123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568 |
- /*
- * uxcons.c: various interactive-prompt routines shared between the
- * Unix console PuTTY tools
- */
- #include <stdio.h>
- #include <stdlib.h>
- #include <stdarg.h>
- #include <assert.h>
- #include <errno.h>
- #include <termios.h>
- #include <unistd.h>
- #include <fcntl.h>
- #include <sys/time.h>
- #ifndef HAVE_NO_SYS_SELECT_H
- #include <sys/select.h>
- #endif
- #include "putty.h"
- #include "storage.h"
- #include "ssh.h"
- int console_batch_mode = FALSE;
- static void *console_logctx = NULL;
- static struct termios orig_termios_stderr;
- static int stderr_is_a_tty;
- void stderr_tty_init()
- {
- /* Ensure that if stderr is a tty, we can get it back to a sane state. */
- if ((flags & FLAG_STDERR_TTY) && isatty(STDERR_FILENO)) {
- stderr_is_a_tty = TRUE;
- tcgetattr(STDERR_FILENO, &orig_termios_stderr);
- }
- }
- void premsg(struct termios *cf)
- {
- if (stderr_is_a_tty) {
- tcgetattr(STDERR_FILENO, cf);
- tcsetattr(STDERR_FILENO, TCSADRAIN, &orig_termios_stderr);
- }
- }
- void postmsg(struct termios *cf)
- {
- if (stderr_is_a_tty)
- tcsetattr(STDERR_FILENO, TCSADRAIN, cf);
- }
- /*
- * Clean up and exit.
- */
- void cleanup_exit(int code)
- {
- /*
- * Clean up.
- */
- sk_cleanup();
- random_save_seed();
- exit(code);
- }
- void set_busy_status(void *frontend, int status)
- {
- }
- void update_specials_menu(void *frontend)
- {
- }
- void notify_remote_exit(void *frontend)
- {
- }
- void timer_change_notify(unsigned long next)
- {
- }
- /*
- * Wrapper around Unix read(2), suitable for use on a file descriptor
- * that's been set into nonblocking mode. Handles EAGAIN/EWOULDBLOCK
- * by means of doing a one-fd select and then trying again; all other
- * errors (including errors from select) are returned to the caller.
- */
- static int block_and_read(int fd, void *buf, size_t len)
- {
- int ret;
- while ((ret = read(fd, buf, len)) < 0 && (
- #ifdef EAGAIN
- (errno == EAGAIN) ||
- #endif
- #ifdef EWOULDBLOCK
- (errno == EWOULDBLOCK) ||
- #endif
- 0)) {
- fd_set rfds;
- FD_ZERO(&rfds);
- FD_SET(fd, &rfds);
- ret = select(fd+1, &rfds, NULL, NULL, NULL);
- assert(ret != 0);
- if (ret < 0)
- return ret;
- assert(FD_ISSET(fd, &rfds));
- }
- return ret;
- }
- int verify_ssh_host_key(void *frontend, char *host, int port,
- const char *keytype, char *keystr, char *fingerprint,
- void (*callback)(void *ctx, int result), void *ctx)
- {
- int ret;
- static const char absentmsg_batch[] =
- "The server's host key is not cached. You have no guarantee\n"
- "that the server is the computer you think it is.\n"
- "The server's %s key fingerprint is:\n"
- "%s\n"
- "Connection abandoned.\n";
- static const char absentmsg[] =
- "The server's host key is not cached. You have no guarantee\n"
- "that the server is the computer you think it is.\n"
- "The server's %s key fingerprint is:\n"
- "%s\n"
- "If you trust this host, enter \"y\" to add the key to\n"
- "PuTTY's cache and carry on connecting.\n"
- "If you want to carry on connecting just once, without\n"
- "adding the key to the cache, enter \"n\".\n"
- "If you do not trust this host, press Return to abandon the\n"
- "connection.\n"
- "Store key in cache? (y/n) ";
- static const char wrongmsg_batch[] =
- "WARNING - POTENTIAL SECURITY BREACH!\n"
- "The server's host key does not match the one PuTTY has\n"
- "cached. This means that either the server administrator\n"
- "has changed the host key, or you have actually connected\n"
- "to another computer pretending to be the server.\n"
- "The new %s key fingerprint is:\n"
- "%s\n"
- "Connection abandoned.\n";
- static const char wrongmsg[] =
- "WARNING - POTENTIAL SECURITY BREACH!\n"
