123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331 |
- /*
- * uxcons.c: various interactive-prompt routines shared between the
- * Unix console PuTTY tools
- */
- #include <stdio.h>
- #include <stdlib.h>
- #include <stdarg.h>
- #include <assert.h>
- #include <termios.h>
- #include <unistd.h>
- #include "putty.h"
- #include "storage.h"
- #include "ssh.h"
- int console_batch_mode = FALSE;
- static void *console_logctx = NULL;
- /*
- * Clean up and exit.
- */
- void cleanup_exit(int code)
- {
- /*
- * Clean up.
- */
- sk_cleanup();
- random_save_seed();
- exit(code);
- }
- void update_specials_menu(void *frontend)
- {
- }
- void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype,
- char *keystr, char *fingerprint)
- {
- int ret;
- static const char absentmsg_batch[] =
- "The server's host key is not cached. You have no guarantee\n"
- "that the server is the computer you think it is.\n"
- "The server's %s key fingerprint is:\n"
- "%s\n"
- "Connection abandoned.\n";
- static const char absentmsg[] =
- "The server's host key is not cached. You have no guarantee\n"
- "that the server is the computer you think it is.\n"
- "The server's %s key fingerprint is:\n"
- "%s\n"
- "If you trust this host, enter \"y\" to add the key to\n"
- "PuTTY's cache and carry on connecting.\n"
- "If you want to carry on connecting just once, without\n"
- "adding the key to the cache, enter \"n\".\n"
- "If you do not trust this host, press Return to abandon the\n"
- "connection.\n"
- "Store key in cache? (y/n) ";
- static const char wrongmsg_batch[] =
- "WARNING - POTENTIAL SECURITY BREACH!\n"
- "The server's host key does not match the one PuTTY has\n"
- "cached. This means that either the server administrator\n"
- "has changed the host key, or you have actually connected\n"
- "to another computer pretending to be the server.\n"
- "The new %s key fingerprint is:\n"
- "%s\n"
- "Connection abandoned.\n";
- static const char wrongmsg[] =
- "WARNING - POTENTIAL SECURITY BREACH!\n"
- "The server's host key does not match the one PuTTY has\n"
- "cached. This means that either the server administrator\n"
- "has changed the host key, or you have actually connected\n"
- "to another computer pretending to be the server.\n"
- "The new %s key fingerprint is:\n"
- "%s\n"
- "If you were expecting this change and trust the new key,\n"
- "enter \"y\" to update PuTTY's cache and continue connecting.\n"
- "If you want to carry on connecting but without updating\n"
- "the cache, enter \"n\".\n"
- "If you want to abandon the connection completely, press\n"
- "Return to cancel. Pressing Return is the ONLY guaranteed\n"
- "safe choice.\n"
- "Update cached key? (y/n, Return cancels connection) ";
- static const char abandoned[] = "Connection abandoned.\n";
- char line[32];
- /*
- * Verify the key.
- */
- ret = verify_host_key(host, port, keytype, keystr);
- if (ret == 0) /* success - key matched OK */
- return;
- if (ret == 2) { /* key was different */
- if (console_batch_mode) {
- fprintf(stderr, wrongmsg_batch, keytype, fingerprint);
- cleanup_exit(1);
- }
- fprintf(stderr, wrongmsg, keytype, fingerprint);
- fflush(stderr);
- }
- if (ret == 1) { /* key was absent */
- if (console_batch_mode) {
- fprintf(stderr, absentmsg_batch, keytype, fingerprint);
- cleanup_exit(1);
- }
- fprintf(stderr, absentmsg, keytype, fingerprint);
- fflush(stderr);
- }
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- read(0, line, sizeof(line) - 1);
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] != '\0' && line[0] != '\r' && line[0] != '\n') {
- if (line[0] == 'y' || line[0] == 'Y')
- store_host_key(host, port, keytype, keystr);
- } else {
- fprintf(stderr, abandoned);
- cleanup_exit(0);
- }
- }
- /*
- * Ask whether the selected cipher is acceptable (since it was
- * below the configured 'warn' threshold).
