123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715 |
- package sftpd
- import (
- "bytes"
- "encoding/hex"
- "encoding/json"
- "errors"
- "fmt"
- "io"
- "io/ioutil"
- "net"
- "os"
- "path/filepath"
- "strings"
- "time"
- "github.com/pkg/sftp"
- "golang.org/x/crypto/ssh"
- "github.com/drakkan/sftpgo/common"
- "github.com/drakkan/sftpgo/dataprovider"
- "github.com/drakkan/sftpgo/logger"
- "github.com/drakkan/sftpgo/metrics"
- "github.com/drakkan/sftpgo/utils"
- )
- const (
- defaultPrivateRSAKeyName = "id_rsa"
- defaultPrivateECDSAKeyName = "id_ecdsa"
- defaultPrivateEd25519KeyName = "id_ed25519"
- sourceAddressCriticalOption = "source-address"
- )
- var (
- sftpExtensions = []string{"posix-rename@openssh.com"}
- )
- // Configuration for the SFTP server
- type Configuration struct {
- // Identification string used by the server
- Banner string `json:"banner" mapstructure:"banner"`
- // The port used for serving SFTP requests
- BindPort int `json:"bind_port" mapstructure:"bind_port"`
- // The address to listen on. A blank value means listen on all available network interfaces.
- BindAddress string `json:"bind_address" mapstructure:"bind_address"`
- // Deprecated: please use the same key in common configuration
- IdleTimeout int `json:"idle_timeout" mapstructure:"idle_timeout"`
- // Maximum number of authentication attempts permitted per connection.
- // If set to a negative number, the number of attempts is unlimited.
- // If set to zero, the number of attempts are limited to 6.
- MaxAuthTries int `json:"max_auth_tries" mapstructure:"max_auth_tries"`
- // Deprecated: please use the same key in common configuration
- UploadMode int `json:"upload_mode" mapstructure:"upload_mode"`
- // Actions to execute on file operations and SSH commands
- Actions common.ProtocolActions `json:"actions" mapstructure:"actions"`
- // Deprecated: please use HostKeys
- Keys []Key `json:"keys" mapstructure:"keys"`
- // HostKeys define the daemon's private host keys.
- // Each host key can be defined as a path relative to the configuration directory or an absolute one.
- // If empty or missing, the daemon will search or try to generate "id_rsa" and "id_ecdsa" host keys
- // inside the configuration directory.
- HostKeys []string `json:"host_keys" mapstructure:"host_keys"`
- // KexAlgorithms specifies the available KEX (Key Exchange) algorithms in
- // preference order.
- KexAlgorithms []string `json:"kex_algorithms" mapstructure:"kex_algorithms"`
- // Ciphers specifies the ciphers allowed
- Ciphers []string `json:"ciphers" mapstructure:"ciphers"`
- // MACs Specifies the available MAC (message authentication code) algorithms
- // in preference order
- MACs []string `json:"macs" mapstructure:"macs"`
- // TrustedUserCAKeys specifies a list of public keys paths of certificate authorities
- // that are trusted to sign user certificates for authentication.
- // The paths can be absolute or relative to the configuration directory
- TrustedUserCAKeys []string `json:"trusted_user_ca_keys" mapstructure:"trusted_user_ca_keys"`
- // LoginBannerFile the contents of the specified file, if any, are sent to
- // the remote user before authentication is allowed.
- LoginBannerFile string `json:"login_banner_file" mapstructure:"login_banner_file"`
- // Deprecated: please use the same key in common configuration
- SetstatMode int `json:"setstat_mode" mapstructure:"setstat_mode"`
- // List of enabled SSH commands.
- // We support the following SSH commands:
- // - "scp". SCP is an experimental feature, we have our own SCP implementation since
- // we can't rely on scp system command to proper handle permissions, quota and
- // user's home dir restrictions.
- // The SCP protocol is quite simple but there is no official docs about it,
- // so we need more testing and feedbacks before enabling it by default.
