123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182 |
- package sshd
- import (
- "fmt"
- "github.com/armon/go-radix"
- "github.com/sirupsen/logrus"
- "golang.org/x/crypto/ssh"
- "net"
- )
- type SSHServer struct {
- config *ssh.ServerConfig
- l *logrus.Entry
- // Map of user -> authorized keys
- trustedKeys map[string]map[string]bool
- // List of available commands
- helpCommand *Command
- commands *radix.Tree
- listener net.Listener
- conns map[int]*session
- counter int
- }
- // NewSSHServer creates a new ssh server rigged with default commands and prepares to listen
- func NewSSHServer(l *logrus.Entry) (*SSHServer, error) {
- s := &SSHServer{
- trustedKeys: make(map[string]map[string]bool),
- l: l,
- commands: radix.New(),
- conns: make(map[int]*session),
- }
- s.config = &ssh.ServerConfig{
- PublicKeyCallback: s.matchPubKey,
- //TODO: AuthLogCallback: s.authAttempt,
- //TODO: version string
- ServerVersion: fmt.Sprintf("SSH-2.0-Nebula???"),
- }
- s.RegisterCommand(&Command{
- Name: "help",
- ShortDescription: "prints available commands or help <command> for specific usage info",
- Callback: func(a interface{}, args []string, w StringWriter) error {
- return helpCallback(s.commands, args, w)
- },
- })
- return s, nil
- }
- func (s *SSHServer) SetHostKey(hostPrivateKey []byte) error {
- private, err := ssh.ParsePrivateKey(hostPrivateKey)
- if err != nil {
- return fmt.Errorf("failed to parse private key: %s", err)
- }
- s.config.AddHostKey(private)
- return nil
- }
- func (s *SSHServer) ClearAuthorizedKeys() {
- s.trustedKeys = make(map[string]map[string]bool)
- }
- // AddAuthorizedKey adds an ssh public key for a user
- func (s *SSHServer) AddAuthorizedKey(user, pubKey string) error {
- pk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(pubKey))
- if err != nil {
- return err
- }
- tk, ok := s.trustedKeys[user]
- if !ok {
- tk = make(map[string]bool)
- s.trustedKeys[user] = tk
- }
- tk[string(pk.Marshal())] = true
- s.l.WithField("sshKey", pubKey).WithField("sshUser", user).Info("Authorized ssh key")
- return nil
- }
- // RegisterCommand adds a command that can be run by a user, by default only `help` is available
- func (s *SSHServer) RegisterCommand(c *Command) {
- s.commands.Insert(c.Name, c)
- }
- // Run begins listening and accepting connections
- func (s *SSHServer) Run(addr string) error {
- var err error
- s.listener, err = net.Listen("tcp", addr)
- if err != nil {
- return err
- }
- s.l.WithField("sshListener", addr).Info("SSH server is listening")
- for {
- c, err := s.listener.Accept()
- if err != nil {
- s.l.WithError(err).Warn("Error in listener, shutting down")
- return nil
- }
- conn, chans, reqs, err := ssh.NewServerConn(c, s.config)
- fp := ""
- if conn != nil {
- fp = conn.Permissions.Extensions["fp"]
- }
- if err != nil {
- l := s.l.WithError(err).WithField("remoteAddress", c.RemoteAddr())
- if conn != nil {
- l = l.WithField("sshUser", conn.User())
- conn.Close()
- }
- if fp != "" {
- l = l.WithField("sshFingerprint", fp)
- }
- l.Warn("failed to handshake")
- continue
- }
- l := s.l.WithField("sshUser", conn.User())
- l.WithField("remoteAddress", c.RemoteAddr()).WithField("sshFingerprint", fp).Info("ssh user logged in")
- session := NewSession(s.commands, conn, chans, l.WithField("subsystem", "sshd.session"))
- s.counter++
- counter := s.counter
- s.conns[counter] = session
- go ssh.DiscardRequests(reqs)
- go func() {
- <-session.exitChan
- s.l.WithField("id", counter).Debug("closing conn")
- delete(s.conns, counter)
- }()
- }
- }
- func (s *SSHServer) Stop() {
- for _, c := range s.conns {
- c.Close()
- }
- if s.listener == nil {
- return
- }
- err := s.listener.Close()
- if err != nil {
- s.l.WithError(err).Warn("Failed to close the sshd listener")
- return
- }
- s.l.Info("SSH server stopped listening")
- return
- }
- func (s *SSHServer) matchPubKey(c ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
- pk := string(pubKey.Marshal())
- fp := ssh.FingerprintSHA256(pubKey)
- tk, ok := s.trustedKeys[c.User()]
- if !ok {
- return nil, fmt.Errorf("unknown user %s", c.User())
- }
- _, ok = tk[pk]
- if !ok {
- return nil, fmt.Errorf("unknown public key for %s (%s)", c.User(), fp)
- }
- return &ssh.Permissions{
- // Record the public key used for authentication.
- Extensions: map[string]string{
- "fp": fp,
- "user": c.User(),
- },
- }, nil
- }
|