|
|
|
@ -29,7 +29,6 @@ import (
|
|
|
|
|
"strconv"
|
|
|
|
|
"strings"
|
|
|
|
|
"sync"
|
|
|
|
|
"sync/atomic"
|
|
|
|
|
"time"
|
|
|
|
|
|
|
|
|
|
gossh "github.com/tailscale/golang-x-crypto/ssh"
|
|
|
|
@ -87,6 +86,21 @@ func init() {
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// attachSessionToConnIfNotShutdown ensures that srv is not shutdown before
|
|
|
|
|
// attaching the session to the conn. This ensures that once Shutdown is called,
|
|
|
|
|
// new sessions are not allowed and existing ones are cleaned up.
|
|
|
|
|
// It reports whether ss was attached to the conn.
|
|
|
|
|
func (srv *server) attachSessionToConnIfNotShutdown(ss *sshSession) bool {
|
|
|
|
|
srv.mu.Lock()
|
|
|
|
|
defer srv.mu.Unlock()
|
|
|
|
|
if srv.shutdownCalled {
|
|
|
|
|
// Do not start any new sessions.
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
ss.conn.attachSession(ss)
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (srv *server) trackActiveConn(c *conn, add bool) {
|
|
|
|
|
srv.mu.Lock()
|
|
|
|
|
defer srv.mu.Unlock()
|
|
|
|
@ -121,12 +135,7 @@ func (srv *server) Shutdown() {
|
|
|
|
|
srv.mu.Lock()
|
|
|
|
|
srv.shutdownCalled = true
|
|
|
|
|
for c := range srv.activeConns {
|
|
|
|
|
for _, s := range c.sessions {
|
|
|
|
|
s.ctx.CloseWithError(userVisibleError{
|
|
|
|
|
fmt.Sprintf("Tailscale SSH is shutting down.\r\n"),
|
|
|
|
|
context.Canceled,
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
c.Close()
|
|
|
|
|
}
|
|
|
|
|
srv.mu.Unlock()
|
|
|
|
|
srv.sessionWaitGroup.Wait()
|
|
|
|
@ -138,10 +147,7 @@ func (srv *server) OnPolicyChange() {
|
|
|
|
|
srv.mu.Lock()
|
|
|
|
|
defer srv.mu.Unlock()
|
|
|
|
|
for c := range srv.activeConns {
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ci := c.info
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
if ci == nil {
|
|
|
|
|
if c.info == nil {
|
|
|
|
|
// c.info is nil when the connection hasn't been authenticated yet.
|
|
|
|
|
// In that case, the connection will be terminated when it is.
|
|
|
|
|
continue
|
|
|
|
@ -152,28 +158,53 @@ func (srv *server) OnPolicyChange() {
|
|
|
|
|
|
|
|
|
|
// conn represents a single SSH connection and its associated
|
|
|
|
|
// ssh.Server.
|
|
|
|
|
//
|
|
|
|
|
// During the lifecycle of a connection, the following are called in order:
|
|
|
|
|
// Setup and discover server info
|
|
|
|
|
// - ServerConfigCallback
|
|
|
|
|
//
|
|
|
|
|
// Do the user auth
|
|
|
|
|
// - BannerHandler
|
|
|
|
|
// - NoClientAuthHandler
|
|
|
|
|
// - PublicKeyHandler (only if NoClientAuthHandler returns errPubKeyRequired)
|
|
|
|
|
//
|
|
|
|
|
// Once auth is done, the conn can be multiplexed with multiple sessions and
|
|
|
|
|
// channels concurrently. At which point any of the following can be called
|
|
|
|
|
// in any order.
|
|
|
|
|
// - c.handleSessionPostSSHAuth
|
|
|
|
|
// - c.mayForwardLocalPortTo followed by ssh.DirectTCPIPHandler
|
|
|
|
|
type conn struct {
|
|
|
|
|
*ssh.Server
|
|
|
|
|
srv *server
|
|
|
|
|
|
|
|
|
|
insecureSkipTailscaleAuth bool // used by tests.
|
|
|
|
|
|
|
|
|
|
connID string // ID that's shared with control
|
|
|
|
|
action0 *tailcfg.SSHAction // first matching action
|
|
|
|
|
srv *server
|
|
|
|
|
|
|
|
|
|
mu sync.Mutex // protects the following
|
|
|
|
|
localUser *user.User // set by checkAuth
|
|
|
|
|
userGroupIDs []string // set by checkAuth
|
|
|
|
|
info *sshConnInfo // set by setInfo
|
|
|
|
|
// idH is the RFC4253 sec8 hash H. It is used to identify the connection,
|
|
|
|
|
// and is shared among all sessions. It should not be shared outside
|
|
|
|
|
// process. It is confusingly referred to as SessionID by the gliderlabs/ssh
|
|
|
|
|
// library.
