All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.sshtools.client.components.Rsa1024Sha1 Maven / Gradle / Ivy

package com.sshtools.client.components;

/*-
 * #%L
 * Client API
 * %%
 * Copyright (C) 2002 - 2024 JADAPTIVE Limited
 * %%
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU Lesser General Public License as
 * published by the Free Software Foundation, either version 3 of the
 * License, or (at your option) any later version.
 * 
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Lesser Public License for more details.
 * 
 * You should have received a copy of the GNU General Lesser Public
 * License along with this program.  If not, see
 * .
 * #L%
 */

import java.io.IOException;
import java.math.BigInteger;
import java.nio.ByteBuffer;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;

import javax.crypto.Cipher;
import javax.crypto.NoSuchPaddingException;

import com.sshtools.client.SshClientContext;
import com.sshtools.client.SshKeyExchangeClient;
import com.sshtools.client.SshKeyExchangeClientFactory;
import com.sshtools.common.logger.Log;
import com.sshtools.common.publickey.SshPublicKeyFileFactory;
import com.sshtools.common.ssh.SecurityLevel;
import com.sshtools.common.ssh.SshException;
import com.sshtools.common.ssh.components.ComponentManager;
import com.sshtools.common.ssh.components.Digest;
import com.sshtools.common.ssh.components.SshPrivateKey;
import com.sshtools.common.ssh.components.SshPublicKey;
import com.sshtools.common.ssh.components.SshRsaPublicKey;
import com.sshtools.common.ssh.components.jce.JCEComponentManager;
import com.sshtools.common.ssh.components.jce.JCEProvider;
import com.sshtools.common.sshd.SshMessage;
import com.sshtools.common.util.ByteArrayReader;
import com.sshtools.common.util.ByteArrayWriter;
import com.sshtools.synergy.ssh.SshTransport;
import com.sshtools.synergy.ssh.TransportProtocol;
import com.sshtools.synergy.ssh.components.jce.AbstractKeyExchange;

