tmate/tmate-ssh-client.c

494 lines
12 KiB
C
Raw Normal View History

2013-06-02 05:16:06 +02:00
#include <sys/socket.h>
#include <netinet/tcp.h>
#include <stdio.h>
#include <event.h>
2013-07-22 23:06:28 +02:00
#include <assert.h>
2013-06-02 05:16:06 +02:00
#include "tmate.h"
2015-12-23 11:41:41 +01:00
#include "window-copy.h"
2013-06-02 05:16:06 +02:00
static void consume_channel(struct tmate_ssh_client *client);
static void flush_input_stream(struct tmate_ssh_client *client);
static void __flush_input_stream(evutil_socket_t fd, short what, void *arg);
static void __on_session_event(evutil_socket_t fd, short what, void *arg);
2015-12-23 11:41:41 +01:00
static void printflike(2, 3) kill_session(struct tmate_ssh_client *client,
2013-06-13 01:40:30 +02:00
const char *fmt, ...);
2015-12-23 11:41:41 +01:00
static void printflike(2, 3) reconnect_session(struct tmate_ssh_client *client,
const char *fmt, ...);
2013-07-23 01:45:34 +02:00
static void on_session_event(struct tmate_ssh_client *client);
2013-06-02 05:16:06 +02:00
static void register_session_fd_event(struct tmate_ssh_client *client)
{
if (!event_initialized(&client->ev_ssh)) {
int flag = 1;
setsockopt(ssh_get_fd(client->session), IPPROTO_TCP,
TCP_NODELAY, &flag, sizeof(flag));
2015-12-23 11:41:41 +01:00
event_assign(&client->ev_ssh, client->tmate_session->ev_base,
ssh_get_fd(client->session),
2013-06-02 05:16:06 +02:00
EV_READ | EV_PERSIST, __on_session_event, client);
event_add(&client->ev_ssh, NULL);
}
}
static void register_input_stream_event(struct tmate_ssh_client *client)
{
2013-07-22 23:06:28 +02:00
struct tmate_encoder *encoder = &client->tmate_session->encoder;
if (!event_initialized(&encoder->ev_readable)) {
2015-12-23 11:41:41 +01:00
event_assign(&encoder->ev_readable, client->tmate_session->ev_base, -1,
2013-06-02 05:16:06 +02:00
EV_READ | EV_PERSIST, __flush_input_stream, client);
2013-07-22 23:06:28 +02:00
event_add(&encoder->ev_readable, NULL);
client->has_encoder = 1;
2013-06-02 05:16:06 +02:00
}
}
static void consume_channel(struct tmate_ssh_client *client)
{
2013-07-22 23:06:28 +02:00
struct tmate_decoder *decoder = &client->tmate_session->decoder;
2013-06-02 05:16:06 +02:00
char *buf;
ssize_t len;
for (;;) {
2013-07-22 23:06:28 +02:00
tmate_decoder_get_buffer(decoder, &buf, &len);
2013-06-02 05:16:06 +02:00
len = ssh_channel_read_nonblocking(client->channel, buf, len, 0);
if (len < 0) {
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Error reading from channel: %s",
ssh_get_error(client->session));
2013-06-02 05:16:06 +02:00
break;
}
if (len == 0)
break;
2013-07-22 23:06:28 +02:00
tmate_decoder_commit(decoder, len);
}
}
static void connection_complete(struct tmate_ssh_client *connected_client)
{
struct tmate_session *session = connected_client->tmate_session;
struct tmate_ssh_client *client, *tmp_client;
TAILQ_FOREACH_SAFE(client, &session->clients, node, tmp_client) {
if (client == connected_client)
continue;
assert(!client->has_encoder);
2013-07-23 01:45:34 +02:00
kill_session(client, NULL);
2013-06-02 05:16:06 +02:00
}
}
static char *get_identity(void)
{
char *identity;
2015-12-23 11:41:41 +01:00
identity = options_get_string(global_s_options, "tmate-identity");
if (!strlen(identity))
return NULL;
if (strchr(identity, '/'))
identity = xstrdup(identity);
else
xasprintf(&identity, "%%d/%s", identity);
return identity;
}
2015-12-23 11:41:41 +01:00
static int passphrase_callback(__unused const char *prompt, char *buf, size_t len,
__unused int echo, __unused int verify, void *userdata)
2013-07-23 01:45:34 +02:00
{
struct tmate_ssh_client *client = userdata;
client->tmate_session->need_passphrase = 1;
if (client->tmate_session->passphrase)
strncpy(buf, client->tmate_session->passphrase, len);
else
strcpy(buf, "");
return 0;
}
static void on_passphrase_read(const char *passphrase, void *private)
{
struct tmate_ssh_client *client = private;
client->tmate_session->passphrase = xstrdup(passphrase);
on_session_event(client);
}
static void request_passphrase(struct tmate_ssh_client *client)
{
struct window_pane *wp;
struct window_copy_mode_data *data;
/*
* We'll display the prompt on the first pane.
