mirror of
https://github.com/nwtgck/handy-sshd.git
synced 2025-06-08 07:03:04 +00:00
Merge branch 'feature/direct-streamlocal' into develop
This commit is contained in:
commit
4b7793e445
7 changed files with 176 additions and 32 deletions
44
README.md
44
README.md
|
@ -41,20 +41,29 @@ handy-sshd --unix-socket /tmp/my-unix-socket --user "john:"
|
||||||
```
|
```
|
||||||
|
|
||||||
## Permissions
|
## Permissions
|
||||||
**All permissions are allowed when nothing is specified.** There are some permissions.
|
There are several permissions:
|
||||||
|
* --allow-direct-streamlocal
|
||||||
* --allow-direct-tcpip
|
* --allow-direct-tcpip
|
||||||
* --allow-execute
|
* --allow-execute
|
||||||
* --allow-sftp
|
* --allow-sftp
|
||||||
* --allow-tcpip-forward
|
* --allow-tcpip-forward
|
||||||
|
|
||||||
Specifying `--allow-direct-tcpip` and `--allow-execute` for example allows only them.
|
**All permissions are allowed when nothing is specified.** The log shows "allowed: " and "NOT allowed: " permissions as follows:
|
||||||
The log shows "allowed: " and "NOT allowed: " permissions as follows.
|
|
||||||
|
```console
|
||||||
|
$ handy-sshd --user "john:"
|
||||||
|
2023/08/11 09:42:05 INFO listening on :2222...
|
||||||
|
2023/08/11 09:42:05 INFO allowed: "tcpip-forward", "direct-tcpip", "execute", "sftp", "direct-streamlocal"
|
||||||
|
2023/08/11 09:42:05 INFO NOT allowed: none
|
||||||
|
```
|
||||||
|
|
||||||
|
For example, specifying `--allow-direct-tcpip` and `--allow-execute` allows only them:
|
||||||
|
|
||||||
```console
|
```console
|
||||||
$ handy-sshd --user "john:" --allow-direct-tcpip --allow-execute
|
$ handy-sshd --user "john:" --allow-direct-tcpip --allow-execute
|
||||||
2023/08/09 20:49:35 INFO listening on :2222...
|
2023/08/11 09:38:58 INFO listening on :2222...
|
||||||
2023/08/09 20:49:35 INFO allowed: "direct-tcpip", "execute"
|
2023/08/11 09:38:58 INFO allowed: "direct-tcpip", "execute"
|
||||||
2023/08/09 20:49:35 INFO NOT allowed: "tcpip-forward", "sftp"
|
2023/08/11 09:38:58 INFO NOT allowed: "tcpip-forward", "sftp", "direct-streamlocal"
|
||||||
```
|
```
|
||||||
|
|
||||||
## --help
|
## --help
|
||||||
|
@ -66,15 +75,16 @@ Usage:
|
||||||
handy-sshd [flags]
|
handy-sshd [flags]
|
||||||
|
|
||||||
Flags:
|
Flags:
|
||||||
--allow-direct-tcpip client can use local forwarding and SOCKS proxy
|
--allow-direct-streamlocal client can use Unix domain socket local forwarding
|
||||||
--allow-execute client can use shell/interactive shell
|
--allow-direct-tcpip client can use local forwarding and SOCKS proxy
|
||||||
--allow-sftp client can use SFTP and SSHFS
|
--allow-execute client can use shell/interactive shell
|
||||||
--allow-tcpip-forward client can use remote forwarding
|
--allow-sftp client can use SFTP and SSHFS
|
||||||
-h, --help help for handy-sshd
|
--allow-tcpip-forward client can use remote forwarding
|
||||||
--host string SSH server host (e.g. 127.0.0.1)
|
-h, --help help for handy-sshd
|
||||||
-p, --port uint16 SSH server port (default 2222)
|
--host string SSH server host (e.g. 127.0.0.1)
|
||||||
--shell string Shell
|
-p, --port uint16 SSH server port (default 2222)
|
||||||
--unix-socket string Unix-domain socket
|
--shell string Shell
|
||||||
--user stringArray SSH user name (e.g. "john:mypassword")
|
--unix-socket string Unix domain socket
|
||||||
-v, --version show version
|
--user stringArray SSH user name (e.g. "john:mypassword")
|
||||||
|
-v, --version show version
|
||||||
```
|
```
|
||||||
|
|
24
cmd/root.go
24
cmd/root.go
|
@ -22,10 +22,11 @@ type flagType struct {
|
||||||
sshShell string
|
sshShell string
|
||||||
sshUsers []string
|
sshUsers []string
|
||||||
|
|
||||||
allowTcpipForward bool
|
allowTcpipForward bool
|
||||||
allowDirectTcpip bool
|
allowDirectTcpip bool
|
||||||
allowExecute bool
|
allowExecute bool
|
||||||
