Browse Source
sshd does support gssapi-with-mic on the server side, but has no built-in client-side support for this authentication mechanism. Add our own implementation for it, following RFC 4462.[1] To avoid needlessly re-trying mechanisms that aren't even configured on the client, we disable mechanisms that fail on the very first attempt to use them. Since we have no real Kerberos5 test setup, this cannot be fully tested in CI. The disabling of the authentication mechanism and that it is skipped when not successful _is_ tested. [1] https://www.ietf.org/rfc/rfc4462.txt Bug: 520927 Change-Id: I5d0cdb14103588a57c52f927df541b589ab88d88 Signed-off-by: Thomas Wolf <thomas.wolf@paranor.ch>stable-5.2
Thomas Wolf
6 years ago
committed by
Matthias Sohn
8 changed files with 653 additions and 5 deletions
@ -0,0 +1,234 @@
|
||||
/* |
||||
* Copyright (C) 2018, Thomas Wolf <thomas.wolf@paranor.ch> |
||||
* and other copyright owners as documented in the project's IP log. |
||||
* |
||||
* This program and the accompanying materials are made available |
||||
* under the terms of the Eclipse Distribution License v1.0 which |
||||
* accompanies this distribution, is reproduced below, and is |
||||
* available at http://www.eclipse.org/org/documents/edl-v10.php
|
||||
* |
||||
* All rights reserved. |
||||
* |
||||
* Redistribution and use in source and binary forms, with or |
||||
* without modification, are permitted provided that the following |
||||
* conditions are met: |
||||
* |
||||
* - Redistributions of source code must retain the above copyright |
||||
* notice, this list of conditions and the following disclaimer. |
||||
* |
||||
* - Redistributions in binary form must reproduce the above |
||||
* copyright notice, this list of conditions and the following |
||||
* disclaimer in the documentation and/or other materials provided |
||||
* with the distribution. |
||||
* |
||||
* - Neither the name of the Eclipse Foundation, Inc. nor the |
||||
* names of its contributors may be used to endorse or promote |
||||
* products derived from this software without specific prior |
||||
* written permission. |
||||
* |
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
||||
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
||||
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF |
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
*/ |
||||
package org.eclipse.jgit.internal.transport.sshd; |
||||
|
||||
import java.net.InetAddress; |
||||
import java.net.InetSocketAddress; |
||||
import java.net.UnknownHostException; |
||||
import java.util.Collection; |
||||
import java.util.Collections; |
||||
import java.util.LinkedHashMap; |
||||
import java.util.Map; |
||||
import java.util.concurrent.atomic.AtomicBoolean; |
||||
|
||||
import org.eclipse.jgit.annotations.NonNull; |
||||
import org.ietf.jgss.GSSContext; |
||||
import org.ietf.jgss.GSSException; |
||||
import org.ietf.jgss.GSSManager; |
||||
import org.ietf.jgss.GSSName; |
||||
import org.ietf.jgss.Oid; |
||||
|
||||
/** |
||||
* Global repository of GSS-API mechanisms that we can use. |
||||
*/ |
||||
public class GssApiMechanisms { |
||||
|
||||
private GssApiMechanisms() { |
||||
// No instantiation
|
||||
} |
||||
|
||||
/** Prefix to use with {@link GSSName#NT_HOSTBASED_SERVICE}. */ |
||||
public static final String GSSAPI_HOST_PREFIX = "host@"; //$NON-NLS-1$
|
||||
|
||||
/** The {@link Oid} of Kerberos 5. */ |
||||
public static final Oid KERBEROS_5 = createOid("1.2.840.113554.1.2.2"); //$NON-NLS-1$
|
||||
|
||||
/** SGNEGO is not to be used with ssh. */ |
||||
private static final Oid SPNEGO = createOid("1.3.6.1.5.5.2"); //$NON-NLS-1$
|
||||
|
||||
/** Protects {@link #supportedMechanisms}. */ |
||||
private static final Object LOCK = new Object(); |
||||
|
||||
/** |
||||
* The {@link AtomicBoolean} is set to {@code true} when the mechanism could |
||||
* be initialized successfully at least once. |
||||
*/ |
||||
private static Map<Oid, Boolean> supportedMechanisms; |
||||
|
||||
/** |
||||
* Retrieves an immutable collection of the supported mechanisms. |
||||
* |
||||
* @return the supported mechanisms |