* It doesn't make much sense, but it's simpler to reuse the copy mode
* and its key parsing logic compared to rolling something on our own.
*/
wp = RB_MIN(window_pane_tree, &all_window_panes);
if (wp->mode) {
data = wp->modedata;
if (data->inputtype == WINDOW_COPY_PASSWORD) {
/* We are already requesting the passphrase */
return;
}
window_pane_reset_mode(wp);
}
window_pane_set_mode(wp, &window_copy_mode);
2015-12-23 11:41:41 +01:00
window_copy_init_from_pane(wp, 0);
2013-07-23 01:45:34 +02:00
data = wp->modedata;
data->inputtype = WINDOW_COPY_PASSWORD;
data->inputprompt = "SSH key passphrase";
mode_key_init(&data->mdata, &mode_key_tree_vi_edit);
2015-12-23 11:41:41 +01:00
window_copy_update_selection(wp, 1);
2013-07-23 01:45:34 +02:00
window_copy_redraw_screen(wp);
data->password_cb = on_passphrase_read;
data->password_cb_private = client;
}
2013-06-02 05:16:06 +02:00
static void on_session_event(struct tmate_ssh_client *client)
{
char *identity;
2013-06-12 07:28:01 +02:00
ssh_key pubkey;
int key_type;
unsigned char *hash;
ssize_t hash_len;
char *hash_str;
2015-12-23 11:41:41 +01:00
const char *server_hash_str;
2013-06-12 07:28:01 +02:00
int match;
2015-12-23 11:41:41 +01:00
int verbosity = SSH_LOG_NOLOG + log_get_level();
int port = options_get_number(global_s_options, "tmate-server-port");
2013-06-02 05:16:06 +02:00
ssh_session session = client->session;
ssh_channel channel = client->channel;
switch (client->state) {
case SSH_INIT:
client->session = session = ssh_new();
if (!session) {
tmate_fatal("cannot initialize");
return;
}
2013-07-22 23:06:28 +02:00
ssh_set_callbacks(session, &client->ssh_callbacks);
2013-06-02 05:16:06 +02:00
client->channel = channel = ssh_channel_new(session);
if (!channel) {
tmate_fatal("cannot initialize");
return;
}
ssh_set_blocking(session, 0);
2013-07-22 23:06:28 +02:00
ssh_options_set(session, SSH_OPTIONS_HOST, client->server_ip);
2013-06-02 05:16:06 +02:00
ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
ssh_options_set(session, SSH_OPTIONS_PORT, &port);
2013-06-12 07:28:01 +02:00
ssh_options_set(session, SSH_OPTIONS_USER, "tmate");
2013-06-10 11:51:11 +02:00
ssh_options_set(session, SSH_OPTIONS_COMPRESSION, "yes");
2013-06-02 05:16:06 +02:00
if ((identity = get_identity())) {
2013-07-23 01:45:34 +02:00
/*
* FIXME libssh will continue with the next set of
* keys if the identity has a passphrase and the
* regular one doesn't.
