Commit Graph

1225 Commits (87a9bd43256429302d596738a05193a05b34a47f)

Author SHA1 Message Date
JacobBarthelmeh 87a9bd4325 cleanup some debug messages and start to actual daemon 2022-07-30 00:46:11 -07:00
JacobBarthelmeh 4d90993e16 stub UseDNS, add checking config UsePrivilegeSeparation, scan-build warning fixes 2022-07-29 23:08:19 -07:00
JacobBarthelmeh c978b83c28 add check for PermitRootLogin config 2022-07-29 16:32:39 -07:00
JacobBarthelmeh cd0213572c add parsing Protocol from sshd_config 2022-07-29 16:06:26 -07:00
JacobBarthelmeh 3af82ddb42 login as user with new shell 2022-07-29 09:51:04 -07:00
Andrew Hutchings 0b6d6cc093 Make a note about 32bit Linux large file support 2022-07-29 14:07:58 +01:00
Andrew Hutchings 2e4d69e5ea Missed one function in PPC32 fix 2022-07-29 13:34:47 +01:00
Andrew Hutchings afdc1f4c67 Fix compiler errors for PPC32 2022-07-29 13:33:12 +01:00
Andrew Hutchings b6924ff604 Fix -p breaking everything
Specifying a port set `ret` to the port number instead of `WS_SUCCESS`
which meant that everything after parameter passing failed silently.
2022-07-29 10:14:34 +01:00
Hayden Roche ec873e1088 Rename wolfSSHD_NewConfig to wolfSSHD_ConfigNew, following pattern. 2022-07-28 13:34:14 -07:00
Hayden Roche f0caefcc33 Make HandlePort use GetConfigInt and add 0 port test. 2022-07-28 13:21:42 -07:00
Hayden Roche 90769af1f8 Add a test program, test_configuration.c, for testing sshd config.
I wanted to be able to test ParseConfigLine directly, so I added some
preprocessor logic to expose this function (i.e. make it non-static) when
building test_configuration. I fixed a couple bugs discovered by this new
testing.
2022-07-28 13:12:13 -07:00
Andrew Hutchings f7fad8b8d0 Fix compiling issues 2022-07-28 15:34:21 +01:00
Hayden Roche cef7e5065a Add support for Port config option and change default port back to 22. 2022-07-27 16:48:10 -07:00
Hayden Roche d62c1e0078 Fix GetConfigInt. 2022-07-27 16:47:14 -07:00
Hayden Roche e255679861 Add support for PasswordAuthentication config option. 2022-07-27 16:46:15 -07:00
Hayden Roche 48b627d70d Refactor various wolfSSHD code.
- Move function declarations for WOLFSSHD_CONFIG from wolfsshd.h to a new
header, configuration.h. Change config.c to configuration.c. (using
"configuration" so as not to collide with autotools' config.h)
- Make the WOLFSSL_CONFIG* member of WOLFSSHD_AUTH const. At least at the
moment, it shouldn't be necessary for this member to be writable.
- Replace wolfSSHD_ConfigGetOption with functions to get specific members from
the config.
- Namespace all config functions with wolfSSHD_Config* and all auth functions
with wolfSSHD_Auth.
- Add const to function parameters, where possible.
- Remove wolfSSHD_ prefix from static functions. Just use PascalCase. These
don't need namespacing since they aren't visible outside their translation unit.
- Modify GetConfigInt to expect leading and trailing whitespace to have already
been removed. It will have been removed in the context this function is used in
configuration.c.
2022-07-27 15:21:11 -07:00
Hayden Roche 477fb6c5c8 Add HostKey support and other config file code improvements.
- hostKeyFile and authKeysFile members of the config are now dynamically
allocated strings owned by the config.
- Break out sshd_config option handling into more modular functions.
2022-07-26 14:10:54 -07:00
JacobBarthelmeh 8d1d2fb633 add support for grace login timer 2022-07-26 10:56:30 -07:00
Hayden Roche 374f675553 Add support for PEM host keys. 2022-07-26 09:27:07 -07:00
JacobBarthelmeh 85109e66cf raise and lower permissions levels 2022-07-25 09:26:05 -07:00
JacobBarthelmeh d16f642734 pass full string in as salt 2022-07-21 16:26:26 -07:00
JacobBarthelmeh f8439af47e add support to handle PermitEmptyPasswords config 2022-07-21 16:23:01 -07:00
JacobBarthelmeh 311738d057 add link to liblogin with QNX for crypt 2022-07-21 14:43:43 -07:00
JacobBarthelmeh 11c1a3998d use function callbacks for auth 2022-07-21 13:31:22 -07:00
JacobBarthelmeh 7b8ce149d7 add look for libpam and adjust for QNX build 2022-07-21 13:31:22 -07:00
JacobBarthelmeh e493d3aeb2 assume sshd builds use shell, better support for routing session types after SSH accept 2022-07-21 13:31:22 -07:00
JacobBarthelmeh 2982ae88ee define for crypt use, set fd for shell, tie in sftp 2022-07-21 13:31:22 -07:00
Hayden Roche 76a17c9765 sshd improvements, get password auth working 2022-07-21 13:31:22 -07:00
Hayden Roche 787d5be900 Add more functionality to wolfsshd, other improvements.
