Question about sshbuf
Ron Frederick
ronf at timeheart.net
Tue May 24 01:05:06 AEST 2022
On May 22, 2022, at 7:03 PM, Damien Miller <djm at mindrot.org> wrote:
> On Sat, 21 May 2022, Ron Frederick wrote:
>> I’m trying to build a version of OpenSSH 9.0p1 with the GSSAPI patch
>> at https://sources.debian.org/patches/openssh/1:9.0p1-1/gssapi.patch/.
>> The patch applied just fine and I had no issues with the build or the
>> tests (all of which passed).
>>
>> That said, I think I’ve discovered a bug in the patch. I know that’s
>> not the responsibility of the OpenSSH maintainers, but I was hoping
>> to get some help from this list on a higher-level question about the
>> right way to work with sshbufs, as I haven’t had a lot of experience
>> actually making changes to OpenSSH.
>>
>> The issue occurs when the GSS client kex code receives a
>> KEXGSS_HOSTKEY message. There’s code to handle this message, but it
>> runs into an issue where it reports "ssh_packet_read: read: internal
>> error: buffer is read-only”. When I looked into this more closely, the
>> issue is not actually that the sshbuf it is using is read-only. It’s
>> that the sshbuf has a refcount greater than 1 at the time the code
>> tries to reuse it. Here’s the code in question:
>>
>> struct sshbuf *server_host_key_blob = NULL;
>>
>> ...snip...
>> /* If we've sent them data, they should reply */
>> do {
>> type = ssh_packet_read(ssh);
>> if (type == SSH2_MSG_KEXGSS_HOSTKEY) {
>> debug("Received KEXGSS_HOSTKEY");
>> if (server_host_key_blob)
>> fatal("Server host key received more than once");
>> if ((r = sshpkt_getb_froms(ssh, &server_host_key_blob)) != 0)
>> fatal("Failed to read server host key: %s", ssh_err(r));
>> }
>> } while (type == SSH2_MSG_KEXGSS_HOSTKEY);
>> ...snip...
>> out:
>> sshbuf_free(server_host_key_blob);
>>
>> I believe the problem here is that the call to sshpkt_getb_froms() is
>> returning an sshbuf in server_host_key_blob which is a reference to
>> the string being consumed from the packet being read, setting that
>> original packet as its parent. As a result, the “ssh” buffer now has
>> a refcount of 2, and when it returns to the top of the do {...} while
>> and tries to read another packet into “ssh”, it gets the error about
>> the sshbuf being “read-only” (for good reason).
>
> IMO the best fix for this would be to put a sshbuf_free() at the
> start of the do {} loop (it will handle a NULL argument fine).
Thanks Damien for the quick response.
Given that “ssh” is actually a “struct ssh *” and not a “struct sshbuf *”, what would be the right argument to pass into sshbuf_free()? It looks like it would need to be something like ssh->state->incoming_packet, but this calling code probably shouldn’t be poking into the internals like that. I don’t see a wrapper in packet.c which would do a free of that internal buffer.
--
Ron Frederick
ronf at timeheart.net
More information about the openssh-unix-dev
mailing list