Key Exchange (or KEX for short) is a sub-protocol in the SSH protocol enabling the two parties in a connection to exchange information and compute a shared secret that will then be used for encrypting all following messages.
A key exchange runs initially, after the network connection is established, but before authentication. Later on, KEX may be repeated; when exactly, depends on various settings:
- it is re-run when a certain amount of bytes have been sent since the last KEX.
- it may be re-run when a certain number of SSH packets have been sent since the last KEX.
- it may be re-run when a certain time has elapsed since the last KEX.
The purpose of re-running KEX is to establish a new shared secret from time to time, changing the encryption for all subsequent messages, until the next KEX. This mitigates possible attacks against the encryption when a lot of data is sent using the same encryption with the same shared secret.
KEX is specified in RFC 4253, section 7.
A key exchange starts with both parties sending a SSH_MSG_KEX_INIT message, passing along information about available cryptographic algorithms. Both parties can decide from this information what kind of key exchange to perform. They then run the cryptographic key exchange protocol, which may incur several message exchanges. Once that protocol ends, both sides know the shared secret. At that point they both send a SSH_MSG_NEW_KEYS message to tell the other side they're ready, and use the new encryption for any subsequent outgoing message. The SSH_MSG_NEW_KEYS message itself is still sent with the old encryption. On receiving a SSH_MSG_NEW_KEYS message, each side starts using the new encryption to decrypt any subsequent incoming messages. Note that the SSH_MSG_NEW_KEYS message does not contain the new encryption key or the shared secret; it is just a marker message telling the other side that from now on, the new encryption will be used.
Apache MINA sshd maintains internally in AbstractSession
a KEX state (in Java KexState
).
This models the key exchange on one side of the connection as a state machine
going through the states DONE
, INIT
, RUN
, KEYS
, DONE
.
These states mark important points in the key exchange sub-protocol:
DONE
means no key exchange is ongoing, this side has received the peer's SSH_MSG_NEW_KEYS message, and both sides have a shared secret that they use for encryption.INIT
means this side of the connection has requested a new KEX; it has sent it's SSH_MSG_KEX_INIT message.RUN
means this side has received the peer's SSH_MSG_KEX_INIT message, and key exchange is running now to determine a new shared secret.KEYS
means the key exchange has been done; both sides know the shared secret, and this side has sent its SSH_MS_NEW_KEYS message.- When the peer's SSH_MSG_NEW_KEYS message is received, the state changes back to
DONE
.
In Apache MINA sshd, there are methods in AbstractSession
for each of the KEX
messages:
requestNewKeyExchange
: switches fromDONE
toINIT
and callssendKexInit
to send the SSH_MSG_KEX_INIT message.handleKexInit
: receives the peer's SSH_MSG_KEX_INIT message; switches toRUN
.sendNewKeys
: switches fromRUN
toKEYS
and sends this side's SSH_MS_NEW_KEYS message.handleNewKeys
: receives the peer's SSH_MSG_KEX_INIT message; switches fromKEYS
toDONE
.
Because both sides may request a new key exchange at any time, it's also possible that they both do so simultaneously, and their initial SSH_MSG_KEX_INIT messages cross:
The protocol is symmetric, so "client" and "server" could also be inverted.
KEX can run at any time during an SSH connection. Either side can request a new key exchange anytime. While a key exchange is ongoing, some messages must not be sent.
But after having sent its own SSH_MSG_KEX_INIT message, each side must still handle incoming non-KEX messages until it receives the peer's SSH_MSG_KEX_INIT message.
How does Apache MINA sshd avoid sending non-KEX messages while a KEX is ongoing? There may be application threads pumping out data, or one may receive, after having sent one's own SSH_MSG_KEX_INIT message non-KEX messages that might require sending back an answer.
The answer lies in the KeyExchangeMessageHandler
.
Each session funnels all SSH packets it sends, before encryption, through this
per-session object. The KeyExchangeMessageHandler
then looks at the current KEX
state and at the packet that is to be sent and decides what to do with it:
- If the packet is a low-level packet allowed during KEX, it is encrypted and sent directly.
- If no KEX is ongoing, the message is encrypted and sent directly.
- Otherwise, the packet is queued.
Once KEX is done, the queue is flushed, i.e., all the queued packets are encrypted (with the new encryption) and sent.
This mechanism has one drawback: if there are data pumping threads sending data
through a channel (and there is a large channel window), arbitrarily many packets
may be queued, and sending them may itself trigger another key exchange. If the
queue is flushed synchronously from handleNewKeys
(or from sendNewKeys
), this
side will not be able to react to a new key exchange request from the peer. (Or
to a disconnection message.) Therefore the queue is flushed asynchronously.
To avoid that application threads create a huge queue, Apache MINA sshd actually
does not queue packets written in application threads. Instead, when the
KeyExchangeMessageHandler
detects a SSH_MSG_CHANNEL_DATA or SSH_MSG_CHANNEL_EXTENDED_DATA
packet written by an application thread, it blocks that thread until KEX is done
and the queue is flushed. Only then the thread is resumed and the packet is written.
The queue thus should never contain many packets (unless internal Apache MINA sshd threads should be writing lots of channel data).
Flushing the queue and enqueuing new packets is a classic producer-consumer problem, but there is a twist: because of the current architecture of the framework, the queue cannot be bounded, and producers should not block. But there is only a single consumer: the flushing thread.
The implementation contains a number of measures that should ensure that the flushing thread is not overrun by producers and actually can finish.
- Application threads trying to enqueue packets may indeed be blocked until the queue is flushed; see above.
- The flushing thread (the consumer) gets priority over the producers.
- The flushing thread flushes a number of packets (a chunk) at a time. It starts off with a chunk size of two. If it detects on the next chunk of packets to write that more packets were enqueued than were written in the last chunk, the chunk size is increased.
- While a chunk is written, new enqueue attempts wait.
- It should be rare that more than one new packet gets enqueued in between chunks, because of (2).
Again, "client" and "server" could also be inverted. For instance, a client uploading files via SFTP might have an application thread pumping data through a channel, which might be blocked during KEX.
"Strict KEX" is an SSH protocol extension introduced in 2023 to harden the protocol against a particular form of attack. For details, see "Terrapin attack" and CVE-2023-48795. The "strict KEX" counter-measures are active if both peers indicate support for it at the start of the initial key exchange. By default, Apache MINA sshd always supports "strict kex" and advertises it, and thus it will always be active if the other party also supports it.
If for whatever reason you want to disable using "strict KEX", this can be achieved by setting
a custom session factory on the SshClient
or SshServer
. This custom session factory would create
custom sessions subclassed from ClientSessionImpl
or ServerSessionImpl
that do not do anything
in method doStrictKexProposal()
(just return the proposal unchanged).