allowSftp bool
|
allowSftp bool
|
||||||
|
allowDirectStreamlocal bool
|
||||||
}
|
}
|
||||||
|
|
||||||
type permissionFlagType = struct {
|
type permissionFlagType = struct {
|
||||||
|
@ -49,6 +50,7 @@ func RootCmd() *cobra.Command {
|
||||||
{name: "direct-tcpip", flagPtr: &flag.allowDirectTcpip},
|
{name: "direct-tcpip", flagPtr: &flag.allowDirectTcpip},
|
||||||
{name: "execute", flagPtr: &flag.allowExecute},
|
{name: "execute", flagPtr: &flag.allowExecute},
|
||||||
{name: "sftp", flagPtr: &flag.allowSftp},
|
{name: "sftp", flagPtr: &flag.allowSftp},
|
||||||
|
{name: "direct-streamlocal", flagPtr: &flag.allowDirectStreamlocal},
|
||||||
}
|
}
|
||||||
rootCmd := cobra.Command{
|
rootCmd := cobra.Command{
|
||||||
Use: os.Args[0],
|
Use: os.Args[0],
|
||||||
|
@ -64,7 +66,7 @@ func RootCmd() *cobra.Command {
|
||||||
rootCmd.PersistentFlags().StringVarP(&flag.sshHost, "host", "", "", "SSH server host (e.g. 127.0.0.1)")
|
rootCmd.PersistentFlags().StringVarP(&flag.sshHost, "host", "", "", "SSH server host (e.g. 127.0.0.1)")
|
||||||
rootCmd.PersistentFlags().Uint16VarP(&flag.sshPort, "port", "p", 2222, "SSH server port")
|
rootCmd.PersistentFlags().Uint16VarP(&flag.sshPort, "port", "p", 2222, "SSH server port")
|
||||||
// NOTE: long name 'unix-socket' is from curl (ref: https://curl.se/docs/manpage.html)
|
// NOTE: long name 'unix-socket' is from curl (ref: https://curl.se/docs/manpage.html)
|
||||||
rootCmd.PersistentFlags().StringVarP(&flag.sshUnixSocket, "unix-socket", "", "", "Unix-domain socket")
|
rootCmd.PersistentFlags().StringVarP(&flag.sshUnixSocket, "unix-socket", "", "", "Unix domain socket")
|
||||||
rootCmd.PersistentFlags().StringVarP(&flag.sshShell, "shell", "", "", "Shell")
|
rootCmd.PersistentFlags().StringVarP(&flag.sshShell, "shell", "", "", "Shell")
|
||||||
//rootCmd.PersistentFlags().StringVar(&flag.dnsServer, "dns-server", "", "DNS server (e.g. 1.1.1.1:53)")
|
//rootCmd.PersistentFlags().StringVar(&flag.dnsServer, "dns-server", "", "DNS server (e.g. 1.1.1.1:53)")
|
||||||
rootCmd.PersistentFlags().StringArrayVarP(&flag.sshUsers, "user", "", nil, `SSH user name (e.g. "john:mypassword")`)
|
rootCmd.PersistentFlags().StringArrayVarP(&flag.sshUsers, "user", "", nil, `SSH user name (e.g. "john:mypassword")`)
|
||||||
|
@ -74,6 +76,7 @@ func RootCmd() *cobra.Command {
|
||||||
rootCmd.PersistentFlags().BoolVarP(&flag.allowDirectTcpip, "allow-direct-tcpip", "", false, "client can use local forwarding and SOCKS proxy")
|
rootCmd.PersistentFlags().BoolVarP(&flag.allowDirectTcpip, "allow-direct-tcpip", "", false, "client can use local forwarding and SOCKS proxy")
|
||||||
rootCmd.PersistentFlags().BoolVarP(&flag.allowExecute, "allow-execute", "", false, "client can use shell/interactive shell")
|
rootCmd.PersistentFlags().BoolVarP(&flag.allowExecute, "allow-execute", "", false, "client can use shell/interactive shell")
|
||||||
rootCmd.PersistentFlags().BoolVarP(&flag.allowSftp, "allow-sftp", "", false, "client can use SFTP and SSHFS")
|
rootCmd.PersistentFlags().BoolVarP(&flag.allowSftp, "allow-sftp", "", false, "client can use SFTP and SSHFS")
|
||||||
|
rootCmd.PersistentFlags().BoolVarP(&flag.allowDirectStreamlocal, "allow-direct-streamlocal", "", false, "client can use Unix domain socket local forwarding")
|
||||||
|
|
||||||
return &rootCmd
|
return &rootCmd
|
||||||
}
|
}
|
||||||
|
@ -99,11 +102,12 @@ func rootRunEWithExtra(cmd *cobra.Command, args []string, flag *flagType, allPer
|
||||||
}
|
}
|
||||||
|
|
||||||
sshServer := &handy_sshd.Server{
|
sshServer := &handy_sshd.Server{
|
||||||
Logger: logger,
|
Logger: logger,
|
||||||
AllowTcpipForward: flag.allowTcpipForward,
|
AllowTcpipForward: flag.allowTcpipForward,
|
||||||
AllowDirectTcpip: flag.allowDirectTcpip,
|
AllowDirectTcpip: flag.allowDirectTcpip,
|
||||||
AllowExecute: flag.allowExecute,
|