- * cs: 0 = both ways, 1 = client->server, 2 = server->client
- */
- void askcipher(void *frontend, char *ciphername, int cs)
- {
- static const char msg[] =
- "The first %scipher supported by the server is\n"
- "%s, which is below the configured warning threshold.\n"
- "Continue with connection? (y/n) ";
- static const char msg_batch[] =
- "The first %scipher supported by the server is\n"
- "%s, which is below the configured warning threshold.\n"
- "Connection abandoned.\n";
- static const char abandoned[] = "Connection abandoned.\n";
- char line[32];
- if (console_batch_mode) {
- fprintf(stderr, msg_batch,
- (cs == 0) ? "" :
- (cs == 1) ? "client-to-server " : "server-to-client ",
- ciphername);
- cleanup_exit(1);
- }
- fprintf(stderr, msg,
- (cs == 0) ? "" :
- (cs == 1) ? "client-to-server " : "server-to-client ",
- ciphername);
- fflush(stderr);
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- read(0, line, sizeof(line) - 1);
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] == 'y' || line[0] == 'Y') {
- return;
- } else {
- fprintf(stderr, abandoned);
- cleanup_exit(0);
- }
- }
- /*
- * Ask whether to wipe a session log file before writing to it.
- * Returns 2 for wipe, 1 for append, 0 for cancel (don't log).
- */
- int askappend(void *frontend, Filename filename)
- {
- static const char msgtemplate[] =
- "The session log file \"%.*s\" already exists.\n"
- "You can overwrite it with a new session log,\n"
- "append your session log to the end of it,\n"
- "or disable session logging for this session.\n"
- "Enter \"y\" to wipe the file, \"n\" to append to it,\n"
- "or just press Return to disable logging.\n"
- "Wipe the log file? (y/n, Return cancels logging) ";
- static const char msgtemplate_batch[] =
- "The session log file \"%.*s\" already exists.\n"
- "Logging will not be enabled.\n";
- char line[32];
- if (console_batch_mode) {
- fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename.path);
- fflush(stderr);
- return 0;
- }
- fprintf(stderr, msgtemplate, FILENAME_MAX, filename.path);
- fflush(stderr);
- {
- struct termios oldmode, newmode;
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ECHO | ISIG | ICANON;
- tcsetattr(0, TCSANOW, &newmode);
- line[0] = '\0';
- read(0, line, sizeof(line) - 1);
- tcsetattr(0, TCSANOW, &oldmode);
- }
- if (line[0] == 'y' || line[0] == 'Y')
- return 2;
- else if (line[0] == 'n' || line[0] == 'N')
- return 1;
- else
- return 0;
- }
- /*
- * Warn about the obsolescent key file format.
- *
- * Uniquely among these functions, this one does _not_ expect a
- * frontend handle. This means that if PuTTY is ported to a
- * platform which requires frontend handles, this function will be
- * an anomaly. Fortunately, the problem it addresses will not have
- * been present on that platform, so it can plausibly be
- * implemented as an empty function.
- */
- void old_keyfile_warning(void)
- {
- static const char message[] =
- "You are loading an SSH 2 private key which has an\n"
- "old version of the file format. This means your key\n"
- "file is not fully tamperproof. Future versions of\n"
- "PuTTY may stop supporting this private key format,\n"
- "so we recommend you convert your key to the new\n"
- "format.\n"
- "\n"
- "Once the key is loaded into PuTTYgen, you can perform\n"
- "this conversion simply by saving it again.\n";
- fputs(message, stderr);
- }
- void console_provide_logctx(void *logctx)
- {
- console_logctx = logctx;
- }
- void logevent(void *frontend, const char *string)
- {
- if (console_logctx)
- log_eventlog(console_logctx, string);
- }
- int console_get_line(const char *prompt, char *str,
- int maxlen, int is_pw)
- {
- struct termios oldmode, newmode;
- int i;
- if (console_batch_mode) {
- if (maxlen > 0)
- str[0] = '\0';
- } else {
- tcgetattr(0, &oldmode);
- newmode = oldmode;
- newmode.c_lflag |= ISIG | ICANON;
- if (is_pw)
- newmode.c_lflag &= ~ECHO;
- else
- newmode.c_lflag |= ECHO;
- tcsetattr(0, TCSANOW, &newmode);
- fputs(prompt, stdout);
- fflush(stdout);
- i = read(0, str, maxlen - 1);
- tcsetattr(0, TCSANOW, &oldmode);
- if (i > 0 && str[i-1] == '\n')
- i--;
- str[i] = '\0';
- if (is_pw)
- fputs("\n", stdout);
- }
- return 1;
- }
- void frontend_keypress(void *handle)
- {
- /*
- * This is nothing but a stub, in console code.
- */
- return;
- }
- int is_interactive(void)
- {
- return isatty(0);
- }
- /*
- * X11-forwarding-related things suitable for console.
- */
- const char platform_x11_best_transport[] = "unix";
- char *platform_get_x_display(void) {
- return dupstr(getenv("DISPLAY"));
- }
|