commit 3c139e05f8a65dedecb36596220bc11c24dfa69d
parent 07dc33df1a76277522c70448eb55b2940ade22f7
Author: Sheng <webmaster0115@gmail.com>
Date: Wed, 22 Aug 2018 13:03:14 +0800
Added KEY_MAX_SIZE to validate the private key
Diffstat:
2 files changed, 59 insertions(+), 7 deletions(-)
diff --git a/tests/test_app.py b/tests/test_app.py
@@ -161,20 +161,64 @@ class TestApp(AsyncHTTPTestCase):
response = yield client.fetch(url)
self.assertEqual(response.code, 200)
- privatekey = read_file(os.path.join(base_dir, 'tests', 'user_rsa_key'))
- privatekey = privatekey[:100] + 'bad' + privatekey[100:]
+ privatekey = 'h' * 1024
+ files = [('privatekey', 'user_rsa_key', privatekey)]
+ content_type, body = encode_multipart_formdata(self.body_dict.items(),
+ files)
+ headers = {
+ 'Content-Type': content_type, 'content-length': str(len(body))
+ }
+ response = yield client.fetch(url, method='POST', headers=headers,
+ body=body)
+ data = json.loads(to_str(response.body))
+ self.assertIsNone(data['id'])
+ self.assertIsNone(data['encoding'])
+ self.assertEqual(data['status'], 'Not a valid private key or wrong password for decrypting the key.') # noqa
+
+ @tornado.testing.gen_test
+ def test_app_auth_with_pubkey_exceeds_key_max_size(self):
+ url = self.get_url('/')
+ client = self.get_http_client()
+ response = yield client.fetch(url)
+ self.assertEqual(response.code, 200)
+
+ privatekey = 'h' * (handler.KEY_MAX_SIZE * 2)
+ files = [('privatekey', 'user_rsa_key', privatekey)]
+ content_type, body = encode_multipart_formdata(self.body_dict.items(),
+ files)
+ headers = {
+ 'Content-Type': content_type, 'content-length': str(len(body))
+ }
+ response = yield client.fetch(url, method='POST', headers=headers,
+ body=body)
+ data = json.loads(to_str(response.body))
+ self.assertIsNone(data['id'])
+ self.assertIsNone(data['encoding'])
+ self.assertEqual(data['status'], 'Not a valid private key.')
+
+ @tornado.testing.gen_test
+ def test_app_auth_with_pubkey_cannot_be_decoded(self):
+ url = self.get_url('/')
+ client = self.get_http_client()
+ response = yield client.fetch(url)
+ self.assertEqual(response.code, 200)
+
+ privatekey = 'h' * 1024
files = [('privatekey', 'user_rsa_key', privatekey)]
content_type, body = encode_multipart_formdata(self.body_dict.items(),
files)
+ body = body.encode('utf-8')
+ # added some gbk bytes to the privatekey, make it cannot be decoded
+ body = body[:-100] + b'\xb4\xed\xce\xf3' + body[-100:]
headers = {
'Content-Type': content_type, 'content-length': str(len(body))
}
response = yield client.fetch(url, method='POST', headers=headers,
body=body)
data = json.loads(to_str(response.body))
- self.assertIsNotNone(data['status'])
self.assertIsNone(data['id'])
self.assertIsNone(data['encoding'])
+ self.assertEqual(data['status'], 'Not a valid private key.')
@tornado.testing.gen_test
def test_app_post_form_with_large_body_size(self):
diff --git a/webssh/handler.py b/webssh/handler.py
@@ -28,6 +28,7 @@ except ImportError:
DELAY = 3
+KEY_MAX_SIZE = 16384
def parse_encoding(data):
@@ -69,9 +70,16 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
def get_privatekey(self):
try:
data = self.request.files.get('privatekey')[0]['body']
- except TypeError:
+ except TypeError: # no privatekey provided
return
- return to_str(data)
+
+ if len(data) < KEY_MAX_SIZE:
+ try:
+ return to_str(data)
+ except UnicodeDecodeError:
+ pass
+
+ raise ValueError('Not a valid private key.')
@classmethod
def get_specific_pkey(cls, pkeycls, privatekey, password):
@@ -96,8 +104,8 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
or cls.get_specific_pkey(paramiko.Ed25519Key, privatekey,
password)
if not pkey:
- raise ValueError('Not a valid private key file or '
- 'wrong password for decrypting the private key.')
+ raise ValueError('Not a valid private key or wrong password '
+ 'for decrypting the key.')
return pkey
def get_hostname(self):