⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ssh.c

📁 OpenSSH 是 SSH (Secure SHell) 协议的免费开源实现。它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持
💻 C
📖 第 1 页 / 共 3 页
字号:
/* * Author: Tatu Ylonen <ylo@cs.hut.fi> * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland *                    All rights reserved * Ssh client program.  This program can be used to log into a remote machine. * The software supports strong authentication, encryption, and forwarding * of X11, TCP/IP, and authentication connections. * * As far as I am concerned, the code I have written for this software * can be used freely for any purpose.  Any derived versions of this * software must be clearly marked as such, and if the derived work is * incompatible with the protocol description in the RFC file, it must be * called by a name other than "ssh" or "Secure Shell". * * Copyright (c) 1999 Niels Provos.  All rights reserved. * Copyright (c) 2000, 2001, 2002, 2003 Markus Friedl.  All rights reserved. * * Modified to work with SSL by Niels Provos <provos@citi.umich.edu> * in Canada (German citizen). * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */#include "includes.h"RCSID("$OpenBSD: ssh.c,v 1.233 2005/03/01 17:22:06 jmc Exp $");#include <openssl/evp.h>#include <openssl/err.h>#include "ssh.h"#include "ssh1.h"#include "ssh2.h"#include "compat.h"#include "cipher.h"#include "xmalloc.h"#include "packet.h"#include "buffer.h"#include "bufaux.h"#include "channels.h"#include "key.h"#include "authfd.h"#include "authfile.h"#include "pathnames.h"#include "dispatch.h"#include "clientloop.h"#include "log.h"#include "readconf.h"#include "sshconnect.h"#include "misc.h"#include "kex.h"#include "mac.h"#include "sshpty.h"#include "match.h"#include "msg.h"#include "monitor_fdpass.h"#include "uidswap.h"#ifdef SMARTCARD#include "scard.h"#endifextern char *__progname;/* Flag indicating whether debug mode is on.  This can be set on the command line. */int debug_flag = 0;/* Flag indicating whether a tty should be allocated */int tty_flag = 0;int no_tty_flag = 0;int force_tty_flag = 0;/* don't exec a shell */int no_shell_flag = 0;/* * Flag indicating that nothing should be read from stdin.  This can be set * on the command line. */int stdin_null_flag = 0;/* * Flag indicating that ssh should fork after authentication.  This is useful * so that the passphrase can be entered manually, and then ssh goes to the * background. */int fork_after_authentication_flag = 0;/* * General data structure for command line options and options configurable * in configuration files.  See readconf.h. */Options options;/* optional user configfile */char *config = NULL;/* * Name of the host we are connecting to.  This is the name given on the * command line, or the HostName specified for the user-supplied name in a * configuration file. */char *host;/* socket address the host resolves to */struct sockaddr_storage hostaddr;/* Private host keys. */Sensitive sensitive_data;/* Original real UID. */uid_t original_real_uid;uid_t original_effective_uid;/* command to be executed */Buffer command;/* Should we execute a command or invoke a subsystem? */int subsystem_flag = 0;/* # of replies received for global requests */static int client_global_request_id = 0;/* pid of proxycommand child process */pid_t proxy_command_pid = 0;/* fd to control socket */int control_fd = -1;/* Multiplexing control command */static u_int mux_command = SSHMUX_COMMAND_OPEN;/* Only used in control client mode */volatile sig_atomic_t control_client_terminate = 0;u_int control_server_pid = 0;/* Prints a help message to the user.  This function never returns. */static voidusage(void){	fprintf(stderr,"usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n""           [-D port] [-e escape_char] [-F configfile]\n""           [-i identity_file] [-L [bind_address:]port:host:hostport]\n""           [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]\n""           [-R [bind_address:]port:host:hostport] [-S ctl_path]\n""           [user@]hostname [command]\n"	);	exit(1);}static int ssh_session(void);static int ssh_session2(void);static void load_public_identity_files(void);static void control_client(const char *path);/* * Main program for the ssh client. */intmain(int ac, char **av){	int i, opt, exit_status;	char *p, *cp, *line, buf[256];	struct stat st;	struct passwd *pw;	int dummy;	extern int optind, optreset;	extern char *optarg;	Forward fwd;	__progname = ssh_get_progname(av[0]);	init_rng();	/*	 * Save the original real uid.  It will be needed later (uid-swapping	 * may clobber the real uid).	 */	original_real_uid = getuid();	original_effective_uid = geteuid();	/*	 * Use uid-swapping to give up root privileges for the duration of	 * option processing.  We will re-instantiate the rights when we are	 * ready to create the privileged port, and will permanently drop	 * them when the port has been created (actually, when the connection	 * has been made, as we may need to create the port several times).	 */	PRIV_END;#ifdef HAVE_SETRLIMIT	/* If we are installed setuid root be careful to not drop core. */	if (original_real_uid != original_effective_uid) {		struct rlimit rlim;		rlim.rlim_cur = rlim.rlim_max = 0;		if (setrlimit(RLIMIT_CORE, &rlim) < 0)			fatal("setrlimit failed: %.100s", strerror(errno));	}#endif	/* Get user data. */	pw = getpwuid(original_real_uid);	if (!pw) {		logit("You don't exist, go away!");		exit(1);	}	/* Take a copy of the returned structure. */	pw = pwcopy(pw);	/*	 * Set our umask to something reasonable, as some files are created	 * with the default umask.  This will make them world-readable but	 * writable only by the owner, which is ok for all files for which we	 * don't set the modes explicitly.	 */	umask(022);	/* Initialize option structure to indicate that no values have been set. */	initialize_options(&options);	/* Parse command-line arguments. */	host = NULL;again:	while ((opt = getopt(ac, av,	    "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:MNO:PR:S:TVXY")) != -1) {		switch (opt) {		case '1':			options.protocol = SSH_PROTO_1;			break;		case '2':			options.protocol = SSH_PROTO_2;			break;		case '4':			options.address_family = AF_INET;			break;		case '6':			options.address_family = AF_INET6;			break;		case 'n':			stdin_null_flag = 1;			break;		case 'f':			fork_after_authentication_flag = 1;			stdin_null_flag = 1;			break;		case 'x':			options.forward_x11 = 0;			break;		case 'X':			options.forward_x11 = 1;			break;		case 'Y':			options.forward_x11 = 1;			options.forward_x11_trusted = 1;			break;		case 'g':			options.gateway_ports = 1;			break;		case 'O':			if (strcmp(optarg, "check") == 0)				mux_command = SSHMUX_COMMAND_ALIVE_CHECK;			else if (strcmp(optarg, "exit") == 0)				mux_command = SSHMUX_COMMAND_TERMINATE;			else				fatal("Invalid multiplex command.");			break;		case 'P':	/* deprecated */			options.use_privileged_port = 0;			break;		case 'a':			options.forward_agent = 0;			break;		case 'A':			options.forward_agent = 1;			break;		case 'k':			options.gss_deleg_creds = 0;			break;		case 'i':			if (stat(optarg, &st) < 0) {				fprintf(stderr, "Warning: Identity file %s "				    "not accessible: %s.\n", optarg,				    strerror(errno));				break;			}			if (options.num_identity_files >=			    SSH_MAX_IDENTITY_FILES)				fatal("Too many identity files specified "				    "(max %d)", SSH_MAX_IDENTITY_FILES);			options.identity_files[options.num_identity_files++] =			    xstrdup(optarg);			break;		case 'I':#ifdef SMARTCARD			options.smartcard_device = xstrdup(optarg);#else			fprintf(stderr, "no support for smartcards.