kex_ecdh_nist.py 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. """
  2. Ephemeral Elliptic Curve Diffie-Hellman (ECDH) key exchange
  3. RFC 5656, Section 4
  4. """
  5. from hashlib import sha256, sha384, sha512
  6. from paramiko.message import Message
  7. from paramiko.py3compat import byte_chr, long
  8. from paramiko.ssh_exception import SSHException
  9. from cryptography.hazmat.backends import default_backend
  10. from cryptography.hazmat.primitives.asymmetric import ec
  11. from binascii import hexlify
  12. _MSG_KEXECDH_INIT, _MSG_KEXECDH_REPLY = range(30, 32)
  13. c_MSG_KEXECDH_INIT, c_MSG_KEXECDH_REPLY = [byte_chr(c) for c in range(30, 32)]
  14. class KexNistp256():
  15. name = "ecdh-sha2-nistp256"
  16. hash_algo = sha256
  17. curve = ec.SECP256R1()
  18. def __init__(self, transport):
  19. self.transport = transport
  20. # private key, client public and server public keys
  21. self.P = long(0)
  22. self.Q_C = None
  23. self.Q_S = None
  24. def start_kex(self):
  25. self._generate_key_pair()
  26. if self.transport.server_mode:
  27. self.transport._expect_packet(_MSG_KEXECDH_INIT)
  28. return
  29. m = Message()
  30. m.add_byte(c_MSG_KEXECDH_INIT)
  31. # SEC1: V2.0 2.3.3 Elliptic-Curve-Point-to-Octet-String Conversion
  32. m.add_string(self.Q_C.public_numbers().encode_point())
  33. self.transport._send_message(m)
  34. self.transport._expect_packet(_MSG_KEXECDH_REPLY)
  35. def parse_next(self, ptype, m):
  36. if self.transport.server_mode and (ptype == _MSG_KEXECDH_INIT):
  37. return self._parse_kexecdh_init(m)
  38. elif not self.transport.server_mode and (ptype == _MSG_KEXECDH_REPLY):
  39. return self._parse_kexecdh_reply(m)
  40. raise SSHException('KexECDH asked to handle packet type %d' % ptype)
  41. def _generate_key_pair(self):
  42. self.P = ec.generate_private_key(self.curve, default_backend())
  43. if self.transport.server_mode:
  44. self.Q_S = self.P.public_key()
  45. return
  46. self.Q_C = self.P.public_key()
  47. def _parse_kexecdh_init(self, m):
  48. Q_C_bytes = m.get_string()
  49. self.Q_C = ec.EllipticCurvePublicNumbers.from_encoded_point(
  50. self.curve, Q_C_bytes
  51. )
  52. K_S = self.transport.get_server_key().asbytes()
  53. K = self.P.exchange(ec.ECDH(), self.Q_C.public_key(default_backend()))
  54. K = long(hexlify(K), 16)
  55. # compute exchange hash
  56. hm = Message()
  57. hm.add(self.transport.remote_version, self.transport.local_version,
  58. self.transport.remote_kex_init, self.transport.local_kex_init)
  59. hm.add_string(K_S)
  60. hm.add_string(Q_C_bytes)
  61. # SEC1: V2.0 2.3.3 Elliptic-Curve-Point-to-Octet-String Conversion
  62. hm.add_string(self.Q_S.public_numbers().encode_point())
  63. hm.add_mpint(long(K))
  64. H = self.hash_algo(hm.asbytes()).digest()
  65. self.transport._set_K_H(K, H)
  66. sig = self.transport.get_server_key().sign_ssh_data(H)
  67. # construct reply
  68. m = Message()
  69. m.add_byte(c_MSG_KEXECDH_REPLY)
  70. m.add_string(K_S)
  71. m.add_string(self.Q_S.public_numbers().encode_point())
  72. m.add_string(sig)
  73. self.transport._send_message(m)
  74. self.transport._activate_outbound()
  75. def _parse_kexecdh_reply(self, m):
  76. K_S = m.get_string()
  77. Q_S_bytes = m.get_string()
  78. self.Q_S = ec.EllipticCurvePublicNumbers.from_encoded_point(
  79. self.curve, Q_S_bytes
  80. )
  81. sig = m.get_binary()
  82. K = self.P.exchange(ec.ECDH(), self.Q_S.public_key(default_backend()))
  83. K = long(hexlify(K), 16)
  84. # compute exchange hash and verify signature
  85. hm = Message()
  86. hm.add(self.transport.local_version, self.transport.remote_version,
  87. self.transport.local_kex_init, self.transport.remote_kex_init)
  88. hm.add_string(K_S)
  89. # SEC1: V2.0 2.3.3 Elliptic-Curve-Point-to-Octet-String Conversion
  90. hm.add_string(self.Q_C.public_numbers().encode_point())
  91. hm.add_string(Q_S_bytes)
  92. hm.add_mpint(K)
  93. self.transport._set_K_H(K, self.hash_algo(hm.asbytes()).digest())
  94. self.transport._verify_key(K_S, sig)
  95. self.transport._activate_outbound()
  96. class KexNistp384(KexNistp256):
  97. name = "ecdh-sha2-nistp384"
  98. hash_algo = sha384
  99. curve = ec.SECP384R1()
  100. class KexNistp521(KexNistp256):
  101. name = "ecdh-sha2-nistp521"
  102. hash_algo = sha512
  103. curve = ec.SECP521R1()