blob: e7e2f951636eec7bbe7ebaa7abf9cfccb5815272 [file] [log] [blame]
// Copyright 2018 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
package sshutil
import (
"context"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/pem"
"errors"
"fmt"
"log"
"net"
"time"
"go.fuchsia.dev/fuchsia/tools/lib/retry"
"go.fuchsia.dev/fuchsia/tools/net/netutil"
"golang.org/x/crypto/ssh"
)
const (
// Default SSH server port.
SSHPort = 22
// Default RSA key size.
RSAKeySize = 2048
// The allowed timeout to establish an SSH connection.
connTimeout = 5 * time.Second
// The total allowed timeout to establish an SSH connection and complete an auth handshake.
totalDialTimeout = 10 * time.Second
sshUser = "fuchsia"
// A conventionally used global request name for checking the status of a client
// connection to an OpenSSH server.
keepAliveOpenSSH = "keepalive@openssh.com"
// Interval between keep-alive pings.
keepAliveInterval = 5 * time.Second
)
var (
// ConnectionError is an all-purpose error indicating the a client had become unresponsive.
ConnectionError = errors.New("SSH connection error")
)
// GeneratePrivateKey generates a private SSH key.
func GeneratePrivateKey() ([]byte, error) {
key, err := rsa.GenerateKey(rand.Reader, RSAKeySize)
if err != nil {
return nil, err
}
privateKey := &pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: x509.MarshalPKCS1PrivateKey(key),
}
buf := pem.EncodeToMemory(privateKey)
return buf, nil
}
// CheckConnection returns nil if a connection is verified as still alive; else
// it returns an error that unwraps as a ConnectionError.
func CheckConnection(client *ssh.Client) error {
if _, _, err := client.Conn.SendRequest(keepAliveOpenSSH, true, nil); err != nil {
return fmt.Errorf("%w: %v", ConnectionError, err)
}
return nil
}
// ConnectDeprecated establishes an SSH connection at the given remote address.
// If it fails to connect, it will return an error that unwraps as a
// ConnectionError.
// TODO(fxb/48042): Delete in favor of a method that returns sshutil.Client.
func ConnectDeprecated(ctx context.Context, raddr net.Addr, config *ssh.ClientConfig) (*ssh.Client, error) {
network, err := network(raddr)
if err != nil {
return nil, err
}
var client *ssh.Client
// TODO: figure out optimal backoff time and number of retries
if err := retry.Retry(ctx, retry.WithMaxDuration(&retry.ZeroBackoff{}, time.Minute), func() error {
var err error
client, err = dialWithTimeout(network, raddr.String(), config, totalDialTimeout)
return err
}, nil); err != nil {
return nil, fmt.Errorf("%w: cannot connect to address %q: %v", ConnectionError, raddr, err)
}
return client, nil
}
// ssh.Dial can hang during authentication, the 'timeout' being set in the config only
// applying to establishment of the initial connection. This function is effectively
// ssh.Dial with the ability to set a deadline on the underlying connection.
//
// See https://github.com/golang/go/issues/21941 for more details on the hang.
func dialWithTimeout(network, addr string, config *ssh.ClientConfig, timeout time.Duration) (*ssh.Client, error) {
conn, err := net.DialTimeout(network, addr, config.Timeout)
if err != nil {
return nil, err
}
if err := conn.SetDeadline(time.Now().Add(timeout)); err != nil {
conn.Close()
return nil, err
}
c, chans, reqs, err := ssh.NewClientConn(conn, addr, config)
if err != nil {
conn.Close()
return nil, err
}
if err := conn.SetDeadline(time.Time{}); err != nil {
c.Close()
return nil, err
}
client := ssh.NewClient(c, chans, reqs)
go keepAlive(conn, client)
return client, nil
}
// ConnectToNodeConnectToNodeDeprecated connects to the device with the given
// nodename.
// TODO(fxb/48042): Delete in favor of a method that returns sshutil.Client.
func ConnectToNodeDeprecated(ctx context.Context, nodename string, config *ssh.ClientConfig) (*ssh.Client, error) {
addr, err := netutil.GetNodeAddress(ctx, nodename, true)
if err != nil {
return nil, err
}
addr.Port = SSHPort
return ConnectDeprecated(ctx, addr, config)
}
// DefaultSSHConfig returns a basic SSH client configuration.
func DefaultSSHConfig(privateKey []byte) (*ssh.ClientConfig, error) {
signer, err := ssh.ParsePrivateKey(privateKey)
if err != nil {
return nil, err
}
return DefaultSSHConfigFromSigners(signer)
}
// DefaultSSHConfigFromSigners returns a basic SSH client configuration.
func DefaultSSHConfigFromSigners(signers ...ssh.Signer) (*ssh.ClientConfig, error) {
return &ssh.ClientConfig{
User: sshUser,
Auth: []ssh.AuthMethod{ssh.PublicKeys(signers...)},
Timeout: connTimeout,
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
}, nil
}
// Returns the network to use to SSH into a device.
func network(address net.Addr) (string, error) {
var ip *net.IP
// We need these type assertions because the net package (annoyingly) doesn't provide
// an interface for objects that have an IP address.
switch addr := address.(type) {
case *net.UDPAddr:
ip = &addr.IP
case *net.TCPAddr:
ip = &addr.IP
case *net.IPAddr:
ip = &addr.IP
default:
return "", fmt.Errorf("unsupported address type: %T", address)
}
if ip.To4() != nil {
return "tcp", nil // IPv4
}
if ip.To16() != nil {
return "tcp6", nil // IPv6
}
return "", fmt.Errorf("cannot infer network for IP address %s", ip.String())
}
// keepAlive runs for the duration of the client's lifetime, sending periodic
// pings (with reponse timeouts) to ensure that the client is still connected.
// If a ping fails, it will close the client and exit.
func keepAlive(conn net.Conn, client *ssh.Client) {
ticker := time.NewTicker(keepAliveInterval)
defer ticker.Stop()
for range ticker.C {
if err := emitKeepAlive(conn, client); err != nil {
// Try to close the client. It's possible the keep-alive failed
// because the client has already been closed, which is fine – this
// close will just silently fail.
log.Printf("ssh keep-alive failed, closing client")
client.Close()
return
}
}
}
func emitKeepAlive(conn net.Conn, client *ssh.Client) error {
responseTimeout := keepAliveInterval + 15*time.Second
conn.SetDeadline(time.Now().Add(responseTimeout))
return CheckConnection(client)
}