- // We may not handle some borderline cases or have sneaky bugs.
- // Please do accurate tests yourself before enabling SCP and let us known
- // if something does not work as expected for your use cases.
- // SCP between two remote hosts is supported using the `-3` scp option.
- // - "md5sum", "sha1sum", "sha256sum", "sha384sum", "sha512sum". Useful to check message
- // digests for uploaded files. These commands are implemented inside SFTPGo so they
- // work even if the matching system commands are not available, for example on Windows.
- // - "cd", "pwd". Some mobile SFTP clients does not support the SFTP SSH_FXP_REALPATH and so
- // they use "cd" and "pwd" SSH commands to get the initial directory.
- // Currently `cd` do nothing and `pwd` always returns the "/" path.
- //
- // The following SSH commands are enabled by default: "md5sum", "sha1sum", "cd", "pwd".
- // "*" enables all supported SSH commands.
- EnabledSSHCommands []string `json:"enabled_ssh_commands" mapstructure:"enabled_ssh_commands"`
- // Absolute path to an external program or an HTTP URL to invoke for keyboard interactive authentication.
- // Leave empty to disable this authentication mode.
- KeyboardInteractiveHook string `json:"keyboard_interactive_auth_hook" mapstructure:"keyboard_interactive_auth_hook"`
- // PasswordAuthentication specifies whether password authentication is allowed.
- PasswordAuthentication bool `json:"password_authentication" mapstructure:"password_authentication"`
- // Deprecated: please use the same key in common configuration
- ProxyProtocol int `json:"proxy_protocol" mapstructure:"proxy_protocol"`
- // Deprecated: please use the same key in common configuration
- ProxyAllowed []string `json:"proxy_allowed" mapstructure:"proxy_allowed"`
- certChecker *ssh.CertChecker
- parsedUserCAKeys []ssh.PublicKey
- }
- // Key contains information about host keys
- // Deprecated: please use HostKeys
- type Key struct {
- // The private key path as absolute path or relative to the configuration directory
- PrivateKey string `json:"private_key" mapstructure:"private_key"`
- }
- type authenticationError struct {
- err string
- }
- func (e *authenticationError) Error() string {
- return fmt.Sprintf("Authentication error: %s", e.err)
- }
- // Initialize the SFTP server and add a persistent listener to handle inbound SFTP connections.
- func (c Configuration) Initialize(configDir string) error {
- serverConfig := &ssh.ServerConfig{
- NoClientAuth: false,
- MaxAuthTries: c.MaxAuthTries,
- PublicKeyCallback: func(conn ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
- sp, err := c.validatePublicKeyCredentials(conn, pubKey)
- if err == ssh.ErrPartialSuccess {
- return sp, err
- }
- if err != nil {
- return nil, &authenticationError{err: fmt.Sprintf("could not validate public key credentials: %v", err)}
- }
- return sp, nil
- },
- NextAuthMethodsCallback: func(conn ssh.ConnMetadata) []string {
- var nextMethods []string
- user, err := dataprovider.UserExists(conn.User())
- if err == nil {
- nextMethods = user.GetNextAuthMethods(conn.PartialSuccessMethods(), c.PasswordAuthentication)
- }
- return nextMethods
- },
- ServerVersion: fmt.Sprintf("SSH-2.0-%v", c.Banner),
- }
- if c.PasswordAuthentication {
- serverConfig.PasswordCallback = func(conn ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
- sp, err := c.validatePasswordCredentials(conn, pass)
- if err != nil {
- return nil, &authenticationError{err: fmt.Sprintf("could not validate password credentials: %v", err)}