||||
*/ |
||||
@NonNull |
||||
public static Collection<Oid> getSupportedMechanisms() { |
||||
synchronized (LOCK) { |
||||
if (supportedMechanisms == null) { |
||||
GSSManager manager = GSSManager.getInstance(); |
||||
Oid[] mechs = manager.getMechs(); |
||||
Map<Oid, Boolean> mechanisms = new LinkedHashMap<>(); |
||||
if (mechs != null) { |
||||
for (Oid oid : mechs) { |
||||
// RFC 4462 states that SPNEGO must not be used with ssh
|
||||
if (!SPNEGO.equals(oid)) { |
||||
mechanisms.put(oid, Boolean.FALSE); |
||||
} |
||||
} |
||||
} |
||||
supportedMechanisms = mechanisms; |
||||
} |
||||
return Collections.unmodifiableSet(supportedMechanisms.keySet()); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Report that this mechanism was used successfully. |
||||
* |
||||
* @param mechanism |
||||
* that worked |
||||
*/ |
||||
public static void worked(@NonNull Oid mechanism) { |
||||
synchronized (LOCK) { |
||||
supportedMechanisms.put(mechanism, Boolean.TRUE); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Mark the mechanisms as failed. |
||||
* |
||||
* @param mechanism |
||||
* to mark |
||||
*/ |
||||
public static void failed(@NonNull Oid mechanism) { |
||||
synchronized (LOCK) { |
||||
Boolean worked = supportedMechanisms.get(mechanism); |
||||
if (worked != null && !worked.booleanValue()) { |
||||
// If it never worked, remove it
|
||||
supportedMechanisms.remove(mechanism); |
||||
} |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Resolves an {@link InetSocketAddress}. |
||||
* |
||||
* @param remote |
||||
* to resolve |
||||
* @return the resolved {@link InetAddress}, or {@code null} if unresolved. |
||||
*/ |
||||
public static InetAddress resolve(@NonNull InetSocketAddress remote) { |
||||
InetAddress address = remote.getAddress(); |
||||
if (address == null) { |
||||
try { |
||||
address = InetAddress.getByName(remote.getHostString()); |
||||
} catch (UnknownHostException e) { |
||||
return null; |
||||
} |
||||
} |
||||
return address; |
||||
} |
||||
|
||||
/** |
||||
* Determines a canonical host name for use use with GSS-API. |
||||
* |
||||
* @param remote |
||||
* to get the host name from |
||||
* @return the canonical host name, if it can be determined, otherwise the |
||||
* {@link InetSocketAddress#getHostString() unprocessed host name}. |
||||
*/ |
||||
@NonNull |
||||
public static String getCanonicalName(@NonNull InetSocketAddress remote) { |
||||
InetAddress address = resolve(remote); |
||||
if (address == null) { |
||||
return remote.getHostString(); |
||||
} |
||||
return address.getCanonicalHostName(); |
||||
} |
||||
|
||||
/** |
||||
* Creates a {@link GSSContext} for the given mechanism to authenticate with |
||||
* the host given by {@code fqdn}. |
||||
* |
||||
* @param mechanism |
||||
* {@link Oid} of the mechanism to use |
||||
* @param fqdn |
||||
* fully qualified domain name of the host to authenticate with |
||||
* @return the context, if the mechanism is available and the context could |
||||
* be created, or {@code null} otherwise |
||||
*/ |
||||
public static GSSContext createContext(@NonNull Oid mechanism, |
||||
@NonNull String fqdn) { |
||||
GSSContext context = null; |
||||
try { |
||||
GSSManager manager = GSSManager.getInstance(); |
||||
context = manager.createContext( |
||||
manager.createName( |
||||
GssApiMechanisms.GSSAPI_HOST_PREFIX + fqdn, |
||||
GSSName.NT_HOSTBASED_SERVICE), |
||||
mechanism, null, GSSContext.DEFAULT_LIFETIME); |
||||
} catch (GSSException e) { |
||||
closeContextSilently(context); |
||||
failed(mechanism); |
||||
return null; |
||||
} |
||||
worked(mechanism); |
||||
return context; |
||||
} |
||||
|
||||
/** |
||||
* Closes (disposes of) a {@link GSSContext} ignoring any |
||||
* {@link GSSException}s. |
||||
* |
||||
* @param context |
||||
* to dispose |
||||
*/ |
||||
public static void closeContextSilently(GSSContext context) { |
||||
if (context != null) { |
||||
try { |
||||
context.dispose(); |
||||
} catch (GSSException e) { |
||||
// Ignore
|
||||
} |
||||
} |
||||
} |
||||
|
||||
private static Oid createOid(String rep) { |
||||
try { |
||||
return new Oid(rep); |
||||
