mirror of
https://github.com/Noratrieb/cluelessh.git
synced 2026-01-15 00:45:06 +01:00
refactor
This commit is contained in:
parent
ae5db1642c
commit
0efd08dd5c
12 changed files with 268 additions and 155 deletions
8
ssh-connection/Cargo.toml
Normal file
8
ssh-connection/Cargo.toml
Normal file
|
|
@ -0,0 +1,8 @@
|
|||
[package]
|
||||
name = "ssh-connection"
|
||||
version = "0.1.0"
|
||||
edition = "2021"
|
||||
|
||||
[dependencies]
|
||||
ssh-transport = { path = "../ssh-transport" }
|
||||
tracing = "0.1.40"
|
||||
5
ssh-connection/README.md
Normal file
5
ssh-connection/README.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# ssh-connection
|
||||
|
||||
Connection layer for SSH. This crate takes care of channel multiplexing.
|
||||
|
||||
Based on [RFC 4254 The Secure Shell (SSH) Connection Protocol](https://datatracker.ietf.org/doc/html/rfc4254).
|
||||
231
ssh-connection/src/lib.rs
Normal file
231
ssh-connection/src/lib.rs
Normal file
|
|
@ -0,0 +1,231 @@
|
|||
use std::collections::VecDeque;
|
||||
use tracing::{debug, warn};
|
||||
|
||||
use ssh_transport::client_error;
|
||||
use ssh_transport::packet::Packet;
|
||||
use ssh_transport::Result;
|
||||
|
||||
pub struct ServerChannelsState {
|
||||
packets_to_send: VecDeque<Packet>,
|
||||
channels: Vec<SessionChannel>,
|
||||
|
||||
channel_updates: VecDeque<ChannelUpdate>,
|
||||
}
|
||||
|
||||
struct SessionChannel {
|
||||
/// Whether our side has closed this channel.
|
||||
we_closed: bool,
|
||||
peer_channel: u32,
|
||||
has_pty: bool,
|
||||
has_shell: bool,
|
||||
sent_bytes: Vec<u8>,
|
||||
}
|
||||
|
||||
pub struct ChannelUpdate {
|
||||
pub channel: u32,
|
||||
pub kind: ChannelUpdateKind,
|
||||
}
|
||||
pub enum ChannelUpdateKind {
|
||||
Create { kind: String, args: Vec<u8> },
|
||||
Request { kind: String, args: Vec<u8> },
|
||||
Data { data: Vec<u8> },
|
||||
ExtendedData { code: u32, data: Vec<u8> },
|
||||
Eof,
|
||||
ChannelClosed,
|
||||
}
|
||||
|
||||
impl ServerChannelsState {
|
||||
pub fn new() -> Self {
|
||||
ServerChannelsState {
|
||||
packets_to_send: VecDeque::new(),
|
||||
channels: Vec::new(),
|
||||
channel_updates: VecDeque::new(),
|
||||
}
|
||||
}
|
||||
|
||||
pub fn recv_packet(&mut self, packet: Packet) -> Result<()> {
|
||||
let mut packet = packet.payload_parser();
|
||||
let packet_type = packet.u8()?;
|
||||
match packet_type {
|
||||
Packet::SSH_MSG_GLOBAL_REQUEST => {
|
||||
let request_name = packet.utf8_string()?;
|
||||
let want_reply = packet.bool()?;
|
||||
debug!(?request_name, ?want_reply, "Received global request");
|
||||
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_request_failure());
|
||||
}
|
||||
Packet::SSH_MSG_CHANNEL_OPEN => {
|
||||
// <https://datatracker.ietf.org/doc/html/rfc4254#section-5.1>
|
||||
let channel_type = packet.utf8_string()?;
|
||||
let sender_channel = packet.u32()?;
|
||||
let initial_window_size = packet.u32()?;
|
||||
let max_packet_size = packet.u32()?;
|
||||
|
||||
debug!(?channel_type, ?sender_channel, "Opening channel");
|
||||
|
||||
match channel_type {
|
||||
"session" => {
|
||||
let our_number = self.channels.len() as u32;
|
||||
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_open_confirmation(
|
||||
our_number,
|
||||
sender_channel,
|
||||
initial_window_size,
|
||||
max_packet_size,
|
||||
));
|
||||
|
||||
self.channels.push(SessionChannel {
|
||||
we_closed: false,
|
||||
peer_channel: sender_channel,
|
||||
has_pty: false,
|
||||
has_shell: false,
|
||||
sent_bytes: Vec::new(),
|
||||
});
|
||||
|
||||
debug!(?channel_type, ?our_number, "Successfully opened channel");
|
||||
}
|
||||
_ => {
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_open_failure(
|
||||
sender_channel,
|
||||
3, // SSH_OPEN_UNKNOWN_CHANNEL_TYPE
|
||||
b"unknown channel type",
|
||||
b"",
|
||||
));
|
||||
}
|
||||
}
|
||||
}
|
||||
Packet::SSH_MSG_CHANNEL_DATA => {
|
||||
let our_channel = packet.u32()?;
|
||||
let data = packet.string()?;
|
||||
|
||||
let channel = self.channel(our_channel)?;
|
||||
channel.recv_bytes(data);
|
||||
|
||||
let peer = channel.peer_channel;
|
||||
// echo :3
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_data(peer, data));
|
||||
|
||||
if data.contains(&0x03 /*EOF, Ctrl-C*/) {
|
||||
debug!(?our_channel, "Received EOF, closing channel");
|
||||
// <https://datatracker.ietf.org/doc/html/rfc4254#section-5.3>
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_close(peer));
|
||||
|
||||
let channel = self.channel(our_channel)?;
|
||||
channel.we_closed = true;
|
||||
}
|
||||
}
|
||||
Packet::SSH_MSG_CHANNEL_CLOSE => {
|
||||
// <https://datatracker.ietf.org/doc/html/rfc4254#section-5.3>
|
||||
let our_channel = packet.u32()?;
|
||||
let channel = self.channel(our_channel)?;
|
||||
if !channel.we_closed {
|
||||
let close = Packet::new_msg_channel_close(channel.peer_channel);
|
||||
self.packets_to_send.push_back(close);
|
||||
}
|
||||
|
||||
self.channels.remove(our_channel as usize);
|
||||
|
||||
debug!("Channel has been closed");
|
||||
}
|
||||
Packet::SSH_MSG_CHANNEL_REQUEST => {
|
||||
let our_channel = packet.u32()?;
|
||||
let request_type = packet.utf8_string()?;
|
||||
let want_reply = packet.bool()?;
|
||||
|
||||
debug!(?our_channel, ?request_type, "Got channel request");
|
||||
|
||||
let channel = self.channel(our_channel)?;
|
||||
let peer_channel = channel.peer_channel;
|
||||
|
||||
match request_type {
|
||||
"pty-req" => {
|
||||
let term = packet.utf8_string()?;
|
||||
let width_chars = packet.u32()?;
|
||||
let height_rows = packet.u32()?;
|
||||
let _width_px = packet.u32()?;
|
||||
let _height_px = packet.u32()?;
|
||||
let _term_modes = packet.string()?;
|
||||
|
||||
debug!(
|
||||
?our_channel,
|
||||
?term,
|
||||
?width_chars,
|
||||
?height_rows,
|
||||
"Trying to open a terminal"
|
||||
);
|
||||
|
||||
// Faithfully allocate the PTY.
|
||||
channel.has_pty = true;
|
||||
|
||||
if want_reply {
|
||||
self.send_channel_success(peer_channel);
|
||||
}
|
||||
}
|
||||
"shell" => {
|
||||
if !channel.has_pty {
|
||||
self.send_channel_failure(peer_channel);
|
||||
}
|
||||
|
||||
// Sure! (reborrow)
|
||||
let channel = self.channel(our_channel)?;
|
||||
channel.has_shell = true;
|
||||
|
||||
debug!(?our_channel, "Opening shell");
|
||||
|
||||
if want_reply {
|
||||
self.send_channel_success(peer_channel);
|
||||
}
|
||||
}
|
||||
"signal" => {
|
||||
debug!(?our_channel, "Received signal");
|
||||
// Ignore signals, something we can do.
|
||||
}
|
||||
_ => {
|
||||
warn!(?request_type, ?our_channel, "Unknown channel request");
|
||||
self.send_channel_failure(peer_channel);
|
||||
}
|
||||
}
|
||||
}
|
||||
_ => {
|
||||
todo!("{packet_type}");
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn packets_to_send(&mut self) -> impl Iterator<Item = Packet> + '_ {
|
||||
self.packets_to_send.drain(..)
|
||||
}
|
||||
|
||||
pub(crate) fn channel_updates(&mut self) -> impl Iterator<Item = ChannelUpdate> + '_ {
|
||||
self.channel_updates.drain(..)
|
||||
}
|
||||
|
||||
fn send_channel_success(&mut self, recipient_channel: u32) {
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_success(recipient_channel));
|
||||
}
|
||||
|
||||
fn send_channel_failure(&mut self, recipient_channel: u32) {
|
||||
self.packets_to_send
|
||||
.push_back(Packet::new_msg_channel_failure(recipient_channel));
|
||||
}
|
||||
|
||||
fn channel(&mut self, number: u32) -> Result<&mut SessionChannel> {
|
||||
self.channels
|
||||
.get_mut(number as usize)
|
||||
.ok_or_else(|| client_error!("unknown channel: {number}"))
|
||||
}
|
||||
}
|
||||
|
||||
impl SessionChannel {
|
||||
fn recv_bytes(&mut self, bytes: &[u8]) {
|
||||
self.sent_bytes.extend_from_slice(bytes);
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue