3 # Debian/OpenSSL Weak Key Detector
5 # Copyright (C) 2008, Florian Weimer <fw@deneb.enyo.de>
7 # Permission to use, copy, modify, and distribute this software for
8 # any purpose with or without fee is hereby granted, provided that the
9 # above copyright notice and this permission notice appear in all
12 # THE SOFTWARE IS PROVIDED "AS IS" AND FLORIAN WEIMER AND HIS
13 # CONTRIBUTORS DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE
14 # INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN
15 # NO EVENT SHALL FLORIAN WEIMER OR HIS CONTRIBUTORS BE LIABLE FOR ANY
16 # SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
17 # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
18 # AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
19 # OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
22 # Blacklist data has been provided by Kees Cook, Peter Palfrader and
25 # Patches and comments are welcome. Please send them to
26 # <fw@deneb.enyo.de>, and use "dowkd" in the subject line.
33 usage: $0 [OPTIONS...] COMMAND [ARGUMENTS...]
37 file: examine files on the command line for weak keys
38 host: examine the specified hosts for weak SSH keys
39 user: examine user SSH keys for weakness; examine all users if no
41 help: show this help screen
45 -c FILE: set the database cache file name (default: dowkd.db)
47 dowkd currently handles the following OpenSSH host and user keys,
48 provided they have been generated on a little-endian architecture
49 (such as i386 or amd64): RSA/1024, RSA/2048 and DSA/1024. (The
50 OpenSSH version in Debian does not support DSA key generation with)
53 OpenVPN shared also detected on little-endian architecture.
55 Note that the blacklist by dowkd may be incomplete; it is only
56 intended as a quick check.
68 my $db_file = 'dowkd.db';
74 warn "notice: creating database, please wait\n";
75 $db = tie
%db, 'DB_File', $db_file, O_RDWR
| O_CREAT
, 0777, $DB_BTREE
76 or die "error: could not open database: $!\n";
78 $db{''} = $db_version;
79 while (my $line = <DATA
>) {
80 next if $line =~ /^\**$/;
82 $line =~ /^[0-9a-f]{32}$/ or die "error: invalid data line";
83 $line =~ s/(..)/chr(hex($1))/ge;
92 $db = tie
%db, 'DB_File', $db_file, O_RDONLY
, 0777, $DB_BTREE
93 or die "error: could not open database: $!\n";
94 my $stored_version = $db{''};
95 $stored_version && $stored_version eq $db_version or create_db
;
102 sub safe_backtick
(@
) {
105 open $fh, '-|', @args
106 or die "error: failed to spawn $args[0]: $!\n";
112 @result = scalar(<$fh>);
115 $?
== 0 or return undef;
124 my $keys_vulnerable = 0;
127 print STDERR
"summary: keys found: $keys_found, weak keys: $keys_vulnerable\n";
130 sub check_hash
($$;$) {
131 my ($name, $hash, $descr) = @_;
133 if (exists $db{$hash}) {
135 $descr = $descr ?
" ($descr)" : '';
136 print "$name: weak key$descr\n";
140 sub ssh_fprint_file
($) {
142 my $data = safe_backtick qw
/ssh-keygen -l -f/, $name;
143 defined $data or return ();
144 my @data = $data =~ /^(\d+) ([0-9a-f]{2}(?::[0-9a-f]{2}){15})/;
145 return @data if @data == 2;
149 sub ssh_fprint_check
($$$$) {
150 my ($name, $type, $length, $hash) = @_;
151 $type =~ /^(?:rsa1?|dsa)\z/ or die;
152 if (($type eq 'rsa' && ($length == 1024 || $length == 2048))
153 || ($type eq 'dsa' && $length == 1024)
154 || ($type eq 'rsa1' && $length == 1024)) {
156 $hash =~ s/(..)/chr(hex($1))/ge;
157 check_hash
$name, $hash, "OpenSSH/$type/$length";
158 } elsif ($type eq 'dsa') {
159 print "$name: $length bits DSA key not recommended\n";
161 warn "$name: warning: no blacklist for $type/$length key\n";
167 seek $tmp, 0, 0 or die "seek: $!";
168 truncate $tmp, 0 or die "truncate: $!";
171 sub cleanup_ssh_auth_line
($) {
174 $line =~ /^(?:ssh-(?:rsa|dss)\s|\d+\s+\d+\s+\d)/ and return $line;
177 if ($line =~ /^\s+(.*)/) {
181 if ($line =~ /^"(.*)/) {
185 if ($line =~ /^\\.(.*)/) {
186 # It doesn't matter if we don't deal with \000 properly, we
187 # just need to defuse the backslash character.
191 if ($line =~ /^[a-zA-Z0-9_=+-]+(.*)/) {
192 # Skip multiple harmless characters in one go.
196 if ($line =~ /^.(.*)/) {
197 # Other characters are stripped one by one.
201 return undef; # empty string, no key found
204 if ($line =~ /^"(.*)/) {
208 if ($line =~ /^\\.(.*)/) {
209 # See above, defuse the backslash.
