/[LeafOK_CVS]/lbbs/src/test_ssh_server.c
ViewVC logotype

Contents of /lbbs/src/test_ssh_server.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.15 - (show annotations)
Tue Nov 11 00:28:05 2025 UTC (4 months ago) by sysadm
Branch: MAIN
Changes since 1.14: +4 -0 lines
Content type: text/x-csrc
Use config.h

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * test_ssh_server
4 * - tester for network server with SSH support
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 // This test was written based on libssh example/proxy.c
10
11 #ifdef HAVE_CONFIG_H
12 #include "config.h"
13 #endif
14
15 #include "log.h"
16 #include <stdio.h>
17 #include <libssh/callbacks.h>
18 #include <libssh/libssh.h>
19 #include <libssh/server.h>
20
21 enum test_ssh_server_constant_t
22 {
23 BUF_SIZE = 2048,
24 };
25
26 static const char SSH_HOST_RSA_KEYFILE[] = "../conf/ssh_host_rsa_key";
27
28 static const char USER[] = "test";
29 static const char PASSWORD[] = "123456";
30
31 static ssh_channel SSH_channel;
32 static int authenticated = 0;
33 static int tries = 0;
34 static int error = 0;
35
36 static int auth_password(ssh_session session, const char *user,
37 const char *password, void *userdata)
38 {
39 (void)userdata;
40
41 log_common("Authenticating user %s pwd %s\n", user, password);
42 if (strcmp(user, USER) == 0 && strcmp(password, PASSWORD) == 0)
43 {
44 authenticated = 1;
45 log_common("Authenticated\n");
46 return SSH_AUTH_SUCCESS;
47 }
48 if (tries >= 3)
49 {
50 log_error("Too many authentication tries\n");
51 ssh_disconnect(session);
52 error = 1;
53 return SSH_AUTH_DENIED;
54 }
55 tries++;
56 return SSH_AUTH_DENIED;
57 }
58
59 static int pty_request(ssh_session session, ssh_channel channel, const char *term,
60 int x, int y, int px, int py, void *userdata)
61 {
62 (void)session;
63 (void)channel;
64 (void)term;
65 (void)x;
66 (void)y;
67 (void)px;
68 (void)py;
69 (void)userdata;
70 log_common("Allocated terminal\n");
71 return 0;
72 }
73
74 static int shell_request(ssh_session session, ssh_channel channel, void *userdata)
75 {
76 (void)session;
77 (void)channel;
78 (void)userdata;
79 log_common("Allocated shell\n");
80 return 0;
81 }
82
83 struct ssh_channel_callbacks_struct channel_cb = {
84 .channel_pty_request_function = pty_request,
85 .channel_shell_request_function = shell_request};
86
87 static ssh_channel channel_open(ssh_session session, void *userdata)
88 {
89 (void)session;
90 (void)userdata;
91
92 if (SSH_channel != NULL)
93 return NULL;
94
95 log_common("Allocated session channel\n");
96 SSH_channel = ssh_channel_new(session);
97 ssh_callbacks_init(&channel_cb);
98 ssh_set_channel_callbacks(SSH_channel, &channel_cb);
99
100 return SSH_channel;
101 }
102
103 int ssh_server(const char *hostaddr, unsigned int port)
104 {
105 ssh_bind sshbind;
106 ssh_session session;
107 ssh_event event;
108
109 struct ssh_server_callbacks_struct cb = {
110 .userdata = NULL,
111 .auth_password_function = auth_password,
112 .channel_open_request_session_function = channel_open};
113
114 long int ssh_timeout = 0;
115
116 char buf[BUF_SIZE];
117 char host[128] = "";
118 int i, r;
119
120 int ssh_log_level = SSH_LOG_PROTOCOL;
121
122 ssh_init();
123
124 sshbind = ssh_bind_new();
125
126 if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||
127 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||
128 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEYFILE) < 0 ||
129 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
130 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||
131 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||
132 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
133 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||