*/
ssh_options_set(session, SSH_OPTIONS_IDENTITY, identity);
free(identity);
}
2013-06-02 05:16:06 +02:00
client->state = SSH_CONNECT;
/* fall through */
case SSH_CONNECT:
switch (ssh_connect(session)) {
case SSH_AGAIN:
register_session_fd_event(client);
return;
case SSH_ERROR:
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Error connecting: %s",
ssh_get_error(session));
2013-06-02 05:16:06 +02:00
return;
case SSH_OK:
register_session_fd_event(client);
2013-07-22 23:06:28 +02:00
tmate_debug("Establishing connection to %s", client->server_ip);
2013-06-12 07:28:01 +02:00
client->state = SSH_AUTH_SERVER;
2013-06-02 05:16:06 +02:00
/* fall through */
}
2013-06-12 07:28:01 +02:00
case SSH_AUTH_SERVER:
2015-12-09 00:50:38 +01:00
if (ssh_get_publickey(session, &pubkey) < 0)
tmate_fatal("ssh_get_publickey");
if (ssh_get_publickey_hash(pubkey, SSH_PUBLICKEY_HASH_MD5, &hash, &hash_len) < 0) {
2013-07-23 01:45:34 +02:00
kill_session(client, "Cannot authenticate server");
2013-06-12 07:28:01 +02:00
return;
}
hash_str = ssh_get_hexa(hash, hash_len);
if (!hash_str)
tmate_fatal("malloc failed");
key_type = ssh_key_type(pubkey);
2013-06-12 07:28:01 +02:00
switch (key_type) {
case SSH_KEYTYPE_RSA:
2015-12-23 11:41:41 +01:00
server_hash_str = options_get_string(global_s_options,
"tmate-server-rsa-fingerprint");
2013-06-12 07:28:01 +02:00
break;
case SSH_KEYTYPE_ECDSA:
2015-12-23 11:41:41 +01:00
server_hash_str = options_get_string(global_s_options,
"tmate-server-ecdsa-fingerprint");
2013-06-12 07:28:01 +02:00
break;
default:
server_hash_str = "";
2013-06-12 07:28:01 +02:00
}
match = !strcmp(hash_str, server_hash_str);
2013-06-12 07:28:01 +02:00
ssh_key_free(pubkey);
ssh_clean_pubkey_hash(&hash);
free(hash_str);
if (!match) {
2013-07-23 01:45:34 +02:00
kill_session(client, "Cannot authenticate server");
2013-06-12 07:28:01 +02:00
return;
}
2013-07-22 23:06:28 +02:00
/*
* At this point, we abort other connection attempts to the
* other tmate servers, since we have reached the fastest one.
* We need to do it before we ask the user its passphrase,
* otherwise the speed test would be biased.