\n");#endif			break;		case 't':			if (tty_flag)				force_tty_flag = 1;			tty_flag = 1;			break;		case 'v':			if (debug_flag == 0) {				debug_flag = 1;				options.log_level = SYSLOG_LEVEL_DEBUG1;			} else {				if (options.log_level < SYSLOG_LEVEL_DEBUG3)					options.log_level++;				break;			}			/* FALLTHROUGH */		case 'V':			fprintf(stderr, "%s, %s\n",			    SSH_RELEASE, SSLeay_version(SSLEAY_VERSION));			if (opt == 'V')				exit(0);			break;		case 'q':			options.log_level = SYSLOG_LEVEL_QUIET;			break;		case 'e':			if (optarg[0] == '^' && optarg[2] == 0 &&			    (u_char) optarg[1] >= 64 &&			    (u_char) optarg[1] < 128)				options.escape_char = (u_char) optarg[1] & 31;			else if (strlen(optarg) == 1)				options.escape_char = (u_char) optarg[0];			else if (strcmp(optarg, "none") == 0)				options.escape_char = SSH_ESCAPECHAR_NONE;			else {				fprintf(stderr, "Bad escape character '%s'.\n",				    optarg);				exit(1);			}			break;		case 'c':			if (ciphers_valid(optarg)) {				/* SSH2 only */				options.ciphers = xstrdup(optarg);				options.cipher = SSH_CIPHER_INVALID;			} else {				/* SSH1 only */				options.cipher = cipher_number(optarg);				if (options.cipher == -1) {					fprintf(stderr,					    "Unknown cipher type '%s'\n",					    optarg);					exit(1);				}				if (options.cipher == SSH_CIPHER_3DES)					options.ciphers = "3des-cbc";				else if (options.cipher == SSH_CIPHER_BLOWFISH)					options.ciphers = "blowfish-cbc";				else					options.ciphers = (char *)-1;			}			break;		case 'm':			if (mac_valid(optarg))				options.macs = xstrdup(optarg);			else {				fprintf(stderr, "Unknown mac type '%s'\n",				    optarg);				exit(1);			}			break;		case 'M':			options.control_master =			    (options.control_master >= 1) ? 2 : 1;			break;		case 'p':			options.port = a2port(optarg);			if (options.port == 0) {				fprintf(stderr, "Bad port '%s'\n", optarg);				exit(1);			}			break;		case 'l':			options.user = optarg;			break;		case 'L':			if (parse_forward(&fwd, optarg))				add_local_forward(&options, &fwd);			else {				fprintf(stderr,				    "Bad local forwarding specification '%s'\n",				    optarg);				exit(1);			}			break;		case 'R':			if (parse_forward(&fwd, optarg)) {				add_remote_forward(&options, &fwd);			} else {				fprintf(stderr,				    "Bad remote forwarding specification "				    "'%s'\n", optarg);				exit(1);			}			break;		case 'D':			cp = p = xstrdup(optarg);			memset(&fwd, '\0', sizeof(fwd));			fwd.connect_host = "socks";			if ((fwd.listen_host = hpdelim(&cp)) == NULL) {				fprintf(stderr, "Bad dynamic forwarding "				    "specification '%.100s'\n", optarg);				exit(1);			}			if (cp != NULL) {				fwd.listen_port = a2port(cp);				fwd.listen_host = cleanhostname(fwd.listen_host);			} else {				fwd.listen_port = a2port(fwd.listen_host);				fwd.listen_host = "";			}			if (fwd.listen_port == 0) {				fprintf(stderr, "Bad dynamic port '%s'\n",				    optarg);				exit(1);			}			add_local_forward(&options, &fwd);			xfree(p);			break;		case 'C':			options.compression = 1;			break;		case 'N':			no_shell_flag = 1;			no_tty_flag = 1;			break;		case 'T':			no_tty_flag = 1;			break;		case 'o':			dummy = 1;			line = xstrdup(optarg);			if (process_config_line(&options, host ? host : "",			    line, "command-line", 0, &dummy) != 0)				exit(1);			xfree(line);			break;		case 's':			subsystem_flag = 1;			break;		case 'S':			if (options.control_path != NULL)				free(options.control_path);			options.control_path = xstrdup(optarg);			break;		case 'b':

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -