d94f80c8da
Signed-off-by: Nicola Murino <nicola.murino@gmail.com>
1313 lines
48 KiB
Go
1313 lines
48 KiB
Go
// Copyright (C) 2019 Nicola Murino
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published
|
|
// by the Free Software Foundation, version 3.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package sftpd
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/fs"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime/debug"
|
|
"slices"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/pkg/sftp"
|
|
"github.com/sftpgo/sdk/plugin/notifier"
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"github.com/drakkan/sftpgo/v2/internal/common"
|
|
"github.com/drakkan/sftpgo/v2/internal/dataprovider"
|
|
"github.com/drakkan/sftpgo/v2/internal/logger"
|
|
"github.com/drakkan/sftpgo/v2/internal/metric"
|
|
"github.com/drakkan/sftpgo/v2/internal/plugin"
|
|
"github.com/drakkan/sftpgo/v2/internal/util"
|
|
"github.com/drakkan/sftpgo/v2/internal/version"
|
|
"github.com/drakkan/sftpgo/v2/internal/vfs"
|
|
)
|
|
|
|
const (
|
|
defaultPrivateRSAKeyName = "id_rsa"
|
|
defaultPrivateECDSAKeyName = "id_ecdsa"
|
|
defaultPrivateEd25519KeyName = "id_ed25519"
|
|
sourceAddressCriticalOption = "source-address"
|
|
keyExchangeCurve25519SHA256LibSSH = "curve25519-sha256@libssh.org"
|
|
)
|
|
|
|
var (
|
|
supportedAlgos = ssh.SupportedAlgorithms()
|
|
insecureAlgos = ssh.InsecureAlgorithms()
|
|
sftpExtensions = []string{"statvfs@openssh.com"}
|
|
supportedHostKeyAlgos = append(supportedAlgos.HostKeys, insecureAlgos.HostKeys...)
|
|
preferredHostKeyAlgos = []string{
|
|
ssh.KeyAlgoRSASHA256, ssh.KeyAlgoRSASHA512,
|
|
ssh.KeyAlgoECDSA256, ssh.KeyAlgoECDSA384, ssh.KeyAlgoECDSA521,
|
|
ssh.KeyAlgoED25519,
|
|
}
|
|
supportedPublicKeyAlgos = append(supportedAlgos.PublicKeyAuths, insecureAlgos.PublicKeyAuths...)
|
|
preferredPublicKeyAlgos = supportedAlgos.PublicKeyAuths
|
|
supportedKexAlgos = append(supportedAlgos.KeyExchanges, insecureAlgos.KeyExchanges...)
|
|
preferredKexAlgos = supportedAlgos.KeyExchanges
|
|
supportedCiphers = append(supportedAlgos.Ciphers, insecureAlgos.Ciphers...)
|
|
preferredCiphers = supportedAlgos.Ciphers
|
|
supportedMACs = append(supportedAlgos.MACs, insecureAlgos.MACs...)
|
|
preferredMACs = []string{
|
|
ssh.HMACSHA256ETM, ssh.HMACSHA256,
|
|
}
|
|
|
|
revokedCertManager = revokedCertificates{
|
|
certs: map[string]bool{},
|
|
}
|
|
|
|
sftpAuthError = newAuthenticationError(nil, "", "")
|
|
)
|
|
|
|
// Binding defines the configuration for a network listener
|
|
type Binding struct {
|
|
// The address to listen on. A blank value means listen on all available network interfaces.
|
|
Address string `json:"address" mapstructure:"address"`
|
|
// The port used for serving requests
|
|
Port int `json:"port" mapstructure:"port"`
|
|
// Apply the proxy configuration, if any, for this binding
|
|
ApplyProxyConfig bool `json:"apply_proxy_config" mapstructure:"apply_proxy_config"`
|
|
}
|
|
|
|
// GetAddress returns the binding address
|
|
func (b *Binding) GetAddress() string {
|
|
return fmt.Sprintf("%s:%d", b.Address, b.Port)
|
|
}
|
|
|
|
// IsValid returns true if the binding port is > 0
|
|
func (b *Binding) IsValid() bool {
|
|
return b.Port > 0
|
|
}
|
|
|
|
// HasProxy returns true if the proxy protocol is active for this binding
|
|
func (b *Binding) HasProxy() bool {
|
|
return b.ApplyProxyConfig && common.Config.ProxyProtocol > 0
|
|
}
|
|
|
|
// Configuration for the SFTP server
|
|
type Configuration struct {
|
|
// Addresses and ports to bind to
|
|
Bindings []Binding `json:"bindings" mapstructure:"bindings"`
|
|
// Maximum number of authentication attempts permitted per connection.
|
|
// If set to a negative number, the number of attempts is unlimited.
|
|
// If set to zero, the number of attempts are limited to 6.
|
|
MaxAuthTries int `json:"max_auth_tries" mapstructure:"max_auth_tries"`
|
|
// HostKeys define the daemon's private host keys.
|
|
// Each host key can be defined as a path relative to the configuration directory or an absolute one.
|
|
// If empty or missing, the daemon will search or try to generate "id_rsa" and "id_ecdsa" host keys
|
|
// inside the configuration directory.
|
|
HostKeys []string `json:"host_keys" mapstructure:"host_keys"`
|
|
// HostCertificates defines public host certificates.
|
|
// Each certificate can be defined as a path relative to the configuration directory or an absolute one.
|
|
// Certificate's public key must match a private host key otherwise it will be silently ignored.
|
|
HostCertificates []string `json:"host_certificates" mapstructure:"host_certificates"`
|
|
// HostKeyAlgorithms lists the public key algorithms that the server will accept for host
|
|
// key authentication.
|
|
HostKeyAlgorithms []string `json:"host_key_algorithms" mapstructure:"host_key_algorithms"`
|
|
// KexAlgorithms specifies the available KEX (Key Exchange) algorithms in
|
|
// preference order.
|
|
KexAlgorithms []string `json:"kex_algorithms" mapstructure:"kex_algorithms"`
|
|
// MinDHGroupExchangeKeySize defines the minimum key size to allow for the
|
|
// key exchanges when using diffie-ellman-group-exchange-sha1 or sha256 key
|
|
// exchange algorithms.
|
|
MinDHGroupExchangeKeySize int `json:"min_dh_group_exchange_key_size" mapstructure:"min_dh_group_exchange_key_size"`
|
|
// Ciphers specifies the ciphers allowed
|
|
Ciphers []string `json:"ciphers" mapstructure:"ciphers"`
|
|
// MACs Specifies the available MAC (message authentication code) algorithms
|
|
// in preference order
|
|
MACs []string `json:"macs" mapstructure:"macs"`
|
|
// PublicKeyAlgorithms lists the supported public key algorithms for client authentication.
|
|
PublicKeyAlgorithms []string `json:"public_key_algorithms" mapstructure:"public_key_algorithms"`
|
|
// TrustedUserCAKeys specifies a list of public keys paths of certificate authorities
|
|
// that are trusted to sign user certificates for authentication.
|
|
// The paths can be absolute or relative to the configuration directory
|
|
TrustedUserCAKeys []string `json:"trusted_user_ca_keys" mapstructure:"trusted_user_ca_keys"`
|
|
// Path to a file containing the revoked user certificates.
|
|
// This file must contain a JSON list with the public key fingerprints of the revoked certificates.
|
|
// Example content:
|
|
// ["SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es","SHA256:119+8cL/HH+NLMawRsJx6CzPF1I3xC+jpM60bQHXGE8"]
|
|
RevokedUserCertsFile string `json:"revoked_user_certs_file" mapstructure:"revoked_user_certs_file"`
|
|
// LoginBannerFile the contents of the specified file, if any, are sent to
|
|
// the remote user before authentication is allowed.
|
|
LoginBannerFile string `json:"login_banner_file" mapstructure:"login_banner_file"`
|
|
// List of enabled SSH commands.
