2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2022-03-09 05:35:55 +00:00
|
|
|
|
2022-09-25 18:29:55 +00:00
|
|
|
// This file contains the code for the incubator process. Tailscaled
|
2022-04-21 21:52:05 +00:00
|
|
|
// launches the incubator as the same user as it was launched as. The
|
|
|
|
// incubator then registers a new session with the OS, sets its UID
|
|
|
|
// and groups to the specified `--uid`, `--gid` and `--groups`, and
|
2022-09-25 18:29:55 +00:00
|
|
|
// then launches the requested `--cmd`.
|
2022-03-09 05:35:55 +00:00
|
|
|
|
2023-01-06 23:39:34 +00:00
|
|
|
//go:build linux || (darwin && !ios) || freebsd || openbsd
|
2022-03-09 05:35:55 +00:00
|
|
|
|
|
|
|
package tailssh
|
|
|
|
|
|
|
|
import (
|
2022-03-13 20:01:59 +00:00
|
|
|
"errors"
|
2022-03-09 05:35:55 +00:00
|
|
|
"flag"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"log/syslog"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"os/user"
|
2022-03-11 20:34:36 +00:00
|
|
|
"path/filepath"
|
2022-03-09 05:35:55 +00:00
|
|
|
"runtime"
|
2023-01-06 20:47:01 +00:00
|
|
|
"sort"
|
2022-04-21 21:44:39 +00:00
|
|
|
"strconv"
|
2022-03-09 05:35:55 +00:00
|
|
|
"strings"
|
|
|
|
"syscall"
|
|
|
|
|
|
|
|
"github.com/creack/pty"
|
2022-04-21 17:11:16 +00:00
|
|
|
"github.com/pkg/sftp"
|
2022-03-11 19:19:55 +00:00
|
|
|
"github.com/u-root/u-root/pkg/termios"
|
2022-12-14 22:20:50 +00:00
|
|
|
"go4.org/mem"
|
2022-03-13 01:40:40 +00:00
|
|
|
gossh "golang.org/x/crypto/ssh"
|
2023-01-06 20:47:01 +00:00
|
|
|
"golang.org/x/exp/slices"
|
2022-03-09 05:35:55 +00:00
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"tailscale.com/cmd/tailscaled/childproc"
|
2022-12-15 22:28:14 +00:00
|
|
|
"tailscale.com/envknob"
|
2022-12-14 22:20:50 +00:00
|
|
|
"tailscale.com/hostinfo"
|
2022-03-25 22:35:36 +00:00
|
|
|
"tailscale.com/tempfork/gliderlabs/ssh"
|
2022-03-09 05:35:55 +00:00
|
|
|
"tailscale.com/types/logger"
|
2022-12-14 22:20:50 +00:00
|
|
|
"tailscale.com/util/lineread"
|
|
|
|
"tailscale.com/version/distro"
|
2022-03-09 05:35:55 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
childproc.Add("ssh", beIncubator)
|
|
|
|
}
|
|
|
|
|
|
|
|
var ptyName = func(f *os.File) (string, error) {
|
|
|
|
return "", fmt.Errorf("unimplemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
// maybeStartLoginSession starts a new login session for the specified UID.
|
|
|
|
// On success, it may return a non-nil close func which must be closed to
|
|
|
|
// release the session.
|
|
|
|
// See maybeStartLoginSessionLinux.
|
2022-05-07 00:11:21 +00:00
|
|
|
var maybeStartLoginSession = func(logf logger.Logf, ia incubatorArgs) (close func() error, err error) {
|
2022-03-09 05:35:55 +00:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// newIncubatorCommand returns a new exec.Cmd configured with
|
|
|
|
// `tailscaled be-child ssh` as the entrypoint.
|
2022-03-13 20:01:59 +00:00
|
|
|
//
|
|
|
|
// If ss.srv.tailscaledPath is empty, this method is equivalent to
|
|
|
|
// exec.CommandContext.
|
2022-12-14 22:20:50 +00:00
|
|
|
//
|
|
|
|
// The returned Cmd.Env is guaranteed to be nil; the caller populates it.
|
|
|
|
func (ss *sshSession) newIncubatorCommand() (cmd *exec.Cmd) {
|
|
|
|
defer func() {
|
|
|
|
if cmd.Env != nil {
|
|
|
|
panic("internal error")
|
|
|
|
}
|
|
|
|
}()
|
2022-04-21 17:11:16 +00:00
|
|
|
var (
|
2022-05-09 23:08:33 +00:00
|
|
|
name string
|
|
|
|
args []string
|
|
|
|
isSFTP bool
|
|
|
|
isShell bool
|
2022-04-21 17:11:16 +00:00
|
|
|
)
|
|
|
|
switch ss.Subsystem() {
|
|
|
|
case "sftp":
|
|
|
|
isSFTP = true
|
|
|
|
case "":
|
2023-02-18 22:53:19 +00:00
|
|
|
name = loginShell(ss.conn.localUser)
|
2022-04-21 17:11:16 +00:00
|
|
|
if rawCmd := ss.RawCommand(); rawCmd != "" {
|
|
|
|
args = append(args, "-c", rawCmd)
|
|
|
|
} else {
|
2022-05-09 23:08:33 +00:00
|
|
|
isShell = true
|
2022-04-21 17:11:16 +00:00
|
|
|
args = append(args, "-l") // login shell
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unexpected subsystem: %v", ss.Subsystem()))
|
|
|
|
}
|
|
|
|
|
2022-04-21 00:36:19 +00:00
|
|
|
if ss.conn.srv.tailscaledPath == "" {
|
2022-04-21 17:11:16 +00:00
|
|
|
// TODO(maisem): this doesn't work with sftp
|
|
|
|
return exec.CommandContext(ss.ctx, name, args...)
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-04-21 00:36:19 +00:00
|
|
|
lu := ss.conn.localUser
|
|
|
|
ci := ss.conn.info
|
2022-07-21 15:46:55 +00:00
|
|
|
gids := strings.Join(ss.conn.userGroupIDs, ",")
|
2022-03-09 05:35:55 +00:00
|
|
|
remoteUser := ci.uprof.LoginName
|
2023-03-13 06:52:17 +00:00
|
|
|
if ci.node.IsTagged() {
|
2022-03-09 05:35:55 +00:00
|
|
|
remoteUser = strings.Join(ci.node.Tags, ",")
|
|
|
|
}
|
|
|
|
|
|
|
|
incubatorArgs := []string{
|
|
|
|
"be-child",
|
|
|
|
"ssh",
|
|
|
|
"--uid=" + lu.Uid,
|
2022-04-21 21:44:39 +00:00
|
|
|
"--gid=" + lu.Gid,
|
2022-07-21 15:46:55 +00:00
|
|
|
"--groups=" + gids,
|
2022-03-09 06:11:31 +00:00
|
|
|
"--local-user=" + lu.Username,
|
2022-03-09 05:35:55 +00:00
|
|
|
"--remote-user=" + remoteUser,
|
2022-07-25 03:08:42 +00:00
|
|
|
"--remote-ip=" + ci.src.Addr().String(),
|
2022-03-10 23:55:06 +00:00
|
|
|
"--has-tty=false", // updated in-place by startWithPTY
|
|
|
|
"--tty-name=", // updated in-place by startWithPTY
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-03-10 23:55:06 +00:00
|
|
|
|
2022-04-21 17:11:16 +00:00
|
|
|
if isSFTP {
|
|
|
|
incubatorArgs = append(incubatorArgs, "--sftp")
|
|
|
|
} else {
|
2022-05-09 23:08:33 +00:00
|
|
|
if isShell {
|
|
|
|
incubatorArgs = append(incubatorArgs, "--shell")
|
2023-02-18 22:49:21 +00:00
|
|
|
}
|
|
|
|
if isShell || runtime.GOOS == "darwin" {
|
|
|
|
// Only the macOS version of the login command supports executing a
|
|
|
|
// command, all other versions only support launching a shell
|
|
|
|
// without taking any arguments.
|
2022-05-09 23:08:33 +00:00
|
|
|
if lp, err := exec.LookPath("login"); err == nil {
|
|
|
|
incubatorArgs = append(incubatorArgs, "--login-cmd="+lp)
|
|
|
|
}
|
|
|
|
}
|
2022-04-21 17:11:16 +00:00
|
|
|
incubatorArgs = append(incubatorArgs, "--cmd="+name)
|
|
|
|
if len(args) > 0 {
|
|
|
|
incubatorArgs = append(incubatorArgs, "--")
|
|
|
|
incubatorArgs = append(incubatorArgs, args...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return exec.CommandContext(ss.ctx, ss.conn.srv.tailscaledPath, incubatorArgs...)
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const debugIncubator = false
|
|
|
|
|
2022-04-21 17:11:16 +00:00
|
|
|
type stdRWC struct{}
|
|
|
|
|
|
|
|
func (stdRWC) Read(p []byte) (n int, err error) {
|
|
|
|
return os.Stdin.Read(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (stdRWC) Write(b []byte) (n int, err error) {
|
|
|
|
return os.Stdout.Write(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (stdRWC) Close() error {
|
|
|
|
os.Exit(0)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-05-07 00:11:21 +00:00
|
|
|
type incubatorArgs struct {
|
2023-03-21 16:26:58 +00:00
|
|
|
uid int
|
2022-05-07 00:11:21 +00:00
|
|
|
gid int
|
|
|
|
groups string
|
|
|
|
localUser string
|
|
|
|
remoteUser string
|
|
|
|
remoteIP string
|
|
|
|
ttyName string
|
|
|
|
hasTTY bool
|
|
|
|
cmdName string
|
|
|
|
isSFTP bool
|
2022-05-09 23:08:33 +00:00
|
|
|
isShell bool
|
2022-05-07 00:11:21 +00:00
|
|
|
loginCmdPath string
|
|
|
|
cmdArgs []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseIncubatorArgs(args []string) (a incubatorArgs) {
|
|
|
|
flags := flag.NewFlagSet("", flag.ExitOnError)
|
2023-03-21 16:26:58 +00:00
|
|
|
flags.IntVar(&a.uid, "uid", 0, "the uid of local-user")
|
2022-05-07 00:11:21 +00:00
|
|
|
flags.IntVar(&a.gid, "gid", 0, "the gid of local-user")
|
|
|
|
flags.StringVar(&a.groups, "groups", "", "comma-separated list of gids of local-user")
|
|
|
|
flags.StringVar(&a.localUser, "local-user", "", "the user to run as")
|
|
|
|
flags.StringVar(&a.remoteUser, "remote-user", "", "the remote user/tags")
|
|
|
|
flags.StringVar(&a.remoteIP, "remote-ip", "", "the remote Tailscale IP")
|
|
|
|
flags.StringVar(&a.ttyName, "tty-name", "", "the tty name (pts/3)")
|
|
|
|
flags.BoolVar(&a.hasTTY, "has-tty", false, "is the output attached to a tty")
|
|
|
|
flags.StringVar(&a.cmdName, "cmd", "", "the cmd to launch (ignored in sftp mode)")
|
2022-05-09 23:08:33 +00:00
|
|
|
flags.BoolVar(&a.isShell, "shell", false, "is launching a shell (with no cmds)")
|
2022-05-07 00:11:21 +00:00
|
|
|
flags.BoolVar(&a.isSFTP, "sftp", false, "run sftp server (cmd is ignored)")
|
2022-05-09 23:08:33 +00:00
|
|
|
flags.StringVar(&a.loginCmdPath, "login-cmd", "", "the path to `login` cmd")
|
2022-05-07 00:11:21 +00:00
|
|
|
flags.Parse(args)
|
|
|
|
a.cmdArgs = flags.Args()
|
|
|
|
return a
|
|
|
|
}
|
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
// beIncubator is the entrypoint to the `tailscaled be-child ssh` subcommand.
|
|
|
|
// It is responsible for informing the system of a new login session for the user.
|
|
|
|
// This is sometimes necessary for mounting home directories and decrypting file
|
|
|
|
// systems.
|
|
|
|
//
|
2022-04-21 21:52:05 +00:00
|
|
|
// Tailscaled launches the incubator as the same user as it was
|
|
|
|
// launched as. The incubator then registers a new session with the
|
|
|
|
// OS, sets its UID and groups to the specified `--uid`, `--gid` and
|
|
|
|
// `--groups` and then launches the requested `--cmd`.
|
2022-03-09 05:35:55 +00:00
|
|
|
func beIncubator(args []string) error {
|
2022-05-07 00:11:21 +00:00
|
|
|
ia := parseIncubatorArgs(args)
|
2022-05-09 23:08:33 +00:00
|
|
|
if ia.isSFTP && ia.isShell {
|
|
|
|
return fmt.Errorf("--sftp and --shell are mutually exclusive")
|
|
|
|
}
|
2022-03-10 23:55:06 +00:00
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
logf := logger.Discard
|
|
|
|
if debugIncubator {
|
|
|
|
// We don't own stdout or stderr, so the only place we can log is syslog.
|
|
|
|
if sl, err := syslog.New(syslog.LOG_INFO|syslog.LOG_DAEMON, "tailscaled-ssh"); err == nil {
|
|
|
|
logf = log.New(sl, "", 0).Printf
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-21 16:26:58 +00:00
|
|
|
euid := os.Geteuid()
|
2022-05-09 23:08:33 +00:00
|
|
|
runningAsRoot := euid == 0
|
2023-02-18 22:49:21 +00:00
|
|
|
if runningAsRoot && ia.loginCmdPath != "" {
|
|
|
|
// Check if we can exec into the login command instead of trying to
|
|
|
|
// incubate ourselves.