- "The server's host key does not match the one PuTTY has\n"
- "cached. This means that either the server administrator\n"
- "has changed the host key, or you have actually connected\n"
- "to another computer pretending to be the server.\n"
- "The new %s key fingerprint is:\n"
- "%s\n"
- "If you were expecting this change and trust the new key,\n"
- "enter \"y\" to update PuTTY's cache and continue connecting.\n"
- "If you want to carry on connecting but without updating\n"
- "the cache, enter \"n\".\n"
- "If you want to abandon the connection completely, press\n"
- "Return to cancel. Pressing Return is the ONLY guaranteed\n"
- "safe choice.\n"
- "Update cached key? (y/n, Return cancels connection) ";
- static const char abandoned[] = "Connection abandoned.\n";
- char line[32];
- struct termios cf;
- /*
- * Verify the key.
- */
- ret = verify_host_key(host, port, keytype, keystr);
- if (ret == 0) /* success - key matched OK */
- return 1;
- premsg(&cf);
- if (ret == 2) { /* key was different */
- if (console_batch_mode) {
- fprintf(stderr, wrongmsg_batch, keytype, fingerprint);
- return 0;
- }
- fprintf(stderr, wrongmsg, keytype, fingerprint);
- fflush(stderr);
- }
- if (ret == 1) { /* key was absent */
- if (console_batch_mode) {
- fprintf(stderr, absentmsg_batch, keytype, fingerprint);
- return 0;
- }
- fprintf(stderr, absentmsg, keytype, fingerprint);
- fflush(stderr);
- }
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- if (block_and_read(0, line, sizeof(line) - 1) <= 0)
- /* handled below */;
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] != '\0' && line[0] != '\r' && line[0] != '\n') {
- if (line[0] == 'y' || line[0] == 'Y')
- store_host_key(host, port, keytype, keystr);
- postmsg(&cf);
- return 1;
- } else {
- fprintf(stderr, abandoned);
- postmsg(&cf);
- return 0;
- }
- }
- /*
- * Ask whether the selected algorithm is acceptable (since it was
- * below the configured 'warn' threshold).
- */
- int askalg(void *frontend, const char *algtype, const char *algname,
- void (*callback)(void *ctx, int result), void *ctx)
- {
- static const char msg[] =
- "The first %s supported by the server is\n"
- "%s, which is below the configured warning threshold.\n"
- "Continue with connection? (y/n) ";
- static const char msg_batch[] =
- "The first %s supported by the server is\n"
- "%s, which is below the configured warning threshold.\n"
- "Connection abandoned.\n";
- static const char abandoned[] = "Connection abandoned.\n";
- char line[32];
- struct termios cf;
- premsg(&cf);
- if (console_batch_mode) {
- fprintf(stderr, msg_batch, algtype, algname);
- return 0;
- }
- fprintf(stderr, msg, algtype, algname);
- fflush(stderr);
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- if (block_and_read(0, line, sizeof(line) - 1) <= 0)
- /* handled below */;
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] == 'y' || line[0] == 'Y') {
- postmsg(&cf);
- return 1;
- } else {
- fprintf(stderr, abandoned);
- postmsg(&cf);
- return 0;
- }
- }
- int askhk(void *frontend, const char *algname, const char *betteralgs,
- void (*callback)(void *ctx, int result), void *ctx)
- {
- static const char msg[] =
- "The first host key type we have stored for this server\n"
- "is %s, which is below the configured warning threshold.\n"
- "The server also provides the following types of host key\n"
- "above the threshold, which we do not have stored:\n"
- "%s\n"
- "Continue with connection? (y/n) ";
- static const char msg_batch[] =
- "The first host key type we have stored for this server\n"
- "is %s, which is below the configured warning threshold.\n"
- "The server also provides the following types of host key\n"
- "above the threshold, which we do not have stored:\n"
- "%s\n"
- "Connection abandoned.\n";
- static const char abandoned[] = "Connection abandoned.\n";
- char line[32];
- struct termios cf;
- premsg(&cf);
- if (console_batch_mode) {
- fprintf(stderr, msg_batch, algname, betteralgs);
- return 0;
- }
- fprintf(stderr, msg, algname, betteralgs);
- fflush(stderr);
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- if (block_and_read(0, line, sizeof(line) - 1) <= 0)
- /* handled below */;
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] == 'y' || line[0] == 'Y') {
- postmsg(&cf);
- return 1;
- } else {
- fprintf(stderr, abandoned);
- postmsg(&cf);
- return 0;
- }
- }
- /*
- * Ask whether to wipe a session log file before writing to it.
- * Returns 2 for wipe, 1 for append, 0 for cancel (don't log).
- */
- int askappend(void *frontend, Filename *filename,
- void (*callback)(void *ctx, int result), void *ctx)
- {
- static const char msgtemplate[] =
- "The session log file \"%.*s\" already exists.\n"
- "You can overwrite it with a new session log,\n"
- "append your session log to the end of it,\n"
- "or disable session logging for this session.\n"
- "Enter \"y\" to wipe the file, \"n\" to append to it,\n"
- "or just press Return to disable logging.\n"
- "Wipe the log file? (y/n, Return cancels logging) ";
- static const char msgtemplate_batch[] =
- "The session log file \"%.*s\" already exists.\n"
- "Logging will not be enabled.\n";
- char line[32];
- struct termios cf;
- premsg(&cf);
- if (console_batch_mode) {
- fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename->path);
- fflush(stderr);
- return 0;
- }
- fprintf(stderr, msgtemplate, FILENAME_MAX, filename->path);
- fflush(stderr);
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- if (block_and_read(0, line, sizeof(line) - 1) <= 0)
- /* handled below */;
- tcsetattr(0, TCSANOW, &oldmode);
- }
- postmsg(&cf);
- if (line[0] == 'y' || line[0] == 'Y')
- return 2;
- else if (line[0] == 'n' || line[0] == 'N')
- return 1;
- else
- return 0;
- }
- /*
- * Warn about the obsolescent key file format.
- *
- * Uniquely among these functions, this one does _not_ expect a
- * frontend handle. This means that if PuTTY is ported to a
- * platform which requires frontend handles, this function will be
- * an anomaly. Fortunately, the problem it addresses will not have
- * been present on that platform, so it can plausibly be
- * implemented as an empty function.
- */
- void old_keyfile_warning(void)
- {
- static const char message[] =
- "You are loading an SSH-2 private key which has an\n"
- "old version of the file format. This means your key\n"
- "file is not fully tamperproof. Future versions of\n"
- "PuTTY may stop supporting this private key format,\n"
- "so we recommend you convert your key to the new\n"
- "format.\n"
- "\n"
- "Once the key is loaded into PuTTYgen, you can perform\n"
- "this conversion simply by saving it again.\n";
- struct termios cf;
- premsg(&cf);
- fputs(message, stderr);
- postmsg(&cf);
- }
- void console_provide_logctx(void *logctx)
- {
- console_logctx = logctx;
- }
- void logevent(void *frontend, const char *string)
- {
- struct termios cf;
- if ((flags & FLAG_STDERR) && (flags & FLAG_VERBOSE))
- premsg(&cf);
- if (console_logctx)
- log_eventlog(console_logctx, string);
- if ((flags & FLAG_STDERR) && (flags & FLAG_VERBOSE))
- postmsg(&cf);
- }
- /*
- * Special functions to read and print to the console for password
- * prompts and the like. Uses /dev/tty or stdin/stderr, in that order
- * of preference; also sanitises escape sequences out of the text, on
- * the basis that it might have been sent by a hostile SSH server
- * doing malicious keyboard-interactive.
- */
- static void console_open(FILE **outfp, int *infd)
- {
- int fd;
- if ((fd = open("/dev/tty", O_RDWR)) >= 0) {
- *infd = fd;
- *outfp = fdopen(*infd, "w");
- } else {
- *infd = 0;
- *outfp = stderr;
- }
- }
- static void console_close(FILE *outfp, int infd)
- {
- if (outfp != stderr)
- fclose(outfp); /* will automatically close infd too */
- }
- static void console_prompt_text(FILE *outfp, const char *data, int len)
- {
- int i;
- for (i = 0; i < len; i++)
- if ((data[i] & 0x60) || (data[i] == '\n'))
- fputc(data[i], outfp);
- fflush(outfp);
- }
- int console_get_userpass_input(prompts_t *p, const unsigned char *in,
- int inlen)
- {
- size_t curr_prompt;
- FILE *outfp = NULL;
- int infd;
- /*
- * Zero all the results, in case we abort half-way through.
- */
- {
- int i;
- for (i = 0; i < p->n_prompts; i++)
- prompt_set_result(p->prompts[i], "");
- }
- if (p->n_prompts && console_batch_mode)
- return 0;
- console_open(&outfp, &infd);
- /*
- * Preamble.
- */
- /* We only print the `name' caption if we have to... */
- if (p->name_reqd && p->name) {
- size_t l = strlen(p->name);
- console_prompt_text(outfp, p->name, l);
- if (p->name[l-1] != '\n')
- console_prompt_text(outfp, "\n", 1);
- }
- /* ...but we always print any `instruction'. */
- if (p->instruction) {
- size_t l = strlen(p->instruction);
- console_prompt_text(outfp, p->instruction, l);
- if (p->instruction[l-1] != '\n')
- console_prompt_text(outfp, "\n", 1);
- }
- for (curr_prompt = 0; curr_prompt < p->n_prompts; curr_prompt++) {
- struct termios oldmode, newmode;
- int len;
- prompt_t *pr = p->prompts[curr_prompt];
- tcgetattr(infd, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ISIG | ICANON;
- if (!pr->echo)
- newmode.c_lflag &= ~ECHO;
- else
- newmode.c_lflag |= ECHO;
- tcsetattr(infd, TCSANOW, &newmode);
- console_prompt_text(outfp, pr->prompt, strlen(pr->prompt));
- len = 0;
- while (1) {
- int ret;
- prompt_ensure_result_size(pr, len * 5 / 4 + 512);
- ret = read(infd, pr->result + len, pr->resultsize - len - 1);
- if (ret <= 0) {
- len = -1;
- break;
- }
- len += ret;
- if (pr->result[len - 1] == '\n') {
- len--;
- break;
- }
- }
- tcsetattr(infd, TCSANOW, &oldmode);
- if (!pr->echo)
- console_prompt_text(outfp, "\n", 1);
- if (len < 0) {
- console_close(outfp, infd);
- return 0; /* failure due to read error */
- }
- pr->result[len] = '\0';
- }
- console_close(outfp, infd);
- return 1; /* success */
- }
- void frontend_keypress(void *handle)
- {
- /*
- * This is nothing but a stub, in console code.
- */
- return;
- }
- int is_interactive(void)
- {
- return isatty(0);
- }
- /*
- * X11-forwarding-related things suitable for console.
- */
- char *platform_get_x_display(void) {
- return dupstr(getenv("DISPLAY"));
- }
|