- }
- return sp, nil
- }
- }
- if err := c.checkAndLoadHostKeys(configDir, serverConfig); err != nil {
- return err
- }
- if err := c.initializeCertChecker(configDir); err != nil {
- return err
- }
- sftp.SetSFTPExtensions(sftpExtensions...) //nolint:errcheck // we configure valid SFTP Extensions so we cannot get an error
- c.configureSecurityOptions(serverConfig)
- c.configureKeyboardInteractiveAuth(serverConfig)
- c.configureLoginBanner(serverConfig, configDir)
- c.checkSSHCommands()
- listener, err := net.Listen("tcp", fmt.Sprintf("%s:%d", c.BindAddress, c.BindPort))
- if err != nil {
- logger.Warn(logSender, "", "error starting listener on address %s:%d: %v", c.BindAddress, c.BindPort, err)
- return err
- }
- proxyListener, err := common.Config.GetProxyListener(listener)
- if err != nil {
- logger.Warn(logSender, "", "error enabling proxy listener: %v", err)
- return err
- }
- logger.Info(logSender, "", "server listener registered address: %v", listener.Addr().String())
- for {
- var conn net.Conn
- if proxyListener != nil {
- conn, err = proxyListener.Accept()
- } else {
- conn, err = listener.Accept()
- }
- if conn != nil && err == nil {
- go c.AcceptInboundConnection(conn, serverConfig)
- }
- }
- }
- func (c Configuration) configureSecurityOptions(serverConfig *ssh.ServerConfig) {
- if len(c.KexAlgorithms) > 0 {
- serverConfig.KeyExchanges = c.KexAlgorithms
- }
- if len(c.Ciphers) > 0 {
- serverConfig.Ciphers = c.Ciphers
- }
- if len(c.MACs) > 0 {
- serverConfig.MACs = c.MACs
- }
- }
- func (c Configuration) configureLoginBanner(serverConfig *ssh.ServerConfig, configDir string) {
- if len(c.LoginBannerFile) > 0 {
- bannerFilePath := c.LoginBannerFile
- if !filepath.IsAbs(bannerFilePath) {
- bannerFilePath = filepath.Join(configDir, bannerFilePath)
- }
- bannerContent, err := ioutil.ReadFile(bannerFilePath)
- if err == nil {
- banner := string(bannerContent)
- serverConfig.BannerCallback = func(conn ssh.ConnMetadata) string {
- return banner
- }
- } else {
- logger.WarnToConsole("unable to read SFTPD login banner file: %v", err)
- logger.Warn(logSender, "", "unable to read login banner file: %v", err)
- }
- }
- }
- func (c Configuration) configureKeyboardInteractiveAuth(serverConfig *ssh.ServerConfig) {
- if len(c.KeyboardInteractiveHook) == 0 {
- return
- }
- if !strings.HasPrefix(c.KeyboardInteractiveHook, "http") {
- if !filepath.IsAbs(c.KeyboardInteractiveHook) {
- logger.WarnToConsole("invalid keyboard interactive authentication program: %#v must be an absolute path",
- c.KeyboardInteractiveHook)
- logger.Warn(logSender, "", "invalid keyboard interactive authentication program: %#v must be an absolute path",
- c.KeyboardInteractiveHook)
- return
- }
- _, err := os.Stat(c.KeyboardInteractiveHook)
- if err != nil {
- logger.WarnToConsole("invalid keyboard interactive authentication program:: %v", err)
- logger.Warn(logSender, "", "invalid keyboard interactive authentication program:: %v", err)
- return
- }
- }
- serverConfig.KeyboardInteractiveCallback = func(conn ssh.ConnMetadata, client ssh.KeyboardInteractiveChallenge) (*ssh.Permissions, error) {
- sp, err := c.validateKeyboardInteractiveCredentials(conn, client)
- if err != nil {
- return nil, &authenticationError{err: fmt.Sprintf("could not validate keyboard interactive credentials: %v", err)}
- }
- return sp, nil
- }
- }
- // AcceptInboundConnection handles an inbound connection to the server instance and determines if the request should be served or not.
