392 lines
9.0 KiB
Go
392 lines
9.0 KiB
Go
// Sshwifty - A Web SSH client
|
|
//
|
|
// Copyright (C) 2019-2021 NI Rui <ranqus@gmail.com>
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as
|
|
// published by the Free Software Foundation, either version 3 of the
|
|
// License, or (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package controller
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/hmac"
|
|
"crypto/rand"
|
|
"crypto/sha512"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"strconv"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/gorilla/websocket"
|
|
|
|
"github.com/nirui/sshwifty/application/command"
|
|
"github.com/nirui/sshwifty/application/configuration"
|
|
"github.com/nirui/sshwifty/application/log"
|
|
"github.com/nirui/sshwifty/application/rw"
|
|
)
|
|
|
|
// Errors
|
|
var (
|
|
ErrSocketInvalidAuthKey = NewError(
|
|
http.StatusForbidden,
|
|
"To use Websocket interface, a valid Auth Key must be provided")
|
|
|
|
ErrSocketAuthFailed = NewError(
|
|
http.StatusForbidden,
|
|
"Authentication has failed with provided Auth Key")
|
|
|
|
ErrSocketUnableToGenerateKey = NewError(
|
|
http.StatusInternalServerError,
|
|
"Unable to generate crypto key")
|
|
|
|
ErrSocketInvalidDataPackage = NewError(
|
|
http.StatusBadRequest, "Invalid data package")
|
|
)
|
|
|
|
const (
|
|
socketGCMStandardNonceSize = 12
|
|
)
|
|
|
|
type socket struct {
|
|
baseController
|
|
|
|
commonCfg configuration.Common
|
|
serverCfg configuration.Server
|
|
upgrader websocket.Upgrader
|
|
commander command.Commander
|
|
}
|
|
|
|
func hashCombineSocketKeys(addedKey string, privateKey string) []byte {
|
|
h := hmac.New(sha512.New, []byte(privateKey))
|
|
|
|
h.Write([]byte(addedKey))
|
|
|
|
return h.Sum(nil)
|
|
}
|
|
|
|
func newSocketCtl(
|
|
commonCfg configuration.Common,
|
|
cfg configuration.Server,
|
|
cmds command.Commands,
|
|
) socket {
|
|
return socket{
|
|
commonCfg: commonCfg,
|
|
serverCfg: cfg,
|
|
upgrader: buildWebsocketUpgrader(cfg),
|
|
commander: command.New(cmds),
|
|
}
|
|
}
|
|
|
|
type websocketWriter struct {
|
|
*websocket.Conn
|
|
}
|
|
|
|
func (w websocketWriter) Write(b []byte) (int, error) {
|
|
wErr := w.WriteMessage(websocket.BinaryMessage, b)
|
|
|
|
if wErr != nil {
|
|
return 0, wErr
|
|
}
|
|
|
|
return len(b), nil
|
|
}
|
|
|
|
type socketPackageWriter struct {
|
|
w websocketWriter
|
|
packager func(w websocketWriter, b []byte) error
|
|
}
|
|
|
|
func (s socketPackageWriter) Write(b []byte) (int, error) {
|
|
packageWriteErr := s.packager(s.w, b)
|
|
|
|
if packageWriteErr != nil {
|
|
return 0, packageWriteErr
|
|
}
|
|
|
|
return len(b), nil
|
|
}
|
|
|
|
func buildWebsocketUpgrader(cfg configuration.Server) websocket.Upgrader {
|
|
return websocket.Upgrader{
|
|
HandshakeTimeout: cfg.InitialTimeout,
|
|
CheckOrigin: func(r *http.Request) bool {
|
|
return true
|
|
},
|
|
Error: func(
|
|
w http.ResponseWriter,
|
|
r *http.Request,
|
|
status int,
|
|
reason error,
|
|
) {
|
|
},
|
|
}
|
|
}
|
|
|
|
func (s socket) Options(
|
|