AllowExecute: flag.allowExecute,
|
||||||
AllowSftp: flag.allowSftp,
|
AllowSftp: flag.allowSftp,
|
||||||
|
AllowDirectStreamlocal: flag.allowDirectStreamlocal,
|
||||||
}
|
}
|
||||||
var sshUsers []sshUser
|
var sshUsers []sshUser
|
||||||
for _, u := range flag.sshUsers {
|
for _, u := range flag.sshUsers {
|
||||||
|
|
|
@ -60,6 +60,7 @@ func TestAllPermissionsAllowed(t *testing.T) {
|
||||||
assertExec(t, client)
|
assertExec(t, client)
|
||||||
assertPtyTerminal(t, client)
|
assertPtyTerminal(t, client)
|
||||||
assertSftp(t, client)
|
assertSftp(t, client)
|
||||||
|
assertUnixLocalPortForwarding(t, client)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestEmptyPassword(t *testing.T) {
|
func TestEmptyPassword(t *testing.T) {
|
||||||
|
@ -166,6 +167,7 @@ func TestAllowExecute(t *testing.T) {
|
||||||
assertExec(t, client)
|
assertExec(t, client)
|
||||||
assertPtyTerminal(t, client)
|
assertPtyTerminal(t, client)
|
||||||
assertNoSftp(t, client)
|
assertNoSftp(t, client)
|
||||||
|
assertNoUnixLocalPortForwarding(t, client)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAllowTcpipForward(t *testing.T) {
|
func TestAllowTcpipForward(t *testing.T) {
|
||||||
|
@ -195,6 +197,7 @@ func TestAllowTcpipForward(t *testing.T) {
|
||||||
assertNoExec(t, client)
|
assertNoExec(t, client)
|
||||||
assertNoPtyTerminal(t, client)
|
assertNoPtyTerminal(t, client)
|
||||||
assertNoSftp(t, client)
|
assertNoSftp(t, client)
|
||||||
|
assertNoUnixLocalPortForwarding(t, client)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAllowDirectTcpip(t *testing.T) {
|
func TestAllowDirectTcpip(t *testing.T) {
|
||||||
|
@ -224,6 +227,37 @@ func TestAllowDirectTcpip(t *testing.T) {
|
||||||
assertNoExec(t, client)
|
assertNoExec(t, client)
|
||||||
assertNoPtyTerminal(t, client)
|
assertNoPtyTerminal(t, client)
|
||||||
assertNoSftp(t, client)
|
assertNoSftp(t, client)
|
||||||
|
assertNoUnixLocalPortForwarding(t, client)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAllowDirectStreamlocal(t *testing.T) {
|
||||||
|
rootCmd := RootCmd()
|
||||||
|
port := getAvailableTcpPort()
|
||||||
|
rootCmd.SetArgs([]string{"--port", strconv.Itoa(port), "--user", "john:mypassword", "--allow-direct-streamlocal"})
|
||||||
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
defer cancel()
|
||||||
|
go func() {
|
||||||
|
var stderrBuf bytes.Buffer
|
||||||
|
rootCmd.SetErr(&stderrBuf)
|
||||||
|
rootCmd.ExecuteContext(ctx)
|
||||||
|
}()
|
||||||
|
waitTCPServer(port)
|
||||||
|
sshClientConfig := &ssh.ClientConfig{
|
||||||
|
User: "john",
|
||||||
|
Auth: []ssh.AuthMethod{ssh.Password("mypassword")},
|
||||||
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
||||||
|
}
|
||||||
|
address := net.JoinHostPort("127.0.0.1", strconv.Itoa(port))
|
||||||
|
client, err := ssh.Dial("tcp", address, sshClientConfig)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
defer client.Close()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assertNoRemotePortForwarding(t, client)
|
||||||
|
assertNoLocalPortForwarding(t, client)
|
||||||
|
assertNoExec(t, client)
|
||||||
|
assertNoPtyTerminal(t, client)
|
||||||
|
assertNoSftp(t, client)
|
||||||
|
assertUnixLocalPortForwarding(t, client)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestAllowSftp(t *testing.T) {
|
func TestAllowSftp(t *testing.T) {
|
||||||
|
|
|
@ -2,12 +2,15 @@ package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"github.com/google/uuid"
|
||||||
"github.com/pkg/sftp"
|
"github.com/pkg/sftp"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"path"
|
||||||
"strconv"
|
"strconv"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
@ -135,6 +138,51 @@ func assertNoLocalPortForwarding(t *testing.T, client *ssh.Client) {
|
||||||
assert.Equal(t, "ssh: rejected: administratively prohibited (direct-tcpip not allowed)", err.Error())
|
assert.Equal(t, "ssh: rejected: administratively prohibited (direct-tcpip not allowed)", err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func assertUnixLocalPortForwarding(t *testing.T, client *ssh.Client) {
|
||||||
|
remoteUnixSocket := path.Join(os.TempDir(), "test-unix-socket-"+uuid.New().String())
|
||||||
|
acceptedConnChan := make(chan net.Conn)
|
||||||
|
{
|
||||||
|
ln, err := net.Listen("unix", remoteUnixSocket)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
defer os.Remove(remoteUnixSocket)
|
||||||
|
go func() {
|
||||||
|
conn, err := ln.Accept()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
acceptedConnChan <- conn
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
conn, err := client.Dial("unix", remoteUnixSocket)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
defer conn.Close()
|
||||||
|
acceptedConn := <-acceptedConnChan
|
||||||
|
defer acceptedConn.Close()
|
||||||
|
{
|
||||||
|
localToRemote := [3]byte{1, 2, 3}
|
||||||
|
_, err = conn.Write(localToRemote[:])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
var buf [len(localToRemote)]byte
|
||||||
|
_, err = io.ReadFull(acceptedConn, buf[:])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Equal(t, buf, localToRemote)
|
||||||
|
}
|
||||||
|
{
|
||||||
|
remoteToLocal := [4]byte{10, 20, 30, 40}
|
||||||
|
_, err = acceptedConn.Write(remoteToLocal[:])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
var buf [len(remoteToLocal)]byte
|
||||||
|
_, err = io.ReadFull(conn, buf[:])
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Equal(t, buf, remoteToLocal)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func assertNoUnixLocalPortForwarding(t *testing.T, client *ssh.Client) {
|
||||||
|
remoteUnixSocket := path.Join(os.TempDir(), "test-unix-socket-"+uuid.New().String())
|
||||||
|
_, err := client.Dial("unix", remoteUnixSocket)
|
||||||
|
assert.Error(t, err)
|
||||||
|
assert.Equal(t, "ssh: rejected: administratively prohibited (direct-streamlocal (Unix domain socket) not allowed)", err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
func assertRemotePortForwarding(t *testing.T, client *ssh.Client) {
|
func assertRemotePortForwarding(t *testing.T, client *ssh.Client) {
|
||||||
remotePort := getAvailableTcpPort()
|
remotePort := getAvailableTcpPort()
|
||||||
ln, err := client.Listen("tcp", net.JoinHostPort("127.0.0.1", strconv.Itoa(remotePort)))
|
ln, err := client.Listen("tcp", net.JoinHostPort("127.0.0.1", strconv.Itoa(remotePort)))
|
||||||
|
|
1
go.mod
1
go.mod
|
@ -4,6 +4,7 @@ go 1.20
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/creack/pty v1.1.18
|
github.com/creack/pty v1.1.18
|
||||||
|
github.com/google/uuid v1.3.0
|
||||||
github.com/mattn/go-shellwords v1.0.12
|
github.com/mattn/go-shellwords v1.0.12
|
||||||
github.com/pkg/errors v0.9.1
|
github.com/pkg/errors v0.9.1
|
||||||
github.com/pkg/sftp v1.13.5
|
github.com/pkg/sftp v1.13.5
|
||||||
|
|
2
go.sum
2
go.sum
|
@ -4,6 +4,8 @@ github.com/creack/pty v1.1.18/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr
|
||||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I=
|
||||||
|
github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
||||||
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
||||||
github.com/kr/fs v0.1.0 h1:Jskdu9ieNAYnjxsi0LbQp1ulIKZV1LAFgK1tWhpZgl8=
|
github.com/kr/fs v0.1.0 h1:Jskdu9ieNAYnjxsi0LbQp1ulIKZV1LAFgK1tWhpZgl8=
|
||||||
|
|
55
server.go
55
server.go
|
@ -30,10 +30,11 @@ type Server struct {
|
||||||
Logger *slog.Logger
|
Logger *slog.Logger
|
||||||
|
|
||||||
// Permissions
|
// Permissions
|
||||||
AllowTcpipForward bool
|
AllowTcpipForward bool
|
||||||
AllowDirectTcpip bool
|
AllowDirectTcpip bool
|
||||||
AllowExecute bool // this should not be split into "allow-exec" and "allow-pty-req" for now because "pty-req" can be used not for shell execution.