- func (c Configuration) AcceptInboundConnection(conn net.Conn, config *ssh.ServerConfig) {
- // Before beginning a handshake must be performed on the incoming net.Conn
- // we'll set a Deadline for handshake to complete, the default is 2 minutes as OpenSSH
- conn.SetDeadline(time.Now().Add(handshakeTimeout)) //nolint:errcheck
- remoteAddr := conn.RemoteAddr()
- if err := common.Config.ExecutePostConnectHook(remoteAddr.String(), common.ProtocolSSH); err != nil {
- conn.Close()
- return
- }
- sconn, chans, reqs, err := ssh.NewServerConn(conn, config)
- if err != nil {
- logger.Debug(logSender, "", "failed to accept an incoming connection: %v", err)
- if _, ok := err.(*ssh.ServerAuthError); !ok {
- ip := utils.GetIPFromRemoteAddress(remoteAddr.String())
- logger.ConnectionFailedLog("", ip, dataprovider.LoginMethodNoAuthTryed, common.ProtocolSSH, err.Error())
- metrics.AddNoAuthTryed()
- dataprovider.ExecutePostLoginHook("", dataprovider.LoginMethodNoAuthTryed, ip, common.ProtocolSSH, err)
- }
- return
- }
- // handshake completed so remove the deadline, we'll use IdleTimeout configuration from now on
- conn.SetDeadline(time.Time{}) //nolint:errcheck
- defer conn.Close()
- var user dataprovider.User
- // Unmarshal cannot fails here and even if it fails we'll have a user with no permissions
- json.Unmarshal([]byte(sconn.Permissions.Extensions["sftpgo_user"]), &user) //nolint:errcheck
- loginType := sconn.Permissions.Extensions["sftpgo_login_method"]
- connectionID := hex.EncodeToString(sconn.SessionID())
- fs, err := user.GetFilesystem(connectionID)
- if err != nil {
- logger.Warn(logSender, "", "could create filesystem for user %#v err: %v", user.Username, err)
- return
- }
- fs.CheckRootPath(user.Username, user.GetUID(), user.GetGID())
- logger.Log(logger.LevelInfo, common.ProtocolSSH, connectionID,
- "User id: %d, logged in with: %#v, username: %#v, home_dir: %#v remote addr: %#v",
- user.ID, loginType, user.Username, user.HomeDir, remoteAddr.String())
- dataprovider.UpdateLastLogin(user) //nolint:errcheck
- sshConnection := common.NewSSHConnection(connectionID, conn)
- common.Connections.AddSSHConnection(sshConnection)
- defer common.Connections.RemoveSSHConnection(connectionID)
- go ssh.DiscardRequests(reqs)
- channelCounter := int64(0)
- for newChannel := range chans {
- // If its not a session channel we just move on because its not something we
- // know how to handle at this point.
- if newChannel.ChannelType() != "session" {
- logger.Log(logger.LevelDebug, common.ProtocolSSH, connectionID, "received an unknown channel type: %v",
- newChannel.ChannelType())
- newChannel.Reject(ssh.UnknownChannelType, "unknown channel type") //nolint:errcheck
- continue
- }
- channel, requests, err := newChannel.Accept()
- if err != nil {
- logger.Log(logger.LevelWarn, common.ProtocolSSH, connectionID, "could not accept a channel: %v", err)
- continue
- }
- channelCounter++
- sshConnection.UpdateLastActivity()
- // Channels have a type that is dependent on the protocol. For SFTP this is "subsystem"
- // with a payload that (should) be "sftp". Discard anything else we receive ("pty", "shell", etc)
- go func(in <-chan *ssh.Request, counter int64) {
- for req := range in {
- ok := false
- connID := fmt.Sprintf("%v_%v", connectionID, counter)
- switch req.Type {
- case "subsystem":
- if string(req.Payload[4:]) == "sftp" {
- ok = true
- connection := Connection{
- BaseConnection: common.NewBaseConnection(connID, common.ProtocolSFTP, user, fs),
- ClientVersion: string(sconn.ClientVersion()),
- RemoteAddr: remoteAddr,
- channel: channel,
- }
- go c.handleSftpConnection(channel, &connection)
- }
- case "exec":
- // protocol will be set later inside processSSHCommand it could be SSH or SCP
- connection := Connection{
- BaseConnection: common.NewBaseConnection(connID, "sshd_exec", user, fs),
- ClientVersion: string(sconn.ClientVersion()),
- RemoteAddr: remoteAddr,
- channel: channel,
- }
- ok = processSSHCommand(req.Payload, &connection, c.EnabledSSHCommands)
- }
- req.Reply(ok, nil) //nolint:errcheck
- }
- }(requests, channelCounter)
- }
- }
- func (c Configuration) handleSftpConnection(channel ssh.Channel, connection *Connection) {
- common.Connections.Add(connection)
- defer common.Connections.Remove(connection.GetID())
- // Create a new handler for the currently logged in user's server.
