]> git.ipfire.org Git - thirdparty/openssh-portable.git/commitdiff
fuzzer for authorized_keys parsing
authorDamien Miller <djm@mindrot.org>
Fri, 27 May 2022 07:00:43 +0000 (17:00 +1000)
committerDamien Miller <djm@mindrot.org>
Fri, 27 May 2022 07:00:43 +0000 (17:00 +1000)
mostly redundant to authopt_fuzz, but it's sensitive code so IMO it
makes sense to test this layer too

regress/misc/fuzz-harness/Makefile
regress/misc/fuzz-harness/authkeys_fuzz.cc [new file with mode: 0644]

index 3938ac853d3137a68677cb87628692fed9ca930e..0b4238fd39a49c500e1f222d888bef029be488cb 100644 (file)
@@ -11,7 +11,7 @@ LIBS=-lssh -lopenbsd-compat -lmd -lcrypto -lfido2 -lcbor $(FUZZ_LIBS)
 SK_NULL_OBJS=ssh-sk-null.o
 COMMON_DEPS=../../../libssh.a
 
-TARGETS=pubkey_fuzz sig_fuzz authopt_fuzz sshsig_fuzz \
+TARGETS=pubkey_fuzz sig_fuzz authopt_fuzz authkeys_fuzz sshsig_fuzz \
        sshsigopt_fuzz privkey_fuzz kex_fuzz agent_fuzz
 
 all: $(TARGETS)
@@ -28,6 +28,9 @@ sig_fuzz: sig_fuzz.o $(SK_NULL_OBJS) $(COMMON_DEPS)
 authopt_fuzz: authopt_fuzz.o $(SK_NULL_OBJS) $(COMMON_DEPS)
        $(CXX) -o $@ authopt_fuzz.o $(SK_NULL_OBJS) ../../../auth-options.o $(LDFLAGS) $(LIBS)
 
+authkeys_fuzz: authkeys_fuzz.o $(SK_NULL_OBJS) $(COMMON_DEPS)
+       $(CXX) -o $@ authkeys_fuzz.o $(SK_NULL_OBJS) ../../../auth-options.o ../../../auth2-pubkeyfile.o $(LDFLAGS) $(LIBS)
+
 sshsig_fuzz: sshsig_fuzz.o $(SK_NULL_OBJS) $(COMMON_DEPS)
        $(CXX) -o $@ sshsig_fuzz.o $(SK_NULL_OBJS) ../../../sshsig.o $(LDFLAGS) $(LIBS)
 
diff --git a/regress/misc/fuzz-harness/authkeys_fuzz.cc b/regress/misc/fuzz-harness/authkeys_fuzz.cc
new file mode 100644 (file)
index 0000000..6fe001f
--- /dev/null
@@ -0,0 +1,76 @@
+#include <stddef.h>
+#include <stdio.h>
+#include <stdint.h>
+#include <string.h>
+#include <stdlib.h>
+#include <pwd.h>
+#include <unistd.h>
+
+extern "C" {
+
+#include "hostfile.h"
+#include "auth.h"
+#include "auth-options.h"
+#include "sshkey.h"
+
+// testdata/id_ed25519.pub and testdata/id_ed25519-cert.pub
+const char *pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDPQXmEVMVLmeFRyafKMVWgPDkv8/uRBTwmcEDatZzMD"; 
+const char *certtext = "ssh-ed25519-cert-v01@openssh.com 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 id_ed25519.pub";
+
+// stubs
+void auth_debug_add(const char *fmt,...)
+{
+}
+
+void
+auth_log_authopts(const char *loc, const struct sshauthopt *opts, int do_remote)
+{
+}
+
+int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
+{
+       char *tmp, *o, *cp = (char *)malloc(size + 1 + strlen(pubkey) + 1);
+       struct sshauthopt *opts = NULL;
+       struct passwd *pw = getpwuid(getuid());
+       static struct sshkey *key, *cert;
+
+       if (key == NULL) {
+               if ((key = sshkey_new(KEY_UNSPEC)) == NULL ||
+                   (cert = sshkey_new(KEY_UNSPEC)) == NULL)
+                       abort();
+               if ((o = tmp = strdup(pubkey)) == NULL ||
+                   sshkey_read(key, &tmp) != 0)
+                       abort();
+               free(o);
+               if ((o = tmp = strdup(certtext)) == NULL ||
+                   sshkey_read(cert, &tmp) != 0)
+                       abort();
+               free(o);
+       }
+       if (cp == NULL || pw == NULL || key == NULL || cert == NULL)
+               abort();
+       memcpy(cp, data, size);
+       cp[size] = ' ';
+       memcpy(cp + size + 1, key, strlen(pubkey) + 1);
+
+       // Try key.
+       if ((tmp = strdup(cp)) == NULL)
+               abort();
+       (void) auth_check_authkey_line(pw, key, tmp, "127.0.0.1", "localhost",
+           "fuzz", &opts);
+       free(tmp);
+       sshauthopt_free(opts);
+
+       // Try cert.
+       if ((tmp = strdup(cp)) == NULL)
+               abort();
+       (void) auth_check_authkey_line(pw, cert, tmp, "127.0.0.1", "localhost",
+           "fuzz", &opts);
+       free(tmp);
+       sshauthopt_free(opts);
+
+       free(cp);
+       return 0;
+}
+
+} // extern "C"