*/
tmate_debug("Connected to %s", client->server_ip);
connection_complete(client);
2013-06-12 07:28:01 +02:00
client->state = SSH_AUTH_CLIENT;
2013-07-22 23:06:28 +02:00
2013-06-12 07:28:01 +02:00
/* fall through */
2013-06-02 05:16:06 +02:00
2013-06-12 07:28:01 +02:00
case SSH_AUTH_CLIENT:
2013-07-23 01:45:34 +02:00
client->tried_passphrase = client->tmate_session->passphrase;
switch (ssh_userauth_autopubkey(session, client->tried_passphrase)) {
2013-06-02 05:16:06 +02:00
case SSH_AUTH_AGAIN:
return;
case SSH_AUTH_PARTIAL:
case SSH_AUTH_INFO:
case SSH_AUTH_DENIED:
2013-07-23 01:45:34 +02:00
if (client->tmate_session->need_passphrase &&
!client->tried_passphrase)
request_passphrase(client);
else
kill_session(client, "Access denied. Check your SSH keys.");
2013-06-02 05:16:06 +02:00
return;
case SSH_AUTH_ERROR:
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Auth error: %s",
ssh_get_error(session));
2013-06-02 05:16:06 +02:00
return;
case SSH_AUTH_SUCCESS:
tmate_debug("Auth successful");
client->state = SSH_OPEN_CHANNEL;
/* fall through */
}
case SSH_OPEN_CHANNEL:
switch (ssh_channel_open_session(channel)) {
case SSH_AGAIN:
return;
case SSH_ERROR:
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Error opening channel: %s",
ssh_get_error(session));
2013-06-02 05:16:06 +02:00
return;
case SSH_OK:
tmate_debug("Session opened, initalizing tmate");
client->state = SSH_BOOTSTRAP;
/* fall through */
}
case SSH_BOOTSTRAP:
switch (ssh_channel_request_subsystem(channel, "tmate")) {
case SSH_AGAIN:
return;
case SSH_ERROR:
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Error initializing tmate: %s",
ssh_get_error(session));
2013-06-02 05:16:06 +02:00
return;
case SSH_OK:
tmate_debug("Ready");
/* Writes are now performed in a blocking fashion */
ssh_set_blocking(session, 1);
client->state = SSH_READY;
register_input_stream_event(client);
flush_input_stream(client);
/* fall through */
}
case SSH_READY:
consume_channel(client);
if (!ssh_is_connected(session)) {
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Disconnected");
2013-06-02 05:16:06 +02:00
return;
}
}
}
static void flush_input_stream(struct tmate_ssh_client *client)
{
2013-07-22 23:06:28 +02:00
struct tmate_encoder *encoder = &client->tmate_session->encoder;
struct evbuffer *evb = encoder->buffer;
2013-06-02 05:16:06 +02:00
ssize_t len, written;
char *buf;
if (client->state < SSH_READY)
return;
for (;;) {
len = evbuffer_get_length(evb);
if (!len)
break;
buf = evbuffer_pullup(evb, -1);
written = ssh_channel_write(client->channel, buf, len);
if (written < 0) {
2013-06-13 01:40:30 +02:00
reconnect_session(client, "Error writing to channel: %s",
ssh_get_error(client->session));
2013-06-02 05:16:06 +02:00
return;
}
evbuffer_drain(evb, written);
}
}
2015-12-23 11:41:41 +01:00
static void __flush_input_stream(__unused evutil_socket_t fd, __unused short what, void *arg)
2013-06-02 05:16:06 +02:00
{
flush_input_stream(arg);
}
2015-12-23 11:41:41 +01:00
static void __on_session_event(__unused evutil_socket_t fd, __unused short what, void *arg)
2013-06-02 05:16:06 +02:00
{
on_session_event(arg);
}
2013-07-23 01:45:34 +02:00
static void __kill_session(struct tmate_ssh_client *client,
const char *fmt, va_list va)
2013-06-02 05:16:06 +02:00
{
2013-07-22 23:06:28 +02:00
struct tmate_encoder *encoder;
2013-07-23 01:45:34 +02:00
if (fmt && TAILQ_EMPTY(&client->tmate_session->clients))
2013-07-22 23:06:28 +02:00
__tmate_status_message(fmt, va);
else
tmate_debug("Disconnecting %s", client->server_ip);
2013-06-13 01:40:30 +02:00
2013-06-02 05:16:06 +02:00
if (event_initialized(&client->ev_ssh)) {
event_del(&client->ev_ssh);
client->ev_ssh.ev_flags = 0;
}
2013-07-22 23:06:28 +02:00
if (client->has_encoder) {
encoder = &client->tmate_session->encoder;
event_del(&encoder->ev_readable);
encoder->ev_readable.ev_flags = 0;
client->has_encoder = 0;
2013-06-02 05:16:06 +02:00
}
if (client->session) {
/* ssh_free() also frees the associated channels. */
ssh_free(client->session);
client->session = NULL;
client->channel = NULL;
}
client->state = SSH_NONE;
}
2015-12-23 11:41:41 +01:00
static void printflike(2, 3) kill_session(struct tmate_ssh_client *client,
const char *fmt, ...)
2013-06-13 01:40:30 +02:00
{
va_list ap;
2013-07-23 01:45:34 +02:00
TAILQ_REMOVE(&client->tmate_session->clients, client, node);
2013-06-13 01:40:30 +02:00
va_start(ap, fmt);
2013-07-23 01:45:34 +02:00
__kill_session(client, fmt, ap);
2013-06-13 01:40:30 +02:00
va_end(ap);
2013-07-23 01:45:34 +02:00
free(client->server_ip);
free(client);
2013-06-13 01:40:30 +02:00
}
2013-06-02 05:16:06 +02:00
static void connect_session(struct tmate_ssh_client *client)
{
if (!client->session) {
client->state = SSH_INIT;
on_session_event(client);
}
}
2015-12-23 11:41:41 +01:00
static void on_reconnect_timer(__unused evutil_socket_t fd, __unused short what, void *arg)
2013-06-02 05:16:06 +02:00
{
connect_session(arg);
}
2015-12-23 11:41:41 +01:00
static void printflike(2, 3) reconnect_session(struct tmate_ssh_client *client,
const char *fmt, ...)
2013-06-02 05:16:06 +02:00
{
2015-12-23 11:41:41 +01:00
/* struct timeval tv; */
2013-06-13 01:40:30 +02:00
va_list ap;
2013-06-02 05:16:06 +02:00
2013-07-23 01:45:34 +02:00
#if 1
TAILQ_REMOVE(&client->tmate_session->clients, client, node);
#endif
2013-06-13 01:40:30 +02:00
va_start(ap, fmt);
2013-07-23 01:45:34 +02:00
__kill_session(client, fmt, ap);
2013-06-13 01:40:30 +02:00
va_end(ap);
2013-06-02 05:16:06 +02:00
2013-06-13 00:01:58 +02:00
/* Not yet implemented... */
#if 0
2013-06-02 05:16:06 +02:00
tv.tv_sec = 1;
tv.tv_usec = 0;
evtimer_add(&client->ev_ssh_reconnect, &tv);
2013-06-13 00:01:58 +02:00
#endif
2013-06-02 05:16:06 +02:00
}
2013-07-22 23:06:28 +02:00
struct tmate_ssh_client *tmate_ssh_client_alloc(struct tmate_session *session,
const char *server_ip)
2013-06-02 05:16:06 +02:00
{
2013-07-22 23:06:28 +02:00
struct tmate_ssh_client *client;
client = xmalloc(sizeof(*client));
2013-07-23 01:45:34 +02:00
memset(&client->ssh_callbacks, 0, sizeof(client->ssh_callbacks));
2013-07-22 23:06:28 +02:00
ssh_callbacks_init(&client->ssh_callbacks);
client->ssh_callbacks.userdata = client;
2013-07-23 01:45:34 +02:00
client->ssh_callbacks.auth_function = passphrase_callback;
2013-06-02 05:16:06 +02:00
2013-07-22 23:06:28 +02:00
client->tmate_session = session;
TAILQ_INSERT_TAIL(&session->clients, client, node);
client->server_ip = xstrdup(server_ip);
2013-06-02 05:16:06 +02:00
client->state = SSH_NONE;
client->session = NULL;
client->channel = NULL;
2013-07-22 23:06:28 +02:00
client->has_encoder = 0;
2013-06-02 05:16:06 +02:00
2013-07-23 01:45:34 +02:00
client->ev_ssh.ev_flags = 0;
2015-12-23 11:41:41 +01:00
evtimer_assign(&client->ev_ssh_reconnect, session->ev_base,
2013-06-02 05:16:06 +02:00
on_reconnect_timer, client);
connect_session(client);
2013-07-22 23:06:28 +02:00
return client;
}