/**
 *
 * 

* Implementation of RFC 4432 https://tools.ietf.org/html/rfc4432 *

* * @author Lee David Painter */ public class Rsa1024Sha1 extends SshKeyExchangeClient implements AbstractKeyExchange { /** * Constant for the algorithm name "rsa1024-sha1". */ public static final String RSA_1024_SHA1 = "rsa1024-sha1"; public static class Rsa1024Sha1Factory implements SshKeyExchangeClientFactory { @Override public Rsa1024Sha1 create() throws NoSuchAlgorithmException, IOException { return new Rsa1024Sha1(); } @Override public String[] getKeys() { return new String[] { RSA_1024_SHA1 }; } } final static int SSH_MSG_KEXRSA_PUBKEY = 30; final static int SSH_MSG_KEXRSA_SECRET = 31; final static int SSH_MSG_KEXRSA_DONE = 32; Cipher cipher; byte[] tk; byte[] encryptedSecret; private String clientId; private String serverId; private byte[] clientKexInit; private byte[] serverKexInit; private byte[] s = new byte[80]; /** * Construct an uninitialized instance. */ public Rsa1024Sha1() { super("SHA-1", SecurityLevel.WEAK, 1); } /** * Get the algorithm name for this key exchange * * @return "diffie-hellman-group1-sha1" */ public String getAlgorithm() { return RSA_1024_SHA1; } public String getProvider() { return cipher.getProvider().getName(); } public void test() { try { ComponentManager.getInstance().supportedDigests().getInstance(getHashAlgorithm()); initCrypto(); } catch (Throwable e) { throw new IllegalStateException(e.getMessage(), e); } } void initCrypto() throws NoSuchAlgorithmException, InvalidAlgorithmParameterException, InvalidKeyException, NoSuchPaddingException { cipher = Cipher.getInstance(JCEProvider.getRSAOAEPSHA1AlgorithmName()); } @Override public void init(SshTransport transport, String clientId, String serverId, byte[] clientKexInit, byte[] serverKexInit, SshPrivateKey prvkey, SshPublicKey pubkey, boolean firstPacketFollows, boolean useFirstPacket) throws IOException, SshException { this.transport = transport; this.clientId = clientId; this.serverId = serverId; this.clientKexInit = clientKexInit; this.serverKexInit = serverKexInit; try { initCrypto(); } catch (Exception ex) { throw new SshException(ex, SshException.JCE_ERROR); } } @Override public boolean processMessage(byte[] tmp) throws SshException, IOException { switch(tmp[0]) { case SSH_MSG_KEXRSA_PUBKEY: try (ByteArrayWriter msg = new ByteArrayWriter()) { try (ByteArrayReader r = new ByteArrayReader(tmp)) { r.skip(1); hostKey = r.readBinaryString(); tk = r.readBinaryString(); } SshRsaPublicKey key = ((SshRsaPublicKey) SshPublicKeyFileFactory.decodeSSH2PublicKey(tk)); JCEComponentManager.getSecureRandom().nextBytes(s); cipher.init(Cipher.ENCRYPT_MODE, key.getJCEPublicKey()); try (ByteArrayWriter w = new ByteArrayWriter()) { w.writeBinaryString(s); encryptedSecret = cipher.doFinal(w.toByteArray()); } if(Log.isDebugEnabled()) { Log.debug("Sending SSH_MSG_KEXRSA_SECRET"); } transport.postMessage(new SshMessage() { public boolean writeMessageIntoBuffer(ByteBuffer buf) { buf.put((byte) SSH_MSG_KEXRSA_SECRET); buf.putInt(encryptedSecret.length); buf.put(encryptedSecret); return true; } public void messageSent(Long sequenceNo) { if (Log.isDebugEnabled()) Log.debug("Sent SSH_MSG_KEX_ECDH_INIT"); } }, true); } catch (Throwable ex) { throw new SshException("Failed to write SSH_MSG_KEXRSA_SECRET to message buffer", SshException.INTERNAL_ERROR); } return true; case SSH_MSG_KEXRSA_DONE: if(Log.isDebugEnabled()) { Log.debug("Received SSH_MSG_KEXRSA_DONE"); } ByteArrayReader bar = new ByteArrayReader(tmp, 1, tmp.length - 1); try { signature = bar.readBinaryString(); secret = new BigInteger(s); // Calculate the exchange hash calculateExchangeHash(); transport.sendNewKeys(); } catch (IOException ex) { Log.error("Key exchange failed", ex); throw new SshException("Failed to read SSH_MSG_KEXRSA_DONE", SshException.INTERNAL_ERROR); } finally { bar.close(); } return true; default: transport.disconnect(TransportProtocol.KEY_EXCHANGE_FAILED, "Key exchange failed"); throw new SshException("Key exchange failed [id=" + tmp[0] + "]", SshException.INTERNAL_ERROR); } } /** *

* Calculates the exchange hash as an SHA1 hash of the following data. *

* *
	 *  String         the client's version string (CR and NL excluded)
	 *  String         the server's version string (CR and NL excluded)
	 *  String         the payload of the client's SSH_MSG_KEXINIT
	 *  String         the payload of the server's SSH_MSG_KEXINIT
	 *  String         the host key
	 *  BigInteger     e, exchange value sent by the client
	 *  BigInteger     f, exchange value sent by the server
	 *  BigInteger     K, the shared secret
	 * 
* *
*

* * @throws IOException */ protected void calculateExchangeHash() throws SshException { Digest hash = (Digest) ComponentManager.getInstance().supportedDigests().getInstance(getHashAlgorithm()); // The local software version comments hash.putString(clientId); // The remote software version comments hash.putString(serverId); // The local kex init payload hash.putInt(clientKexInit.length); hash.putBytes(clientKexInit); // The remote kex init payload hash.putInt(serverKexInit.length); hash.putBytes(serverKexInit); // The host key hash.putInt(hostKey.length); hash.putBytes(hostKey); hash.putInt(tk.length); hash.putBytes(tk); hash.putInt(encryptedSecret.length); hash.putBytes(encryptedSecret); // The diffie hellman k value hash.putBigInteger(secret); // Do the final output exchangeHash = hash.doFinal(); } public boolean isKeyExchangeMessage(int messageid) { switch (messageid) { case SSH_MSG_KEXRSA_PUBKEY: case SSH_MSG_KEXRSA_SECRET: case SSH_MSG_KEXRSA_DONE: return true; default: return false; } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy