net::SSH
10
- # distribution for the texts of these licenses.
11
- # -----------------------------------------------------------------------------
12
- # net-ssh website : http://net-ssh.rubyforge.org
13
- # project website: http://rubyforge.org/projects/net-ssh
14
- # =============================================================================
15
- #++
16
-
17
1
  require 'socket'
18
2
  require 'net/ssh/proxy/errors'
19
3
 
@@ -21,41 +5,55 @@ module Net
21
5
  module SSH
22
6
  module Proxy
23
7
 
24
- # An implementation of a socket factory that returns a socket which
25
- # will tunnel the connection through a SOCKS5 proxy. It allows explicit
26
- # specification of the user and password, but if none are given it
27
- # will look in the SOCKS_USER/SOCKS_PASSWORD and
28
- # CONNECT_USER/CONNECT_PASSWORD environment variables as well.
8
+ # An implementation of a SOCKS5 proxy. To use it, instantiate it, then
9
+ # pass the instantiated object via the :proxy key to Net::SSH.start:
10
+ #
11
+ # require 'net/ssh/proxy/socks5'
12
+ #
13
+ # proxy = Net::SSH::Proxy::SOCKS5.new('proxy.host', proxy_port,
14
+ # :user => 'user', :password => "password")
15
+ # Net::SSH.start('host', 'user', :proxy => proxy) do |ssh|
16
+ # ...
17
+ # end
29
18
  class SOCKS5
19
+ # The SOCKS protocol version used by this class
20
+ VERSION = 5
21
+
22
+ # The SOCKS authentication type for requests without authentication
23
+ METHOD_NO_AUTH = 0
24
+
25
+ # The SOCKS authentication type for requests via username/password
26
+ METHOD_PASSWD = 2
27
+
28
+ # The SOCKS authentication type for when there are no supported
29
+ # authentication methods.
30
+ METHOD_NONE = 0xFF
31
+
32
+ # The SOCKS packet type for requesting a proxy connection.
33
+ CMD_CONNECT = 1
34
+
35
+ # The SOCKS address type for connections via IP address.
36
+ ATYP_IPV4 = 1
30
37
 
31
- SOCKS_VERSION = 5
38
+ # The SOCKS address type for connections via domain name.
39
+ ATYP_DOMAIN = 3
32
40
 
33
- SOCKS_METHOD_NO_AUTH = 0
34
- SOCKS_METHOD_GSSAPI = 1
35
- SOCKS_METHOD_PASSWD = 2
41
+ # The SOCKS response code for a successful operation.
42
+ SUCCESS = 0
36
43
 
37
- SOCKS_METHOD_NONE = 0xFF
38
-
39
- SOCKS_CMD_CONNECT = 1
44
+ # The proxy's host name or IP address
45
+ attr_reader :proxy_host
40
46
 
41
- SOCKS_ATYP_IPV4 = 1
42
- SOCKS_ATYP_DOMAIN = 3
43
- SOCKS_ATYP_IPV6 = 4
47
+ # The proxy's port number
48
+ attr_reader :proxy_port
44
49
 
45
- SOCKS_SUCCESS = 0
46
- SOCKS_FAILURE = 1
47
- SOCKS_NOT_ALLOWED = 2
48
- SOCKS_NETWORK_UNREACHABLE = 3
49
- SOCKS_HOST_UNREACHABLE = 4
50
- SOCKS_REFUSED = 5
51
- SOCKS_TTL_EXPIRED = 6
52
- SOCKS_CMD_NOT_SUPPORTED = 7
53
- SOCKS_ADDR_NOT_SUPPORTED = 8
50
+ # The map of options given at initialization
51
+ attr_reader :options
54
52
 
55
53
  # Create a new proxy connection to the given proxy host and port.
56
- # Optionally, @:user@ and @:password@ options may be given to
54
+ # Optionally, :user and :password options may be given to
57
55
  # identify the username and password with which to authenticate.
58
- def initialize( proxy_host, proxy_port=1080, options={} )
56
+ def initialize(proxy_host, proxy_port=1080, options={})
59
57
  @proxy_host = proxy_host
60
58
  @proxy_port = proxy_port
61
59
  @options = options
@@ -63,96 +61,66 @@ module Net
63
61
 
64
62
  # Return a new socket connected to the given host and port via the
65
63
  # proxy that was requested when the socket factory was instantiated.
66
- def open( host, port )
67
- sock = TCPSocket.new( @proxy_host, @proxy_port )
64
+ def open(host, port)
65
+ socket = TCPSocket.new(proxy_host, proxy_port)
68
66
 
69
- methods = [ SOCKS_METHOD_NO_AUTH ]
70
- methods << SOCKS_METHOD_PASSWD if proxy_user
67
+ methods = [METHOD_NO_AUTH]
68
+ methods << METHOD_PASSWD if options[:user]
71
69
 
72
- packet = [ SOCKS_VERSION, methods.size, *methods ].pack( "C*" )
73
- sock.send packet, 0
70
+ packet = [VERSION, methods.size, *methods].pack("C*")
71
+ socket.send packet, 0
74
72
 
75
- version, method = sock.recv( 2 ).unpack( "CC" )
76
- if version != 5
77
- sock.close
78
- raise Net::SSH::Proxy::Error,
79
- "invalid SOCKS version (#{version})"
73
+ version, method = socket.recv(2).unpack("CC")
74
+ if version != VERSION
75
+ socket.close
76
+ raise Net::SSH::Proxy::Error, "invalid SOCKS version (#{version})"
80
77
  end
81
78
 
82
- if method == SOCKS_METHOD_NONE
83
- sock.close
84
- raise Net::SSH::Proxy::Error,
85
- "no supported authorization methods"
79
+ if method == METHOD_NONE
80
+ socket.close
81
+ raise Net::SSH::Proxy::Error, "no supported authorization methods"
86
82
  end
87
83
 
88
- case method
89
- when SOCKS_METHOD_NO_AUTH
90
- # no method-dependent subnegotiation required
91
-
92
- when SOCKS_METHOD_PASSWD
93
- negotiate_password( sock )
94
- end
84
+ negotiate_password(socket) if method == METHOD_PASSWD
95
85
 
96
- packet = [ SOCKS_VERSION, SOCKS_CMD_CONNECT, 0 ].pack( "C*" )
86
+ packet = [VERSION, CMD_CONNECT, 0].pack("C*")
97
87
 
98
88
  if host =~ /^(\d+)\.(\d+)\.(\d+)\.(\d+)$/
99
- packet << [ SOCKS_ATYP_IPV4, $1.to_i, $2.to_i,
100
- $3.to_i, $4.to_i ].pack( "C*" )
89
+ packet << [ATYP_IPV4, $1.to_i, $2.to_i, $3.to_i, $4.to_i].pack("C*")
101
90
  else
102
- packet << [ SOCKS_ATYP_DOMAIN, host.length, host ].pack( "CCA*" )
91
+ packet << [ATYP_DOMAIN, host.length, host].pack("CCA*")
103
92
  end
104
93
 
105
- packet << [ port ].pack( "n" )
106
- sock.send packet, 0
94
+ packet << [port].pack("n")
95
+ socket.send packet, 0
107
96
 
108
- version, reply, = sock.recv( 4 ).unpack( "C*" )
109
- len = sock.recv( 1 )[0]
110
- sock.recv( len + 2 )
97
+ version, reply, = socket.recv(4).unpack("C*")
98
+ len = socket.recv(1)[0]
99
+ socket.recv(len + 2)
111
100
 
112
- unless reply == SOCKS_SUCCESS
113
- sock.close
101
+ unless reply == SUCCESS
102
+ socket.close
114
103
  raise ConnectError, "#{reply}"
115
104
  end
116
105
 
117
- return sock
106
+ return socket
118
107
  end
119
108
 
120
- # Simple username/password negotiation with the SOCKS5 server.
121
- def negotiate_password( socket )
122
- user = proxy_user
123
- passwd = proxy_password
124
-
125
- packet = [ 0x01,
126
- user.length, user,
127
- passwd.length, passwd ].pack( "CCA*CA*" )
109
+ private
128
110
 
129
- socket.send packet, 0
111
+ # Simple username/password negotiation with the SOCKS5 server.
112
+ def negotiate_password(socket)
113
+ packet = [0x01, options[:user].length, options[:user],
114
+ options[:password].length, options[:password]].pack("CCA*CA*")
115
+ socket.send packet, 0
130
116
 
131
- version, status = socket.recv( 2 ).unpack( "CC" )
117
+ version, status = socket.recv(2).unpack("CC")
132
118
 
133
- if status != SOCKS_SUCCESS
134
- socket.close
135
- raise UnauthorizedError, "could not authorize user"
119
+ if status != SUCCESS
120
+ socket.close
121
+ raise UnauthorizedError, "could not authorize user"
122
+ end
136
123
  end
137
- end
138
- private :negotiate_password
139
-
140
- def proxy_user
141
- return @options[ :user ] if @options[ :user ]
142
- return ENV['SOCKS_USER'] if ENV['SOCKS_USER']
143
- return ENV['CONNECT_USER'] if ENV['CONNECT_USER']
144
- return nil
145
- end
146
- private :proxy_user
147
-
148
- def proxy_password
149
- return @options[ :password ] if @options[ :password ]
150
- return ENV['SOCKS_PASSWORD'] if ENV['SOCKS_PASSWORD']
151
- return ENV['CONNECT_PASSWORD'] if ENV['CONNECT_PASSWORD']
152
- return ""
153
- end
154
- private :proxy_password
155
-
156
124
  end
157
125
 
158
126
  end
@@ -0,0 +1,267 @@
1
+ require 'net/ssh/loggable'
2
+
3
+ module Net; module SSH; module Service
4
+
5
+ # This class implements various port forwarding services for use by
6
+ # Net::SSH clients. The Forward class should never need to be instantiated
7
+ # directly; instead, it should be accessed via the singleton instance
8
+ # returned by Connection::Session#forward:
9
+ #
10
+ # ssh.forward.local(1234, "www.capify.org", 80)
11
+ class Forward
12
+ include Loggable
13
+
14
+ # The underlying connection service instance that the port-forwarding
15
+ # services employ.
16
+ attr_reader :session
17
+
18
+ # A simple class for representing a requested remote forwarded port.
19
+ Remote = Struct.new(:host, :port) #:nodoc:
20
+
21
+ # Instantiates a new Forward service instance atop the given connection
22
+ # service session. This will register new channel open handlers to handle
23
+ # the specialized channels that the SSH port forwarding protocols employ.
24
+ def initialize(session)
25
+ @session = session
26
+ self.logger = session.logger
27
+ @remote_forwarded_ports = {}
28
+ @local_forwarded_ports = {}
29
+ @agent_forwarded = false
30
+
31
+ session.on_open_channel('forwarded-tcpip', &method(:forwarded_tcpip))
32
+ session.on_open_channel('auth-agent', &method(:auth_agent_channel))
33
+ session.on_open_channel('auth-agent@openssh.com', &method(:auth_agent_channel))
34
+ end
35
+
36
+ # Starts listening for connections on the local host, and forwards them
37
+ # to the specified remote host/port via the SSH connection. This method
38
+ # accepts either three or four arguments. When four arguments are given,
39
+ # they are:
40
+ #
41
+ # * the local address to bind to
42
+ # * the local port to listen on
43
+ # * the remote host to forward connections to
44
+ # * the port on the remote host to connect to
45
+ #
46
+ # If three arguments are given, it is as if the local bind address is
47
+ # "127.0.0.1", and the rest are applied as above.
48
+ #
49
+ # ssh.forward.local(1234, "www.capify.org", 80)
50
+ # ssh.forward.local("0.0.0.0", 1234, "www.capify.org", 80)
51
+ def local(*args)
52
+ if args.length < 3 || args.length > 4
53
+ raise ArgumentError, "expected 3 or 4 parameters, got #{args.length}"
54
+ end
55
+
56
+ bind_address = "127.0.0.1"
57
+ bind_address = args.shift if args.first.is_a?(String) && args.first =~ /\D/
58
+
59
+ local_port = args.shift.to_i
60
+ remote_host = args.shift
61
+ remote_port = args.shift.to_i
62
+
63
+ socket = TCPServer.new(bind_address, local_port)
64
+
65
+ @local_forwarded_ports[[local_port, bind_address]] = socket
66
+
67
+ session.listen_to(socket) do |socket|
68
+ client = socket.accept
69
+ debug { "received connection on #{bind_address}:#{local_port}" }
70
+
71
+ channel = session.open_channel("direct-tcpip", :string, remote_host, :long, remote_port, :string, bind_address, :long, local_port) do |channel|
72
+ channel.info { "direct channel established" }
73
+ end
74
+
75
+ prepare_client(client, channel, :local)
76
+
77
+ channel.on_open_failed do |ch, code, description|
78
+ channel.error { "could not establish direct channel: #{description} (#{code})" }
79
+ channel[:socket].close
80
+ end
81
+ end
82
+ end
83
+
84
+ # Terminates an active local forwarded port. If no such forwarded port
85
+ # exists, this will raise an exception. Otherwise, the forwarded connection
86
+ # is terminated.
87
+ #
88
+ # ssh.forward.cancel_local(1234)
89
+ # ssh.forward.cancel_local(1234, "0.0.0.0")
90
+ def cancel_local(port, bind_address="127.0.0.1")
91
+ socket = @local_forwarded_ports.delete([port, bind_address])
92
+ socket.shutdown rescue nil
93
+ socket.close rescue nil
94
+ session.stop_listening_to(socket)
95
+ end
96
+
97
+ # Returns a list of all active locally forwarded ports. The returned value
98
+ # is an array of arrays, where each element is a two-element tuple
99
+ # consisting of the local port and bind address corresponding to the
100
+ # forwarding port.
101
+ def active_locals
102
+ @local_forwarded_ports.keys
103
+ end
104
+
105
+ # Requests that all connections on the given remote-port be forwarded via
106
+ # the local host to the given port/host. The last argument describes the
107
+ # bind address on the remote host, and defaults to 127.0.0.1.
108
+ #
109
+ # This method will return immediately, but the port will not actually be
110
+ # forwarded immediately. If the remote server is not able to begin the
111
+ # listener for this request, an exception will be raised asynchronously.
112
+ #
113
+ # If you want to know when the connection is active, it will show up in the
114
+ # #active_remotes list. If you want to block until the port is active, you
115
+ # could do something like this:
116
+ #
117
+ # ssh.forward.remote(80, "www.google.com", 1234, "0.0.0.0")
118
+ # ssh.loop { !ssh.forward.active_remotes.include?([1234, "0.0.0.0"]) }
119
+ def remote(port, host, remote_port, remote_host="127.0.0.1")
120
+ session.send_global_request("tcpip-forward", :string, remote_host, :long, remote_port) do |success, response|
121
+ if success
122
+ debug { "remote forward from remote #{remote_host}:#{remote_port} to #{host}:#{port} established" }
123
+ @remote_forwarded_ports[[remote_port, remote_host]] = Remote.new(host, port)
124
+ else
125
+ error { "remote forwarding request failed" }
126
+ raise Net::SSH::Exception, "remote forwarding request failed"
127
+ end
128
+ end
129
+ end
130
+
131
+ # an alias, for token backwards compatibility with the 1.x API
132
+ alias :remote_to :remote
133
+
134
+ # Requests that a remote forwarded port be cancelled. The remote forwarded
135
+ # port on the remote host, bound to the given address on the remote host,
136
+ # will be terminated, but not immediately. This method returns immediately
137
+ # after queueing the request to be sent to the server. If for some reason
138
+ # the port cannot be cancelled, an exception will be raised (asynchronously).
139
+ #
140
+ # If you want to know when the connection has been cancelled, it will no
141
+ # longer be present in the #active_remotes list. If you want to block until
142
+ # the port is no longer active, you could do something like this:
143
+ #
144
+ # ssh.forward.cancel_remote(1234, "0.0.0.0")
145
+ # ssh.loop { ssh.forward.active_remotes.include?([1234, "0.0.0.0"]) }
146
+ def cancel_remote(port, host="127.0.0.1")
147
+ session.send_global_request("cancel-tcpip-forward", :string, host, :long, port) do |success, response|
148
+ if success
149
+ @remote_forwarded_ports.delete([port, host])
150
+ else
151
+ raise Net::SSH::Exception, "could not cancel remote forward request on #{host}:#{port}"
152
+ end
153
+ end
154
+ end
155
+
156
+ # Returns all active forwarded remote ports. The returned value is an
157
+ # array of two-element tuples, where the first element is the port on the
158
+ # remote host and the second is the bind address.
159
+ def active_remotes
160
+ @remote_forwarded_ports.keys
161
+ end
162
+
163
+ # Enables SSH agent forwarding on the given channel. The forwarded agent
164
+ # will remain active even after the channel closes--the channel is only
165
+ # used as the transport for enabling the forwarded connection. You should
166
+ # never need to call this directly--it is called automatically the first
167
+ # time a session channel is opened, when the connection was created with
168
+ # :forward_agent set to true:
169
+ #
170
+ # Net::SSH.start("remote.host", "me", :forwrd_agent => true) do |ssh|
171
+ # ssh.open_channel do |ch|
172
+ # # agent will be automatically forwarded by this point
173
+ # end
174
+ # ssh.loop
175
+ # end
176
+ def agent(channel)
177
+ return if @agent_forwarded
178
+ @agent_forwarded = true
179
+
180
+ channel.send_channel_request("auth-agent-req@openssh.com") do |channel, success|
181
+ if success
182
+ debug { "authentication agent forwarding is active" }
183
+ else
184
+ channel.send_channel_request("auth-agent-req") do |channel, success|
185
+ if success
186
+ debug { "authentication agent forwarding is active" }
187
+ else
188
+ error { "could not establish forwarding of authentication agent" }
189
+ end
190
+ end
191
+ end
192
+ end
193
+ end
194
+
195
+ private
196
+
197
+ # Perform setup operations that are common to all forwarded channels.
198
+ # +client+ is a socket, +channel+ is the channel that was just created,
199
+ # and +type+ is an arbitrary string describing the type of the channel.
200
+ def prepare_client(client, channel, type)
201
+ client.extend(Net::SSH::BufferedIo)
202
+ client.logger = logger
203
+
204
+ session.listen_to(client)
205
+ channel[:socket] = client
206
+
207
+ channel.on_data do |ch, data|
208
+ ch[:socket].enqueue(data)
209
+ end
210
+
211
+ channel.on_close do |ch|
212
+ debug { "closing #{type} forwarded channel" }
213
+ ch[:socket].close if !client.closed?
214
+ session.stop_listening_to(ch[:socket])
215
+ end
216
+
217
+ channel.on_process do |ch|
218
+ if ch[:socket].closed?
219
+ ch.info { "#{type} forwarded connection closed" }
220
+ ch.close
221
+ elsif ch[:socket].available > 0
222
+ data = ch[:socket].read_available(8192)
223
+ ch.debug { "read #{data.length} bytes from client, sending over #{type} forwarded connection" }
224
+ ch.send_data(data)
225
+ end
226
+ end
227
+ end
228
+
229
+ # The callback used when a new "forwarded-tcpip" channel is requested
230
+ # by the server. This will open a new socket to the host/port specified
231
+ # when the forwarded connection was first requested.
232
+ def forwarded_tcpip(session, channel, packet)
233
+ connected_address = packet.read_string
234
+ connected_port = packet.read_long
235
+ originator_address = packet.read_string
236
+ originator_port = packet.read_long
237
+
238
+ remote = @remote_forwarded_ports[[connected_port, connected_address]]
239
+
240
+ if remote.nil?
241
+ raise Net::SSH::ChannelOpenFailed.new(1, "unknown request from remote forwarded connection on #{connected_address}:#{connected_port}")
242
+ end
243
+
244
+ client = TCPSocket.new(remote.host, remote.port)
245
+ info { "connected #{connected_address}:#{connected_port} originator #{originator_address}:#{originator_port}" }
246
+
247
+ prepare_client(client, channel, :remote)
248
+ rescue SocketError => err
249
+ raise Net::SSH::ChannelOpenFailed.new(2, "could not connect to remote host (#{remote.host}:#{remote.port}): #{err.message}")
250
+ end
251
+
252
+ # The callback used when an auth-agent channel is requested by the server.
253
+ def auth_agent_channel(session, channel, packet)
254
+ info { "opening auth-agent channel" }
255
+ channel[:invisible] = true
256
+
257
+ begin
258
+ agent = Authentication::Agent.connect(logger)
259
+ prepare_client(agent.socket, channel, :agent)
260
+ rescue Exception => e
261
+ error { "attempted to connect to agent but failed: #{e.class.name} (#{e.message})" }
262
+ raise ChannelOpenFailure.new(2, "could not connect to authentication agent")
263
+ end
264
+ end
265
+ end
266
+
267
+ end; end; end