213 if ($line =~ /^[^\\"]+(.*)/) {
217 return undef; # missing closing double quote
220 $line =~ /^(?:ssh-(?:rsa|dss)\s|\d+\s+\d+\s+\d)/ and return $line;
224 sub derive_ssh_auth_type
($) {
226 $line =~ /^ssh-rsa\s/ and return 'rsa';
227 $line =~ /^ssh-dss\s/ and return 'dsa';
228 $line =~ /^\d+\s/ and return 'rsa1';
232 sub from_ssh_auth_line
($$$) {
233 my ($tmp, $name, $line) = @_;
235 return if $line =~ m/^\s*(#|$)/;
238 my $l = cleanup_ssh_auth_line
$line;
242 my $type = derive_ssh_auth_type
$line;
245 print $tmp "$line\n" or die "print: $!";
246 $tmp->flush or die "flush: $!";
247 my ($length, $hash) = ssh_fprint_file
"$tmp";
248 if ($length && $hash) {
249 ssh_fprint_check
"$name", $type, $length, $hash;
254 warn "$name: warning: unparsable line\n";
257 sub from_ssh_auth_file
($) {
260 unless (open $auth, '<', $name) {
261 warn "$name:0: error: open failed: $!\n";
265 my $tmp = new File
::Temp
;
266 while (my $line = <$auth>) {
267 from_ssh_auth_line
$tmp, "$name:$.", $line;
271 sub from_openvpn_key
($) {
274 unless (open $key, '<', $name) {
275 warn "$name:0: open failed: $!\n";
280 while (my $line = <$key>) {
282 if ($line =~ /^-----BEGIN OpenVPN Static key V1-----/) {
285 if ($line =~ /^([0-9a-f]{32})/) {
287 $line =~ s/(..)/chr(hex($1))/ge;
288 check_hash
"$name:$.", $line, "OpenVPN";
291 warn "$name:$.: warning: illegal OpenVPN file format\n";
298 sub openssl_modulus_check
($$) {
299 my ($name, $modulus) = @_;
301 if ($modulus =~ /^Modulus=([A-F0-9]+)$/) {
303 my $length = length($modulus) * 4;
304 if ($length == 1024 || $length == 2048) {
305 my $mod = substr $modulus, length($modulus) - 32;
307 my @mod = $mod =~ /(..)/g;
308 $mod = join('', map { chr(hex($_)) } reverse @mod);
309 check_hash
$name, $mod, "OpenSSL/RSA/$length";
311 warn "$name: warning: no blacklist for OpenSSL/RSA/$length key\n";
314 die "internal error: $modulus\n";
324 unless (open $src, '<', $name) {
325 warn "$name:0: open failed: $!\n";
329 while (my $line = <$src>) {
330 if ($line =~ /^-----BEGIN CERTIFICATE-----/) {
332 $tmp or $tmp = new File
::Temp
;
335 print $tmp $line or die "print: $!";
336 goto LAST
if $line =~ /^-----END CERTIFICATE-----/;
337 } while ($line = <$src>);
339 $tmp->flush or die "flush: $!";
340 my $mod = safe_backtick qw
/openssl x509 -noout -modulus -in/, $tmp;
342 openssl_modulus_check
"$name:$lineno", $mod;
345 warn "$name:$lineno: failed to parse certificate\n";
348 } elsif ($line =~ /^-----BEGIN RSA PRIVATE KEY-----/) {
350 $tmp or $tmp = new File
::Temp
;
353 print $tmp $line or die "print: $!";
354 goto LAST_RSA
if $line =~ /^-----END RSA PRIVATE KEY-----/;
355 } while ($line = <$src>);
357 $tmp->flush or die "flush: $!";
358 my $mod = safe_backtick qw
/openssl rsa -noout -modulus -in/, $tmp;
360 openssl_modulus_check
"$name:$lineno", $mod;
363 warn "$name:$lineno: failed to parse RSA private key\n";
372 sub from_ssh_host
(@
) {
376 my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyname $_;
377 @addrs or warn "warning: host not found: $_\n";
382 push @lines, safe_backtick qw
/ssh-keyscan -t rsa/, @names;
383 push @lines, safe_backtick qw
/ssh-keyscan -t dsa/, @names;
385 my $tmp = new File
::Temp
;
386 for my $line (@lines) {
387 next if $line =~ /^#/;
388 my ($host, $data) = $line =~ /^(\S+) (.*)$/;
389 from_ssh_auth_line
$tmp, $host, $data;
395 my ($name,$passwd,$uid,$gid,
396 $quota,$comment,$gcos,$dir,$shell,$expire) = getpwnam($user);
398 warn "warning: user $user does not exist\n";
401 for my $name (qw
/authorized_keys authorized_keys2
402 known_hosts known_hosts2
403 id_rsa
.pub id_dsa
.pub identity
.pub
/) {
404 my $file = "$dir/.ssh/$name";
405 from_ssh_auth_file
$file if -r
$file;
409 sub from_user_all
() {
410 # This was one loop initially, but does not work with some Perl
414 while (my $name = getpwent) {
418 from_user
$_ for @names;
421 if (@ARGV && $ARGV[0] eq '-c') {
423 $db_file = shift @ARGV if @ARGV;
427 my $cmd = shift @ARGV;
428 if ($cmd eq 'file') {
429 for my $name (@ARGV) {
430 next if from_openvpn_key
$name;
431 next if from_pem
$name;
432 from_ssh_auth_file
$name;
434 } elsif ($cmd eq 'host') {
436 } elsif ($cmd eq 'user') {
438 from_user
$_ for @ARGV;
442 } elsif ($cmd eq 'help') {
446 die "error: invalid command, use \"help\" to get help\n";