|
|
// We support the following SSH commands:
|
|
// - "scp". SCP is an experimental feature, we have our own SCP implementation since
|
|
// we can't rely on scp system command to proper handle permissions, quota and
|
|
// user's home dir restrictions.
|
|
// The SCP protocol is quite simple but there is no official docs about it,
|
|
// so we need more testing and feedbacks before enabling it by default.
|
|
// We may not handle some borderline cases or have sneaky bugs.
|
|
// Please do accurate tests yourself before enabling SCP and let us known
|
|
// if something does not work as expected for your use cases.
|
|
// SCP between two remote hosts is supported using the `-3` scp option.
|
|
// - "md5sum", "sha1sum", "sha256sum", "sha384sum", "sha512sum". Useful to check message
|
|
// digests for uploaded files. These commands are implemented inside SFTPGo so they
|
|
// work even if the matching system commands are not available, for example on Windows.
|
|
// - "cd", "pwd". Some mobile SFTP clients does not support the SFTP SSH_FXP_REALPATH and so
|
|
// they use "cd" and "pwd" SSH commands to get the initial directory.
|
|
// Currently `cd` do nothing and `pwd` always returns the "/" path.
|
|
//
|
|
// The following SSH commands are enabled by default: "md5sum", "sha1sum", "cd", "pwd".
|
|
// "*" enables all supported SSH commands.
|
|
EnabledSSHCommands []string `json:"enabled_ssh_commands" mapstructure:"enabled_ssh_commands"`
|
|
// KeyboardInteractiveAuthentication specifies whether keyboard interactive authentication is allowed.
|
|
// If no keyboard interactive hook or auth plugin is defined the default is to prompt for the user password and then the
|
|
// one time authentication code, if defined.
|
|
KeyboardInteractiveAuthentication bool `json:"keyboard_interactive_authentication" mapstructure:"keyboard_interactive_authentication"`
|
|
// Absolute path to an external program or an HTTP URL to invoke for keyboard interactive authentication.
|
|
// Leave empty to disable this authentication mode.
|
|
KeyboardInteractiveHook string `json:"keyboard_interactive_auth_hook" mapstructure:"keyboard_interactive_auth_hook"`
|
|
// PasswordAuthentication specifies whether password authentication is allowed.
|
|
PasswordAuthentication bool `json:"password_authentication" mapstructure:"password_authentication"`
|
|
certChecker *ssh.CertChecker
|
|
parsedUserCAKeys []ssh.PublicKey
|
|
}
|
|
|
|
type authenticationError struct {
|
|
err error
|
|
loginMethod string
|
|
username string
|
|
}
|
|
|
|
func (e *authenticationError) Error() string {
|
|
return fmt.Sprintf("Authentication error: %v", e.err)
|
|
}
|
|
|
|
// Is reports if target matches
|
|
func (e *authenticationError) Is(target error) bool {
|
|
_, ok := target.(*authenticationError)
|
|
return ok
|
|
}
|
|
|
|
// Unwrap returns the wrapped error
|
|
func (e *authenticationError) Unwrap() error {
|
|
return e.err
|
|
}
|
|
|
|
func (e *authenticationError) getLoginMethod() string {
|
|
return e.loginMethod
|
|
}
|
|
|
|
func (e *authenticationError) getUsername() string {
|
|
return e.username
|
|
}
|
|
|
|
func newAuthenticationError(err error, loginMethod, username string) *authenticationError {
|
|
return &authenticationError{err: err, loginMethod: loginMethod, username: username}
|
|
}
|
|
|
|
// ShouldBind returns true if there is at least a valid binding
|
|
func (c *Configuration) ShouldBind() bool {
|
|
for _, binding := range c.Bindings {
|
|
if binding.IsValid() {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (c *Configuration) getServerConfig() *ssh.ServerConfig {
|
|
serverConfig := &ssh.ServerConfig{
|
|
NoClientAuth: false,
|
|
MaxAuthTries: c.MaxAuthTries,
|
|
PublicKeyCallback: func(conn ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
|
|
sp, err := c.validatePublicKeyCredentials(conn, pubKey)
|
|
var partialSuccess *ssh.PartialSuccessError
|
|
if errors.As(err, &partialSuccess) {
|
|
return sp, err
|
|
}
|
|
if err != nil {
|
|
return nil, newAuthenticationError(fmt.Errorf("could not validate public key credentials: %w", err),
|
|
dataprovider.SSHLoginMethodPublicKey, conn.User())
|
|
}
|
|
|
|
return sp, nil
|
|
},
|
|
ServerVersion: fmt.Sprintf("SSH-2.0-%s", version.GetServerVersion("_", false)),
|
|
}
|
|
|
|
if c.PasswordAuthentication {
|
|
serverConfig.PasswordCallback = func(conn ssh.ConnMetadata, password []byte) (*ssh.Permissions, error) {
|
|
return c.validatePasswordCredentials(conn, password, dataprovider.LoginMethodPassword)
|
|
}
|
|
serviceStatus.Authentications = append(serviceStatus.Authentications, dataprovider.LoginMethodPassword)
|
|
}
|
|
serviceStatus.Authentications = append(serviceStatus.Authentications, dataprovider.SSHLoginMethodPublicKey)
|
|
|
|
return serverConfig
|
|
}
|
|
|
|
func (c *Configuration) updateSupportedAuthentications() {
|
|
serviceStatus.Authentications = util.RemoveDuplicates(serviceStatus.Authentications, false)
|
|
|
|
if slices.Contains(serviceStatus.Authentications, dataprovider.LoginMethodPassword) &&
|
|
slices.Contains(serviceStatus.Authentications, dataprovider.SSHLoginMethodPublicKey) {
|
|
serviceStatus.Authentications = append(serviceStatus.Authentications, dataprovider.SSHLoginMethodKeyAndPassword)
|
|
}
|
|
|
|
if slices.Contains(serviceStatus.Authentications, dataprovider.SSHLoginMethodKeyboardInteractive) &&
|
|
slices.Contains(serviceStatus.Authentications, dataprovider.SSHLoginMethodPublicKey) {
|
|
serviceStatus.Authentications = append(serviceStatus.Authentications, dataprovider.SSHLoginMethodKeyAndKeyboardInt)
|
|
}
|
|
}
|
|
|
|
func (c *Configuration) loadFromProvider() error {
|
|
configs, err := dataprovider.GetConfigs()
|
|
if err != nil {
|
|
return fmt.Errorf("unable to load config from provider: %w", err)
|
|
}
|
|
configs.SetNilsToEmpty()
|
|
if len(configs.SFTPD.HostKeyAlgos) > 0 {
|
|
if len(c.HostKeyAlgorithms) == 0 {
|
|
c.HostKeyAlgorithms = preferredHostKeyAlgos
|
|
}
|
|
c.HostKeyAlgorithms = append(c.HostKeyAlgorithms, configs.SFTPD.HostKeyAlgos...)
|
|
}
|
|
if len(configs.SFTPD.PublicKeyAlgos) > 0 {
|
|
if len(c.PublicKeyAlgorithms) == 0 {
|
|
c.PublicKeyAlgorithms = preferredPublicKeyAlgos
|
|
}
|
|
c.PublicKeyAlgorithms = append(c.PublicKeyAlgorithms, configs.SFTPD.PublicKeyAlgos...)
|
|
}
|
|
if len(configs.SFTPD.KexAlgorithms) > 0 {
|
|
if len(c.KexAlgorithms) == 0 {
|
|
c.KexAlgorithms = preferredKexAlgos
|
|
}
|
|
c.KexAlgorithms = append(c.KexAlgorithms, configs.SFTPD.KexAlgorithms...)
|
|
}
|
|
if len(configs.SFTPD.Ciphers) > 0 {
|
|
if len(c.Ciphers) == 0 {
|
|
c.Ciphers = preferredCiphers
|
|
}
|
|
c.Ciphers = append(c.Ciphers, configs.SFTPD.Ciphers...)