} catch (GSSException e) { |
||||
// Does not occur
|
||||
return null; |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,68 @@
|
||||
/* |
||||
* Copyright (C) 2018, Thomas Wolf <thomas.wolf@paranor.ch> |
||||
* and other copyright owners as documented in the project's IP log. |
||||
* |
||||
* This program and the accompanying materials are made available |
||||
* under the terms of the Eclipse Distribution License v1.0 which |
||||
* accompanies this distribution, is reproduced below, and is |
||||
* available at http://www.eclipse.org/org/documents/edl-v10.php
|
||||
* |
||||
* All rights reserved. |
||||
* |
||||
* Redistribution and use in source and binary forms, with or |
||||
* without modification, are permitted provided that the following |
||||
* conditions are met: |
||||
* |
||||
* - Redistributions of source code must retain the above copyright |
||||
* notice, this list of conditions and the following disclaimer. |
||||
* |
||||
* - Redistributions in binary form must reproduce the above |
||||
* copyright notice, this list of conditions and the following |
||||
* disclaimer in the documentation and/or other materials provided |
||||
* with the distribution. |
||||
* |
||||
* - Neither the name of the Eclipse Foundation, Inc. nor the |
||||
* names of its contributors may be used to endorse or promote |
||||
* products derived from this software without specific prior |
||||
* written permission. |
||||
* |
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
||||
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
||||
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF |
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
*/ |
||||
package org.eclipse.jgit.internal.transport.sshd; |
||||
|
||||
import org.apache.sshd.client.auth.AbstractUserAuthFactory; |
||||
import org.apache.sshd.client.auth.UserAuth; |
||||
|
||||
/** |
||||
* Factory to create {@link GssApiWithMicAuthentication} handlers. |
||||
*/ |
||||
public class GssApiWithMicAuthFactory extends AbstractUserAuthFactory { |
||||
|
||||
/** The authentication identifier for GSSApi-with-MIC. */ |
||||
public static final String NAME = "gssapi-with-mic"; //$NON-NLS-1$
|
||||
|
||||
/** The singleton {@link GssApiWithMicAuthFactory}. */ |
||||
public static final GssApiWithMicAuthFactory INSTANCE = new GssApiWithMicAuthFactory(); |
||||
|
||||
private GssApiWithMicAuthFactory() { |
||||
super(NAME); |
||||
} |
||||
|
||||
@Override |
||||
public UserAuth create() { |
||||
return new GssApiWithMicAuthentication(); |
||||
} |
||||
|
||||
} |
@ -0,0 +1,275 @@
|
||||
/* |
||||
* Copyright (C) 2018, Thomas Wolf <thomas.wolf@paranor.ch> |
||||
* and other copyright owners as documented in the project's IP log. |
||||
* |
||||
* This program and the accompanying materials are made available |
||||
* under the terms of the Eclipse Distribution License v1.0 which |
||||
* accompanies this distribution, is reproduced below, and is |
||||
* available at http://www.eclipse.org/org/documents/edl-v10.php
|
||||
* |
||||
* All rights reserved. |
||||
* |
||||
* Redistribution and use in source and binary forms, with or |
||||
* without modification, are permitted provided that the following |
||||
* conditions are met: |
||||
* |
||||
* - Redistributions of source code must retain the above copyright |
||||
* notice, this list of conditions and the following disclaimer. |
||||
* |
||||
* - Redistributions in binary form must reproduce the above |
||||
* copyright notice, this list of conditions and the following |
||||
* disclaimer in the documentation and/or other materials provided |
||||
* with the distribution. |
||||
* |
||||
* - Neither the name of the Eclipse Foundation, Inc. nor the |
||||
* names of its contributors may be used to endorse or promote |
||||
* products derived from this software without specific prior |
||||
* written permission. |
||||
* |
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND |
||||
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, |
||||
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||||
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
||||
