/[LeafOK_CVS]/lbbs/src/test_ssh_server.c
ViewVC logotype

Annotation of /lbbs/src/test_ssh_server.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.6 - (hide annotations)
Fri Jun 6 09:27:09 2025 UTC (9 months, 1 week ago) by sysadm
Branch: MAIN
Changes since 1.5: +4 -3 lines
Content type: text/x-csrc
Update

1 sysadm 1.1 #include "log.h"
2     #include <stdio.h>
3     #include <libssh/libssh.h>
4     #include <libssh/server.h>
5     #include <libssh/callbacks.h>
6    
7 sysadm 1.2 #ifndef BUF_SIZE
8     #define BUF_SIZE 2048
9     #endif
10    
11 sysadm 1.6 #define SSH_HOST_RSA_KEYFILE "../conf/ssh_host_rsa_key"
12 sysadm 1.2
13     #define USER "test"
14     #define PASSWORD "123456"
15    
16 sysadm 1.4 static ssh_channel SSH_channel;
17 sysadm 1.2 static int authenticated = 0;
18     static int tries = 0;
19     static int error = 0;
20    
21     static int auth_password(ssh_session session, const char *user,
22     const char *password, void *userdata)
23 sysadm 1.1 {
24 sysadm 1.2 (void)userdata;
25    
26 sysadm 1.3 log_common("Authenticating user %s pwd %s\n", user, password);
27 sysadm 1.2 if (strcmp(user, USER) == 0 && strcmp(password, PASSWORD) == 0)
28 sysadm 1.1 {
29 sysadm 1.2 authenticated = 1;
30 sysadm 1.3 log_common("Authenticated\n");
31 sysadm 1.1 return SSH_AUTH_SUCCESS;
32     }
33 sysadm 1.2 if (tries >= 3)
34     {
35     log_error("Too many authentication tries\n");
36     ssh_disconnect(session);
37     error = 1;
38     return SSH_AUTH_DENIED;
39     }
40     tries++;
41     return SSH_AUTH_DENIED;
42     }
43    
44     static int pty_request(ssh_session session, ssh_channel channel, const char *term,
45     int x, int y, int px, int py, void *userdata)
46     {
47     (void)session;
48     (void)channel;
49     (void)term;
50     (void)x;
51     (void)y;
52     (void)px;
53     (void)py;
54     (void)userdata;
55 sysadm 1.3 log_common("Allocated terminal\n");
56 sysadm 1.2 return 0;
57     }
58    
59     static int shell_request(ssh_session session, ssh_channel channel, void *userdata)
60     {
61     (void)session;
62     (void)channel;
63     (void)userdata;
64 sysadm 1.3 log_common("Allocated shell\n");
65 sysadm 1.2 return 0;
66     }
67 sysadm 1.4
68 sysadm 1.2 struct ssh_channel_callbacks_struct channel_cb = {
69     .channel_pty_request_function = pty_request,
70     .channel_shell_request_function = shell_request};
71    
72     static ssh_channel new_session_channel(ssh_session session, void *userdata)
73     {
74     (void)session;
75     (void)userdata;
76 sysadm 1.1
77 sysadm 1.4 if (SSH_channel != NULL)
78 sysadm 1.2 return NULL;
79    
80 sysadm 1.3 log_common("Allocated session channel\n");
81 sysadm 1.4 SSH_channel = ssh_channel_new(session);
82 sysadm 1.2 ssh_callbacks_init(&channel_cb);
83 sysadm 1.4 ssh_set_channel_callbacks(SSH_channel, &channel_cb);
84 sysadm 1.2
85 sysadm 1.4 return SSH_channel;
86 sysadm 1.1 }
87    
88     int ssh_server(const char *hostaddr, unsigned int port)
89     {
90 sysadm 1.4 ssh_bind sshbind;
91 sysadm 1.2 ssh_session session;
92     ssh_event event;
93    
94 sysadm 1.1 struct ssh_server_callbacks_struct cb = {
95     .userdata = NULL,
96 sysadm 1.2 .auth_password_function = auth_password,
97     .channel_open_request_session_function = new_session_channel};
98    
99     char buf[BUF_SIZE];
100     char host[128] = "";
101     int i, r;
102    
103 sysadm 1.6 int ssh_log_level = SSH_LOG_PROTOCOL;
104 sysadm 1.1
105     ssh_init();
106    
107     sshbind = ssh_bind_new();
108    
109     if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||
110     ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||
111 sysadm 1.6 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEYFILE) < 0 ||
112 sysadm 1.5 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
113 sysadm 1.6 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
114 sysadm 1.5 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||
115     ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