|
|
}
|
|
if len(configs.SFTPD.MACs) > 0 {
|
|
if len(c.MACs) == 0 {
|
|
c.MACs = preferredMACs
|
|
}
|
|
c.MACs = append(c.MACs, configs.SFTPD.MACs...)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Initialize the SFTP server and add a persistent listener to handle inbound SFTP connections.
|
|
func (c *Configuration) Initialize(configDir string) error {
|
|
if err := c.loadFromProvider(); err != nil {
|
|
return fmt.Errorf("unable to load configs from provider: %w", err)
|
|
}
|
|
serviceStatus = ServiceStatus{}
|
|
serverConfig := c.getServerConfig()
|
|
|
|
if !c.ShouldBind() {
|
|
return common.ErrNoBinding
|
|
}
|
|
|
|
ssh.SetDHKexServerMinBits(uint32(c.MinDHGroupExchangeKeySize))
|
|
logger.Debug(logSender, "", "minimum key size allowed for diffie-ellman-group-exchange: %d",
|
|
ssh.GetDHKexServerMinBits())
|
|
sftp.SetSFTPExtensions(sftpExtensions...) //nolint:errcheck // we configure valid SFTP Extensions so we cannot get an error
|
|
sftp.MaxFilelist = 250
|
|
|
|
if err := c.configureSecurityOptions(serverConfig); err != nil {
|
|
return err
|
|
}
|
|
if err := c.checkAndLoadHostKeys(configDir, serverConfig); err != nil {
|
|
serviceStatus.HostKeys = nil
|
|
return err
|
|
}
|
|
if err := c.initializeCertChecker(configDir); err != nil {
|
|
return err
|
|
}
|
|
c.configureKeyboardInteractiveAuth(serverConfig)
|
|
c.configureLoginBanner(serverConfig, configDir)
|
|
c.checkSSHCommands()
|
|
|
|
exitChannel := make(chan error, 1)
|
|
serviceStatus.Bindings = nil
|
|
|
|
for _, binding := range c.Bindings {
|
|
if !binding.IsValid() {
|
|
continue
|
|
}
|
|
serviceStatus.Bindings = append(serviceStatus.Bindings, binding)
|
|
|
|
go func(binding Binding) {
|
|
addr := binding.GetAddress()
|
|
util.CheckTCP4Port(binding.Port)
|
|
listener, err := net.Listen("tcp", addr)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error starting listener on address %v: %v", addr, err)
|
|
exitChannel <- err
|
|
return
|
|
}
|
|
|
|
if binding.ApplyProxyConfig && common.Config.ProxyProtocol > 0 {
|
|
proxyListener, err := common.Config.GetProxyListener(listener)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error enabling proxy listener: %v", err)
|
|
exitChannel <- err
|
|
return
|
|
}
|
|
listener = proxyListener
|
|
}
|
|
|
|
exitChannel <- c.serve(listener, serverConfig)
|
|
}(binding)
|
|
}
|
|
|
|
serviceStatus.IsActive = true
|
|
serviceStatus.SSHCommands = c.EnabledSSHCommands
|
|
c.updateSupportedAuthentications()
|
|
|
|
return <-exitChannel
|
|
}
|
|
|
|
func (c *Configuration) serve(listener net.Listener, serverConfig *ssh.ServerConfig) error {
|
|
logger.Info(logSender, "", "server listener registered, address: %s", listener.Addr().String())
|
|
var tempDelay time.Duration // how long to sleep on accept failure
|
|
|
|
for {
|
|
conn, err := listener.Accept()
|
|
if err != nil {
|
|
// see https://github.com/golang/go/blob/4aa1efed4853ea067d665a952eee77c52faac774/src/net/http/server.go#L3046
|
|
if ne, ok := err.(net.Error); ok && ne.Temporary() { //nolint:staticcheck
|
|
if tempDelay == 0 {
|
|
tempDelay = 5 * time.Millisecond
|
|
} else {
|
|
tempDelay *= 2
|
|
}
|
|
if max := 1 * time.Second; tempDelay > max {
|
|
tempDelay = max
|
|
}
|
|
logger.Warn(logSender, "", "accept error: %v; retrying in %v", err, tempDelay)
|
|
time.Sleep(tempDelay)
|
|
continue
|
|
}
|
|
logger.Warn(logSender, "", "unrecoverable accept error: %v", err)
|
|
return err
|
|
}
|
|
tempDelay = 0
|
|
|
|
go c.AcceptInboundConnection(conn, serverConfig)
|
|
}
|
|
}
|
|
|
|
func (c *Configuration) configureKeyAlgos(serverConfig *ssh.ServerConfig) error {
|
|
if len(c.HostKeyAlgorithms) == 0 {
|
|
c.HostKeyAlgorithms = preferredHostKeyAlgos
|
|
} else {
|
|
c.HostKeyAlgorithms = util.RemoveDuplicates(c.HostKeyAlgorithms, true)
|
|
}
|
|
for _, hostKeyAlgo := range c.HostKeyAlgorithms {
|
|
if !slices.Contains(supportedHostKeyAlgos, hostKeyAlgo) {
|
|
return fmt.Errorf("unsupported host key algorithm %q", hostKeyAlgo)
|
|
}
|
|
}
|
|
|
|
if len(c.PublicKeyAlgorithms) > 0 {
|
|
c.PublicKeyAlgorithms = util.RemoveDuplicates(c.PublicKeyAlgorithms, true)
|
|
for _, algo := range c.PublicKeyAlgorithms {
|
|
if !slices.Contains(supportedPublicKeyAlgos, algo) {
|
|
return fmt.Errorf("unsupported public key authentication algorithm %q", algo)
|
|
}
|
|
}
|
|
} else {
|
|
c.PublicKeyAlgorithms = preferredPublicKeyAlgos
|
|
}
|
|
serverConfig.PublicKeyAuthAlgorithms = c.PublicKeyAlgorithms
|
|
serviceStatus.PublicKeyAlgorithms = c.PublicKeyAlgorithms
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Configuration) checkKeyExchangeAlgorithms() {
|
|
var kexs []string
|
|
for _, k := range c.KexAlgorithms {
|
|
if k == "diffie-hellman-group18-sha512" {
|
|
logger.Warn(logSender, "", "KEX %q is not supported and will be ignored", k)
|
|
continue
|
|
}
|
|
kexs = append(kexs, k)
|
|
if strings.TrimSpace(k) == keyExchangeCurve25519SHA256LibSSH {
|
|
kexs = append(kexs, ssh.KeyExchangeCurve25519SHA256)
|
|
}
|
|
if strings.TrimSpace(k) == ssh.KeyExchangeCurve25519SHA256 {
|
|
kexs = append(kexs, keyExchangeCurve25519SHA256LibSSH)
|
|
}
|
|
}
|
|
c.KexAlgorithms = util.RemoveDuplicates(kexs, true)
|
|
}
|
|
|
|
func (c *Configuration) configureSecurityOptions(serverConfig *ssh.ServerConfig) error {
|
|
if err := c.configureKeyAlgos(serverConfig); err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(c.KexAlgorithms) > 0 {
|
|
c.checkKeyExchangeAlgorithms()
|
|
for _, kex := range c.KexAlgorithms {
|
|
if kex == keyExchangeCurve25519SHA256LibSSH {
|
|
continue
|
|
}
|
|
if !slices.Contains(supportedKexAlgos, kex) {
|
|
return fmt.Errorf("unsupported key-exchange algorithm %q", kex)
|
|
}
|
|
}
|
|
} else {
|
|
c.KexAlgorithms = preferredKexAlgos
|
|
