Module: HrrRbSsh::Transport::KexAlgorithm::DiffieHellmanGroupExchange
Defined Under Namespace
Classes: H0
Instance Attribute Summary
Attributes included from Loggable
#log_key, #logger
Instance Method Summary
collapse
#build_key, #iv_c_to_s, #iv_s_to_c, #key_c_to_s, #key_s_to_c, #mac_c_to_s, #mac_s_to_c
Methods included from Loggable
#log_debug, #log_error, #log_fatal, #log_info, #log_warn
Instance Method Details
#hash(transport) ⇒ Object
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 79
def hash transport
h0_payload = {
:'V_C' => transport.v_c,
:'V_S' => transport.v_s,
:'I_C' => transport.i_c,
:'I_S' => transport.i_s,
:'K_S' => @k_s,
:'min' => @min,
:'n' => @n,
:'max' => @max,
:'p' => @p,
:'g' => @g,
:'e' => @e,
:'f' => @f,
:'k' => @shared_secret,
}
h0 = H0.new(logger: logger).encode h0_payload
h = OpenSSL::Digest.digest self.class::DIGEST, h0
end
|
#initialize(logger: nil) ⇒ Object
16
17
18
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 16
def initialize logger: nil
self.logger = logger
end
|
#initialize_dh(pg = nil) ⇒ Object
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 55
def initialize_dh pg=nil
unless pg
p_list = KexAlgorithm.list_supported.map{ |e| KexAlgorithm[e] }.select{ |e| e.const_defined?(:P) }.map{ |e| [OpenSSL::BN.new(e::P,16).num_bits, e::P] }.sort_by{ |e| e[0] }.reverse
candidate = p_list.find{ |e| e[0] <= @n }
raise unless (@min .. @max).include?(candidate[0])
p, g = candidate[1], 2
else
p, g = pg
end
@dh = OpenSSL::PKey::DH.new
if @dh.respond_to?(:set_pqg)
@dh.set_pqg OpenSSL::BN.new(p, 16), nil, OpenSSL::BN.new(g)
else
@dh.p = OpenSSL::BN.new(p, 16)
@dh.g = OpenSSL::BN.new(g)
end
@dh.generate_key!
@public_key = @dh.pub_key.to_i
end
|
#receive_kex_dh_gex_group(payload) ⇒ Object
144
145
146
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 144
def receive_kex_dh_gex_group payload
Message::SSH_MSG_KEX_DH_GEX_GROUP.new(logger: logger).decode payload
end
|
#receive_kex_dh_gex_init(payload) ⇒ Object
118
119
120
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 118
def receive_kex_dh_gex_init payload
Message::SSH_MSG_KEX_DH_GEX_INIT.new(logger: logger).decode payload
end
|
#receive_kex_dh_gex_reply(payload) ⇒ Object
157
158
159
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 157
def receive_kex_dh_gex_reply payload
Message::SSH_MSG_KEX_DH_GEX_REPLY.new(logger: logger).decode payload
end
|
#receive_kex_dh_gex_request(payload) ⇒ Object
104
105
106
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 104
def receive_kex_dh_gex_request payload
Message::SSH_MSG_KEX_DH_GEX_REQUEST.new(logger: logger).decode payload
end
|
#send_kex_dh_gex_group(transport) ⇒ Object
108
109
110
111
112
113
114
115
116
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 108
def send_kex_dh_gex_group transport
message = {
:'message number' => Message::SSH_MSG_KEX_DH_GEX_GROUP::VALUE,
:'p' => @p,
:'g' => @g,
}
payload = Message::SSH_MSG_KEX_DH_GEX_GROUP.new(logger: logger).encode message
transport.send payload
end
|
#send_kex_dh_gex_init(transport) ⇒ Object
148
149
150
151
152
153
154
155
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 148
def send_kex_dh_gex_init transport
message = {
:'message number' => Message::SSH_MSG_KEX_DH_GEX_INIT::VALUE,
:'e' => @e,
}
payload = Message::SSH_MSG_KEX_DH_GEX_INIT.new(logger: logger).encode message
transport.send payload
end
|
#send_kex_dh_gex_reply(transport) ⇒ Object
122
123
124
125
126
127
128
129
130
131
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 122
def send_kex_dh_gex_reply transport
message = {
:'message number' => Message::SSH_MSG_KEX_DH_GEX_REPLY::VALUE,
:'server public host key and certificates (K_S)' => @k_s,
:'f' => @f,
:'signature of H' => sign(transport),
}
payload = Message::SSH_MSG_KEX_DH_GEX_REPLY.new(logger: logger).encode message
transport.send payload
end
|
#send_kex_dh_gex_request(transport) ⇒ Object
133
134
135
136
137
138
139
140
141
142
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 133
def send_kex_dh_gex_request transport
message = {
:'message number' => Message::SSH_MSG_KEX_DH_GEX_REQUEST::VALUE,
:'min' => @min,
:'n' => @n,
:'max' => @max,
}
payload = Message::SSH_MSG_KEX_DH_GEX_REQUEST.new(logger: logger).encode message
transport.send payload
end
|
#shared_secret ⇒ Object
75
76
77
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 75
def shared_secret
@shared_secret
end
|
#sign(transport) ⇒ Object
99
100
101
102
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 99
def sign transport
h = hash transport
s = transport.server_host_key_algorithm.sign h
end
|
#start(transport) ⇒ Object
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
# File 'lib/hrr_rb_ssh/transport/kex_algorithm/diffie_hellman_group_exchange.rb', line 20
def start transport
case transport.mode
when Mode::SERVER
message = receive_kex_dh_gex_request transport.receive
@min = message[:'min']
@n = message[:'n']
@max = message[:'max']
initialize_dh
@p = @dh.p.to_i
@g = @dh.g.to_i
send_kex_dh_gex_group transport
@k_s = transport.server_host_key_algorithm.server_public_host_key
@f = @public_key
message = receive_kex_dh_gex_init transport.receive
@e = message[:'e']
@shared_secret = OpenSSL::BN.new(@dh.compute_key(OpenSSL::BN.new(@e)), 2).to_i
send_kex_dh_gex_reply transport
when Mode::CLIENT
@min = 1024
@n = 2048
@max = 8192
send_kex_dh_gex_request transport
message = receive_kex_dh_gex_group transport.receive
@p = message[:'p']
@g = message[:'g']
initialize_dh [@p, @g]
@e = @public_key
send_kex_dh_gex_init transport
message = receive_kex_dh_gex_reply transport.receive
@k_s = message[:'server public host key and certificates (K_S)']
@f = message[:'f']
@shared_secret = OpenSSL::BN.new(@dh.compute_key(OpenSSL::BN.new(@f)), 2).to_i
end
end
|