|
|
|
|
|
idH string
|
|
|
|
|
pubKey gossh.PublicKey // set by authorizeSession
|
|
|
|
|
finalAction *tailcfg.SSHAction // set by authorizeSession
|
|
|
|
|
finalActionErr error // set by authorizeSession
|
|
|
|
|
sessions []*sshSession
|
|
|
|
|
idH string
|
|
|
|
|
connID string // ID that's shared with control
|
|
|
|
|
|
|
|
|
|
noPubKeyPolicyAuthError error // set by BannerCallback
|
|
|
|
|
|
|
|
|
|
action0 *tailcfg.SSHAction // set by doPolicyAuth; first matching action
|
|
|
|
|
currentAction *tailcfg.SSHAction // set by doPolicyAuth, updated by resolveNextAction
|
|
|
|
|
finalAction *tailcfg.SSHAction // set by doPolicyAuth or resolveNextAction
|
|
|
|
|
finalActionErr error // set by doPolicyAuth or resolveNextAction
|
|
|
|
|
|
|
|
|
|
info *sshConnInfo // set by setInfo
|
|
|
|
|
localUser *user.User // set by doPolicyAuth
|
|
|
|
|
userGroupIDs []string // set by doPolicyAuth
|
|
|
|
|
pubKey gossh.PublicKey // set by doPolicyAuth
|
|
|
|
|
|
|
|
|
|
// mu protects the following fields.
|
|
|
|
|
//
|
|
|
|
|
// srv.mu should be acquired prior to mu.
|
|
|
|
|
// It is safe to just acquire mu, but unsafe to
|
|
|
|
|
// acquire mu and then srv.mu.
|
|
|
|
|
mu sync.Mutex // protects the following
|
|
|
|
|
sessions []*sshSession
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *conn) logf(format string, args ...any) {
|
|
|
|
@ -181,49 +212,108 @@ func (c *conn) logf(format string, args ...any) {
|
|
|
|
|
c.srv.logf(format, args...)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// PublicKeyHandler implements ssh.PublicKeyHandler is called by the
|
|
|
|
|
// ssh.Server when the client presents a public key.
|
|
|
|
|
func (c *conn) PublicKeyHandler(ctx ssh.Context, pubKey ssh.PublicKey) error {
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ci := c.info
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
if ci == nil {
|
|
|
|
|
return gossh.ErrDenied
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if err := c.checkAuth(pubKey); err != nil {
|
|
|
|
|
// TODO(maisem/bradfitz): surface the error here.
|
|
|
|
|
c.logf("rejecting SSH public key %s: %v", bytes.TrimSpace(gossh.MarshalAuthorizedKey(pubKey)), err)
|
|
|
|
|
return err
|
|
|
|
|
// isAuthorized returns nil if the connection is authorized to proceed.
|
|
|
|
|
func (c *conn) isAuthorized(ctx ssh.Context) error {
|
|
|
|
|
action := c.currentAction
|
|
|
|
|
for {
|
|
|
|
|
if action.Accept {
|
|
|
|
|
if c.pubKey != nil {
|
|
|
|
|
metricPublicKeyAccepts.Add(1)
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
if action.Reject || action.HoldAndDelegate == "" {
|
|
|
|
|
return gossh.ErrDenied
|
|
|
|
|
}
|
|
|
|
|
var err error
|
|
|
|
|
action, err = c.resolveNextAction(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
c.logf("accepting SSH public key %s", bytes.TrimSpace(gossh.MarshalAuthorizedKey(pubKey)))
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// errPubKeyRequired is returned by NoClientAuthCallback to make the client
|
|
|
|
|
// resort to public-key auth; not user visible.
|
|
|
|
|
var errPubKeyRequired = errors.New("ssh publickey required")
|
|
|
|
|
|
|
|
|
|
// BannerCallback implements ssh.BannerCallback.
|
|
|
|
|
// It is responsible for starting the policy evaluation, and returns
|
|
|
|
|
// the first message found in the action chain. It stops the evaluation
|
|
|
|
|
// on the first "accept" or "reject" action, and returns the message
|
|
|
|
|
// associated with that action (if any).
|
|
|
|
|
func (c *conn) BannerCallback(ctx ssh.Context) string {
|
|
|
|
|
if err := c.setInfo(ctx); err != nil {
|
|
|
|
|
c.logf("failed to get conninfo: %v", err)
|
|
|
|
|
return gossh.ErrDenied.Error()
|
|
|
|
|
}
|
|
|
|
|
if err := c.doPolicyAuth(ctx, nil /* no pub key */); err != nil {
|
|
|
|
|
// Stash the error for NoClientAuthCallback to return it.
|
|
|
|
|
c.noPubKeyPolicyAuthError = err
|
|
|
|
|
return ""
|
|
|
|
|
}
|
|
|
|
|
action := c.currentAction
|
|
|
|
|
for {
|
|
|
|
|
if action.Reject || action.Accept || action.Message != "" {
|
|
|
|
|
return action.Message
|
|
|
|
|
}
|
|
|
|
|
if action.HoldAndDelegate == "" {
|
|
|
|
|
// Do not send user-visible messages to the user.
|
|
|
|
|
// Let the SSH level authentication fail instead.
|
|
|
|
|
return ""
|
|
|
|
|
}
|
|
|
|
|
var err error
|
|
|
|
|
action, err = c.resolveNextAction(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return ""
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// NoClientAuthCallback implements gossh.NoClientAuthCallback and is called by
|
|
|
|
|
// the ssh.Server when the client first connects with the "none"
|
|
|
|
|
// authentication method.
|
|
|
|
|
func (c *conn) NoClientAuthCallback(cm gossh.ConnMetadata) (*gossh.Permissions, error) {
|
|
|
|
|
//
|
|
|
|
|
// It is responsible for continuing policy evaluation from BannerCallback (or
|
|
|
|
|
// starting it afresh). It returns an error if the policy evaluation fails, or
|
|
|
|
|
// if the decision is "reject"
|
|
|
|
|
//
|
|
|
|
|
// It either returns nil (accept) or errPubKeyRequired or gossh.ErrDenied
|
|
|
|
|
// (reject). The errors may be wrapped.
|
|
|
|
|
func (c *conn) NoClientAuthCallback(ctx ssh.Context) error {
|
|
|
|
|
if c.insecureSkipTailscaleAuth {
|
|
|
|
|
return nil, nil
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
if err := c.setInfo(cm); err != nil {
|
|
|
|
|
c.logf("failed to get conninfo: %v", err)
|
|
|
|
|
return nil, gossh.ErrDenied
|
|
|
|
|
if c.noPubKeyPolicyAuthError != nil {
|
|
|
|
|
return c.noPubKeyPolicyAuthError
|
|
|
|
|
} else if c.currentAction == nil {
|
|
|
|
|
// This should never happen, but if it does, we want to know.
|
|
|
|
|
panic("no current action")
|
|
|
|
|
}
|
|
|
|
|
return nil, c.checkAuth(nil /* no pub key */)
|
|
|
|
|
return c.isAuthorized(ctx)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// checkAuth verifies that conn can proceed with the specified (optional)
|
|
|
|
|
// PublicKeyHandler implements ssh.PublicKeyHandler is called by the
|
|
|
|
|
// ssh.Server when the client presents a public key.
|
|
|
|
|
func (c *conn) PublicKeyHandler(ctx ssh.Context, pubKey ssh.PublicKey) error {
|
|
|
|
|
if err := c.doPolicyAuth(ctx, pubKey); err != nil {
|
|
|
|
|
// TODO(maisem/bradfitz): surface the error here.
|
|
|
|
|
c.logf("rejecting SSH public key %s: %v", bytes.TrimSpace(gossh.MarshalAuthorizedKey(pubKey)), err)
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
if err := c.isAuthorized(ctx); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
c.logf("accepting SSH public key %s", bytes.TrimSpace(gossh.MarshalAuthorizedKey(pubKey)))
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// doPolicyAuth verifies that conn can proceed with the specified (optional)
|
|
|
|
|
// pubKey. It returns nil if the matching policy action is Accept or
|
|
|
|
|
// HoldAndDelegate. If pubKey is nil, there was no policy match but there is a
|
|
|
|
|
// policy that might match a public key it returns errPubKeyRequired. Otherwise,
|
|
|
|
|
// it returns gossh.ErrDenied possibly wrapped in gossh.WithBannerError.
|
|
|
|
|
func (c *conn) checkAuth(pubKey ssh.PublicKey) error {
|
|
|
|
|
func (c *conn) doPolicyAuth(ctx ssh.Context, pubKey ssh.PublicKey) error {
|
|
|
|
|
a, localUser, err := c.evaluatePolicy(pubKey)
|
|
|
|
|
if err != nil {
|
|
|
|
|
if pubKey == nil && c.havePubKeyPolicy() {
|
|
|
|
@ -232,7 +322,12 @@ func (c *conn) checkAuth(pubKey ssh.PublicKey) error {
|
|
|
|
|
return fmt.Errorf("%w: %v", gossh.ErrDenied, err)
|
|
|
|
|
}
|
|
|
|
|
c.action0 = a
|
|
|
|
|
c.currentAction = a
|
|
|
|
|
c.pubKey = pubKey
|
|
|
|
|
if a.Accept || a.HoldAndDelegate != "" {
|
|
|
|
|
if a.Accept {
|
|
|
|
|
c.finalAction = a
|
|
|
|
|
}
|
|
|
|
|
lu, err := user.Lookup(localUser)
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.logf("failed to lookup %v: %v", localUser, err)
|
|
|
|
@ -245,13 +340,12 @@ func (c *conn) checkAuth(pubKey ssh.PublicKey) error {
|
|
|
|
|
if err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
c.userGroupIDs = gids
|
|
|
|
|
c.localUser = lu
|
|
|
|
|
return nil
|
|
|
|
|
}
|
|
|
|
|
if a.Reject {
|
|
|
|
|
c.finalAction = a
|
|
|
|
|
err := gossh.ErrDenied
|
|
|
|
|
if a.Message != "" {
|
|
|
|
|
err = gossh.WithBannerError{
|
|
|
|
@ -269,9 +363,8 @@ func (c *conn) checkAuth(pubKey ssh.PublicKey) error {
|
|
|
|
|
func (c *conn) ServerConfig(ctx ssh.Context) *gossh.ServerConfig {
|
|
|
|
|
return &gossh.ServerConfig{
|
|
|
|
|
// OpenSSH presents this on failure as `Permission denied (tailscale).`
|
|
|
|
|
ImplicitAuthMethod: "tailscale",
|
|
|
|
|
NoClientAuth: true, // required for the NoClientAuthCallback to run
|
|
|
|
|
NoClientAuthCallback: c.NoClientAuthCallback,
|
|
|
|
|
ImplicitAuthMethod: "tailscale",
|
|
|
|
|
NoClientAuth: true, // required for the NoClientAuthCallback to run
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -289,23 +382,25 @@ func (srv *server) newConn() (*conn, error) {
|
|
|
|
|
now := srv.now()
|
|
|
|
|
c.connID = fmt.Sprintf("ssh-conn-%s-%02x", now.UTC().Format("20060102T150405"), randBytes(5))
|
|
|
|
|
c.Server = &ssh.Server{
|
|
|
|
|
Version: "Tailscale",
|
|
|
|
|
Handler: c.handleSessionPostSSHAuth,
|
|
|
|
|
RequestHandlers: map[string]ssh.RequestHandler{},
|
|
|
|
|
Version: "Tailscale",
|
|
|
|
|
ServerConfigCallback: c.ServerConfig,
|
|
|
|
|
|
|
|
|
|
BannerHandler: c.BannerCallback,
|
|
|
|
|
NoClientAuthHandler: c.NoClientAuthCallback,
|
|
|
|
|
PublicKeyHandler: c.PublicKeyHandler,
|
|
|
|
|
|
|
|
|
|
Handler: c.handleSessionPostSSHAuth,
|
|
|
|
|
LocalPortForwardingCallback: c.mayForwardLocalPortTo,
|
|
|
|
|
SubsystemHandlers: map[string]ssh.SubsystemHandler{
|
|
|
|
|
"sftp": c.handleSessionPostSSHAuth,
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
// Note: the direct-tcpip channel handler and LocalPortForwardingCallback
|
|
|
|
|
// only adds support for forwarding ports from the local machine.
|
|
|
|
|
// TODO(maisem/bradfitz): add remote port forwarding support.
|
|
|
|
|
ChannelHandlers: map[string]ssh.ChannelHandler{
|
|
|
|
|
"direct-tcpip": ssh.DirectTCPIPHandler,
|
|
|
|
|
},
|
|
|
|
|
LocalPortForwardingCallback: c.mayForwardLocalPortTo,
|
|
|
|
|
|
|
|
|
|
PublicKeyHandler: c.PublicKeyHandler,
|
|
|
|
|
ServerConfigCallback: c.ServerConfig,
|
|
|
|
|
RequestHandlers: map[string]ssh.RequestHandler{},
|
|
|
|
|
}
|
|
|
|
|
ss := c.Server
|
|
|
|
|
for k, v := range ssh.DefaultRequestHandlers {
|
|
|
|
@ -341,10 +436,7 @@ func (c *conn) mayForwardLocalPortTo(ctx ssh.Context, destinationHost string, de
|
|
|
|
|
// havePubKeyPolicy reports whether any policy rule may provide access by means
|
|
|
|
|
// of a ssh.PublicKey.
|
|
|
|
|
func (c *conn) havePubKeyPolicy() bool {
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ci := c.info
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
if ci == nil {
|
|
|
|
|
if c.info == nil {
|
|
|
|
|
panic("havePubKeyPolicy called before setInfo")
|
|
|
|
|
}
|
|
|
|
|
// Is there any rule that looks like it'd require a public key for this
|
|
|
|
@ -357,7 +449,7 @@ func (c *conn) havePubKeyPolicy() bool {
|
|
|
|
|
if c.ruleExpired(r) {
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
if mapLocalUser(r.SSHUsers, ci.sshUser) == "" {
|
|
|
|
|
if mapLocalUser(r.SSHUsers, c.info.sshUser) == "" {
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
for _, p := range r.Principals {
|
|
|
|
@ -416,11 +508,11 @@ func toIPPort(a net.Addr) (ipp netip.AddrPort) {
|
|
|
|
|
|
|
|
|
|
// connInfo returns a populated sshConnInfo from the provided arguments,
|
|
|
|
|
// validating only that they represent a known Tailscale identity.
|
|
|
|
|
func (c *conn) setInfo(cm gossh.ConnMetadata) error {
|
|
|
|
|
func (c *conn) setInfo(ctx ssh.Context) error {
|
|
|
|
|
ci := &sshConnInfo{
|
|
|
|
|
sshUser: cm.User(),
|
|
|
|
|
src: toIPPort(cm.RemoteAddr()),
|
|
|
|
|
dst: toIPPort(cm.LocalAddr()),
|
|
|
|
|
sshUser: ctx.User(),
|
|
|
|
|
src: toIPPort(ctx.RemoteAddr()),
|
|
|
|
|
dst: toIPPort(ctx.LocalAddr()),
|
|
|
|
|
}
|
|
|
|
|
if !tsaddr.IsTailscaleIP(ci.dst.Addr()) {
|
|
|
|
|
return fmt.Errorf("tailssh: rejecting non-Tailscale local address %v", ci.dst)
|
|
|
|
@ -432,11 +524,10 @@ func (c *conn) setInfo(cm gossh.ConnMetadata) error {
|
|
|
|
|
if !ok {
|
|
|
|
|
return fmt.Errorf("unknown Tailscale identity from src %v", ci.src)
|
|
|
|
|
}
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
ci.node = node
|
|
|
|
|
ci.uprof = &uprof
|
|
|
|
|
|
|
|
|
|
c.idH = ctx.SessionID()
|
|
|
|
|
c.info = ci
|
|
|
|
|
c.logf("handling conn: %v", ci.String())
|
|
|
|
|
return nil
|
|
|
|
@ -554,50 +645,10 @@ func (srv *server) fetchPublicKeysURL(url string) ([]string, error) {
|
|
|
|
|
return lines, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *conn) authorizeSession(s ssh.Session) (_ *contextReader, ok bool) {
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
idH := s.Context().(ssh.Context).SessionID()
|
|
|
|
|
if c.idH == "" {
|
|
|
|
|
c.idH = idH
|
|
|
|
|
} else if c.idH != idH {
|
|
|
|
|
c.logf("ssh: session ID mismatch: %q != %q", c.idH, idH)
|
|
|
|
|
s.Exit(1)
|
|
|
|
|
return nil, false
|
|
|
|
|
}
|
|
|
|
|
cr := &contextReader{r: s}
|
|
|
|
|
action, err := c.resolveTerminalActionLocked(s, cr)
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.logf("resolveTerminalAction: %v", err)
|
|
|
|
|
io.WriteString(s.Stderr(), "Access Denied: failed during authorization check.\r\n")
|
|
|
|
|
s.Exit(1)
|
|
|
|
|
return nil, false
|
|
|
|
|
}
|
|
|
|
|
if action.Reject || !action.Accept {
|
|
|
|
|
c.logf("access denied for %v", c.info.uprof.LoginName)
|
|
|
|
|
s.Exit(1)
|
|
|
|
|
return nil, false
|
|
|
|
|
}
|
|
|
|
|
return cr, true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// handleSessionPostSSHAuth runs an SSH session after the SSH-level authentication,
|
|
|
|
|
// but not necessarily before all the Tailscale-level extra verification has
|
|
|
|
|
// completed. It also handles SFTP requests.
|
|
|
|
|
func (c *conn) handleSessionPostSSHAuth(s ssh.Session) {
|
|
|
|
|
// Now that we have passed the SSH-level authentication, we can start the
|
|
|
|
|
// Tailscale-level extra verification. This means that we are going to
|
|
|
|
|
// evaluate the policy provided by control against the incoming SSH session.
|
|
|
|
|
cr, ok := c.authorizeSession(s)
|
|
|
|
|
if !ok {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
if cr.HasOutstandingRead() {
|
|
|
|
|
// There was some buffered input while we were waiting for the policy
|
|
|
|
|
// decision.
|
|
|
|
|
s = contextReaderSession{s, cr}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Do this check after auth, but before starting the session.
|
|
|
|
|
switch s.Subsystem() {
|
|
|
|
|
case "sftp", "":
|
|
|
|
@ -609,45 +660,35 @@ func (c *conn) handleSessionPostSSHAuth(s ssh.Session) {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ss := c.newSSHSession(s)
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ss.logf("handling new SSH connection from %v (%v) to ssh-user %q", c.info.uprof.LoginName, c.info.src.Addr(), c.localUser.Username)
|
|
|
|
|
ss.logf("access granted to %v as ssh-user %q", c.info.uprof.LoginName, c.localUser.Username)
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
ss.run()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// resolveTerminalActionLocked either returns action0 (if it's Accept or Reject) or
|
|
|
|
|
// else loops, fetching new SSHActions from the control plane.
|
|
|
|
|
//
|
|
|
|
|
// Any action with a Message in the chain will be printed to s.
|
|
|
|
|
//
|
|
|
|
|
// The returned SSHAction will be either Reject or Accept.
|
|
|
|
|
//
|
|
|
|
|
// c.mu must be held.
|
|
|
|
|
func (c *conn) resolveTerminalActionLocked(s ssh.Session, cr *contextReader) (action *tailcfg.SSHAction, err error) {
|
|
|
|
|
// resolveNextAction starts at c.currentAction and makes it way through the
|
|
|
|
|
// action chain one step at a time. An action without a HoldAndDelegate is
|
|
|
|
|
// considered the final action. Once a final action is reached, this function
|
|
|
|
|
// will keep returning that action. It updates c.currentAction to the next
|
|
|
|
|
// action in the chain. When the final action is reached, it also sets
|
|
|
|
|
// c.finalAction to the final action.
|
|
|
|
|
func (c *conn) resolveNextAction(sctx ssh.Context) (action *tailcfg.SSHAction, err error) {
|
|
|
|
|
if c.finalAction != nil || c.finalActionErr != nil {
|
|
|
|
|
return c.finalAction, c.finalActionErr
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if s.PublicKey() != nil {
|
|
|
|
|
metricPublicKeyConnections.Add(1)
|
|
|
|
|
}
|
|
|
|
|
defer func() {
|
|
|
|
|
c.finalAction = action
|
|
|
|
|
c.finalActionErr = err
|
|
|
|
|
c.pubKey = s.PublicKey()
|
|
|
|
|
if c.pubKey != nil && action.Accept {
|
|
|
|
|
metricPublicKeyAccepts.Add(1)
|
|
|
|
|
if action != nil {
|
|
|
|
|
c.currentAction = action
|
|
|
|
|
if action.Accept || action.Reject {
|
|
|
|
|
c.finalAction = action
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if err != nil {
|
|
|
|
|
c.finalActionErr = err
|
|
|
|
|
}
|
|
|
|
|
}()
|
|
|
|
|
action = c.action0
|
|
|
|
|
|
|
|
|
|
var awaitReadOnce sync.Once // to start Reads on cr
|
|
|
|
|
var sawInterrupt atomic.Bool
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
|
defer wg.Wait() // wait for awaitIntrOnce's goroutine to exit
|
|
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(s.Context())
|
|
|
|
|
ctx, cancel := context.WithCancel(sctx)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
// Loop processing/fetching Actions until one reaches a
|
|
|
|
@ -656,56 +697,28 @@ func (c *conn) resolveTerminalActionLocked(s ssh.Session, cr *contextReader) (ac
|
|
|
|
|
// done (client disconnect) or its 30 minute timeout passes.
|
|
|
|
|
// (Which is a long time for somebody to see login
|
|
|
|
|
// instructions and go to a URL to do something.)
|
|
|
|
|
for {
|
|
|
|
|
if action.Message != "" {
|
|
|
|
|
io.WriteString(s.Stderr(), strings.Replace(action.Message, "\n", "\r\n", -1))
|
|
|
|
|
}
|
|
|
|
|
if action.Accept || action.Reject {
|
|
|
|
|
if action.Reject {
|
|
|
|
|
metricTerminalReject.Add(1)
|
|
|
|
|
} else {
|
|
|
|
|
metricTerminalAccept.Add(1)
|
|
|
|
|
}
|
|
|
|
|
return action, nil
|
|
|
|
|
}
|
|
|
|
|
url := action.HoldAndDelegate
|
|
|
|
|
if url == "" {
|
|
|
|
|
metricTerminalMalformed.Add(1)
|
|
|
|
|
return nil, errors.New("reached Action that lacked Accept, Reject, and HoldAndDelegate")
|
|
|
|
|
}
|
|
|
|
|
metricHolds.Add(1)
|
|
|
|
|
awaitReadOnce.Do(func() {
|
|
|
|
|
wg.Add(1)
|
|
|
|
|
go func() {
|
|
|
|
|
defer wg.Done()
|
|
|
|
|
buf := make([]byte, 1)
|
|
|
|
|
for {
|
|
|
|
|
n, err := cr.ReadContext(ctx, buf)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
if n > 0 && buf[0] == 0x03 { // Ctrl-C
|
|
|
|
|
sawInterrupt.Store(true)
|
|
|
|
|
s.Stderr().Write([]byte("Canceled.\r\n"))
|
|
|
|
|
s.Exit(1)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}()
|
|
|
|
|
})
|
|
|
|
|
url = c.expandDelegateURLLocked(url)
|
|
|
|
|
var err error
|
|
|
|
|
action, err = c.fetchSSHAction(ctx, url)
|
|
|
|
|
if err != nil {
|
|
|
|
|
if sawInterrupt.Load() {
|
|
|
|
|
metricTerminalInterrupt.Add(1)
|
|
|
|
|
return nil, fmt.Errorf("aborted by user")
|
|
|
|
|
} else {
|
|
|
|
|
metricTerminalFetchError.Add(1)
|
|
|
|
|
}
|
|
|
|
|
return nil, fmt.Errorf("fetching SSHAction from %s: %w", url, err)
|
|
|
|
|
action = c.currentAction
|
|
|
|
|
if action.Accept || action.Reject {
|
|
|
|
|
if action.Reject {
|
|
|
|
|
metricTerminalReject.Add(1)
|
|
|
|
|
} else {
|
|
|
|
|
metricTerminalAccept.Add(1)
|
|
|
|
|
}
|
|
|
|
|
return action, nil
|
|
|
|
|
}
|
|
|
|
|
url := action.HoldAndDelegate
|
|
|
|
|
if url == "" {
|
|
|
|
|
metricTerminalMalformed.Add(1)
|
|
|
|
|
return nil, errors.New("reached Action that lacked Accept, Reject, and HoldAndDelegate")
|
|
|
|
|
}
|
|
|
|
|
metricHolds.Add(1)
|
|
|
|
|
url = c.expandDelegateURLLocked(url)
|
|
|
|
|
nextAction, err := c.fetchSSHAction(ctx, url)
|
|
|
|
|
if err != nil {
|
|
|
|
|
metricTerminalFetchError.Add(1)
|
|
|
|
|
return nil, fmt.Errorf("fetching SSHAction from %s: %w", url, err)
|
|
|
|
|
}
|
|
|
|
|
return nextAction, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (c *conn) expandDelegateURLLocked(actionURL string) string {
|
|
|
|
@ -732,12 +745,10 @@ func (c *conn) expandPublicKeyURL(pubKeyURL string) string {
|
|
|
|
|
}
|
|
|
|
|
var localPart string
|
|
|
|
|
var loginName string
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
if c.info.uprof != nil {
|
|
|
|
|
loginName = c.info.uprof.LoginName
|
|
|
|
|
localPart, _, _ = strings.Cut(loginName, "@")
|
|
|
|
|
}
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
return strings.NewReplacer(
|
|
|
|
|
"$LOGINNAME_EMAIL", loginName,
|
|
|
|
|
"$LOGINNAME_LOCALPART", localPart,
|
|
|
|
@ -793,8 +804,6 @@ func (c *conn) isStillValid() bool {
|
|
|
|
|
if !a.Accept && a.HoldAndDelegate == "" {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
return c.localUser.Username == localUser
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -806,6 +815,8 @@ func (c *conn) checkStillValid() {
|
|
|
|
|
}
|
|
|
|
|
metricPolicyChangeKick.Add(1)
|
|
|
|
|
c.logf("session no longer valid per new SSH policy; closing")
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
for _, s := range c.sessions {
|
|
|
|
|
s.ctx.CloseWithError(userVisibleError{
|
|
|
|
|
fmt.Sprintf("Access revoked.\r\n"),
|
|
|
|
@ -876,21 +887,22 @@ func (ss *sshSession) killProcessOnContextDone() {
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// startSessionLocked registers ss as an active session.
|
|
|
|
|
// It must be called with srv.mu held.
|
|
|
|
|
func (c *conn) startSessionLocked(ss *sshSession) {
|
|
|
|
|
// attachSession registers ss as an active session.
|
|
|
|
|
func (c *conn) attachSession(ss *sshSession) {
|
|
|
|
|
c.srv.sessionWaitGroup.Add(1)
|
|
|
|
|
if ss.sharedID == "" {
|
|
|
|
|
panic("empty sharedID")
|
|
|
|
|
}
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
c.sessions = append(c.sessions, ss)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// endSession unregisters s from the list of active sessions.
|
|
|
|
|
func (c *conn) endSession(ss *sshSession) {
|
|
|
|
|
// detachSession unregisters s from the list of active sessions.