c.checkKeyExchangeAlgorithms()
|
|
}
|
|
serverConfig.KeyExchanges = c.KexAlgorithms
|
|
serviceStatus.KexAlgorithms = c.KexAlgorithms
|
|
|
|
if len(c.Ciphers) > 0 {
|
|
c.Ciphers = util.RemoveDuplicates(c.Ciphers, true)
|
|
for _, cipher := range c.Ciphers {
|
|
if !slices.Contains(supportedCiphers, cipher) {
|
|
return fmt.Errorf("unsupported cipher %q", cipher)
|
|
}
|
|
}
|
|
} else {
|
|
c.Ciphers = preferredCiphers
|
|
}
|
|
serverConfig.Ciphers = c.Ciphers
|
|
serviceStatus.Ciphers = c.Ciphers
|
|
|
|
if len(c.MACs) > 0 {
|
|
c.MACs = util.RemoveDuplicates(c.MACs, true)
|
|
for _, mac := range c.MACs {
|
|
if !slices.Contains(supportedMACs, mac) {
|
|
return fmt.Errorf("unsupported MAC algorithm %q", mac)
|
|
}
|
|
}
|
|
} else {
|
|
c.MACs = preferredMACs
|
|
}
|
|
serverConfig.MACs = c.MACs
|
|
serviceStatus.MACs = c.MACs
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Configuration) configureLoginBanner(serverConfig *ssh.ServerConfig, configDir string) {
|
|
if c.LoginBannerFile != "" {
|
|
bannerFilePath := c.LoginBannerFile
|
|
if !filepath.IsAbs(bannerFilePath) {
|
|
bannerFilePath = filepath.Join(configDir, bannerFilePath)
|
|
}
|
|
bannerContent, err := os.ReadFile(bannerFilePath)
|
|
if err == nil {
|
|
banner := util.BytesToString(bannerContent)
|
|
serverConfig.BannerCallback = func(_ ssh.ConnMetadata) string {
|
|
return banner
|
|
}
|
|
} else {
|
|
logger.WarnToConsole("unable to read SFTPD login banner file: %v", err)
|
|
logger.Warn(logSender, "", "unable to read login banner file: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *Configuration) configureKeyboardInteractiveAuth(serverConfig *ssh.ServerConfig) {
|
|
if !c.KeyboardInteractiveAuthentication {
|
|
return
|
|
}
|
|
if c.KeyboardInteractiveHook != "" {
|
|
if !strings.HasPrefix(c.KeyboardInteractiveHook, "http") {
|
|
if !filepath.IsAbs(c.KeyboardInteractiveHook) {
|
|
c.KeyboardInteractiveAuthentication = false
|
|
logger.WarnToConsole("invalid keyboard interactive authentication program: %q must be an absolute path",
|
|
c.KeyboardInteractiveHook)
|
|
logger.Warn(logSender, "", "invalid keyboard interactive authentication program: %q must be an absolute path",
|
|
c.KeyboardInteractiveHook)
|
|
return
|
|
}
|
|
_, err := os.Stat(c.KeyboardInteractiveHook)
|
|
if err != nil {
|
|
c.KeyboardInteractiveAuthentication = false
|
|
logger.WarnToConsole("invalid keyboard interactive authentication program:: %v", err)
|
|
logger.Warn(logSender, "", "invalid keyboard interactive authentication program:: %v", err)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
serverConfig.KeyboardInteractiveCallback = func(conn ssh.ConnMetadata, client ssh.KeyboardInteractiveChallenge) (*ssh.Permissions, error) {
|
|
return c.validateKeyboardInteractiveCredentials(conn, client, dataprovider.SSHLoginMethodKeyboardInteractive, false)
|
|
}
|
|
|
|
serviceStatus.Authentications = append(serviceStatus.Authentications, dataprovider.SSHLoginMethodKeyboardInteractive)
|
|
}
|
|
|
|
// AcceptInboundConnection handles an inbound connection to the server instance and determines if the request should be served or not.
|
|
func (c *Configuration) AcceptInboundConnection(conn net.Conn, config *ssh.ServerConfig) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
logger.Error(logSender, "", "panic in AcceptInboundConnection: %q stack trace: %v", r, string(debug.Stack()))
|
|
}
|
|
}()
|
|
|
|
ipAddr := util.GetIPFromRemoteAddress(conn.RemoteAddr().String())
|
|
common.Connections.AddClientConnection(ipAddr)
|
|
defer common.Connections.RemoveClientConnection(ipAddr)
|
|
|
|
if !canAcceptConnection(ipAddr) {
|
|
conn.Close()
|
|
return
|
|
}
|
|
// Before beginning a handshake must be performed on the incoming net.Conn
|
|
// we'll set a Deadline for handshake to complete, the default is 2 minutes as OpenSSH
|
|
conn.SetDeadline(time.Now().Add(handshakeTimeout)) //nolint:errcheck
|
|
|
|
sconn, chans, reqs, err := ssh.NewServerConn(conn, config)
|
|
if err != nil {
|
|
logger.Debug(logSender, "", "failed to accept an incoming connection from ip %q: %v", ipAddr, err)
|
|
checkAuthError(ipAddr, err)
|
|
return
|
|
}
|
|
// handshake completed so remove the deadline, we'll use IdleTimeout configuration from now on
|
|
conn.SetDeadline(time.Time{}) //nolint:errcheck
|
|
go ssh.DiscardRequests(reqs)
|
|
|
|
defer conn.Close()
|
|
|
|
var user dataprovider.User
|
|
|
|
// Unmarshal cannot fails here and even if it fails we'll have a user with no permissions
|
|
json.Unmarshal(util.StringToBytes(sconn.Permissions.Extensions["sftpgo_user"]), &user) //nolint:errcheck
|
|
|
|
loginType := sconn.Permissions.Extensions["sftpgo_login_method"]
|
|
connectionID := hex.EncodeToString(sconn.SessionID())
|
|
|
|
defer user.CloseFs() //nolint:errcheck
|
|
if err = user.CheckFsRoot(connectionID); err != nil {
|
|
logger.Warn(logSender, connectionID, "unable to check fs root for user %q: %v", user.Username, err)
|
|
go discardAllChannels(chans, "invalid root fs", connectionID)
|
|
return
|
|
}
|
|
|
|
logger.Log(logger.LevelInfo, common.ProtocolSSH, connectionID,
|
|
"User %q logged in with %q, from ip %q, client version %q, negotiated algorithms: %+v",
|
|
user.Username, loginType, ipAddr, util.BytesToString(sconn.ClientVersion()),
|
|
sconn.Conn.(ssh.AlgorithmsConnMetadata).Algorithms())
|
|
dataprovider.UpdateLastLogin(&user)
|
|
|
|
sshConnection := common.NewSSHConnection(connectionID, conn)
|
|
common.Connections.AddSSHConnection(sshConnection)
|
|
|
|
defer common.Connections.RemoveSSHConnection(connectionID)
|
|
|
|
channelCounter := int64(0)
|
|
for newChannel := range chans {
|
|
// If its not a session channel we just move on because its not something we
|
|
// know how to handle at this point.
|
|
if newChannel.ChannelType() != "session" {
|
|
logger.Log(logger.LevelDebug, common.ProtocolSSH, connectionID, "received an unknown channel type: %v",
|
|
newChannel.ChannelType())
|
|
newChannel.Reject(ssh.UnknownChannelType, "unknown channel type") //nolint:errcheck
|
|
continue
|
|
}
|
|
|
|
channel, requests, err := newChannel.Accept()
|
|
if err != nil {
|
|
logger.Log(logger.LevelWarn, common.ProtocolSSH, connectionID, "could not accept a channel: %v", err)
|
|
continue
|
|
}
|
|
|
|
channelCounter++
|
|
sshConnection.UpdateLastActivity()
|
|
// Channels have a type that is dependent on the protocol. For SFTP this is "subsystem"
|
|
// with a payload that (should) be "sftp". Discard anything else we receive ("pty", "shell", etc)
|
|
go func(in <-chan *ssh.Request, counter int64) {
|
|
for req := range in {
|
|
ok := false
|
|
connID := fmt.Sprintf("%s_%d", connectionID, counter)
|
|
|
|
switch req.Type {
|
|
case "subsystem":
|
|
if util.BytesToString(req.Payload[4:]) == "sftp" {
|
|
ok = true
|
|
connection := &Connection{
|
|
BaseConnection: common.NewBaseConnection(connID, common.ProtocolSFTP, conn.LocalAddr().String(),
|
|
conn.RemoteAddr().String(), user),
|
|
ClientVersion: util.BytesToString(sconn.ClientVersion()),
|
|
RemoteAddr: conn.RemoteAddr(),
|
|
LocalAddr: conn.LocalAddr(),
|
|
channel: channel,
|
|
}
|
|
go c.handleSftpConnection(channel, connection)
|
|
}
|
|
case "exec":
|
|
// protocol will be set later inside processSSHCommand it could be SSH or SCP
|
|
connection := Connection{
|
|
BaseConnection: common.NewBaseConnection(connID, "sshd_exec", conn.LocalAddr().String(),
|
|
conn.RemoteAddr().String(), user),
|
|
ClientVersion: util.BytesToString(sconn.ClientVersion()),
|
|
RemoteAddr: conn.RemoteAddr(),
|
|
LocalAddr: conn.LocalAddr(),
|
|
channel: channel,
|
|
}
|
|
ok = processSSHCommand(req.Payload, &connection, c.EnabledSSHCommands)
|
|
}
|
|
if req.WantReply {
|
|
req.Reply(ok, nil) //nolint:errcheck
|
|
}
|
|
}
|
|
}(requests, channelCounter)
|
|
}
|
|
}
|
|
|
|
func (c *Configuration) handleSftpConnection(channel ssh.Channel, connection *Connection) {
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
logger.Error(logSender, "", "panic in handleSftpConnection: %q stack trace: %v", r, string(debug.Stack()))
|
|
}
|
|
}()
|
|
if err := common.Connections.Add(connection); err != nil {
|
|
errClose := connection.Disconnect()
|
|
logger.Info(logSender, "", "unable to add connection: %v, close err: %v", err, errClose)
|
|
return
|
|
}
|
|
defer common.Connections.Remove(connection.GetID())
|
|
|
|
// Create the server instance for the channel using the handler we created above.
|
|
server := sftp.NewRequestServer(channel, c.createHandlers(connection), sftp.WithRSAllocator(),
|
|
sftp.WithStartDirectory(connection.User.Filters.StartDirectory))
|
|
|
|
defer server.Close()
|
|
if err := server.Serve(); errors.Is(err, io.EOF) {
|
|
exitStatus := sshSubsystemExitStatus{Status: uint32(0)}
|
|
_, err = channel.SendRequest("exit-status", false, ssh.Marshal(&exitStatus))
|
|
connection.Log(logger.LevelInfo, "connection closed, sent exit status %+v error: %v", exitStatus, err)
|
|
} else if err != nil {
|
|
connection.Log(logger.LevelError, "connection closed with error: %v", err)
|
|
}
|
|
}
|
|
|
|
func (c *Configuration) createHandlers(connection *Connection) sftp.Handlers {
|
|
return sftp.Handlers{
|
|
FileGet: connection,
|
|
FilePut: connection,
|
|
FileCmd: connection,
|
|
FileList: connection,
|
|
}
|
|
}
|
|
|
|
func canAcceptConnection(ip string) bool {
|
|
if common.IsBanned(ip, common.ProtocolSSH) {
|
|
logger.Log(logger.LevelDebug, common.ProtocolSSH, "", "connection refused, ip %q is banned", ip)
|
|
return false
|
|
}
|
|
if err := common.Connections.IsNewConnectionAllowed(ip, common.ProtocolSSH); err != nil {
|
|
logger.Log(logger.LevelDebug, common.ProtocolSSH, "", "connection not allowed from ip %q: %v", ip, err)
|
|
return false
|
|
}
|
|
_, err := common.LimitRate(common.ProtocolSSH, ip)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
if err := common.Config.ExecutePostConnectHook(ip, common.ProtocolSSH); err != nil {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func discardAllChannels(in <-chan ssh.NewChannel, message, connectionID string) {
|
|
for req := range in {
|
|
err := req.Reject(ssh.ConnectionFailed, message)
|
|
logger.Debug(logSender, connectionID, "discarded channel request, message %q err: %v", message, err)
|
|
}
|
|
}
|
|
|
|
func checkAuthError(ip string, err error) {
|
|
var authErrors *ssh.ServerAuthError
|
|
if errors.As(err, &authErrors) {
|
|
// check public key auth errors here
|
|
for _, err := range authErrors.Errors {
|
|
var sftpAuthErr *authenticationError
|
|
if errors.As(err, &sftpAuthErr) {
|
|
if sftpAuthErr.getLoginMethod() == dataprovider.SSHLoginMethodPublicKey {
|
|
event := common.HostEventLoginFailed
|
|
logEv := notifier.LogEventTypeLoginFailed
|
|
if errors.Is(err, util.ErrNotFound) {
|
|
event = common.HostEventUserNotFound
|
|
logEv = notifier.LogEventTypeLoginNoUser
|
|
}
|
|
common.AddDefenderEvent(ip, common.ProtocolSSH, event)
|
|
plugin.Handler.NotifyLogEvent(logEv, common.ProtocolSSH, sftpAuthErr.getUsername(), ip, "", err)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
logger.ConnectionFailedLog("", ip, dataprovider.LoginMethodNoAuthTried, common.ProtocolSSH, err.Error())
|
|
metric.AddNoAuthTried()
|
|
common.AddDefenderEvent(ip, common.ProtocolSSH, common.HostEventNoLoginTried)
|
|
dataprovider.ExecutePostLoginHook(&dataprovider.User{}, dataprovider.LoginMethodNoAuthTried, ip, common.ProtocolSSH, err)
|
|
logEv := notifier.LogEventTypeNoLoginTried
|
|
var negotiationError *ssh.AlgorithmNegotiationError
|
|
if errors.As(err, &negotiationError) {
|
|
logEv = notifier.LogEventTypeNotNegotiated
|
|
}
|
|
plugin.Handler.NotifyLogEvent(logEv, common.ProtocolSSH, "", ip, "", err)
|
|
}
|
|
}
|
|
|
|
func loginUser(user *dataprovider.User, loginMethod, publicKey string, conn ssh.ConnMetadata) (*ssh.Permissions, error) {
|
|
connectionID := ""
|
|
if conn != nil {
|
|
connectionID = hex.EncodeToString(conn.SessionID())
|
|
}
|
|
if !filepath.IsAbs(user.HomeDir) {
|
|
logger.Warn(logSender, connectionID, "user %q has an invalid home dir: %q. Home dir must be an absolute path, login not allowed",
|
|
user.Username, user.HomeDir)
|
|
return nil, fmt.Errorf("cannot login user with invalid home dir: %q", user.HomeDir)
|
|
}
|
|
if slices.Contains(user.Filters.DeniedProtocols, common.ProtocolSSH) {
|
|
logger.Info(logSender, connectionID, "cannot login user %q, protocol SSH is not allowed", user.Username)
|
|
return nil, fmt.Errorf("protocol SSH is not allowed for user %q", user.Username)
|
|
}
|
|
if user.MaxSessions > 0 {
|
|
activeSessions := common.Connections.GetActiveSessions(user.Username)
|
|
if activeSessions >= user.MaxSessions {
|
|
logger.Info(logSender, "", "authentication refused for user: %q, too many open sessions: %v/%v", user.Username,
|
|
activeSessions, user.MaxSessions)
|
|
return nil, fmt.Errorf("too many open sessions: %v", activeSessions)
|
|
}
|
|
}
|
|
if !user.IsLoginMethodAllowed(loginMethod, common.ProtocolSSH) {
|
|
logger.Info(logSender, connectionID, "cannot login user %q, login method %q is not allowed",
|
|
user.Username, loginMethod)
|
|
return nil, fmt.Errorf("login method %q is not allowed for user %q", loginMethod, user.Username)
|
|
}
|
|
if user.MustSetSecondFactorForProtocol(common.ProtocolSSH) {
|
|
logger.Info(logSender, connectionID, "cannot login user %q, second factor authentication is not set",
|
|
user.Username)
|
|
return nil, fmt.Errorf("second factor authentication is not set for user %q", user.Username)
|
|
}
|
|
remoteAddr := util.GetIPFromRemoteAddress(conn.RemoteAddr().String())
|
|
if !user.IsLoginFromAddrAllowed(remoteAddr) {
|
|
logger.Info(logSender, connectionID, "cannot login user %q, remote address is not allowed: %v",
|
|
user.Username, remoteAddr)
|
|
return nil, fmt.Errorf("login for user %q is not allowed from this address: %v", user.Username, remoteAddr)
|
|
}
|
|
|
|
json, err := json.Marshal(user)
|
|
if err != nil {
|
|
logger.Warn(logSender, connectionID, "error serializing user info: %v, authentication rejected", err)
|
|
return nil, err
|
|
}
|
|
if publicKey != "" {
|
|
loginMethod = fmt.Sprintf("%v: %v", loginMethod, publicKey)
|
|
}
|
|
p := &ssh.Permissions{}
|
|
p.Extensions = make(map[string]string)
|
|
p.Extensions["sftpgo_user"] = util.BytesToString(json)
|
|
p.Extensions["sftpgo_login_method"] = loginMethod
|
|
return p, nil
|
|
}
|
|
|
|
func (c *Configuration) checkSSHCommands() {
|
|
if slices.Contains(c.EnabledSSHCommands, "*") {
|
|
c.EnabledSSHCommands = GetSupportedSSHCommands()
|
|
return
|
|
}
|
|
sshCommands := []string{}
|
|
for _, command := range c.EnabledSSHCommands {
|
|
command = strings.TrimSpace(command)
|
|
if slices.Contains(supportedSSHCommands, command) {
|
|
sshCommands = append(sshCommands, command)
|
|
} else {
|
|
logger.Warn(logSender, "", "unsupported ssh command: %q ignored", command)
|
|
logger.WarnToConsole("unsupported ssh command: %q ignored", command)
|
|
}
|
|
}
|
|
c.EnabledSSHCommands = sshCommands
|
|
logger.Debug(logSender, "", "enabled SSH commands %v", c.EnabledSSHCommands)
|
|
}
|
|
|
|
func (c *Configuration) generateDefaultHostKeys(configDir string) error {
|
|
var err error
|
|
defaultHostKeys := []string{defaultPrivateRSAKeyName, defaultPrivateECDSAKeyName, defaultPrivateEd25519KeyName}
|
|
for _, k := range defaultHostKeys {
|
|
autoFile := filepath.Join(configDir, k)
|
|
if _, err = os.Stat(autoFile); errors.Is(err, fs.ErrNotExist) {
|
|
logger.Info(logSender, "", "No host keys configured and %q does not exist; try to create a new host key", autoFile)
|
|
logger.InfoToConsole("No host keys configured and %q does not exist; try to create a new host key", autoFile)
|
|
if k == defaultPrivateRSAKeyName {
|
|
err = util.GenerateRSAKeys(autoFile)
|
|
} else if k == defaultPrivateECDSAKeyName {
|
|
err = util.GenerateECDSAKeys(autoFile)
|
|
} else {
|
|
err = util.GenerateEd25519Keys(autoFile)
|
|
}
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error creating host key %q: %v", autoFile, err)
|
|
logger.WarnToConsole("error creating host key %q: %v", autoFile, err)
|
|
return err
|
|
}
|
|
}
|
|
c.HostKeys = append(c.HostKeys, k)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func (c *Configuration) checkHostKeyAutoGeneration(configDir string) error {
|
|
for _, k := range c.HostKeys {
|
|
k = strings.TrimSpace(k)
|
|
if filepath.IsAbs(k) {
|
|
if _, err := os.Stat(k); errors.Is(err, fs.ErrNotExist) {
|
|
keyName := filepath.Base(k)
|
|
switch keyName {
|
|
case defaultPrivateRSAKeyName:
|
|
logger.Info(logSender, "", "try to create non-existent host key %q", k)
|
|
logger.InfoToConsole("try to create non-existent host key %q", k)
|
|
err = util.GenerateRSAKeys(k)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error creating host key %q: %v", k, err)
|
|
logger.WarnToConsole("error creating host key %q: %v", k, err)
|
|
return err
|
|
}
|
|
case defaultPrivateECDSAKeyName:
|
|
logger.Info(logSender, "", "try to create non-existent host key %q", k)
|
|
logger.InfoToConsole("try to create non-existent host key %q", k)
|
|
err = util.GenerateECDSAKeys(k)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error creating host key %q: %v", k, err)
|
|
logger.WarnToConsole("error creating host key %q: %v", k, err)
|
|
return err
|
|
}
|
|
case defaultPrivateEd25519KeyName:
|
|
logger.Info(logSender, "", "try to create non-existent host key %q", k)
|
|
logger.InfoToConsole("try to create non-existent host key %q", k)
|
|
err = util.GenerateEd25519Keys(k)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error creating host key %q: %v", k, err)
|
|
logger.WarnToConsole("error creating host key %q: %v", k, err)
|
|
return err
|
|
}
|
|
default:
|
|
logger.Warn(logSender, "", "non-existent host key %q will not be created", k)
|
|
logger.WarnToConsole("non-existent host key %q will not be created", k)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if len(c.HostKeys) == 0 {
|
|
if err := c.generateDefaultHostKeys(configDir); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *Configuration) getHostKeyAlgorithms(keyFormat string) []string {
|
|
var algos []string
|
|
for _, algo := range algorithmsForKeyFormat(keyFormat) {
|
|
if slices.Contains(c.HostKeyAlgorithms, algo) {
|
|
algos = append(algos, algo)
|
|
}
|
|
}
|
|
return algos
|
|
}
|
|
|
|
// If no host keys are defined we try to use or generate the default ones.
|
|
func (c *Configuration) checkAndLoadHostKeys(configDir string, serverConfig *ssh.ServerConfig) error {
|
|
if err := c.checkHostKeyAutoGeneration(configDir); err != nil {
|
|
return err
|
|
}
|
|
hostCertificates, err := c.loadHostCertificates(configDir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
serviceStatus.HostKeys = nil
|
|
for _, hostKey := range c.HostKeys {
|
|
hostKey = strings.TrimSpace(hostKey)
|
|
if !util.IsFileInputValid(hostKey) {
|
|
logger.Warn(logSender, "", "unable to load invalid host key %q", hostKey)
|
|
logger.WarnToConsole("unable to load invalid host key %q", hostKey)
|
|
continue
|
|
}
|
|
if !filepath.IsAbs(hostKey) {
|
|
hostKey = filepath.Join(configDir, hostKey)
|
|
}
|
|
logger.Info(logSender, "", "Loading private host key %q", hostKey)
|
|
|
|
privateBytes, err := os.ReadFile(hostKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
private, err := ssh.ParsePrivateKey(privateBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
k := HostKey{
|
|
Path: hostKey,
|
|
Fingerprint: ssh.FingerprintSHA256(private.PublicKey()),
|
|
Algorithms: c.getHostKeyAlgorithms(private.PublicKey().Type()),
|
|
}
|
|
mas, err := ssh.NewSignerWithAlgorithms(private.(ssh.AlgorithmSigner), k.Algorithms)
|
|
if err != nil {
|
|
return fmt.Errorf("could not create signer for key %q with algorithms %+v: %w", k.Path, k.Algorithms, err)
|
|
}
|
|
serviceStatus.HostKeys = append(serviceStatus.HostKeys, k)
|
|
logger.Info(logSender, "", "Host key %q loaded, type %q, fingerprint %q, algorithms %+v", hostKey,
|
|
private.PublicKey().Type(), k.Fingerprint, k.Algorithms)
|
|
|
|
// Add private key to the server configuration.
|
|
serverConfig.AddHostKey(mas)
|
|
for _, cert := range hostCertificates {
|
|
signer, err := ssh.NewCertSigner(cert.Certificate, mas)
|
|
if err == nil {
|
|
var algos []string
|
|
for _, algo := range algorithmsForKeyFormat(signer.PublicKey().Type()) {
|
|
if underlyingAlgo, ok := certKeyAlgoNames[algo]; ok {
|
|
if slices.Contains(mas.Algorithms(), underlyingAlgo) {
|
|
algos = append(algos, algo)
|
|
}
|
|
}
|
|
}
|
|
serviceStatus.HostKeys = append(serviceStatus.HostKeys, HostKey{
|
|
Path: cert.Path,
|
|
Fingerprint: ssh.FingerprintSHA256(signer.PublicKey()),
|
|
Algorithms: algos,
|
|
})
|
|
serverConfig.AddHostKey(signer)
|
|
logger.Info(logSender, "", "Host certificate loaded for host key %q, fingerprint %q, algorithms %+v",
|
|
hostKey, ssh.FingerprintSHA256(signer.PublicKey()), algos)
|
|
}
|
|
}
|
|
}
|
|
var fp []string
|
|
for idx := range serviceStatus.HostKeys {
|
|
h := &serviceStatus.HostKeys[idx]
|
|
fp = append(fp, h.Fingerprint)
|
|
}
|
|
vfs.SetSFTPFingerprints(fp)
|
|
return nil
|
|
}
|
|
|
|
func (c *Configuration) loadHostCertificates(configDir string) ([]hostCertificate, error) {
|
|
var certs []hostCertificate
|
|
for _, certPath := range c.HostCertificates {
|
|
certPath = strings.TrimSpace(certPath)
|
|
if !util.IsFileInputValid(certPath) {
|
|
logger.Warn(logSender, "", "unable to load invalid host certificate %q", certPath)
|
|
logger.WarnToConsole("unable to load invalid host certificate %q", certPath)
|
|
continue
|
|
}
|
|
if !filepath.IsAbs(certPath) {
|
|
certPath = filepath.Join(configDir, certPath)
|
|
}
|
|
certBytes, err := os.ReadFile(certPath)
|
|
if err != nil {
|
|
return certs, fmt.Errorf("unable to load host certificate %q: %w", certPath, err)
|
|
}
|
|
parsed, _, _, _, err := ssh.ParseAuthorizedKey(certBytes)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to parse host certificate %q: %w", certPath, err)
|
|
}
|
|
cert, ok := parsed.(*ssh.Certificate)
|
|
if !ok {
|
|
return nil, fmt.Errorf("the file %q is not an SSH certificate", certPath)
|
|
}
|
|
if cert.CertType != ssh.HostCert {
|
|
return nil, fmt.Errorf("the file %q is not an host certificate", certPath)
|
|
}
|
|
certs = append(certs, hostCertificate{
|
|
Path: certPath,
|
|
Certificate: cert,
|
|
})
|
|
}
|
|
return certs, nil
|
|
}
|
|
|
|
func (c *Configuration) initializeCertChecker(configDir string) error {
|
|
for _, keyPath := range c.TrustedUserCAKeys {
|
|
keyPath = strings.TrimSpace(keyPath)
|
|
if !util.IsFileInputValid(keyPath) {
|
|
logger.Warn(logSender, "", "unable to load invalid trusted user CA key %q", keyPath)
|
|
logger.WarnToConsole("unable to load invalid trusted user CA key %q", keyPath)
|
|
continue
|
|
}
|
|
if !filepath.IsAbs(keyPath) {
|
|
keyPath = filepath.Join(configDir, keyPath)
|
|
}
|
|
keyBytes, err := os.ReadFile(keyPath)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error loading trusted user CA key %q: %v", keyPath, err)
|
|
logger.WarnToConsole("error loading trusted user CA key %q: %v", keyPath, err)
|
|
return err
|
|
}
|
|
parsedKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes)
|
|
if err != nil {
|
|
logger.Warn(logSender, "", "error parsing trusted user CA key %q: %v", keyPath, err)
|
|
logger.WarnToConsole("error parsing trusted user CA key %q: %v", keyPath, err)
|
|
return err
|
|
}
|
|
c.parsedUserCAKeys = append(c.parsedUserCAKeys, parsedKey)
|
|
}
|
|
c.certChecker = &ssh.CertChecker{
|
|
SupportedCriticalOptions: []string{
|
|
sourceAddressCriticalOption,
|
|
},
|
|
IsUserAuthority: func(k ssh.PublicKey) bool {
|
|
for _, key := range c.parsedUserCAKeys {
|
|
if bytes.Equal(k.Marshal(), key.Marshal()) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
},
|
|
}
|
|
if c.RevokedUserCertsFile != "" {
|
|
if !util.IsFileInputValid(c.RevokedUserCertsFile) {
|
|
return fmt.Errorf("invalid revoked user certificate: %q", c.RevokedUserCertsFile)
|
|
}
|
|
if !filepath.IsAbs(c.RevokedUserCertsFile) {
|
|
c.RevokedUserCertsFile = filepath.Join(configDir, c.RevokedUserCertsFile)
|
|
}
|
|
}
|
|
revokedCertManager.filePath = c.RevokedUserCertsFile
|
|
return revokedCertManager.load()
|
|
}
|
|
|
|
func (c *Configuration) getPartialSuccessError(nextAuthMethods []string) error {
|
|
err := &ssh.PartialSuccessError{}
|
|
if c.PasswordAuthentication && slices.Contains(nextAuthMethods, dataprovider.LoginMethodPassword) {
|
|
err.Next.PasswordCallback = func(conn ssh.ConnMetadata, password []byte) (*ssh.Permissions, error) {
|
|
return c.validatePasswordCredentials(conn, password, dataprovider.SSHLoginMethodKeyAndPassword)
|
|
}
|
|
}
|
|
if c.KeyboardInteractiveAuthentication && slices.Contains(nextAuthMethods, dataprovider.SSHLoginMethodKeyboardInteractive) {
|
|
err.Next.KeyboardInteractiveCallback = func(conn ssh.ConnMetadata, client ssh.KeyboardInteractiveChallenge) (*ssh.Permissions, error) {
|
|
return c.validateKeyboardInteractiveCredentials(conn, client, dataprovider.SSHLoginMethodKeyAndKeyboardInt, true)
|
|
}
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (c *Configuration) validatePublicKeyCredentials(conn ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
|
|
var err error
|
|
var user dataprovider.User
|
|
var keyID string
|
|
var sshPerm *ssh.Permissions
|
|
var certPerm *ssh.Permissions
|
|
|
|
connectionID := hex.EncodeToString(conn.SessionID())
|
|
method := dataprovider.SSHLoginMethodPublicKey
|
|
ipAddr := util.GetIPFromRemoteAddress(conn.RemoteAddr().String())
|
|
cert, ok := pubKey.(*ssh.Certificate)
|
|
var certFingerprint string
|
|
if ok {
|
|
certFingerprint = ssh.FingerprintSHA256(cert.Key)
|
|
if cert.CertType != ssh.UserCert {
|
|
err = fmt.Errorf("ssh: cert has type %d", cert.CertType)
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return nil, err
|
|
}
|
|
if !c.certChecker.IsUserAuthority(cert.SignatureKey) {
|
|
err = errors.New("ssh: certificate signed by unrecognized authority")
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return nil, err
|
|
}
|
|
if len(cert.ValidPrincipals) == 0 {
|
|
err = fmt.Errorf("ssh: certificate %s has no valid principals, user: \"%s\"", certFingerprint, conn.User())
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return nil, err
|
|
}
|