- handler := c.createHandler(connection)
- // Create the server instance for the channel using the handler we created above.
- server := sftp.NewRequestServer(channel, handler, sftp.WithRSAllocator())
- if err := server.Serve(); err == io.EOF {
- connection.Log(logger.LevelDebug, "connection closed, sending exit status")
- exitStatus := sshSubsystemExitStatus{Status: uint32(0)}
- _, err = channel.SendRequest("exit-status", false, ssh.Marshal(&exitStatus))
- connection.Log(logger.LevelDebug, "sent exit status %+v error: %v", exitStatus, err)
- server.Close()
- } else if err != nil {
- connection.Log(logger.LevelWarn, "connection closed with error: %v", err)
- }
- }
- func (c Configuration) createHandler(connection *Connection) sftp.Handlers {
- return sftp.Handlers{
- FileGet: connection,
- FilePut: connection,
- FileCmd: connection,
- FileList: connection,
- }
- }
- func loginUser(user dataprovider.User, loginMethod, publicKey string, conn ssh.ConnMetadata) (*ssh.Permissions, error) {
- connectionID := ""
- if conn != nil {
- connectionID = hex.EncodeToString(conn.SessionID())
- }
- if !filepath.IsAbs(user.HomeDir) {
- logger.Warn(logSender, connectionID, "user %#v has an invalid home dir: %#v. Home dir must be an absolute path, login not allowed",
- user.Username, user.HomeDir)
- return nil, fmt.Errorf("cannot login user with invalid home dir: %#v", user.HomeDir)
- }
- if utils.IsStringInSlice(common.ProtocolSSH, user.Filters.DeniedProtocols) {
- logger.Debug(logSender, connectionID, "cannot login user %#v, protocol SSH is not allowed", user.Username)
- return nil, fmt.Errorf("Protocol SSH is not allowed for user %#v", user.Username)
- }
- if user.MaxSessions > 0 {
- activeSessions := common.Connections.GetActiveSessions(user.Username)
- if activeSessions >= user.MaxSessions {
- logger.Debug(logSender, "", "authentication refused for user: %#v, too many open sessions: %v/%v", user.Username,
- activeSessions, user.MaxSessions)
- return nil, fmt.Errorf("too many open sessions: %v", activeSessions)
- }
- }
- if !user.IsLoginMethodAllowed(loginMethod, conn.PartialSuccessMethods()) {
- logger.Debug(logSender, connectionID, "cannot login user %#v, login method %#v is not allowed", user.Username, loginMethod)
- return nil, fmt.Errorf("Login method %#v is not allowed for user %#v", loginMethod, user.Username)
- }
- if dataprovider.GetQuotaTracking() > 0 && user.HasOverlappedMappedPaths() {
- logger.Debug(logSender, connectionID, "cannot login user %#v, overlapping mapped folders are allowed only with quota tracking disabled",
- user.Username)
- return nil, errors.New("overlapping mapped folders are allowed only with quota tracking disabled")
- }
- remoteAddr := conn.RemoteAddr().String()
- if !user.IsLoginFromAddrAllowed(remoteAddr) {
- logger.Debug(logSender, connectionID, "cannot login user %#v, remote address is not allowed: %v", user.Username, remoteAddr)
- return nil, fmt.Errorf("Login for user %#v is not allowed from this address: %v", user.Username, remoteAddr)
- }
- json, err := json.Marshal(user)
- if err != nil {
- logger.Warn(logSender, connectionID, "error serializing user info: %v, authentication rejected", err)
- return nil, err
- }
- if len(publicKey) > 0 {
- loginMethod = fmt.Sprintf("%v: %v", loginMethod, publicKey)
- }
- p := &ssh.Permissions{}
- p.Extensions = make(map[string]string)
- p.Extensions["sftpgo_user"] = string(json)
- p.Extensions["sftpgo_login_method"] = loginMethod
- return p, nil
- }
- func (c *Configuration) checkSSHCommands() {
- if utils.IsStringInSlice("*", c.EnabledSSHCommands) {
- c.EnabledSSHCommands = GetSupportedSSHCommands()
- return
- }
- sshCommands := []string{}
- for _, command := range c.EnabledSSHCommands {
- if utils.IsStringInSlice(command, supportedSSHCommands) {
- sshCommands = append(sshCommands, command)
- } else {
- logger.Warn(logSender, "", "unsupported ssh command: %#v ignored", command)
- logger.WarnToConsole("unsupported ssh command: %#v ignored", command)
- }
- }
- c.EnabledSSHCommands = sshCommands
- }
- func (c *Configuration) generateDefaultHostKeys(configDir string) error {
- var err error
- defaultHostKeys := []string{defaultPrivateRSAKeyName, defaultPrivateECDSAKeyName, defaultPrivateEd25519KeyName}
- for _, k := range defaultHostKeys {
- autoFile := filepath.Join(configDir, k)
- if _, err = os.Stat(autoFile); os.IsNotExist(err) {
- logger.Info(logSender, "", "No host keys configured and %#v does not exist; try to create a new host key", autoFile)
- logger.InfoToConsole("No host keys configured and %#v does not exist; try to create a new host key", autoFile)
- if k == defaultPrivateRSAKeyName {
- err = utils.GenerateRSAKeys(autoFile)
- } else if k == defaultPrivateECDSAKeyName {
- err = utils.GenerateECDSAKeys(autoFile)
- } else {
- err = utils.GenerateEd25519Keys(autoFile)
- }
- if err != nil {
- logger.Warn(logSender, "", "error creating host key %#v: %v", autoFile, err)
- logger.WarnToConsole("error creating host key %#v: %v", autoFile, err)
- return err
- }
- }
- c.HostKeys = append(c.HostKeys, k)
- }
- return err
- }
- func (c *Configuration) checkHostKeyAutoGeneration(configDir string) error {
- for _, k := range c.HostKeys {
- if filepath.IsAbs(k) {
- if _, err := os.Stat(k); os.IsNotExist(err) {
- keyName := filepath.Base(k)
- switch keyName {
- case defaultPrivateRSAKeyName:
- logger.Info(logSender, "", "try to create non-existent host key %#v", k)
- logger.InfoToConsole("try to create non-existent host key %#v", k)
- err = utils.GenerateRSAKeys(k)
- if err != nil {
- logger.Warn(logSender, "", "error creating host key %#v: %v", k, err)
- logger.WarnToConsole("error creating host key %#v: %v", k, err)
- return err
- }
- case defaultPrivateECDSAKeyName:
- logger.Info(logSender, "", "try to create non-existent host key %#v", k)
- logger.InfoToConsole("try to create non-existent host key %#v", k)
- err = utils.GenerateECDSAKeys(k)
- if err != nil {
- logger.Warn(logSender, "", "error creating host key %#v: %v", k, err)
- logger.WarnToConsole("error creating host key %#v: %v", k, err)
- return err
- }
- case defaultPrivateEd25519KeyName:
- logger.Info(logSender, "", "try to create non-existent host key %#v", k)
- logger.InfoToConsole("try to create non-existent host key %#v", k)
- err = utils.GenerateEd25519Keys(k)
- if err != nil {
- logger.Warn(logSender, "", "error creating host key %#v: %v", k, err)
- logger.WarnToConsole("error creating host key %#v: %v", k, err)
- return err
- }
- default:
- logger.Warn(logSender, "", "non-existent host key %#v will not be created", k)
- logger.WarnToConsole("non-existent host key %#v will not be created", k)
- }
- }
- }
- }
- if len(c.HostKeys) == 0 {
- if err := c.generateDefaultHostKeys(configDir); err != nil {
- return err
- }
- }
- return nil
- }
- // If no host keys are defined we try to use or generate the default ones.
- func (c *Configuration) checkAndLoadHostKeys(configDir string, serverConfig *ssh.ServerConfig) error {
- if err := c.checkHostKeyAutoGeneration(configDir); err != nil {
- return err
- }
- for _, k := range c.HostKeys {
- hostKey := k
- if !utils.IsFileInputValid(hostKey) {
- logger.Warn(logSender, "", "unable to load invalid host key: %#v", hostKey)
- logger.WarnToConsole("unable to load invalid host key: %#v", hostKey)
- continue
- }
- if !filepath.IsAbs(hostKey) {
- hostKey = filepath.Join(configDir, hostKey)
- }
- logger.Info(logSender, "", "Loading private host key: %s", hostKey)
- privateBytes, err := ioutil.ReadFile(hostKey)
- if err != nil {
- return err
- }
- private, err := ssh.ParsePrivateKey(privateBytes)
- if err != nil {
- return err
- }
- // Add private key to the server configuration.
- serverConfig.AddHostKey(private)
- }
- return nil
- }
- func (c *Configuration) initializeCertChecker(configDir string) error {
- for _, keyPath := range c.TrustedUserCAKeys {
- if !utils.IsFileInputValid(keyPath) {
- logger.Warn(logSender, "", "unable to load invalid trusted user CA key: %#v", keyPath)
- logger.WarnToConsole("unable to load invalid trusted user CA key: %#v", keyPath)
- continue
- }
- if !filepath.IsAbs(keyPath) {
- keyPath = filepath.Join(configDir, keyPath)
- }
- keyBytes, err := ioutil.ReadFile(keyPath)
- if err != nil {
- logger.Warn(logSender, "", "error loading trusted user CA key %#v: %v", keyPath, err)
- logger.WarnToConsole("error loading trusted user CA key %#v: %v", keyPath, err)
- return err
- }
- parsedKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes)
- if err != nil {
- logger.Warn(logSender, "", "error parsing trusted user CA key %#v: %v", keyPath, err)
- logger.WarnToConsole("error parsing trusted user CA key %#v: %v", keyPath, err)
- return err
- }
- c.parsedUserCAKeys = append(c.parsedUserCAKeys, parsedKey)
- }
- c.certChecker = &ssh.CertChecker{
- SupportedCriticalOptions: []string{
- sourceAddressCriticalOption,
- },
- IsUserAuthority: func(k ssh.PublicKey) bool {
- for _, key := range c.parsedUserCAKeys {
- if bytes.Equal(k.Marshal(), key.Marshal()) {
- return true
- }
- }
- return false
- },
- }
- return nil
- }
- func (c Configuration) validatePublicKeyCredentials(conn ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
- var err error
- var user dataprovider.User
- var keyID string
- var sshPerm *ssh.Permissions
- var certPerm *ssh.Permissions
- connectionID := hex.EncodeToString(conn.SessionID())
- method := dataprovider.SSHLoginMethodPublicKey
- cert, ok := pubKey.(*ssh.Certificate)
- if ok {
- if cert.CertType != ssh.UserCert {
- err = fmt.Errorf("ssh: cert has type %d", cert.CertType)
- updateLoginMetrics(conn, method, err)
- return nil, err
- }
- if !c.certChecker.IsUserAuthority(cert.SignatureKey) {
- err = fmt.Errorf("ssh: certificate signed by unrecognized authority")
