class SSHUserAuthServer(service.SSHService): (source)
A service implementing the server side of the 'ssh-userauth' service. It is used to authenticate the user on the other side as being able to access this server.
| Method | auth |
Password authentication. Payload: |
| Method | auth |
Public key authentication. Payload: |
| Method | service |
Called when the userauth service is started. Set up instance variables, check if we should allow password authentication (only allow if the outgoing connection is encrypted) and set up a login timeout. |
| Method | service |
Called when the userauth service is stopped. Cancel the login timeout if it's still going. |
| Method | ssh_ |
The client has requested authentication. Payload: |
| Method | timeout |
Called when the user has timed out on authentication. Disconnect with a DISCONNECT_NO_MORE_AUTH_METHODS_AVAILABLE message. |
| Method | try |
Try to authenticate the user with the given method. Dispatches to a auth_* method. |
| Instance Variable | attempts |
the number of failed login attempts we allow before disconnecting. |
| Instance Variable | authenticated |
a list of authentication methods that have already been used. |
| Instance Variable | clock |
an object with a callLater method. Stubbed out for testing. |
| Instance Variable | interface |
a dict mapping credential interfaces to authentication methods. The server checks to see which of the cred interfaces have checkers and tells the client that those methods are valid for authentication. |
| Instance Variable | login |
the number of login attempts that have been made |
| Instance Variable | login |
the number of seconds we wait before disconnecting the user for taking too long to authenticate |
| Instance Variable | method |
the current authentication method |
| Instance Variable | name |
the name of this service: 'ssh-userauth' |
| Instance Variable | next |
the service the user wants started after authentication has been completed. |
| Instance Variable | password |
the number of seconds to delay when the user gives an incorrect password |
| Instance Variable | portal |
the twisted.cred.portal.Portal we are using for authentication |
| Instance Variable | supported |
A list of the supported authentication methods. |
| Instance Variable | user |
the last username the client tried to authenticate with |
| Static Method | _wrap |
Wraps the SSH user auth message request with security key information. This blob will be verified against the signature. See https://github.com/openssh/openssh-portable/blob/a4aa090a3d40dddb07d5ebebc501f6457541a501/PROTOCOL.u2f#L176... |
| Method | _cb |
The callback when user has successfully been authenticated. For a description of the arguments, see twisted.cred.portal.Portal.login. We start the service requested by the user. |
| Method | _eb |
The final errback in the authentication chain. If the reason is error.IgnoreAuthentication, we simply return; the authentication method has sent its own response. Otherwise, send a failure message and (if the method is not 'none') increment the number of login attempts. |
| Method | _eb |
Called back if the user did not sent a signature. If reason is error.ValidPublicKey then this key is valid for the user to authenticate with. Send MSG_USERAUTH_PK_OK. |
| Method | _eb |
An intermediate errback. If the reason is error.NotEnoughAuthentication, we send a MSG_USERAUTH_FAILURE, but with the partial success indicator set. |
| Method | _eb |
If the password is invalid, wait before sending the failure in order to delay brute-force password guessing. |
| Class Variable | _log |
Undocumented |
| Instance Variable | _cancel |
Undocumented |
Inherited from SSHService:
| Method | log |
Undocumented |
| Method | packet |
called when we receive a packet on the transport |
| Class Variable | protocol |
Undocumented |
| Class Variable | transport |
Undocumented |
Password authentication. Payload:
string password
Make a UsernamePassword credential and verify it with our portal.
Public key authentication. Payload:
byte has signature
string algorithm name
string key blob
[string signature] (if has signature is True)
Create a SSHPublicKey credential and verify it using our portal.
Called when the userauth service is started. Set up instance variables, check if we should allow password authentication (only allow if the outgoing connection is encrypted) and set up a login timeout.
The client has requested authentication. Payload:
string user
string next service
string method
<authentication specific data>
| Parameters | |
packet:bytes | Undocumented |
| Returns | |
Deferred[ | Undocumented |
Called when the user has timed out on authentication. Disconnect with a DISCONNECT_NO_MORE_AUTH_METHODS_AVAILABLE message.
Try to authenticate the user with the given method. Dispatches to a auth_* method.
| Parameters | |
kind:bytes | the authentication method to try. |
user:bytes | the username the client is authenticating with. |
data:bytes | authentication specific data sent by the client. |
| Returns | |
Deferred[ | A Deferred called back if the method succeeded, or erred back if it failed. |
a dict mapping credential interfaces to authentication methods. The server checks to see which of the cred interfaces have checkers and tells the client that those methods are valid for authentication.
Wraps the SSH user auth message request with security key information. This blob will be verified against the signature. See https://github.com/openssh/openssh-portable/blob/a4aa090a3d40dddb07d5ebebc501f6457541a501/PROTOCOL.u2f#L176
In addition to the message to be signed, the U2F signature operation requires the key handle and a few additional parameters. The signature is signed over a blob that consists of:
byte[32] SHA256(application)
byte flags (including "user present", extensions present)
uint32 counter
byte[] extensions
byte[32] SHA256(message)
The signature format used on the wire in SSH2_USERAUTH_REQUEST:
string "sk-ecdsa-sha2-nistp256@openssh.com" or "sk-ssh-ed25519@openssh.com"
string signature
byte flags
uint32 counter
The callback when user has successfully been authenticated. For a description of the arguments, see twisted.cred.portal.Portal.login. We start the service requested by the user.
The final errback in the authentication chain. If the reason is error.IgnoreAuthentication, we simply return; the authentication method has sent its own response. Otherwise, send a failure message and (if the method is not 'none') increment the number of login attempts.
| Parameters | |
reason:twisted.python.failure.Failure | Undocumented |
Called back if the user did not sent a signature. If reason is error.ValidPublicKey then this key is valid for the user to authenticate with. Send MSG_USERAUTH_PK_OK.
An intermediate errback. If the reason is error.NotEnoughAuthentication, we send a MSG_USERAUTH_FAILURE, but with the partial success indicator set.
| Parameters | |
reason:twisted.python.failure.Failure | Undocumented |