You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mina.apache.org by gn...@apache.org on 2020/05/26 13:39:49 UTC
[mina-sshd] branch master updated: Record which AuthorizedKeyEntry
is used to authenticate
This is an automated email from the ASF dual-hosted git repository.
gnodet pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
The following commit(s) were added to refs/heads/master by this push:
new 675c79e Record which AuthorizedKeyEntry is used to authenticate
675c79e is described below
commit 675c79e4e2821481d5a6def689d29ca46adba09f
Author: w <none>
AuthorDate: Sun Oct 6 19:47:23 2019 -0700
Record which AuthorizedKeyEntry is used to authenticate
# Conflicts:
# sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/PublickeyAuthenticator.java
---
...AuthorizedKeyEntriesPublickeyAuthenticator.java | 109 +++++++++++++++++++++
.../server/auth/pubkey/PublickeyAuthenticator.java | 6 +-
2 files changed, 111 insertions(+), 4 deletions(-)
diff --git a/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/AuthorizedKeyEntriesPublickeyAuthenticator.java b/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/AuthorizedKeyEntriesPublickeyAuthenticator.java
new file mode 100644
index 0000000..0967a28
--- /dev/null
+++ b/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/AuthorizedKeyEntriesPublickeyAuthenticator.java
@@ -0,0 +1,109 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.sshd.server.auth.pubkey;
+
+import java.io.IOException;
+import java.security.GeneralSecurityException;
+import java.security.PublicKey;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.HashMap;
+import java.util.Map;
+import java.util.Objects;
+
+import org.apache.sshd.common.AttributeRepository;
+import org.apache.sshd.common.config.keys.AuthorizedKeyEntry;
+import org.apache.sshd.common.config.keys.KeyUtils;
+import org.apache.sshd.common.config.keys.PublicKeyEntryResolver;
+import org.apache.sshd.common.util.GenericUtils;
+import org.apache.sshd.common.util.logging.AbstractLoggingBean;
+import org.apache.sshd.server.session.ServerSession;
+
+/**
+ * Checks against a {@link Collection} of {@link AuthorizedKeyEntry}s
+ *
+ * Records the matched entry under a session attribute.
+ */
+public class AuthorizedKeyEntriesPublickeyAuthenticator extends AbstractLoggingBean implements PublickeyAuthenticator {
+ public static final AttributeRepository.AttributeKey<AuthorizedKeyEntry> AUTHORIZED_KEY = new AttributeRepository.AttributeKey<>();
+
+ private Map<AuthorizedKeyEntry, PublicKey> resolvedKeys;
+ private Object id;
+
+ public AuthorizedKeyEntriesPublickeyAuthenticator(
+ Object id, ServerSession session,
+ Collection<? extends AuthorizedKeyEntry> entries,
+ PublicKeyEntryResolver fallbackResolver)
+ throws IOException, GeneralSecurityException {
+ this.id = id;
+ int numEntries = GenericUtils.size(entries);
+ if (numEntries <= 0) {
+ resolvedKeys = Collections.emptyMap();
+ } else {
+ resolvedKeys = new HashMap<>(numEntries);
+ for (AuthorizedKeyEntry e : entries) {
+ Map<String, String> headers = e.getLoginOptions();
+ PublicKey k = e.resolvePublicKey(session, headers, fallbackResolver);
+ if (k != null) {
+ resolvedKeys.put(e, k);
+ }
+ }
+ }
+ }
+
+ /**
+ * @return Some kind of mnemonic identifier for the authenticator - used also in {@code toString()}
+ */
+ public Object getId() {
+ return id;
+ }
+
+ @Override
+ public boolean authenticate(String username, PublicKey key, ServerSession session) {
+ if (GenericUtils.isEmpty(resolvedKeys)) {
+ if (log.isDebugEnabled()) {
+ log.debug("authenticate(" + username + ")[" + session + "] no entries");
+ }
+
+ return false;
+ }
+
+ for (Map.Entry<AuthorizedKeyEntry, PublicKey> e : resolvedKeys.entrySet()) {
+ if (KeyUtils.compareKeys(key, e.getValue())) {
+ if (log.isDebugEnabled()) {
+ log.debug("authenticate(" + username + ")[" + session + "] match found");
+ }
+ if (session != null) {
+ session.setAttribute(AUTHORIZED_KEY, e.getKey());
+ }
+ return true;
+ }
+ }
+
+ if (log.isDebugEnabled()) {
+ log.debug("authenticate(" + username + ")[" + session + "] match not found");
+ }
+ return false;
+ }
+
+ @Override
+ public String toString() {
+ return Objects.toString(getId());
+ }
+}
diff --git a/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/PublickeyAuthenticator.java b/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/PublickeyAuthenticator.java
index 6902b57..45767f0 100644
--- a/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/PublickeyAuthenticator.java
+++ b/sshd-core/src/main/java/org/apache/sshd/server/auth/pubkey/PublickeyAuthenticator.java
@@ -24,7 +24,6 @@ import java.security.PublicKey;
import java.util.Collection;
import org.apache.sshd.common.config.keys.AuthorizedKeyEntry;
-import org.apache.sshd.common.config.keys.PublicKeyEntry;
import org.apache.sshd.common.config.keys.PublicKeyEntryResolver;
import org.apache.sshd.common.util.GenericUtils;
import org.apache.sshd.server.auth.AsyncAuthException;
@@ -65,11 +64,10 @@ public interface PublickeyAuthenticator {
Collection<? extends AuthorizedKeyEntry> entries,
PublicKeyEntryResolver fallbackResolver)
throws IOException, GeneralSecurityException {
- Collection<PublicKey> keys = PublicKeyEntry.resolvePublicKeyEntries(session, entries, fallbackResolver);
- if (GenericUtils.isEmpty(keys)) {
+ if (GenericUtils.isEmpty(entries)) {
return RejectAllPublickeyAuthenticator.INSTANCE;
} else {
- return new KeySetPublickeyAuthenticator(id, keys);
+ return new AuthorizedKeyEntriesPublickeyAuthenticator(id, session, entries, fallbackResolver);
}
}
}