134 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_C_S, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
135 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_S_C, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||
136 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
137 {
138 log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));
139 ssh_bind_free(sshbind);
140 return -1;
141 }
142
143 if (ssh_bind_listen(sshbind) < 0)
144 {
145 log_error("Error listening at SSH server port: %s\n", ssh_get_error(sshbind));
146 ssh_bind_free(sshbind);
147 return -1;
148 }
149
150 while (1)
151 {
152 session = ssh_new();
153
154 if (ssh_bind_accept(sshbind, session) == SSH_OK)
155 {
156 pid_t pid = fork();
157 switch (pid)
158 {
159 case 0:
160 ssh_bind_free(sshbind);
161
162 ssh_callbacks_init(&cb);
163 ssh_set_server_callbacks(session, &cb);
164
165 ssh_timeout = 60; // second
166 if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
167 {
168 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
169 ssh_disconnect(session);
170 _exit(1);
171 }
172
173 if (ssh_handle_key_exchange(session))
174 {
175 log_error("ssh_handle_key_exchange: %s\n", ssh_get_error(session));
176 ssh_disconnect(session);
177 _exit(1);
178 }
179 ssh_set_auth_methods(session, SSH_AUTH_METHOD_PASSWORD | SSH_AUTH_METHOD_GSSAPI_MIC);
180
181 event = ssh_event_new();
182 ssh_event_add_session(event, session);
183
184 while (!(authenticated && SSH_channel != NULL))
185 {
186 if (error)
187 break;
188 r = ssh_event_dopoll(event, -1);
189 if (r == SSH_ERROR)
190 {
191 log_error("Error : %s\n", ssh_get_error(session));
192 ssh_disconnect(session);
193 _exit(1);
194 }
195 }
196
197 if (error)
198 {
199 log_error("Error, exiting loop\n");
200 _exit(1);
201 }
202 else
203 {
204 log_common("Authenticated and got a channel\n");
205 }
206
207 ssh_timeout = 0;
208 if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
209 {
210 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
211 ssh_disconnect(session);
212 _exit(1);
213 }
214
215 snprintf(buf, sizeof(buf), "Hello, welcome to the Sample SSH proxy.\r\nPlease select your destination: ");
216 ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
217 do
218 {
219 i = ssh_channel_read(SSH_channel, buf, sizeof(buf), 0);
220 if (i > 0)
221 {
222 ssh_channel_write(SSH_channel, buf, (uint32_t)i);
223 if (strlen(host) + (size_t)i < sizeof(host))
224 {
225 strncat(host, buf, (size_t)i);
226 }
227 if (strchr(host, '\x0d'))
228 {
229 *strchr(host, '\x0d') = '\0';
230 ssh_channel_write(SSH_channel, "\n", 1);
231 break;
232 }
233 }
234 else
235 {
236 log_error("Error: %s\n", ssh_get_error(session));
237 _exit(1);
238 }
239 } while (i > 0);
240 snprintf(buf, sizeof(buf), "Trying to connect to \"%s\"\r\n", host);
241 ssh_channel_write(SSH_channel, buf, (uint32_t)strlen(buf));
242 log_common("%s", buf);
243
244 ssh_disconnect(session);
245 ssh_free(session);
246
247 _exit(0);
248 case -1:
249 log_error("Failed to fork\n");
250 break;
251 }
252 }
253 else
254 {
255 log_error("%s\n", ssh_get_error(sshbind));
256 }
257
258 /* Since the session has been passed to a child fork, do some cleaning
259 * up at the parent process. */
260 ssh_disconnect(session);
261 ssh_free(session);
262 }
263
264 ssh_bind_free(sshbind);
265 ssh_finalize();
266
267 return 0;
268 }
269
270 int main(int argc, char *argv[])
271 {
272 if (log_begin("../log/bbsd.log", "../log/error.log") < 0)
273 {
274 printf("Open log error\n");
275 return -1;
276 }
277
278 log_common_redir(STDOUT_FILENO);
279 log_error_redir(STDERR_FILENO);
280
281 ssh_server("0.0.0.0", 2322);
282
283 log_end();
284
285 return 0;
286 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1