|
if revokedCertManager.isRevoked(certFingerprint) {
|
|
err = fmt.Errorf("ssh: certificate %s is revoked", certFingerprint)
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return nil, err
|
|
}
|
|
if err := c.certChecker.CheckCert(conn.User(), cert); err != nil {
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return nil, err
|
|
}
|
|
certPerm = &cert.Permissions
|
|
}
|
|
if user, keyID, err = dataprovider.CheckUserAndPubKey(conn.User(), pubKey.Marshal(), ipAddr, common.ProtocolSSH, ok); err == nil {
|
|
if ok {
|
|
keyID = fmt.Sprintf("%s: ID: %s, serial: %v, CA %s %s", certFingerprint,
|
|
cert.KeyId, cert.Serial, cert.Type(), ssh.FingerprintSHA256(cert.SignatureKey))
|
|
}
|
|
if user.IsPartialAuth() {
|
|
logger.Debug(logSender, connectionID, "user %q authenticated with partial success", conn.User())
|
|
return certPerm, c.getPartialSuccessError(user.GetNextAuthMethods())
|
|
}
|
|
sshPerm, err = loginUser(&user, method, keyID, conn)
|
|
if err == nil && certPerm != nil {
|
|
// if we have a SSH user cert we need to merge certificate permissions with our ones
|
|
// we only set Extensions, so CriticalOptions are always the ones from the certificate
|
|
sshPerm.CriticalOptions = certPerm.CriticalOptions
|
|
if certPerm.Extensions != nil {
|
|
for k, v := range certPerm.Extensions {
|
|
sshPerm.Extensions[k] = v
|
|
}
|
|
}
|
|
}
|
|
}
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
return sshPerm, err
|
|
}
|
|
|
|
func (c *Configuration) validatePasswordCredentials(conn ssh.ConnMetadata, pass []byte, method string) (*ssh.Permissions, error) {
|
|
var err error
|
|
var user dataprovider.User
|
|
var sshPerm *ssh.Permissions
|
|
|
|
ipAddr := util.GetIPFromRemoteAddress(conn.RemoteAddr().String())
|
|
if user, err = dataprovider.CheckUserAndPass(conn.User(), util.BytesToString(pass), ipAddr, common.ProtocolSSH); err == nil {
|
|
sshPerm, err = loginUser(&user, method, "", conn)
|
|
}
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
if err != nil {
|
|
return nil, newAuthenticationError(fmt.Errorf("could not validate password credentials: %w", err), method, conn.User())
|
|
}
|
|
return sshPerm, nil
|
|
}
|
|
|
|
func (c *Configuration) validateKeyboardInteractiveCredentials(conn ssh.ConnMetadata, client ssh.KeyboardInteractiveChallenge,
|
|
method string, isPartialAuth bool,
|
|
) (*ssh.Permissions, error) {
|
|
var err error
|
|
var user dataprovider.User
|
|
var sshPerm *ssh.Permissions
|
|
|
|
ipAddr := util.GetIPFromRemoteAddress(conn.RemoteAddr().String())
|
|
if user, err = dataprovider.CheckKeyboardInteractiveAuth(conn.User(), c.KeyboardInteractiveHook, client,
|
|
ipAddr, common.ProtocolSSH, isPartialAuth); err == nil {
|
|
sshPerm, err = loginUser(&user, method, "", conn)
|
|
}
|
|
user.Username = conn.User()
|
|
updateLoginMetrics(&user, ipAddr, method, err)
|
|
if err != nil {
|
|
return nil, newAuthenticationError(fmt.Errorf("could not validate keyboard interactive credentials: %w", err), method, conn.User())
|
|
}
|
|
return sshPerm, nil
|
|
}
|
|
|
|
func updateLoginMetrics(user *dataprovider.User, ip, method string, err error) {
|
|
metric.AddLoginAttempt(method)
|
|
if err == nil {
|
|
plugin.Handler.NotifyLogEvent(notifier.LogEventTypeLoginOK, common.ProtocolSSH, user.Username, ip, "", err)
|
|
common.DelayLogin(nil)
|
|
} else {
|
|
logger.ConnectionFailedLog(user.Username, ip, method, common.ProtocolSSH, err.Error())
|
|
if method != dataprovider.SSHLoginMethodPublicKey {
|
|
// some clients try all available public keys for a user, we
|
|
// record failed login key auth only once for session if the
|
|
// authentication fails in checkAuthError
|
|
event := common.HostEventLoginFailed
|
|
logEv := notifier.LogEventTypeLoginFailed
|
|
if errors.Is(err, util.ErrNotFound) {
|
|
event = common.HostEventUserNotFound
|
|
logEv = notifier.LogEventTypeLoginNoUser
|
|
}
|
|
common.AddDefenderEvent(ip, common.ProtocolSSH, event)
|
|
plugin.Handler.NotifyLogEvent(logEv, common.ProtocolSSH, user.Username, ip, "", err)
|
|
if method != dataprovider.SSHLoginMethodPublicKey {
|
|
common.DelayLogin(err)
|
|
}
|
|
}
|
|
}
|
|
metric.AddLoginResult(method, err)
|
|
dataprovider.ExecutePostLoginHook(user, method, ip, common.ProtocolSSH, err)
|
|
}
|
|
|
|
type revokedCertificates struct {
|
|
filePath string
|
|
mu sync.RWMutex
|
|
certs map[string]bool
|
|
}
|
|
|
|
func (r *revokedCertificates) load() error {
|
|
if r.filePath == "" {
|
|
return nil
|
|
}
|
|
logger.Debug(logSender, "", "loading revoked user certificate file %q", r.filePath)
|
|
info, err := os.Stat(r.filePath)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to load revoked user certificate file %q: %w", r.filePath, err)
|
|
}
|
|
maxSize := int64(1048576 * 5) // 5MB
|
|
if info.Size() > maxSize {
|
|
return fmt.Errorf("unable to load revoked user certificate file %q size too big: %v/%v bytes",
|
|
r.filePath, info.Size(), maxSize)
|
|
}
|
|
content, err := os.ReadFile(r.filePath)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to read revoked user certificate file %q: %w", r.filePath, err)
|
|
}
|
|
var certs []string
|
|
err = json.Unmarshal(content, &certs)
|
|
if err != nil {
|
|
return fmt.Errorf("unable to parse revoked user certificate file %q: %w", r.filePath, err)
|
|
}
|
|
|
|
r.mu.Lock()
|
|
defer r.mu.Unlock()
|
|
|
|
r.certs = map[string]bool{}
|
|
for _, fp := range certs {
|
|
r.certs[fp] = true
|
|
}
|
|
logger.Debug(logSender, "", "revoked user certificate file %q loaded, entries: %v", r.filePath, len(r.certs))
|
|
return nil
|
|
}
|
|
|
|
func (r *revokedCertificates) isRevoked(fp string) bool {
|
|
r.mu.RLock()
|
|
defer r.mu.RUnlock()
|
|
|
|
return r.certs[fp]
|
|
}
|
|
|
|
// Reload reloads the list of revoked user certificates
|
|
func Reload() error {
|
|
return revokedCertManager.load()
|
|
}
|
|
|
|
func algorithmsForKeyFormat(keyFormat string) []string {
|
|
switch keyFormat {
|
|
case ssh.KeyAlgoRSA:
|
|
return []string{ssh.KeyAlgoRSASHA256, ssh.KeyAlgoRSASHA512, ssh.KeyAlgoRSA}
|
|
case ssh.CertAlgoRSAv01:
|
|
return []string{ssh.CertAlgoRSASHA256v01, ssh.CertAlgoRSASHA512v01, ssh.CertAlgoRSAv01}
|
|
default:
|
|
return []string{keyFormat}
|
|
}
|
|
}
|