116     ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
117     ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_C_S, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
118     ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_S_C, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
119 sysadm 1.1 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
120     {
121     log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));
122 sysadm 1.2 ssh_bind_free(sshbind);
123 sysadm 1.1 return -1;
124     }
125    
126     if (ssh_bind_listen(sshbind) < 0)
127     {
128     log_error("Error listening at SSH server port: %s\n", ssh_get_error(sshbind));
129 sysadm 1.2 ssh_bind_free(sshbind);
130 sysadm 1.1 return -1;
131     }
132    
133     while (1)
134     {
135     session = ssh_new();
136    
137 sysadm 1.2 if (ssh_bind_accept(sshbind, session) == SSH_OK)
138 sysadm 1.1 {
139 sysadm 1.2 pid_t pid = fork();
140     switch (pid)
141     {
142     case 0:
143     ssh_bind_free(sshbind);
144    
145     ssh_callbacks_init(&cb);
146     ssh_set_server_callbacks(session, &cb);
147    
148     if (ssh_handle_key_exchange(session))
149     {
150     log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));
151     return 1;
152     }
153     ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
154    
155     event = ssh_event_new();
156     ssh_event_add_session(event, session);
157    
158 sysadm 1.4 while (!(authenticated && SSH_channel != NULL))
159 sysadm 1.2 {
160     if (error)
161     break;
162     r = ssh_event_dopoll(event, -1);
163     if (r == SSH_ERROR)
164     {
165     log_error("Error : %s\n", ssh_get_error(session));
166     ssh_disconnect(session);
167     _exit(1);
168     }
169     }
170    
171     if (error)
172     {
173     log_error("Error, exiting loop\n");
174     _exit(1);
175     }
176     else
177     {
178 sysadm 1.3 log_common("Authenticated and got a channel\n");
179 sysadm 1.2 }
180    
181     snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");
182 sysadm 1.4 ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
183 sysadm 1.2 do
184     {
185 sysadm 1.4 i = ssh_channel_read(SSH_channel, buf, sizeof(buf), 0);
186 sysadm 1.2 if (i > 0)
187     {
188 sysadm 1.4 ssh_channel_write(SSH_channel, buf, (uint32_t)i);
189 sysadm 1.2 if (strlen(host) + (size_t)i < sizeof(host))
190     {
191     strncat(host, buf, (size_t)i);
192     }
193     if (strchr(host, '\x0d'))
194     {
195     *strchr(host, '\x0d') = '\0';
196 sysadm 1.4 ssh_channel_write(SSH_channel, "\n", 1);
197 sysadm 1.2 break;
198     }
199     }
200     else
201     {
202     log_error("Error: %s\n", ssh_get_error(session));
203     _exit(1);
204     }
205     } while (i > 0);
206     snprintf(buf, sizeof(buf), "Trying to connect to \"%s\"\r\n", host);
207 sysadm 1.4 ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
208 sysadm 1.3 log_common("%s", buf);
209 sysadm 1.2
210     ssh_disconnect(session);
211     ssh_free(session);
212    
213     _exit(0);
214     case -1:
215     log_error("Failed to fork\n");
216     break;
217     }
218 sysadm 1.1 }
219 sysadm 1.2 else
220 sysadm 1.1 {
221 sysadm 1.2 log_error("%s\n", ssh_get_error(sshbind));
222 sysadm 1.1 }
223    
224 sysadm 1.2 /* Since the session has been passed to a child fork, do some cleaning
225     * up at the parent process. */
226 sysadm 1.1 ssh_disconnect(session);
227     ssh_free(session);
228     }
229    
230     ssh_bind_free(sshbind);
231     ssh_finalize();
232    
233     return 0;
234     }
235    
236     int main(int argc, char *argv[])
237     {
238     if (log_begin("../log/bbsd.log", "../log/error.log") < 0)
239     {
240     printf("Open log error\n");
241     return -1;
242     }
243    
244 sysadm 1.3 log_common_redir(STDOUT_FILENO);
245     log_error_redir(STDERR_FILENO);
246 sysadm 1.1
247     ssh_server("0.0.0.0", 2322);
248    
249     log_end();
250    
251     return 0;
252     }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1