|
|
|
|
if la := ia.loginArgs(); la != nil {
|
|
|
|
return unix.Exec(ia.loginCmdPath, la, os.Environ())
|
|
|
|
}
|
2022-05-09 23:08:33 +00:00
|
|
|
}
|
2022-05-07 00:11:21 +00:00
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
// Inform the system that we are about to log someone in.
|
|
|
|
// We can only do this if we are running as root.
|
2022-03-11 20:34:36 +00:00
|
|
|
// This is best effort to still allow running on machines where
|
2022-04-21 21:52:05 +00:00
|
|
|
// we don't support starting sessions, e.g. darwin.
|
2022-05-07 00:11:21 +00:00
|
|
|
sessionCloser, err := maybeStartLoginSession(logf, ia)
|
2022-03-09 05:35:55 +00:00
|
|
|
if err == nil && sessionCloser != nil {
|
|
|
|
defer sessionCloser()
|
|
|
|
}
|
ssh/tailssh: fix privilege dropping on FreeBSD; add tests
On FreeBSD and Darwin, changing a process's supplementary groups with
setgroups(2) will also change the egid of the process, setting it to the
first entry in the provided list. This is distinct from the behaviour on
other platforms (and possibly a violation of the POSIX standard).
Because of this, on FreeBSD with no TTY, our incubator code would
previously not change the process's gid, because it would read the
newly-changed egid, compare it against the expected egid, and since they
matched, not change the gid. Because we didn't use the 'login' program
on FreeBSD without a TTY, this would propagate to a child process.
This could be observed by running "id -p" in two contexts. The expected
output, and the output returned when running from a SSH shell, is:
andrew@freebsd:~ $ id -p
uid andrew
groups andrew
However, when run via "ssh andrew@freebsd id -p", the output would be:
$ ssh andrew@freebsd id -p
login root
uid andrew
rgid wheel
groups andrew
(this could also be observed via "id -g -r" to print just the gid)
We fix this by pulling the details of privilege dropping out into their
own function and prepending the expected gid to the start of the list on
Darwin and FreeBSD.
Finally, we add some tests that run a child process, drop privileges,
and assert that the final UID/GID/additional groups are what we expect.
More information can be found in the following article:
https://www.usenix.org/system/files/login/articles/325-tsafrir.pdf
Updates #7616
Alternative to #7609
Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: I0e6513c31b121108b50fe561c89e5816d84a45b9
2023-03-20 17:37:28 +00:00
|
|
|
|
2022-04-21 21:44:39 +00:00
|
|
|
var groupIDs []int
|
2022-05-07 00:11:21 +00:00
|
|
|
for _, g := range strings.Split(ia.groups, ",") {
|
2022-04-21 21:44:39 +00:00
|
|
|
gid, err := strconv.ParseInt(g, 10, 32)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
groupIDs = append(groupIDs, int(gid))
|
|
|
|
}
|
2022-06-26 03:41:15 +00:00
|
|
|
|
2023-03-21 16:26:58 +00:00
|
|
|
if err := dropPrivileges(logf, ia.uid, ia.gid, groupIDs); err != nil {
|
2022-04-21 21:44:39 +00:00
|
|
|
return err
|
|
|
|
}
|
ssh/tailssh: fix privilege dropping on FreeBSD; add tests
On FreeBSD and Darwin, changing a process's supplementary groups with
setgroups(2) will also change the egid of the process, setting it to the
first entry in the provided list. This is distinct from the behaviour on
other platforms (and possibly a violation of the POSIX standard).
Because of this, on FreeBSD with no TTY, our incubator code would
previously not change the process's gid, because it would read the
newly-changed egid, compare it against the expected egid, and since they
matched, not change the gid. Because we didn't use the 'login' program
on FreeBSD without a TTY, this would propagate to a child process.
This could be observed by running "id -p" in two contexts. The expected
output, and the output returned when running from a SSH shell, is:
andrew@freebsd:~ $ id -p
uid andrew
groups andrew
However, when run via "ssh andrew@freebsd id -p", the output would be:
$ ssh andrew@freebsd id -p
login root
uid andrew
rgid wheel
groups andrew
(this could also be observed via "id -g -r" to print just the gid)
We fix this by pulling the details of privilege dropping out into their
own function and prepending the expected gid to the start of the list on
Darwin and FreeBSD.
Finally, we add some tests that run a child process, drop privileges,
and assert that the final UID/GID/additional groups are what we expect.
More information can be found in the following article:
https://www.usenix.org/system/files/login/articles/325-tsafrir.pdf
Updates #7616
Alternative to #7609
Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: I0e6513c31b121108b50fe561c89e5816d84a45b9
2023-03-20 17:37:28 +00:00
|
|
|
|
2022-05-07 00:11:21 +00:00
|
|
|
if ia.isSFTP {
|
2022-04-21 17:11:16 +00:00
|
|
|
logf("handling sftp")
|
|
|
|
|
|
|
|
server, err := sftp.NewServer(stdRWC{})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return server.Serve()
|
|
|
|
}
|
2022-03-09 05:35:55 +00:00
|
|
|
|
2022-05-07 00:11:21 +00:00
|
|
|
cmd := exec.Command(ia.cmdName, ia.cmdArgs...)
|
2022-03-09 05:35:55 +00:00
|
|
|
cmd.Stdin = os.Stdin
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
cmd.Env = os.Environ()
|
|
|
|
|
2022-05-07 00:11:21 +00:00
|
|
|
if ia.hasTTY {
|
2022-03-09 05:35:55 +00:00
|
|
|
// If we were launched with a tty then we should
|
|
|
|
// mark that as the ctty of the child. However,
|
|
|
|
// as the ctty is being passed from the parent
|
|
|
|
// we set the child to foreground instead which
|
|
|
|
// also passes the ctty.
|
|
|
|
// However, we can not do this if never had a tty to
|
|
|
|
// begin with.
|
|
|
|
cmd.SysProcAttr = &syscall.SysProcAttr{
|
|
|
|
Foreground: true,
|
|
|
|
}
|
|
|
|
}
|
2022-12-23 20:36:31 +00:00
|
|
|
err = cmd.Run()
|
|
|
|
if ee, ok := err.(*exec.ExitError); ok {
|
|
|
|
ps := ee.ProcessState
|
|
|
|
code := ps.ExitCode()
|
|
|
|
if code < 0 {
|
|
|
|
// TODO(bradfitz): do we need to also check the syscall.WaitStatus
|
|
|
|
// and make our process look like it also died by signal/same signal
|
|
|
|
// as our child process? For now we just do the exit code.
|
|
|
|
fmt.Fprintf(os.Stderr, "[tailscale-ssh: process died: %v]\n", ps.String())
|
|
|
|
code = 1 // for now. so we don't exit with negative
|
|
|
|
}
|
|
|
|
os.Exit(code)
|
|
|
|
}
|
|
|
|
return err
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
|
ssh/tailssh: fix privilege dropping on FreeBSD; add tests
On FreeBSD and Darwin, changing a process's supplementary groups with
setgroups(2) will also change the egid of the process, setting it to the
first entry in the provided list. This is distinct from the behaviour on
other platforms (and possibly a violation of the POSIX standard).
Because of this, on FreeBSD with no TTY, our incubator code would
previously not change the process's gid, because it would read the
newly-changed egid, compare it against the expected egid, and since they
matched, not change the gid. Because we didn't use the 'login' program
on FreeBSD without a TTY, this would propagate to a child process.
This could be observed by running "id -p" in two contexts. The expected
output, and the output returned when running from a SSH shell, is:
andrew@freebsd:~ $ id -p
uid andrew
groups andrew
However, when run via "ssh andrew@freebsd id -p", the output would be:
$ ssh andrew@freebsd id -p
login root
uid andrew
rgid wheel
groups andrew
(this could also be observed via "id -g -r" to print just the gid)
We fix this by pulling the details of privilege dropping out into their
own function and prepending the expected gid to the start of the list on
Darwin and FreeBSD.
Finally, we add some tests that run a child process, drop privileges,
and assert that the final UID/GID/additional groups are what we expect.
More information can be found in the following article:
https://www.usenix.org/system/files/login/articles/325-tsafrir.pdf
Updates #7616
Alternative to #7609
Signed-off-by: Andrew Dunham <andrew@du.nham.ca>
Change-Id: I0e6513c31b121108b50fe561c89e5816d84a45b9
2023-03-20 17:37:28 +00:00
|
|
|
// TODO(andrew-d): verify that this works in more configurations before
|
|
|
|
// enabling by default.
|
|
|
|
const assertDropPrivileges = false
|
|
|
|
|
|
|
|
// dropPrivileges contains all the logic for dropping privileges to a different
|
|
|
|
// UID, GID, and set of supplementary groups. This function is
|
|
|
|
// security-sensitive and ordering-dependent; please be very cautious if/when
|
|
|
|
// refactoring.
|
|
|
|
//
|
|
|
|
// WARNING: if you change this function, you *MUST* run the TestDropPrivileges
|
|
|
|
// test in this package as root on at least Linux, FreeBSD and Darwin. This can
|
|
|
|
// be done by running:
|
|
|
|
//
|
|
|
|
// go test -c ./ssh/tailssh/ && sudo ./tailssh.test -test.v -test.run TestDropPrivileges
|
|
|
|
func dropPrivileges(logf logger.Logf, wantUid, wantGid int, supplementaryGroups []int) error {
|
|
|
|
fatalf := func(format string, args ...any) {
|
|
|
|
logf(format, args...)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
|
|
|
euid := os.Geteuid()
|
|
|
|
egid := os.Getegid()
|
|
|
|
|
|
|
|
if runtime.GOOS == "darwin" || runtime.GOOS == "freebsd" {
|
|
|
|
// On FreeBSD and Darwin, the first entry returned from the
|
|
|
|
// getgroups(2) syscall is the egid, and changing it with
|
|
|
|
// setgroups(2) changes the egid of the process. This is
|
|
|
|
// technically a violation of the POSIX standard; see the
|
|
|
|
// following article for more detail:
|
|
|
|
// https://www.usenix.org/system/files/login/articles/325-tsafrir.pdf
|
|
|
|
//
|
|
|
|
// In this case, we add an entry at the beginning of the
|
|
|
|
// groupIDs list containing the expected gid if it's not
|
|
|
|
// already there, which modifies the egid and additional groups
|
|
|
|
// as one unit.
|
|
|
|
if len(supplementaryGroups) == 0 || supplementaryGroups[0] != wantGid {
|
|
|
|
supplementaryGroups = append([]int{wantGid}, supplementaryGroups...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := setGroups(supplementaryGroups); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if egid != wantGid {
|
|
|
|
// On FreeBSD and Darwin, we may have already called the
|
|
|
|
// equivalent of setegid(wantGid) via the call to setGroups,
|
|
|
|
// above. However, per the manpage, setgid(getegid()) is an
|
|
|
|
// allowed operation regardless of privilege level.
|
|
|
|
//
|
|
|
|
// FreeBSD:
|
|
|
|
// The setgid() system call is permitted if the specified ID
|
|
|
|
// is equal to the real group ID or the effective group ID
|
|
|
|
// of the process, or if the effective user ID is that of
|
|
|
|
// the super user.
|
|
|
|
//
|
|
|
|
// Darwin:
|
|
|
|
// The setgid() function is permitted if the effective
|
|
|
|
// user ID is that of the super user, or if the specified
|
|
|
|
// group ID is the same as the effective group ID. If
|
|
|
|
// not, but the specified group ID is the same as the real
|
|
|
|
// group ID, setgid() will set the effective group ID to
|
|
|
|
// the real group ID.
|
|
|
|
if err := syscall.Setgid(wantGid); err != nil {
|
|
|
|
fatalf("Setgid(%d): %v", wantGid, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if euid != wantUid {
|
|
|
|
// Switch users if required before starting the desired process.
|
|
|
|
if err := syscall.Setuid(wantUid); err != nil {
|
|
|
|
fatalf("Setuid(%d): %v", wantUid, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we changed either the UID or GID, defensively assert that we
|
|
|
|
// cannot reset the it back to our original values, and that the
|
|
|
|
// current egid/euid are the expected values after we change
|
|
|
|
// everything; if not, we exit the process.
|
|
|
|
if assertDropPrivileges {
|
|
|
|
if egid != wantGid {
|
|
|
|
if err := syscall.Setegid(egid); err == nil {
|
|
|
|
fatalf("unexpectedly able to set egid back to %d", egid)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if euid != wantUid {
|
|
|
|
if err := syscall.Seteuid(euid); err == nil {
|
|
|
|
fatalf("unexpectedly able to set euid back to %d", euid)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if got := os.Getegid(); got != wantGid {
|
|
|
|
fatalf("got egid=%d, want %d", got, wantGid)
|
|
|
|
}
|
|
|
|
if got := os.Geteuid(); got != wantUid {
|
|
|
|
fatalf("got euid=%d, want %d", got, wantUid)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(andrew-d): assert that our supplementary groups are correct
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
// launchProcess launches an incubator process for the provided session.
|
|
|
|
// It is responsible for configuring the process execution environment.