w http.ResponseWriter, r *http.Request, l log.Logger) error {
|
|
w.Header().Add("Access-Control-Allow-Origin", "*")
|
|
w.Header().Add("Access-Control-Allow-Headers", "X-Key")
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s socket) buildWSFetcher(c *websocket.Conn) rw.FetchReaderFetcher {
|
|
return func() ([]byte, error) {
|
|
for {
|
|
mt, message, err := c.ReadMessage()
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if mt != websocket.BinaryMessage {
|
|
return nil, NewError(
|
|
http.StatusBadRequest,
|
|
fmt.Sprintf("Received unknown type of data: %d", message))
|
|
}
|
|
|
|
return message, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s socket) generateNonce(nonce []byte) error {
|
|
_, rErr := io.ReadFull(rand.Reader, nonce[:socketGCMStandardNonceSize])
|
|
|
|
return rErr
|
|
}
|
|
|
|
func (s socket) increaseNonce(nonce []byte) {
|
|
for i := len(nonce); i > 0; i-- {
|
|
nonce[i-1]++
|
|
|
|
if nonce[i-1] <= 0 {
|
|
continue
|
|
}
|
|
|
|
break
|
|
}
|
|
}
|
|
|
|
func (s socket) createCipher(key []byte) (cipher.AEAD, cipher.AEAD, error) {
|
|
readCipher, readCipherErr := aes.NewCipher(key)
|
|
|
|
if readCipherErr != nil {
|
|
return nil, nil, readCipherErr
|
|
}
|
|
|
|
writeCipher, writeCipherErr := aes.NewCipher(key)
|
|
|
|
if writeCipherErr != nil {
|
|
return nil, nil, writeCipherErr
|
|
}
|
|
|
|
gcmRead, gcmReadErr := cipher.NewGCMWithNonceSize(
|
|
readCipher, socketGCMStandardNonceSize)
|
|
|
|
if gcmReadErr != nil {
|
|
return nil, nil, gcmReadErr
|
|
}
|
|
|
|
gcmWrite, gcmWriteErr := cipher.NewGCMWithNonceSize(
|
|
writeCipher, socketGCMStandardNonceSize)
|
|
|
|
if gcmWriteErr != nil {
|
|
return nil, nil, gcmWriteErr
|
|
}
|
|
|
|
return gcmRead, gcmWrite, nil
|
|
}
|
|
|
|
func (s socket) mixerKey(r *http.Request) []byte {
|
|
return hashCombineSocketKeys(
|
|
r.UserAgent(), s.commonCfg.SharedKey+"+"+s.commonCfg.HostName)
|
|
}
|
|
|
|
func (s socket) buildCipherKey(r *http.Request) [16]byte {
|
|
key := [16]byte{}
|
|
|
|
copy(key[:], hashCombineSocketKeys(
|
|
strconv.FormatInt(time.Now().Unix()/100, 10),
|
|
string(s.mixerKey(r))+"+"+s.commonCfg.SharedKey,
|
|
))
|
|
|
|
return key
|
|
}
|
|
|
|
func (s socket) Get(
|
|
w http.ResponseWriter, r *http.Request, l log.Logger) error {
|
|
// Error will not be returned when Websocket already handled
|
|
// (i.e. returned the error to client). We just log the error and that's it
|
|
c, err := s.upgrader.Upgrade(w, r, nil)
|
|
|
|
if err != nil {
|
|
return NewError(http.StatusBadRequest, err.Error())
|
|
}
|
|
|
|
defer c.Close()
|
|
|
|
wsReader := rw.NewFetchReader(s.buildWSFetcher(c))
|
|
wsWriter := websocketWriter{Conn: c}
|
|
|
|
// Initialize ciphers
|
|
//
|
|
// WARNING: The AES-GCM cipher is here for authenticating user login. Yeah
|
|
// it is overkill and probably not correct. But I eventually decide
|
|
// to keep it as long as it authenticates (Hopefully in a safe and
|
|
// secured way).
|
|
//
|
|
// DO NOT rely on this if you want to secured communitcation, in
|
|
// that case, you need to use HTTPS.
|
|
//
|
|
readNonce := [socketGCMStandardNonceSize]byte{}
|
|
_, nonceReadErr := io.ReadFull(&wsReader, readNonce[:])
|
|
|
|
if nonceReadErr != nil {
|
|
return NewError(http.StatusBadRequest, fmt.Sprintf(
|
|
"Unable to read initial client nonce: %s", nonceReadErr.Error()))
|
|
}
|
|
|
|
writeNonce := [socketGCMStandardNonceSize]byte{}
|
|
nonceReadErr = s.generateNonce(writeNonce[:])
|
|
|
|
if nonceReadErr != nil {
|
|
return NewError(http.StatusBadRequest, fmt.Sprintf(
|
|
"Unable to generate initial server nonce: %s",
|
|
nonceReadErr.Error()))
|
|
}
|
|
|
|
_, nonceSendErr := wsWriter.Write(writeNonce[:])
|
|
|
|
if nonceSendErr != nil {
|
|
return NewError(http.StatusBadRequest, fmt.Sprintf(
|
|
"Unable to send server nonce to client: %s", nonceSendErr.Error()))
|
|
}
|
|
|
|
cipherKey := s.buildCipherKey(r)
|
|
|
|
readCipher, writeCipher, cipherCreationErr := s.createCipher(cipherKey[:])
|
|
|
|
if cipherCreationErr != nil {
|
|
return NewError(http.StatusInternalServerError, fmt.Sprintf(
|
|
"Unable to create cipher: %s", cipherCreationErr.Error()))
|
|
}
|
|
|
|
// Start service
|
|
const cipherReadBufSize = 4096
|
|
|
|
cipherReadBuf := [cipherReadBufSize]byte{}
|
|
cipherWriteBuf := [cipherReadBufSize]byte{}
|
|
maxWriteLen := int(cipherReadBufSize) - (writeCipher.Overhead() + 2)
|
|
|
|
senderLock := sync.Mutex{}
|
|
cmdExec, cmdExecErr := s.commander.New(
|
|
command.Configuration{
|
|
Dial: s.commonCfg.Dialer,
|
|
DialTimeout: s.commonCfg.DecideDialTimeout(s.serverCfg.ReadTimeout),
|
|
},
|
|
rw.NewFetchReader(func() ([]byte, error) {
|
|
defer s.increaseNonce(readNonce[:])
|
|
|
|
// Size is unencrypted
|
|
_, rErr := io.ReadFull(&wsReader, cipherReadBuf[:2])
|
|
|
|
if rErr != nil {
|
|
return nil, rErr
|
|
}
|
|
|
|
// Read full size
|
|
packageSize := uint16(cipherReadBuf[0])
|
|
packageSize <<= 8
|
|
packageSize |= uint16(cipherReadBuf[1])
|
|
|
|
if packageSize <= 0 || packageSize > cipherReadBufSize {
|
|
return nil, ErrSocketInvalidDataPackage
|
|
}
|
|
|
|
if int(packageSize) <= wsReader.Remain() {
|
|
rData, rErr := wsReader.Export(int(packageSize))
|
|
|
|
if rErr != nil {
|
|
return nil, rErr
|
|
}
|
|
|
|
return readCipher.Open(
|
|
cipherReadBuf[:0], readNonce[:], rData, nil)
|
|
}
|
|
|
|
_, rErr = io.ReadFull(&wsReader, cipherReadBuf[:packageSize])
|
|
|
|
if rErr != nil {
|
|
return nil, rErr
|
|
}
|
|
|
|
return readCipher.Open(
|
|
cipherReadBuf[:0],
|
|
readNonce[:],
|
|
cipherReadBuf[:packageSize],
|
|
nil)
|
|
}),
|
|
socketPackageWriter{
|
|
w: wsWriter,
|
|
packager: func(w websocketWriter, b []byte) error {
|
|
start := 0
|
|
bLen := len(b)
|
|
readLen := bLen
|
|
|
|
for start < bLen {
|
|
if readLen > maxWriteLen {
|
|
readLen = maxWriteLen
|
|
}
|
|
|
|
encrypted := writeCipher.Seal(
|
|
cipherWriteBuf[2:2],
|
|
writeNonce[:],
|
|
b[start:start+readLen],
|
|
nil)
|
|
|
|
s.increaseNonce(writeNonce[:])
|
|
|
|
encryptedSize := uint16(len(encrypted))
|
|
|
|
if encryptedSize <= 0 {
|
|
return ErrSocketInvalidDataPackage
|
|
}
|
|
|
|
cipherWriteBuf[0] = byte(encryptedSize >> 8)
|
|
cipherWriteBuf[1] = byte(encryptedSize)
|
|
|
|
_, wErr := w.Write(cipherWriteBuf[:encryptedSize+2])
|
|
|
|
if wErr != nil {
|
|
return wErr
|
|
}
|
|
|
|
start += readLen
|
|
readLen = bLen - start
|
|
}
|
|
|
|
return nil
|
|
},
|
|
}, &senderLock, s.serverCfg.ReadDelay, s.serverCfg.WriteDelay, l)
|
|
|
|
if cmdExecErr != nil {
|
|
return NewError(http.StatusBadRequest, cmdExecErr.Error())
|
|
}
|
|
|
|
return cmdExec.Handle()
|
|
}
|