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF |
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
*/ |
||||
package org.eclipse.jgit.internal.transport.sshd; |
||||
|
||||
import static java.text.MessageFormat.format; |
||||
|
||||
import java.io.IOException; |
||||
import java.net.InetAddress; |
||||
import java.net.InetSocketAddress; |
||||
import java.net.SocketAddress; |
||||
import java.net.UnknownHostException; |
||||
import java.util.Collection; |
||||
import java.util.Iterator; |
||||
|
||||
import org.apache.sshd.client.auth.AbstractUserAuth; |
||||
import org.apache.sshd.client.session.ClientSession; |
||||
import org.apache.sshd.common.SshConstants; |
||||
import org.apache.sshd.common.util.buffer.Buffer; |
||||
import org.apache.sshd.common.util.buffer.ByteArrayBuffer; |
||||
import org.ietf.jgss.GSSContext; |
||||
import org.ietf.jgss.GSSException; |
||||
import org.ietf.jgss.MessageProp; |
||||
import org.ietf.jgss.Oid; |
||||
|
||||
/** |
||||
* GSSAPI-with-MIC authentication handler (Kerberos 5). |
||||
* |
||||
* @see <a href="https://tools.ietf.org/html/rfc4462">RFC 4462</a> |
||||
*/ |
||||
public class GssApiWithMicAuthentication extends AbstractUserAuth { |
||||
|
||||
/** Synonym used in RFC 4462. */ |
||||
private static final byte SSH_MSG_USERAUTH_GSSAPI_RESPONSE = SshConstants.SSH_MSG_USERAUTH_INFO_REQUEST; |
||||
|
||||
/** Synonym used in RFC 4462. */ |
||||
private static final byte SSH_MSG_USERAUTH_GSSAPI_TOKEN = SshConstants.SSH_MSG_USERAUTH_INFO_RESPONSE; |
||||
|
||||
private enum ProtocolState { |
||||
STARTED, TOKENS, MIC_SENT, FAILED |
||||
} |
||||
|
||||
private Collection<Oid> mechanisms; |
||||
|
||||
private Iterator<Oid> nextMechanism; |
||||
|
||||
private Oid currentMechanism; |
||||
|
||||
private ProtocolState state; |
||||
|
||||
private GSSContext context; |
||||
|
||||
/** Creates a new {@link GssApiWithMicAuthentication}. */ |
||||
public GssApiWithMicAuthentication() { |
||||
super(GssApiWithMicAuthFactory.NAME); |
||||
} |
||||
|
||||
@Override |
||||
protected boolean sendAuthDataRequest(ClientSession session, String service) |
||||
throws Exception { |
||||
if (mechanisms == null) { |
||||
mechanisms = GssApiMechanisms.getSupportedMechanisms(); |
||||
nextMechanism = mechanisms.iterator(); |
||||
} |
||||
if (context != null) { |
||||
close(false); |
||||
} |
||||
if (!nextMechanism.hasNext()) { |
||||
return false; |
||||
} |
||||
state = ProtocolState.STARTED; |
||||
currentMechanism = nextMechanism.next(); |
||||
try { |
||||
String hostName = getHostName(session); |
||||
context = GssApiMechanisms.createContext(currentMechanism, |
||||
hostName); |
||||
context.requestMutualAuth(true); |
||||
context.requestConf(true); |
||||
context.requestInteg(true); |
||||
context.requestCredDeleg(true); |
||||
context.requestAnonymity(false); |
||||
} catch (GSSException | NullPointerException e) { |
||||
close(true); |
||||
if (log.isDebugEnabled()) { |
||||
log.debug(format(SshdText.get().gssapiInitFailure, |
||||
currentMechanism.toString())); |
||||
} |
||||
currentMechanism = null; |
||||
state = ProtocolState.FAILED; |
||||
return false; |
||||
} |
||||
Buffer buffer = session |
||||
.createBuffer(SshConstants.SSH_MSG_USERAUTH_REQUEST); |
||||
buffer.putString(session.getUsername()); |
||||
buffer.putString(service); |
||||
buffer.putString(getName()); |
||||
buffer.putInt(1); |
||||
buffer.putBytes(currentMechanism.getDER()); |
||||
session.writePacket(buffer); |
||||
return true; |
||||
} |
||||
|
||||
@Override |
||||
protected boolean processAuthDataRequest(ClientSession session, |
||||
String service, Buffer in) throws Exception { |
||||
// SSH_MSG_USERAUTH_FAILURE and SSH_MSG_USERAUTH_SUCCESS, as well as
|
||||
// SSH_MSG_USERAUTH_BANNER are handled by the framework.
|
||||
int command = in.getUByte(); |
||||
if (context == null) { |
||||
return false; |
||||
} |
||||
try { |
||||
switch (command) { |
||||
case SSH_MSG_USERAUTH_GSSAPI_RESPONSE: { |
||||
if (state != ProtocolState.STARTED) { |
||||
return unexpectedMessage(command); |
||||
} |
||||
// Initial reply from the server with the mechanism to use.
