line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Test::SSH::Backend::OpenSSH; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
7
|
use strict; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
32
|
|
4
|
1
|
|
|
1
|
|
5
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
22
|
|
5
|
|
|
|
|
|
|
|
6
|
1
|
|
|
1
|
|
397
|
use IO::Socket::INET; |
|
1
|
|
|
|
|
9675
|
|
|
1
|
|
|
|
|
6
|
|
7
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
require Test::SSH::Backend::Base; |
9
|
|
|
|
|
|
|
our @ISA = qw(Test::SSH::Backend::Base); |
10
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
sub new { |
12
|
2
|
|
|
2
|
0
|
13
|
my ($class, %opts) = @_; |
13
|
2
|
|
50
|
|
|
13
|
my $override_server_config = delete $opts{override_server_config} || {}; |
14
|
2
|
|
|
|
|
17
|
my $sshd = $class->SUPER::new(%opts, auth_method => 'publickey'); |
15
|
2
|
50
|
|
|
|
11
|
unless ($sshd->{run_server}) { |
16
|
0
|
|
|
|
|
0
|
$sshd->_log("backend skipped because run_server is set to false"); |
17
|
0
|
|
|
|
|
0
|
return; |
18
|
|
|
|
|
|
|
} |
19
|
|
|
|
|
|
|
|
20
|
2
|
50
|
|
|
|
8
|
my $exe = $sshd->_sshd_executable or return; |
21
|
0
|
0
|
|
|
|
0
|
$sshd->_create_keys or return; |
22
|
0
|
|
|
|
|
0
|
my $run_dir = $sshd->_run_dir; |
23
|
0
|
|
|
|
|
0
|
my $port = $sshd->{port} = $sshd->_find_unused_port; |
24
|
1
|
|
|
1
|
|
896
|
use Tie::IxHash; # order must be preserved because Port must come before ListenAddress |
|
1
|
|
|
|
|
2087
|
|
|
1
|
|
|
|
|
818
|
|
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
tie my %Config, 'Tie::IxHash', |
27
|
|
|
|
|
|
|
( HostKey => $sshd->{host_key_path}, |
28
|
|
|
|
|
|
|
AuthorizedKeysFile => $sshd->_user_key_path_quoted . ".pub", |
29
|
|
|
|
|
|
|
AllowUsers => $sshd->{user}, # only user running the script can log |
30
|
0
|
|
|
|
|
0
|
AllowTcpForwarding => 'yes', |
31
|
|
|
|
|
|
|
GatewayPorts => 'no', # bind port forwarder listener to localhost only |
32
|
|
|
|
|
|
|
ChallengeResponseAuthentication => 'no', |
33
|
|
|
|
|
|
|
PasswordAuthentication => 'no', |
34
|
|
|
|
|
|
|
Port => $port, |
35
|
|
|
|
|
|
|
ListenAddress => "localhost:$port", |
36
|
|
|
|
|
|
|
LogLevel => 'INFO', |
37
|
|
|
|
|
|
|
PermitRootLogin => 'yes', |
38
|
|
|
|
|
|
|
PidFile => "$run_dir/sshd.pid", |
39
|
|
|
|
|
|
|
PrintLastLog => 'no', |
40
|
|
|
|
|
|
|
PrintMotd => 'no', |
41
|
|
|
|
|
|
|
Subsystem => 'sftp /usr/lib/openssh/sftp-server', |
42
|
|
|
|
|
|
|
UseDNS => 'no', |
43
|
|
|
|
|
|
|
UsePrivilegeSeparation => 'no', |
44
|
|
|
|
|
|
|
); |
45
|
0
|
|
|
|
|
0
|
while (my($k,$v) = each %$override_server_config) { |
46
|
0
|
0
|
|
|
|
0
|
if (defined $v) { |
47
|
0
|
|
|
|
|
0
|
$Config{$k} = $v; |
48
|
|
|
|
|
|
|
} else { |
49
|
0
|
|
|
|
|
0
|
delete $Config{$k}; |
50
|
|
|
|
|
|
|
} |
51
|
|
|
|
|
|
|
} |
52
|
0
|
0
|
|
|
|
0
|
$sshd->_write_config(%Config) |
53
|
|
|
|
|
|
|
or return; |
54
|
|
|
|
|
|
|
|
55
|
0
|
|
|
|
|
0
|
$sshd->_log('starting SSH server'); |
56
|
0
|
0
|
|
|
|
0
|
unless ($sshd->{server_pid} = $sshd->_run_cmd({out_name => 'server', |
57
|
|
|
|
|
|
|
async => 1}, |
58
|
|
|
|
|
|
|
$exe, |
59
|
|
|
|
|
|
|
'-D', # no daemon |
60
|
|
|
|
|
|
|
'-e', # send output to STDERR |
61
|
|
|
|
|
|
|
'-f', $sshd->{config_file})) { |
62
|
0
|
|
|
|
|
0
|
$sshd->_error("unable to start SSH server at '$exe' on port $port", $!); |
63
|
0
|
|
|
|
|
0
|
return undef; |
64
|
|
|
|
|
|
|
} |
65
|
|
|
|
|
|
|
|
66
|
0
|
|
|
|
|
0
|
$sshd->_log("SSH server listening on port $port"); |
67
|
|
|
|
|
|
|
|
68
|
0
|
|
|
|
|
0
|
$sshd->_log("trying to authenticate using keys"); |
69
|
0
|
|
|
|
|
0
|
$sshd->{auth_method} = 'publickey'; |
70
|
0
|
|
|
|
|
0
|
for my $key (@{$sshd->{user_keys}}) { |
|
0
|
|
|
|
|
0
|
|
71
|
0
|
|
|
|
|
0
|
$sshd->_log("trying user key '$key'"); |
72
|
0
|
|
|
|
|
0
|
$sshd->{key_path} = $key; |
73
|
0
|
0
|
|
|
|
0
|
if ($sshd->_test_server) { |
74
|
0
|
|
|
|
|
0
|
$sshd->_log("key '$key' can be used to connect to host"); |
75
|
0
|
|
|
|
|
0
|
return $sshd; |
76
|
|
|
|
|
|
|
} |
77
|
|
|
|
|
|
|
} |
78
|
|
|
|
|
|
|
() |
79
|
0
|
|
|
|
|
0
|
} |
80
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
sub _write_config { |
82
|
0
|
|
|
0
|
|
0
|
my $sshd = shift; |
83
|
0
|
|
|
|
|
0
|
my $fn = $sshd->{config_file} = "$sshd->{run_dir}/sshd_config"; |
84
|
0
|
0
|
|
|
|
0
|
if (open my $fn, '>', $fn) { |
85
|
0
|
|
|
|
|
0
|
while (@_) { |
86
|
0
|
|
|
|
|
0
|
my $k = shift; |
87
|
0
|
|
|
|
|
0
|
my $v = shift; |
88
|
0
|
|
|
|
|
0
|
print $fn "$k=$v\n"; |
89
|
|
|
|
|
|
|
} |
90
|
0
|
0
|
|
|
|
0
|
close $fn and return 1 |
91
|
|
|
|
|
|
|
} |
92
|
0
|
|
|
|
|
0
|
$sshd->_error("unable to create sshd configuration file at '$fn': $!"); |
93
|
|
|
|
|
|
|
() |
94
|
0
|
|
|
|
|
0
|
} |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
sub _is_server_running { |
97
|
0
|
|
|
0
|
|
0
|
my $sshd = shift; |
98
|
0
|
0
|
|
|
|
0
|
if (defined (my $pid = $sshd->{server_pid})) { |
99
|
0
|
|
|
|
|
0
|
my $rc = waitpid($pid, POSIX::WNOHANG()); |
100
|
0
|
0
|
|
|
|
0
|
$rc <= 0 and return $sshd->SUPER::_is_server_running; |
101
|
0
|
|
|
|
|
0
|
delete $sshd->{server_pid}; |
102
|
0
|
|
|
|
|
0
|
$sshd->_log("server process has terminated (rc: $?)"); |
103
|
|
|
|
|
|
|
} |
104
|
0
|
|
|
|
|
0
|
$sshd->_error("SSH server is not running"); |
105
|
|
|
|
|
|
|
return |
106
|
0
|
|
|
|
|
0
|
} |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
sub DESTROY { |
109
|
2
|
|
|
2
|
|
7
|
my $sshd = shift; |
110
|
2
|
|
|
|
|
14
|
local ($@, $!, $?, $^E); |
111
|
2
|
|
|
|
|
5
|
eval { |
112
|
2
|
50
|
|
|
|
8
|
if (defined (my $run_dir = $sshd->_run_dir)) { |
113
|
2
|
|
|
|
|
6
|
for my $signal (qw(TERM TERM TERM TERM KILL)) { |
114
|
2
|
50
|
|
|
|
90
|
open my $fh, '<', "$run_dir/sshd.pid" or last; |
115
|
0
|
|
|
|
|
0
|
my $pid = <$fh>; |
116
|
0
|
0
|
|
|
|
0
|
defined $pid or last; |
117
|
0
|
|
|
|
|
0
|
chomp $pid; |
118
|
0
|
0
|
|
|
|
0
|
$pid or last; |
119
|
0
|
|
|
|
|
0
|
$sshd->_log("sending $signal signal to server (pid: $pid)"); |
120
|
0
|
|
|
|
|
0
|
kill $signal => $pid; |
121
|
0
|
|
|
|
|
0
|
sleep 1; |
122
|
|
|
|
|
|
|
} |
123
|
|
|
|
|
|
|
} |
124
|
2
|
|
|
|
|
17
|
$sshd->SUPER::DESTROY; |
125
|
|
|
|
|
|
|
}; |
126
|
|
|
|
|
|
|
} |
127
|
|
|
|
|
|
|
|
128
|
2
|
|
|
2
|
|
14
|
sub _sshd_executable { shift->_find_executable('sshd', '-zalacain', 5) } |
129
|
|
|
|
|
|
|
|
130
|
0
|
|
|
0
|
|
|
sub _ssh_keygen_executable { shift->_find_executable('ssh-keygen') } |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
sub _create_key { |
133
|
0
|
|
|
0
|
|
|
my ($sshd, $fn) = @_; |
134
|
0
|
0
|
0
|
|
|
|
-f $fn and -f "$fn.pub" and return 1; |
135
|
0
|
|
|
|
|
|
$sshd->_log("generating key '$fn'"); |
136
|
0
|
|
|
|
|
|
my $tmpfn = join('.', $fn, $$, int(rand(9999999))); |
137
|
0
|
0
|
|
|
|
|
if ($sshd->_run_cmd( { search_binary => 1 }, |
138
|
|
|
|
|
|
|
'ssh_keygen', -t => 'rsa', -b => 1024, -f => $tmpfn, -P => '')) { |
139
|
0
|
|
|
|
|
|
unlink $fn; |
140
|
0
|
|
|
|
|
|
unlink "$fn.pub"; |
141
|
0
|
0
|
0
|
|
|
|
if (rename $tmpfn, $fn and |
142
|
|
|
|
|
|
|
rename "$tmpfn.pub", "$fn.pub") { |
143
|
0
|
|
|
|
|
|
$sshd->_log("key generated"); |
144
|
0
|
|
|
|
|
|
return 1; |
145
|
|
|
|
|
|
|
} |
146
|
|
|
|
|
|
|
} |
147
|
0
|
|
|
|
|
|
$sshd->_error("key generation failed"); |
148
|
0
|
|
|
|
|
|
return; |
149
|
|
|
|
|
|
|
} |
150
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
sub _user_key_path_quoted { |
152
|
0
|
|
|
0
|
|
|
my $sshd = shift; |
153
|
0
|
|
|
|
|
|
my $key = $sshd->{user_key_path}; |
154
|
0
|
|
|
|
|
|
$key =~ s/%/%%/g; |
155
|
0
|
|
|
|
|
|
$key; |
156
|
|
|
|
|
|
|
} |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
sub _create_keys { |
159
|
0
|
|
|
0
|
|
|
my $sshd = shift; |
160
|
0
|
0
|
|
|
|
|
my $kdir = $sshd->_private_dir('openssh/keys') or return; |
161
|
0
|
|
|
|
|
|
my $user_key = $sshd->{user_key_path} = "$kdir/user_key"; |
162
|
0
|
|
|
|
|
|
my $host_key = $sshd->{host_key_path} = "$kdir/host_key"; |
163
|
0
|
|
|
|
|
|
$sshd->{user_keys} = [$user_key]; |
164
|
0
|
0
|
|
|
|
|
$sshd->_create_key($user_key) and |
165
|
|
|
|
|
|
|
$sshd->_create_key($host_key); |
166
|
|
|
|
|
|
|
} |
167
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
sub _find_unused_port { |
169
|
0
|
|
|
0
|
|
|
my $sshd = shift; |
170
|
0
|
|
|
|
|
|
$sshd->_log("looking for an unused TCP port"); |
171
|
0
|
|
|
|
|
|
for (1..32) { |
172
|
0
|
|
|
|
|
|
my $port = 5000 + int rand 27000; |
173
|
0
|
0
|
|
|
|
|
unless (IO::Socket::INET->new(PeerAddr => "localhost:$port", |
174
|
|
|
|
|
|
|
Proto => 'tcp', |
175
|
|
|
|
|
|
|
Timeout => $sshd->{timeout})) { |
176
|
0
|
|
|
|
|
|
$sshd->_log("port $port is available"); |
177
|
0
|
|
|
|
|
|
return $port; |
178
|
|
|
|
|
|
|
} |
179
|
|
|
|
|
|
|
} |
180
|
0
|
|
|
|
|
|
$sshd->_error("Can't find free TCP port for SSH server"); |
181
|
0
|
|
|
|
|
|
return; |
182
|
|
|
|
|
|
|
} |
183
|
|
|
|
|
|
|
|
184
|
|
|
|
|
|
|
1; |