|
|
|
|
// The caller can wait for the process to exit by calling cmd.Wait().
|
2022-03-13 20:01:59 +00:00
|
|
|
//
|
|
|
|
// It sets ss.cmd, stdin, stdout, and stderr.
|
2022-04-21 17:11:16 +00:00
|
|
|
func (ss *sshSession) launchProcess() error {
|
|
|
|
ss.cmd = ss.newIncubatorCommand()
|
2022-03-09 05:35:55 +00:00
|
|
|
|
2022-04-21 17:11:16 +00:00
|
|
|
cmd := ss.cmd
|
2022-11-01 11:15:16 +00:00
|
|
|
homeDir := ss.conn.localUser.HomeDir
|
|
|
|
if _, err := os.Stat(homeDir); err == nil {
|
|
|
|
cmd.Dir = homeDir
|
|
|
|
} else if os.IsNotExist(err) {
|
|
|
|
// If the home directory doesn't exist, we can't chdir to it.
|
|
|
|
// Instead, we'll chdir to the root directory.
|
|
|
|
cmd.Dir = "/"
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
2022-12-14 22:20:50 +00:00
|
|
|
cmd.Env = envForUser(ss.conn.localUser)
|
2022-04-21 21:40:32 +00:00
|
|
|
for _, kv := range ss.Environ() {
|
|
|
|
if acceptEnvPair(kv) {
|
|
|
|
cmd.Env = append(cmd.Env, kv)
|
|
|
|
}
|
|
|
|
}
|
2022-04-21 17:11:16 +00:00
|
|
|
|
|
|
|
ci := ss.conn.info
|
2022-03-09 05:35:55 +00:00
|
|
|
cmd.Env = append(cmd.Env,
|
2022-07-25 03:08:42 +00:00
|
|
|
fmt.Sprintf("SSH_CLIENT=%s %d %d", ci.src.Addr(), ci.src.Port(), ci.dst.Port()),
|
|
|
|
fmt.Sprintf("SSH_CONNECTION=%s %d %s %d", ci.src.Addr(), ci.src.Port(), ci.dst.Addr(), ci.dst.Port()),
|
2022-03-09 05:35:55 +00:00
|
|
|
)
|
|
|
|
|
2022-03-14 20:26:06 +00:00
|
|
|
if ss.agentListener != nil {
|
|
|
|
cmd.Env = append(cmd.Env, fmt.Sprintf("SSH_AUTH_SOCK=%s", ss.agentListener.Addr()))
|
|
|
|
}
|
|
|
|
|
2022-03-13 20:01:59 +00:00
|
|
|
ptyReq, winCh, isPty := ss.Pty()
|
2022-03-09 05:35:55 +00:00
|
|
|
if !isPty {
|
2022-03-13 20:01:59 +00:00
|
|
|
ss.logf("starting non-pty command: %+v", cmd.Args)
|
|
|
|
return ss.startWithStdPipes()
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-03-13 20:01:59 +00:00
|
|
|
ss.ptyReq = &ptyReq
|
|
|
|
pty, err := ss.startWithPTY()
|
2022-03-09 05:35:55 +00:00
|
|
|
if err != nil {
|
2022-03-13 20:01:59 +00:00
|
|
|
return err
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-07-15 15:40:20 +00:00
|
|
|
|
|
|
|
// We need to be able to close stdin and stdout separately later so make a
|
|
|
|
// dup.
|
|
|
|
ptyDup, err := syscall.Dup(int(pty.Fd()))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
go resizeWindow(ptyDup /* arbitrary fd */, winCh)
|
|
|
|
|
2022-03-13 20:01:59 +00:00
|
|
|
ss.stdin = pty
|
2022-07-15 15:40:20 +00:00
|
|
|
ss.stdout = os.NewFile(uintptr(ptyDup), pty.Name())
|
|
|
|
ss.stderr = nil // not available for pty
|
|
|
|
|
2022-03-13 20:01:59 +00:00
|
|
|
return nil
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
|
2022-07-15 15:40:20 +00:00
|
|
|
func resizeWindow(fd int, winCh <-chan ssh.Window) {
|
2022-03-09 05:35:55 +00:00
|
|
|
for win := range winCh {
|
2022-07-15 15:40:20 +00:00
|
|
|
unix.IoctlSetWinsize(fd, syscall.TIOCSWINSZ, &unix.Winsize{
|
2022-03-09 05:35:55 +00:00
|
|
|
Row: uint16(win.Height),
|
|
|
|
Col: uint16(win.Width),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-13 01:40:40 +00:00
|
|
|
// opcodeShortName is a mapping of SSH opcode
|
2022-04-21 21:52:05 +00:00
|
|
|
// to mnemonic names expected by the termios package.
|
2022-03-13 01:40:40 +00:00
|
|
|
// These are meant to be platform independent.
|
|
|
|
var opcodeShortName = map[uint8]string{
|
|
|
|
gossh.VINTR: "intr",
|
|
|
|
gossh.VQUIT: "quit",
|
|
|
|
gossh.VERASE: "erase",
|
|
|
|
gossh.VKILL: "kill",
|
|
|
|
gossh.VEOF: "eof",
|
|
|
|
gossh.VEOL: "eol",
|
|
|
|
gossh.VEOL2: "eol2",
|
|
|
|
gossh.VSTART: "start",
|
|
|
|
gossh.VSTOP: "stop",
|
|
|
|
gossh.VSUSP: "susp",
|
|
|
|
gossh.VDSUSP: "dsusp",
|
|
|
|
gossh.VREPRINT: "rprnt",
|
|
|
|
gossh.VWERASE: "werase",
|
|
|
|
gossh.VLNEXT: "lnext",
|
|
|
|
gossh.VFLUSH: "flush",
|
|
|
|
gossh.VSWTCH: "swtch",
|
|
|
|
gossh.VSTATUS: "status",
|
|
|
|
gossh.VDISCARD: "discard",
|
|
|
|
gossh.IGNPAR: "ignpar",
|
|
|
|
gossh.PARMRK: "parmrk",
|
|
|
|
gossh.INPCK: "inpck",
|
|
|
|
gossh.ISTRIP: "istrip",
|
|
|
|
gossh.INLCR: "inlcr",
|
|
|
|
gossh.IGNCR: "igncr",
|
|
|
|
gossh.ICRNL: "icrnl",
|
|
|
|
gossh.IUCLC: "iuclc",
|
|
|
|
gossh.IXON: "ixon",
|
|
|
|
gossh.IXANY: "ixany",
|
|
|
|
gossh.IXOFF: "ixoff",
|
|
|
|
gossh.IMAXBEL: "imaxbel",
|
|
|
|
gossh.IUTF8: "iutf8",
|
|
|
|
gossh.ISIG: "isig",
|
|
|
|
gossh.ICANON: "icanon",
|
|
|
|
gossh.XCASE: "xcase",
|
|
|
|
gossh.ECHO: "echo",
|
|
|
|
gossh.ECHOE: "echoe",
|
|
|
|
gossh.ECHOK: "echok",
|
|
|
|
gossh.ECHONL: "echonl",
|
|
|
|
gossh.NOFLSH: "noflsh",
|
|
|
|
gossh.TOSTOP: "tostop",
|
|
|
|
gossh.IEXTEN: "iexten",
|
|
|
|
gossh.ECHOCTL: "echoctl",
|
|
|
|
gossh.ECHOKE: "echoke",
|
|
|
|
gossh.PENDIN: "pendin",
|
|
|
|
gossh.OPOST: "opost",
|
|
|
|
gossh.OLCUC: "olcuc",
|
|
|
|
gossh.ONLCR: "onlcr",
|
|
|
|
gossh.OCRNL: "ocrnl",
|
|
|
|
gossh.ONOCR: "onocr",
|
|
|
|
gossh.ONLRET: "onlret",
|
|
|
|
gossh.CS7: "cs7",
|
|
|
|
gossh.CS8: "cs8",
|
|
|
|
gossh.PARENB: "parenb",
|
|
|
|
gossh.PARODD: "parodd",
|
|
|
|
gossh.TTY_OP_ISPEED: "tty_op_ispeed",
|
|
|
|
gossh.TTY_OP_OSPEED: "tty_op_ospeed",
|
|
|
|
}
|
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
// startWithPTY starts cmd with a psuedo-terminal attached to Stdin, Stdout and Stderr.
|
2022-03-13 20:01:59 +00:00
|
|
|
func (ss *sshSession) startWithPTY() (ptyFile *os.File, err error) {
|
|
|
|
ptyReq := ss.ptyReq
|
|
|
|
cmd := ss.cmd
|
|
|
|
if cmd == nil {
|
|
|
|
return nil, errors.New("nil ss.cmd")
|
|
|
|
}
|
|
|
|
if ptyReq == nil {
|
|
|
|
return nil, errors.New("nil ss.ptyReq")
|
|
|
|
}
|
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
var tty *os.File
|
|
|
|
ptyFile, tty, err = pty.Open()
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("pty.Open: %w", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
ptyFile.Close()
|
|
|
|
tty.Close()
|
|
|
|
}
|
|
|
|
}()
|
2022-03-13 01:40:40 +00:00
|
|
|
ptyRawConn, err := tty.SyscallConn()
|
2022-03-11 19:19:55 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("SyscallConn: %w", err)
|
|
|
|
}
|
|
|
|
var ctlErr error
|
|
|
|
if err := ptyRawConn.Control(func(fd uintptr) {
|
|
|
|
// Load existing PTY settings to modify them & save them back.
|
|
|
|
tios, err := termios.GTTY(int(fd))
|
|
|
|
if err != nil {
|
|
|
|
ctlErr = fmt.Errorf("GTTY: %w", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the rows & cols to those advertised from the ptyReq frame
|
|
|
|
// received over SSH.
|
|
|
|
tios.Row = int(ptyReq.Window.Height)
|
|
|
|
tios.Col = int(ptyReq.Window.Width)
|
|
|
|
|
2022-03-13 01:40:40 +00:00
|
|
|
for c, v := range ptyReq.Modes {
|
|
|
|
if c == gossh.TTY_OP_ISPEED {
|
|
|
|
tios.Ispeed = int(v)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if c == gossh.TTY_OP_OSPEED {
|
|
|
|
tios.Ospeed = int(v)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
k, ok := opcodeShortName[c]
|
|
|
|
if !ok {
|
2022-04-01 19:57:12 +00:00
|
|
|
ss.vlogf("unknown opcode: %d", c)
|
2022-03-13 01:40:40 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, ok := tios.CC[k]; ok {
|
|
|
|
tios.CC[k] = uint8(v)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, ok := tios.Opts[k]; ok {
|
|
|
|
tios.Opts[k] = v > 0
|
|
|
|
continue
|
|
|
|
}
|
2022-04-01 19:57:12 +00:00
|
|
|
ss.vlogf("unsupported opcode: %v(%d)=%v", k, c, v)
|
2022-03-13 01:40:40 +00:00
|
|
|
}
|
2022-03-11 19:19:55 +00:00
|
|
|
|
|
|
|
// Save PTY settings.
|
|
|
|
if _, err := tios.STTY(int(fd)); err != nil {
|
|
|
|
ctlErr = fmt.Errorf("STTY: %w", err)
|
|
|
|
return
|
|
|
|
}
|
2022-03-09 05:35:55 +00:00
|
|
|
}); err != nil {
|
2022-03-11 19:19:55 +00:00
|
|
|
return nil, fmt.Errorf("ptyRawConn.Control: %w", err)
|
|
|
|
}
|
|
|
|
if ctlErr != nil {
|
|
|
|
return nil, fmt.Errorf("ptyRawConn.Control func: %w", ctlErr)
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
cmd.SysProcAttr = &syscall.SysProcAttr{
|
|
|
|
Setctty: true,
|
|
|
|
Setsid: true,
|
|
|
|
}
|
2022-03-10 23:55:06 +00:00
|
|
|
updateStringInSlice(cmd.Args, "--has-tty=false", "--has-tty=true")
|
2022-03-09 05:35:55 +00:00
|
|
|
if ptyName, err := ptyName(ptyFile); err == nil {
|
2022-03-10 23:55:06 +00:00
|
|
|
updateStringInSlice(cmd.Args, "--tty-name=", "--tty-name="+ptyName)
|
2022-03-11 20:34:36 +00:00
|
|
|
fullPath := filepath.Join("/dev", ptyName)
|
|
|
|
cmd.Env = append(cmd.Env, fmt.Sprintf("SSH_TTY=%s", fullPath))
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-03-10 23:55:06 +00:00
|
|
|
|
2022-03-09 05:35:55 +00:00
|
|
|
if ptyReq.Term != "" {
|
|
|
|
cmd.Env = append(cmd.Env, fmt.Sprintf("TERM=%s", ptyReq.Term))
|
|
|
|
}
|
|
|
|
cmd.Stdin = tty
|
|
|
|
cmd.Stdout = tty
|
|
|
|
cmd.Stderr = tty
|
|
|
|
|
2022-05-07 00:11:21 +00:00
|
|
|
ss.logf("starting pty command: %+v", cmd.Args)
|
2022-03-09 05:35:55 +00:00
|
|
|
if err = cmd.Start(); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return ptyFile, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// startWithStdPipes starts cmd with os.Pipe for Stdin, Stdout and Stderr.
