1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
|
package connectors
import (
"context"
"encoding/base64"
"fmt"
"io"
"net"
"os"
"strconv"
"strings"
"time"
"github.com/mimecast/dtail/internal/clients/handlers"
"github.com/mimecast/dtail/internal/config"
"github.com/mimecast/dtail/internal/io/dlog"
"github.com/mimecast/dtail/internal/ssh/client"
"golang.org/x/crypto/ssh"
)
// ServerConnection represents a connection to a single remote dtail server via
// SSH protocol.
type ServerConnection struct {
// The full server string as received from the server discovery (can be with port number)
server string
// Only the hostname or FQDN (without the port number)
hostname string
// Only the port number.
port int
config *ssh.ClientConfig
handler handlers.Handler
commands []string
authKeyPath string
authKeyDisabled bool
hostKeyCallback client.HostKeyCallback
throttlingDone bool
}
var _ Connector = (*ServerConnection)(nil)
// NewServerConnection returns a new DTail SSH server connection.
func NewServerConnection(server string, userName string,
authMethods []ssh.AuthMethod, hostKeyCallback client.HostKeyCallback,
handler handlers.Handler, commands []string, authKeyPath string,
authKeyDisabled bool) *ServerConnection {
dlog.Client.Debug(server, "Creating new connection", server, handler, commands)
sshConnectTimeout := time.Duration(config.Common.SSHConnectTimeoutMs) * time.Millisecond
if sshConnectTimeout <= 0 {
sshConnectTimeout = 2 * time.Second
}
c := ServerConnection{
hostKeyCallback: hostKeyCallback,
server: server,
handler: handler,
commands: commands,
authKeyPath: resolveAuthKeyPath(authKeyPath),
authKeyDisabled: authKeyDisabled,
config: &ssh.ClientConfig{
User: userName,
Auth: authMethods,
HostKeyCallback: hostKeyCallback.Wrap(),
Timeout: sshConnectTimeout,
},
}
c.initServerPort()
return &c
}
// Server returns the server hostname connected to.
func (c *ServerConnection) Server() string { return c.server }
// Handler returns the handler used for the connection.
func (c *ServerConnection) Handler() handlers.Handler { return c.handler }
// Attempt to parse the server port address from the provided server FQDN.
func (c *ServerConnection) initServerPort() {
parts := strings.Split(c.server, ":")
if len(parts) == 1 {
c.hostname = c.server
c.port = config.Common.SSHPort
return
}
dlog.Client.Debug("Parsing port from hostname", parts)
port, err := strconv.Atoi(parts[1])
if err != nil {
dlog.Client.FatalPanic("Unable to parse client port", c.server, parts, err)
}
c.hostname = parts[0]
c.port = port
}
// Start the connection to the server.
func (c *ServerConnection) Start(ctx context.Context, cancel context.CancelFunc,
throttleCh, statsCh chan struct{}) {
// Throttle how many connections can be established concurrently (based on ch length)
dlog.Client.Debug(c.server, "Throttling connection", len(throttleCh), cap(throttleCh))
select {
case throttleCh <- struct{}{}:
case <-ctx.Done():
dlog.Client.Debug(c.server, "Not establishing connection as context is done",
len(throttleCh), cap(throttleCh))
return
}
dlog.Client.Debug(c.server, "Throttling says that the connection can be established",
len(throttleCh), cap(throttleCh))
go func() {
defer func() {
if !c.throttlingDone {
dlog.Client.Debug(c.server, "Unthrottling connection (1)",
len(throttleCh), cap(throttleCh))
c.throttlingDone = true
<-throttleCh
}
cancel()
}()
if err := c.dial(ctx, cancel, throttleCh, statsCh); err != nil {
dlog.Client.Warn(c.server, err)
if c.hostKeyCallback.Untrusted(c.server) {
dlog.Client.Debug(c.server, "Not trusting host")
}
}
}()
<-ctx.Done()
}
// Dail into a new SSH connection. Close connection in case of an error.
func (c *ServerConnection) dial(ctx context.Context, cancel context.CancelFunc,
throttleCh, statsCh chan struct{}) error {
dlog.Client.Debug(c.server, "Incrementing connection stats")
statsCh <- struct{}{}
defer func() {
dlog.Client.Debug(c.server, "Decrementing connection stats")
<-statsCh
}()
address := fmt.Sprintf("%s:%d", c.hostname, c.port)
dlog.Client.Debug(c.server, "Dialing into the connection", address)
// Use context-aware dialing to enable proper cancellation during connection establishment.