|
|
|
|
|
func (c *conn) detachSession(ss *sshSession) {
|
|
|
|
|
defer c.srv.sessionWaitGroup.Done()
|
|
|
|
|
c.srv.mu.Lock()
|
|
|
|
|
defer c.srv.mu.Unlock()
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
defer c.mu.Unlock()
|
|
|
|
|
for i, s := range c.sessions {
|
|
|
|
|
if s == ss {
|
|
|
|
|
c.sessions = append(c.sessions[:i], c.sessions[i+1:]...)
|
|
|
|
@ -960,22 +972,16 @@ func (ss *sshSession) run() {
|
|
|
|
|
metricActiveSessions.Add(1)
|
|
|
|
|
defer metricActiveSessions.Add(-1)
|
|
|
|
|
defer ss.ctx.CloseWithError(errSessionDone)
|
|
|
|
|
srv := ss.conn.srv
|
|
|
|
|
|
|
|
|
|
srv.mu.Lock()
|
|
|
|
|
if srv.shutdownCalled {
|
|
|
|
|
srv.mu.Unlock()
|
|
|
|
|
// Do not start any new sessions.
|
|
|
|
|
if attached := ss.conn.srv.attachSessionToConnIfNotShutdown(ss); !attached {
|
|
|
|
|
fmt.Fprintf(ss, "Tailscale SSH is shutting down\r\n")
|
|
|
|
|
ss.Exit(1)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
ss.conn.startSessionLocked(ss)
|
|
|
|
|
lu := ss.conn.localUser
|
|
|
|
|
localUser := lu.Username
|
|
|
|
|
srv.mu.Unlock()
|
|
|
|
|
defer ss.conn.detachSession(ss)
|
|
|
|
|
|
|
|
|
|
defer ss.conn.endSession(ss)
|
|
|
|
|
lu := ss.conn.localUser
|
|
|
|
|
logf := ss.logf
|
|
|
|
|
|
|
|
|
|
if ss.conn.finalAction.SessionDuration != 0 {
|
|
|
|
|
t := time.AfterFunc(ss.conn.finalAction.SessionDuration, func() {
|
|
|
|
@ -987,11 +993,9 @@ func (ss *sshSession) run() {
|
|
|
|
|
defer t.Stop()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
logf := ss.logf
|
|
|
|
|
|
|
|
|
|
if euid := os.Geteuid(); euid != 0 {
|
|
|
|
|
if lu.Uid != fmt.Sprint(euid) {
|
|
|
|
|
ss.logf("can't switch to user %q from process euid %v", localUser, euid)
|
|
|
|
|
ss.logf("can't switch to user %q from process euid %v", lu.Username, euid)
|
|
|
|
|
fmt.Fprintf(ss, "can't switch user\r\n")
|
|
|
|
|
ss.Exit(1)
|
|
|
|
|
return
|
|
|
|
@ -1141,10 +1145,7 @@ func (c *conn) matchRule(r *tailcfg.SSHRule, pubKey gossh.PublicKey) (a *tailcfg
|
|
|
|
|
if c == nil {
|
|
|
|
|
return nil, "", errInvalidConn
|
|
|
|
|
}
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ci := c.info
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
if ci == nil {
|
|
|
|
|
if c.info == nil {
|
|
|
|
|
c.logf("invalid connection state")
|
|
|
|
|
return nil, "", errInvalidConn
|
|
|
|
|
}
|
|
|
|
@ -1161,7 +1162,7 @@ func (c *conn) matchRule(r *tailcfg.SSHRule, pubKey gossh.PublicKey) (a *tailcfg
|
|
|
|
|
// For all but Reject rules, SSHUsers is required.
|
|
|
|
|
// If SSHUsers is nil or empty, mapLocalUser will return an
|
|
|
|
|
// empty string anyway.
|
|
|
|
|
localUser = mapLocalUser(r.SSHUsers, ci.sshUser)
|
|
|
|
|
localUser = mapLocalUser(r.SSHUsers, c.info.sshUser)
|
|
|
|
|
if localUser == "" {
|
|
|
|
|
return nil, "", errUserMatch
|
|
|
|
|
}
|
|
|
|
@ -1210,9 +1211,7 @@ func (c *conn) principalMatches(p *tailcfg.SSHPrincipal, pubKey gossh.PublicKey)
|
|
|
|
|
// that match the Tailscale identity match (Node, NodeIP, UserLogin, Any).
|
|
|
|
|
// This function does not consider PubKeys.
|
|
|
|
|
func (c *conn) principalMatchesTailscaleIdentity(p *tailcfg.SSHPrincipal) bool {
|
|
|
|
|
c.mu.Lock()
|
|
|
|
|
ci := c.info
|
|
|
|
|
c.mu.Unlock()
|
|
|
|
|
if p.Any {
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|