|
AllowExecute bool // this should not be split into "allow-exec" and "allow-pty-req" for now because "pty-req" can be used not for shell execution.
|
||||||
AllowSftp bool
|
AllowSftp bool
|
||||||
|
AllowDirectStreamlocal bool
|
||||||
|
|
||||||
// TODO: DNS server ?
|
// TODO: DNS server ?
|
||||||
}
|
}
|
||||||
|
@ -59,6 +60,12 @@ func (s *Server) handleChannel(shell string, newChannel ssh.NewChannel) {
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
s.handleDirectTcpip(newChannel)
|
s.handleDirectTcpip(newChannel)
|
||||||
|
case "direct-streamlocal@openssh.com":
|
||||||
|
if !s.AllowDirectStreamlocal {
|
||||||
|
newChannel.Reject(ssh.Prohibited, "direct-streamlocal (Unix domain socket) not allowed")
|
||||||
|
break
|
||||||
|
}
|
||||||
|
s.handleDirectStreamlocal(newChannel)
|
||||||
default:
|
default:
|
||||||
newChannel.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %s", newChannel.ChannelType()))
|
newChannel.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %s", newChannel.ChannelType()))
|
||||||
}
|
}
|
||||||
|
@ -197,7 +204,7 @@ func (s *Server) handleDirectTcpip(newChannel ssh.NewChannel) {
|
||||||
SourcePort uint32
|
SourcePort uint32
|
||||||
}
|
}
|
||||||
if err := ssh.Unmarshal(newChannel.ExtraData(), &msg); err != nil {
|
if err := ssh.Unmarshal(newChannel.ExtraData(), &msg); err != nil {
|
||||||
s.Logger.Info("failed to parse message", "err", err)
|
s.Logger.Info("failed to parse direct-tcpip message", "err", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
channel, reqs, err := newChannel.Accept()
|
channel, reqs, err := newChannel.Accept()
|
||||||
|
@ -227,6 +234,44 @@ func (s *Server) handleDirectTcpip(newChannel ssh.NewChannel) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// client side: https://github.com/golang/crypto/blob/b4ddeeda5bc71549846db71ba23e83ecb26f36ed/ssh/streamlocal.go#L52
|
||||||
|
func (s *Server) handleDirectStreamlocal(newChannel ssh.NewChannel) {
|
||||||
|
// https://github.com/openssh/openssh-portable/blob/f9f18006678d2eac8b0c5a5dddf17ab7c50d1e9f/PROTOCOL#L237
|
||||||
|
var msg struct {
|
||||||
|
SocketPath string
|
||||||
|
Reserved0 string
|
||||||
|
Reserved1 uint32
|
||||||
|
}
|
||||||
|
if err := ssh.Unmarshal(newChannel.ExtraData(), &msg); err != nil {
|
||||||
|
s.Logger.Info("failed to parse direct-streamlocal message", "err", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
channel, reqs, err := newChannel.Accept()
|
||||||
|
if err != nil {
|
||||||
|
s.Logger.Info("failed to accept", "err", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
go ssh.DiscardRequests(reqs)
|
||||||
|
conn, err := net.Dial("unix", msg.SocketPath)
|
||||||
|
if err != nil {
|
||||||
|
s.Logger.Info("failed to dial", "err", err)
|
||||||
|
channel.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
var closeOnce sync.Once
|
||||||
|
closer := func() {
|
||||||
|
channel.Close()
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
io.Copy(channel, conn)
|
||||||
|
closeOnce.Do(closer)
|
||||||
|
}()
|
||||||
|
io.Copy(conn, channel)
|
||||||
|
closeOnce.Do(closer)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
// =======================
|
// =======================
|
||||||
|
|
||||||
// parseDims extracts terminal dimensions (width x height) from the provided buffer.
|
// parseDims extracts terminal dimensions (width x height) from the provided buffer.
|
||||||
|
|
Loading…
Add table
Reference in a new issue