- updateLoginMetrics(conn, method, err)
- return nil, err
- }
- if err := c.certChecker.CheckCert(conn.User(), cert); err != nil {
- updateLoginMetrics(conn, method, err)
- return nil, err
- }
- certPerm = &cert.Permissions
- }
- ipAddr := utils.GetIPFromRemoteAddress(conn.RemoteAddr().String())
- if user, keyID, err = dataprovider.CheckUserAndPubKey(conn.User(), pubKey.Marshal(), ipAddr, common.ProtocolSSH); err == nil {
- if user.IsPartialAuth(method) {
- logger.Debug(logSender, connectionID, "user %#v authenticated with partial success", conn.User())
- return certPerm, ssh.ErrPartialSuccess
- }
- sshPerm, err = loginUser(user, method, keyID, conn)
- if err == nil && certPerm != nil {
- // if we have a SSH user cert we need to merge certificate permissions with our ones
- // we only set Extensions, so CriticalOptions are always the ones from the certificate
- sshPerm.CriticalOptions = certPerm.CriticalOptions
- if certPerm.Extensions != nil {
- for k, v := range certPerm.Extensions {
- sshPerm.Extensions[k] = v
- }
- }
- }
- }
- updateLoginMetrics(conn, method, err)
- return sshPerm, err
- }
- func (c Configuration) validatePasswordCredentials(conn ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
- var err error
- var user dataprovider.User
- var sshPerm *ssh.Permissions
- method := dataprovider.LoginMethodPassword
- if len(conn.PartialSuccessMethods()) == 1 {
- method = dataprovider.SSHLoginMethodKeyAndPassword
- }
- ipAddr := utils.GetIPFromRemoteAddress(conn.RemoteAddr().String())
- if user, err = dataprovider.CheckUserAndPass(conn.User(), string(pass), ipAddr, common.ProtocolSSH); err == nil {
- sshPerm, err = loginUser(user, method, "", conn)
- }
- updateLoginMetrics(conn, method, err)
- return sshPerm, err
- }
- func (c Configuration) validateKeyboardInteractiveCredentials(conn ssh.ConnMetadata, client ssh.KeyboardInteractiveChallenge) (*ssh.Permissions, error) {
- var err error
- var user dataprovider.User
- var sshPerm *ssh.Permissions
- method := dataprovider.SSHLoginMethodKeyboardInteractive
- if len(conn.PartialSuccessMethods()) == 1 {
- method = dataprovider.SSHLoginMethodKeyAndKeyboardInt
- }
- ipAddr := utils.GetIPFromRemoteAddress(conn.RemoteAddr().String())
- if user, err = dataprovider.CheckKeyboardInteractiveAuth(conn.User(), c.KeyboardInteractiveHook, client,
- ipAddr, common.ProtocolSSH); err == nil {
- sshPerm, err = loginUser(user, method, "", conn)
- }
- updateLoginMetrics(conn, method, err)
- return sshPerm, err
- }
- func updateLoginMetrics(conn ssh.ConnMetadata, method string, err error) {
- metrics.AddLoginAttempt(method)
- ip := utils.GetIPFromRemoteAddress(conn.RemoteAddr().String())
- if err != nil {
- logger.ConnectionFailedLog(conn.User(), ip, method, common.ProtocolSSH, err.Error())
- }
- metrics.AddLoginResult(method, err)
- dataprovider.ExecutePostLoginHook(conn.User(), method, ip, common.ProtocolSSH, err)
- }
|