|
2022-03-13 20:01:59 +00:00
|
|
|
func (ss *sshSession) startWithStdPipes() (err error) {
|
|
|
|
var stdin io.WriteCloser
|
|
|
|
var stdout, stderr io.ReadCloser
|
2022-03-09 05:35:55 +00:00
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
for _, c := range []io.Closer{stdin, stdout, stderr} {
|
|
|
|
if c != nil {
|
|
|
|
c.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2022-03-13 20:01:59 +00:00
|
|
|
cmd := ss.cmd
|
|
|
|
if cmd == nil {
|
|
|
|
return errors.New("nil cmd")
|
|
|
|
}
|
2022-03-09 05:35:55 +00:00
|
|
|
stdin, err = cmd.StdinPipe()
|
|
|
|
if err != nil {
|
2022-03-13 20:01:59 +00:00
|
|
|
return err
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
stdout, err = cmd.StdoutPipe()
|
|
|
|
if err != nil {
|
2022-03-13 20:01:59 +00:00
|
|
|
return err
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
stderr, err = cmd.StderrPipe()
|
|
|
|
if err != nil {
|
2022-03-13 20:01:59 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return err
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-03-13 20:01:59 +00:00
|
|
|
ss.stdin = stdin
|
|
|
|
ss.stdout = stdout
|
|
|
|
ss.stderr = stderr
|
|
|
|
return nil
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
|
2023-02-18 22:53:19 +00:00
|
|
|
func loginShell(u *user.User) string {
|
2022-03-09 05:35:55 +00:00
|
|
|
switch runtime.GOOS {
|
|
|
|
case "linux":
|
2023-02-18 22:53:19 +00:00
|
|
|
out, _ := exec.Command("getent", "passwd", u.Uid).Output()
|
2022-03-09 05:35:55 +00:00
|
|
|
// out is "root:x:0:0:root:/root:/bin/bash"
|
|
|
|
f := strings.SplitN(string(out), ":", 10)
|
|
|
|
if len(f) > 6 {
|
|
|
|
return strings.TrimSpace(f[6]) // shell
|
|
|
|
}
|
2023-02-18 22:53:19 +00:00
|
|
|
case "darwin":
|
|
|
|
// Note: /Users/username is key, and not the same as u.HomeDir.
|
|
|
|
out, _ := exec.Command("dscl", ".", "-read", filepath.Join("/Users", u.Username), "UserShell").Output()
|
|
|
|
// out is "UserShell: /bin/bash"
|
|
|
|
s, ok := strings.CutPrefix(string(out), "UserShell: ")
|
|
|
|
if ok {
|
|
|
|
return strings.TrimSpace(s)
|
|
|
|
}
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
if e := os.Getenv("SHELL"); e != "" {
|
|
|
|
return e
|
|
|
|
}
|
2022-04-21 21:52:05 +00:00
|
|
|
return "/bin/sh"
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func envForUser(u *user.User) []string {
|
|
|
|
return []string{
|
2023-02-18 22:53:19 +00:00
|
|
|
fmt.Sprintf("SHELL=" + loginShell(u)),
|
2022-03-09 05:35:55 +00:00
|
|
|
fmt.Sprintf("USER=" + u.Username),
|
|
|
|
fmt.Sprintf("HOME=" + u.HomeDir),
|
2022-12-14 22:20:50 +00:00
|
|
|
fmt.Sprintf("PATH=" + defaultPathForUser(u)),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-12-15 22:28:14 +00:00
|
|
|
// defaultPathTmpl specifies the default PATH template to use for new sessions.
|
|
|
|
//
|
|
|
|
// If empty, a default value is used based on the OS & distro to match OpenSSH's
|
|
|
|
// usually-hardcoded behavior. (see
|
|
|
|
// https://github.com/tailscale/tailscale/issues/5285 for background).
|
|
|
|
//
|
|
|
|
// The template may contain @{HOME} or @{PAM_USER} which expand to the user's
|
|
|
|
// home directory and username, respectively. (PAM is not used, despite the
|
|
|
|
// name)
|
|
|
|
var defaultPathTmpl = envknob.RegisterString("TAILSCALE_SSH_DEFAULT_PATH")
|
|
|
|
|
2022-12-14 22:20:50 +00:00
|
|
|
func defaultPathForUser(u *user.User) string {
|
2022-12-15 22:28:14 +00:00
|
|
|
if s := defaultPathTmpl(); s != "" {
|
|
|
|
return expandDefaultPathTmpl(s, u)
|
|
|
|
}
|
2022-12-14 22:20:50 +00:00
|
|
|
isRoot := u.Uid == "0"
|
|
|
|
switch distro.Get() {
|
|
|
|
case distro.Debian:
|
|
|
|
hi := hostinfo.New()
|
|
|
|
if hi.Distro == "ubuntu" {
|
|
|
|
// distro.Get's Debian includes Ubuntu. But see if it's actually Ubuntu.
|
|
|
|
// Ubuntu doesn't empirically seem to distinguish between root and non-root for the default.
|
|
|
|
// And it includes /snap/bin.
|
|
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin"
|
|
|
|
}
|
|
|
|
if isRoot {
|
|
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
|
|
}
|
|
|
|
return "/usr/local/bin:/usr/bin:/bin:/usr/bn/games"
|
|
|
|
case distro.NixOS:
|
|
|
|
return defaultPathForUserOnNixOS(u)
|
|
|
|
}
|
|
|
|
if isRoot {
|
|
|
|
return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
|
|
|
}
|
|
|
|
return "/usr/local/bin:/usr/bin:/bin"
|
|
|
|
}
|
|
|
|
|
|
|
|
func defaultPathForUserOnNixOS(u *user.User) string {
|
|
|
|
var path string
|
|
|
|
lineread.File("/etc/pam/environment", func(lineb []byte) error {
|
|
|
|
if v := pathFromPAMEnvLine(lineb, u); v != "" {
|
|
|
|
path = v
|
|
|
|
return io.EOF // stop iteration
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
|
|
|
|
func pathFromPAMEnvLine(line []byte, u *user.User) (path string) {
|
|
|
|
if !mem.HasPrefix(mem.B(line), mem.S("PATH")) {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
rest := strings.TrimSpace(strings.TrimPrefix(string(line), "PATH"))
|
2023-02-01 21:43:06 +00:00
|
|
|
if quoted, ok := strings.CutPrefix(rest, "DEFAULT="); ok {
|
2022-12-14 22:20:50 +00:00
|
|
|
if path, err := strconv.Unquote(quoted); err == nil {
|
2022-12-15 22:28:14 +00:00
|
|
|
return expandDefaultPathTmpl(path, u)
|
2022-12-14 22:20:50 +00:00
|
|
|
}
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-12-14 22:20:50 +00:00
|
|
|
return ""
|
2022-03-09 05:35:55 +00:00
|
|
|
}
|
2022-03-10 23:55:06 +00:00
|
|
|
|
2022-12-15 22:28:14 +00:00
|
|
|
func expandDefaultPathTmpl(t string, u *user.User) string {
|
|
|
|
p := strings.NewReplacer(
|
|
|
|
"@{HOME}", u.HomeDir,
|
|
|
|
"@{PAM_USER}", u.Username,
|
|
|
|
).Replace(t)
|
|
|
|
if strings.Contains(p, "@{") {
|
|
|
|
// If there are unknown expansions, conservatively fail closed.
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2022-03-10 23:55:06 +00:00
|
|
|
// updateStringInSlice mutates ss to change the first occurrence of a
|
|
|
|
// to b.
|
|
|
|
func updateStringInSlice(ss []string, a, b string) {
|
|
|
|
for i, s := range ss {
|
|
|
|
if s == a {
|
|
|
|
ss[i] = b
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-04-21 21:40:32 +00:00
|
|
|
|
|
|
|
// acceptEnvPair reports whether the environment variable key=value pair
|
|
|
|
// should be accepted from the client. It uses the same default as OpenSSH
|
|
|
|
// AcceptEnv.
|
|
|
|
func acceptEnvPair(kv string) bool {
|
|
|
|
k, _, ok := strings.Cut(kv, "=")
|
|
|
|
if !ok {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return k == "TERM" || k == "LANG" || strings.HasPrefix(k, "LC_")
|
|
|
|
}
|
2023-01-06 20:13:38 +00:00
|
|
|
|
|
|
|
func fileExists(path string) bool {
|
|
|
|
_, err := os.Stat(path)
|
|
|
|
return err == nil
|
|
|
|
}
|
|
|
|
|
2023-02-18 22:49:21 +00:00
|
|
|
// loginArgs returns the arguments to use to exec the login binary.
|
|
|
|
// It returns nil if the login binary should not be used.
|
|
|
|
// The login binary is only used:
|
|
|
|
// - on darwin, if the client is requesting a shell or a command.
|
|
|
|
// - on linux and BSD, if the client is requesting a shell with a TTY.
|
2023-01-06 20:13:38 +00:00
|
|
|
func (ia *incubatorArgs) loginArgs() []string {
|
2023-02-18 22:49:21 +00:00
|
|
|
if ia.isSFTP {
|
|
|
|
return nil
|
|
|
|
}
|
2023-01-06 20:13:38 +00:00
|
|
|
switch runtime.GOOS {
|
2023-02-18 22:49:21 +00:00
|
|
|
case "darwin":
|
|
|
|
args := []string{
|
|
|
|
ia.loginCmdPath,
|
|
|
|
"-f", // already authenticated
|
|
|
|
|
|
|
|
// login typically discards the previous environment, but we want to
|
|
|
|
// preserve any environment variables that we currently have.
|
|
|
|
"-p",
|
|
|
|
|
|
|
|
"-h", ia.remoteIP, // -h is "remote host"
|
|
|
|
ia.localUser,
|
|
|
|
}
|
|
|
|
if !ia.hasTTY {
|
|
|
|
args[2] = "-pq" // -q is "quiet" which suppresses the login banner
|
|
|
|
}
|
|
|
|
if ia.cmdName != "" {
|
|
|
|
args = append(args, ia.cmdName)
|
|
|
|
args = append(args, ia.cmdArgs...)
|
|
|
|
}
|
|
|
|
return args
|
2023-01-06 20:13:38 +00:00
|
|
|
case "linux":
|
2023-02-18 22:49:21 +00:00
|
|
|
if !ia.isShell || !ia.hasTTY {
|
|
|
|
// We can only use login command if a shell was requested with a TTY. If
|
|
|
|
// there is no TTY, login exits immediately, which breaks things likes
|
|
|
|
// mosh and VSCode.
|
|
|
|
return nil
|
|
|
|
}
|
2023-01-06 20:13:38 +00:00
|
|
|
if distro.Get() == distro.Arch && !fileExists("/etc/pam.d/remote") {
|
|
|
|
// See https://github.com/tailscale/tailscale/issues/4924
|
|
|
|
//
|
|
|
|
// Arch uses a different login binary that makes the -h flag set the PAM
|
|
|
|
// service to "remote". So if they don't have that configured, don't
|
|
|
|
// pass -h.
|
|
|
|
return []string{ia.loginCmdPath, "-f", ia.localUser, "-p"}
|
|
|
|
}
|
|
|
|
return []string{ia.loginCmdPath, "-f", ia.localUser, "-h", ia.remoteIP, "-p"}
|
2023-02-18 22:49:21 +00:00
|
|
|
case "freebsd", "openbsd":
|
|
|
|
if !ia.isShell || !ia.hasTTY {
|
|
|
|
// We can only use login command if a shell was requested with a TTY. If
|
|
|
|
// there is no TTY, login exits immediately, which breaks things likes
|
|
|
|
// mosh and VSCode.
|
|
|
|
return nil
|
|
|
|
}
|
2023-01-06 20:13:38 +00:00
|
|
|
return []string{ia.loginCmdPath, "-fp", "-h", ia.remoteIP, ia.localUser}
|
|
|
|
}
|
|
|
|
panic("unimplemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func setGroups(groupIDs []int) error {
|
|
|
|
if runtime.GOOS == "darwin" && len(groupIDs) > 16 {
|
|
|
|
// darwin returns "invalid argument" if more than 16 groups are passed to syscall.Setgroups
|
|
|
|
// some info can be found here:
|
|
|
|
// https://opensource.apple.com/source/samba/samba-187.8/patches/support-darwin-initgroups-syscall.auto.html
|
|
|
|
// this fix isn't great, as anyone reading this has probably just wasted hours figuring out why
|
|
|
|
// some permissions thing isn't working, due to some arbitrary group ordering, but it at least allows
|
|
|
|
// this to work for more things than it previously did.
|
|
|
|
groupIDs = groupIDs[:16]
|
|
|
|
}
|
2023-01-06 20:47:01 +00:00
|
|
|
|
|
|
|
err := syscall.Setgroups(groupIDs)
|
|
|
|
if err != nil && os.Geteuid() != 0 && groupsMatchCurrent(groupIDs) {
|
|
|
|
// If we're not root, ignore a Setgroups failure if all groups are the same.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func groupsMatchCurrent(groupIDs []int) bool {
|
|
|
|
existing, err := syscall.Getgroups()
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if len(existing) != len(groupIDs) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
groupIDs = slices.Clone(groupIDs)
|
|
|
|
sort.Ints(groupIDs)
|
|
|
|
sort.Ints(existing)
|
|
|
|
return slices.Equal(groupIDs, existing)
|
2023-01-06 20:13:38 +00:00
|
|
|
}
|