// TCP KeepAlive (30s) prevents silent connection failures on long-lived connections.
dialer := &net.Dialer{
Timeout: c.config.Timeout, // Use the SSH config timeout (2 seconds)
KeepAlive: 30 * time.Second, // Standard Go default for connection health monitoring
}
// Establish TCP connection with context support for cancellation
conn, err := dialer.DialContext(ctx, "tcp", address)
if err != nil {
return fmt.Errorf("failed to dial TCP connection to %s: %w", address, err)
}
// Perform SSH handshake over the established TCP connection
sshConn, chans, reqs, err := ssh.NewClientConn(conn, address, c.config)
if err != nil {
conn.Close()
return fmt.Errorf("SSH handshake failed for %s: %w", address, err)
}
// Create SSH client from the connection components
client := ssh.NewClient(sshConn, chans, reqs)
defer client.Close()
return c.session(ctx, cancel, client, throttleCh)
}
// Create the SSH session. Close the session in case of an error.
func (c *ServerConnection) session(ctx context.Context, cancel context.CancelFunc,
client *ssh.Client, throttleCh chan struct{}) error {
dlog.Client.Debug(c.server, "Creating SSH session")
session, err := client.NewSession()
if err != nil {
return fmt.Errorf("failed to create SSH session for %s: %w", c.server, err)
}
defer session.Close()
return c.handle(ctx, cancel, session, throttleCh)
}
func (c *ServerConnection) handle(ctx context.Context, cancel context.CancelFunc,
session *ssh.Session, throttleCh chan struct{}) error {
dlog.Client.Debug(c.server, "Creating handler for SSH session")
stdinPipe, err := session.StdinPipe()
if err != nil {
return fmt.Errorf("failed to get SSH session stdin pipe for %s: %w", c.server, err)
}
stdoutPipe, err := session.StdoutPipe()
if err != nil {
return fmt.Errorf("failed to get SSH session stdout pipe for %s: %w", c.server, err)
}
if err := session.Shell(); err != nil {
return fmt.Errorf("failed to start SSH shell for %s: %w", c.server, err)
}
go func() {
defer cancel()
if _, err := io.Copy(stdinPipe, c.handler); err != nil {
dlog.Client.Trace(err)
}
}()
go func() {
defer cancel()
if _, err := io.Copy(c.handler, stdoutPipe); err != nil {
dlog.Client.Trace(err)
}
}()
go func() {
defer cancel()
select {
case <-c.handler.Done():
case <-ctx.Done():
}
}()
if c.authKeyDisabled {
dlog.Client.Debug(c.server, "Skipping AUTHKEY registration because auth-key is disabled")
} else {
c.sendAuthKeyRegistrationCommand()
}
// Send all requested commands to the server.
for _, command := range c.commands {
dlog.Client.Debug(command)
if err := c.handler.SendMessage(command); err != nil {
dlog.Client.Debug(err)
}
}
if !c.throttlingDone {
dlog.Client.Debug(c.server, "Unthrottling connection (2)",
len(throttleCh), cap(throttleCh))
c.throttlingDone = true
<-throttleCh
}
<-ctx.Done()
c.handler.Shutdown()
return nil
}
func resolveAuthKeyPath(authKeyPath string) string {
if strings.TrimSpace(authKeyPath) != "" {
return authKeyPath
}
return os.Getenv("HOME") + "/.ssh/id_rsa"
}
func (c *ServerConnection) sendAuthKeyRegistrationCommand() {
authKeyPubPath := c.authKeyPath + ".pub"
authKeyPubBytes, err := os.ReadFile(authKeyPubPath)
if err != nil {
dlog.Client.Debug(c.server, "Skipping AUTHKEY registration, unable to read public key", authKeyPubPath, err)
return
}
authKeyBase64, err := extractAuthKeyBase64(authKeyPubBytes)
if err != nil {
dlog.Client.Debug(c.server, "Skipping AUTHKEY registration, invalid public key file", authKeyPubPath, err)
return
}
if err := c.handler.SendMessage("AUTHKEY " + authKeyBase64); err != nil {
dlog.Client.Debug(c.server, "Unable to send AUTHKEY registration command", err)
return
}
dlog.Client.Debug(c.server, "Sent AUTHKEY registration command", authKeyPubPath)
}
func extractAuthKeyBase64(authKeyPubBytes []byte) (string, error) {
authKeyPubContent := string(authKeyPubBytes)
for _, line := range strings.Split(authKeyPubContent, "\n") {
trimmedLine := strings.TrimSpace(line)
if trimmedLine == "" || strings.HasPrefix(trimmedLine, "#") {
continue
}
fields := strings.Fields(trimmedLine)
if len(fields) < 2 {
return "", fmt.Errorf("expected authorized key format '<type> <base64-key> [comment]'")
}
authKeyBase64 := strings.TrimSpace(fields[1])
if _, err := base64.StdEncoding.DecodeString(authKeyBase64); err != nil {
return "", fmt.Errorf("invalid base64 public key: %w", err)
}
return authKeyBase64, nil
}
return "", fmt.Errorf("no public key found")
}
|