|
||||
Oid mechanism = new Oid(in.getBytes()); |
||||
if (!currentMechanism.equals(mechanism)) { |
||||
return false; |
||||
} |
||||
replyToken(session, service, new byte[0]); |
||||
return true; |
||||
} |
||||
case SSH_MSG_USERAUTH_GSSAPI_TOKEN: { |
||||
if (context.isEstablished() || state != ProtocolState.TOKENS) { |
||||
return unexpectedMessage(command); |
||||
} |
||||
// Server sent us a token
|
||||
replyToken(session, service, in.getBytes()); |
||||
return true; |
||||
} |
||||
default: |
||||
return unexpectedMessage(command); |
||||
} |
||||
} catch (GSSException e) { |
||||
log.warn(format(SshdText.get().gssapiFailure, |
||||
currentMechanism.toString()), e); |
||||
state = ProtocolState.FAILED; |
||||
return false; |
||||
} |
||||
} |
||||
|
||||
@Override |
||||
public void destroy() { |
||||
try { |
||||
close(false); |
||||
} finally { |
||||
super.destroy(); |
||||
} |
||||
} |
||||
|
||||
private void close(boolean silent) { |
||||
try { |
||||
if (context != null) { |
||||
context.dispose(); |
||||
context = null; |
||||
} |
||||
} catch (GSSException e) { |
||||
if (!silent) { |
||||
log.warn(SshdText.get().gssapiFailure, e); |
||||
} |
||||
} |
||||
} |
||||
|
||||
private void sendToken(ClientSession session, byte[] receivedToken) |
||||
throws IOException, GSSException { |
||||
state = ProtocolState.TOKENS; |
||||
byte[] token = context.initSecContext(receivedToken, 0, |
||||
receivedToken.length); |
||||
if (token != null) { |
||||
Buffer buffer = session.createBuffer(SSH_MSG_USERAUTH_GSSAPI_TOKEN); |
||||
buffer.putBytes(token); |
||||
session.writePacket(buffer); |
||||
} |
||||
} |
||||
|
||||
private void sendMic(ClientSession session, String service) |
||||
throws IOException, GSSException { |
||||
state = ProtocolState.MIC_SENT; |
||||
// Produce MIC
|
||||
Buffer micBuffer = new ByteArrayBuffer(); |
||||
micBuffer.putBytes(session.getSessionId()); |
||||
micBuffer.putByte(SshConstants.SSH_MSG_USERAUTH_REQUEST); |
||||
micBuffer.putString(session.getUsername()); |
||||
micBuffer.putString(service); |
||||
micBuffer.putString(getName()); |
||||
byte[] micBytes = micBuffer.getCompactData(); |
||||
byte[] mic = context.getMIC(micBytes, 0, micBytes.length, |
||||
new MessageProp(0, true)); |
||||
Buffer buffer = session |
||||
.createBuffer(SshConstants.SSH_MSG_USERAUTH_GSSAPI_MIC); |
||||
buffer.putBytes(mic); |
||||
session.writePacket(buffer); |
||||
} |
||||
|
||||
private void replyToken(ClientSession session, String service, byte[] bytes) |
||||
throws IOException, GSSException { |
||||
sendToken(session, bytes); |
||||
if (context.isEstablished()) { |
||||
sendMic(session, service); |
||||
} |
||||
} |
||||
|
||||
private String getHostName(ClientSession session) { |
||||
SocketAddress remote = session.getConnectAddress(); |
||||
if (remote instanceof InetSocketAddress) { |
||||
InetAddress address = GssApiMechanisms |
||||
.resolve((InetSocketAddress) remote); |
||||
if (address != null) { |
||||
return address.getCanonicalHostName(); |
||||
} |
||||
} |
||||
if (session instanceof JGitClientSession) { |
||||
String hostName = ((JGitClientSession) session).getHostConfigEntry() |
||||
.getHostName(); |
||||
try { |
||||
hostName = InetAddress.getByName(hostName) |
||||
.getCanonicalHostName(); |
||||
} catch (UnknownHostException e) { |
||||
// Ignore here; try with the non-canonical name
|
||||
} |
||||
return hostName; |
||||
} |
||||
throw new IllegalStateException( |
||||
"Wrong session class :" + session.getClass().getName()); //$NON-NLS-1$
|
||||
} |
||||
|
||||
private boolean unexpectedMessage(int command) { |
||||
log.warn(format(SshdText.get().gssapiUnexpectedMessage, getName(), |
||||
Integer.toString(command))); |
||||
return false; |
||||
} |
||||
|
||||
} |
Loading…
Reference in new issue