- Moved all wolfsshd source code into apps/wolfsshd/. Then future apps, e.g.
an ssh-keygen type utility, will get their own subdirectory under apps/.
- Rename wolfauth.(c|h) to auth.(c|h), rename wolfconfig.c to config.c.
- Add support for checking user public keys against an authorized keys file.
Doesn't support parsing options and comments in the key file, yet. Parsing
special tokens (e.g. %h) and absolute paths in the AuthorizedKeysFile string
are also not supported.
- Comment out currently unused USER_NODE code. Could be useful later on if
we integrate wolfsshd in an environment where the OS doesn't have its own
username service.
- Modify configure.ac to bring in libcrypt if wolfsshd is enabled.
2022-07-21 13:31:22 -07:00
Jacob Barthelmeh 474527b89c add missing wolfauth header file 2022-07-21 13:31:22 -07:00
Jacob Barthelmeh 475ee1f113 add wolfauth file for peer auth 2022-07-21 13:31:22 -07:00
Jacob Barthelmeh 65dde05900 simple ssh connection and start of shell with sshd 2022-07-21 13:31:22 -07:00
JacobBarthelmeh 5410cf5690 add tcp select and port arg 2022-07-21 13:31:22 -07:00
Jacob Barthelmeh 757f3c6b2c expanding config parsing 2022-07-21 13:31:22 -07:00
Jacob Barthelmeh 27cf3d31b9 add initial reading of sshd_config file 2022-07-21 13:31:22 -07:00
Jacob Barthelmeh c81fcbca39 initial autotools sshd addition 2022-07-21 13:31:22 -07:00
David Garske 90827e95b0
Merge pull request #427 from JacobBarthelmeh/port
adjust macro guard on NO_WOLFSSL_DIR for examples build
2022-07-15 16:06:32 -07:00
John Safranek b60f802de0
Merge pull request #429 from embhorn/zd14507
Fix mem init error in DoKexDhReply
2022-07-15 13:41:10 -07:00
David Garske 1d1ac2c475
Merge pull request #430 from JacobBarthelmeh/sftp
SFTP want write and SSH quick rekey issues
2022-07-14 13:07:07 -07:00
JacobBarthelmeh 3013eee8cb handle pending sent packets with SFTP and want write case with rekey 2022-07-14 09:17:43 -07:00
JacobBarthelmeh 3475e99f96 reset want read/write state on calling wolfSSH_accept and do not allow calling in error state 2022-07-13 21:41:52 -07:00
JacobBarthelmeh 0b5a36661c handle the case where SSH takes over output packet with SFTP want write 2022-07-13 21:35:32 -07:00
JacobBarthelmeh be2f462f73 handle sftp change to directory '/' 2022-07-13 21:31:26 -07:00
Eric Blankenhorn c31efcd8ed Fix mem init error in DoKexDhReply 2022-07-13 11:30:34 -05:00
JacobBarthelmeh e2ca8ada6e adjust macro guard on NO_WOLFSSL_DIR for examples build 2022-07-05 08:16:10 -07:00
David Garske e646bd141a
Merge pull request #426 from ejohnstown/sig-init
ECC Userauth Initialization
2022-06-29 19:38:47 -07:00
John Safranek 7116dd1d14
ECC Userauth Initialization
For ECC user authentication, initialize the mpints used to store the
signature before checking it. (ZD 14412)
2022-06-29 11:18:24 -07:00
David Garske 8a5d5362d5
Merge pull request #425 from ejohnstown/esp-build
ESP-IDF Build Cleanup
2022-06-28 16:44:30 -07:00
John Safranek 8f2c62accd
ESP-IDF Build Cleanup
1. Update the list of files to leave out of the build. They are from
   wolfCrypt and aren't needed. Also left out wolfSSH's version of
   misc.c as it is handled automatically.
2022-06-28 16:04:26 -07:00