mirror of https://github.com/minio/minio.git
				
				
				
			
		
			
				
	
	
		
			360 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			360 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright (c) 2015-2023 MinIO, Inc.
 | |
| //
 | |
| // This file is part of MinIO Object Storage stack
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"crypto/subtle"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 	"os"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/minio/cli"
 | |
| 	"github.com/minio/minio/internal/logger"
 | |
| 	"github.com/pkg/sftp"
 | |
| 	ftp "goftp.io/server/v2"
 | |
| 	"golang.org/x/crypto/ssh"
 | |
| )
 | |
| 
 | |
| var globalRemoteFTPClientTransport = NewRemoteTargetHTTPTransport(true)()
 | |
| 
 | |
| // minioLogger use an instance of this to log in a standard format
 | |
| type minioLogger struct{}
 | |
| 
 | |
| // Print implement Logger
 | |
| func (log *minioLogger) Print(sessionID string, message interface{}) {
 | |
| 	if serverDebugLog {
 | |
| 		logger.Info("%s %s", sessionID, message)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Printf implement Logger
 | |
| func (log *minioLogger) Printf(sessionID string, format string, v ...interface{}) {
 | |
| 	if serverDebugLog {
 | |
| 		if sessionID != "" {
 | |
| 			logger.Info("%s %s", sessionID, fmt.Sprintf(format, v...))
 | |
| 		} else {
 | |
| 			logger.Info(format, v...)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // PrintCommand impelment Logger
 | |
| func (log *minioLogger) PrintCommand(sessionID string, command string, params string) {
 | |
| 	if serverDebugLog {
 | |
| 		if command == "PASS" {
 | |
| 			logger.Info("%s > PASS ****", sessionID)
 | |
| 		} else {
 | |
| 			logger.Info("%s > %s %s", sessionID, command, params)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // PrintResponse impelment Logger
 | |
| func (log *minioLogger) PrintResponse(sessionID string, code int, message string) {
 | |
| 	if serverDebugLog {
 | |
| 		logger.Info("%s < %d %s", sessionID, code, message)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func acceptSFTPConnection(conn net.Conn, config *ssh.ServerConfig) {
 | |
| 	// For SSH handshake keep a 2 minute deadline, as OpensSSH default.
 | |
| 	conn.SetDeadline(time.Now().Add(2 * time.Minute))
 | |
| 
 | |
| 	// Before use, a handshake must be performed on the incoming net.Conn.
 | |
| 	sconn, chans, reqs, err := ssh.NewServerConn(conn, config)
 | |
| 	if err != nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// Once we are done with SSH handshake, remove deadline.
 | |
| 	conn.SetDeadline(time.Time{})
 | |
| 
 | |
| 	// The incoming Request channel must be serviced.
 | |
| 	go ssh.DiscardRequests(reqs)
 | |
| 
 | |
| 	// Service the incoming Channel channel.
 | |
| 	for newChannel := range chans {
 | |
| 		// Channels have a type, depending on the application level
 | |
| 		// protocol intended. In the case of an SFTP session, this is "subsystem"
 | |
| 		// with a payload string of "<length=4>sftp"
 | |
| 		if newChannel.ChannelType() != "session" {
 | |
| 			newChannel.Reject(ssh.UnknownChannelType, "unknown channel type")
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		channel, requests, err := newChannel.Accept()
 | |
| 		if err != nil {
 | |
| 			logger.LogOnceIf(context.Background(), fmt.Errorf("unable to accept the connection requests channel: %w", err), "accept-channel-sftp")
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Sessions have out-of-band requests such as "shell",
 | |
| 		// "pty-req" and "env".  Here we handle only the
 | |
| 		// "subsystem" request.
 | |
| 		go func(in <-chan *ssh.Request) {
 | |
| 			for req := range in {
 | |
| 				ok := false
 | |
| 				if req.Type == "subsystem" {
 | |
| 					if len(req.Payload) > 4 && string(req.Payload[4:]) == "sftp" {
 | |
| 						ok = true
 | |
| 						go handleSFTPConnection(channel, sconn)
 | |
| 					}
 | |
| 				}
 | |
| 
 | |
| 				if req.WantReply {
 | |
| 					// We only reply to SSH packets that have `sftp` payload, all other
 | |
| 					// packets are rejected
 | |
| 					req.Reply(ok, nil)
 | |
| 				}
 | |
| 			}
 | |
| 		}(requests)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func handleSFTPConnection(channel ssh.Channel, sconn *ssh.ServerConn) {
 | |
| 	// Create the server instance for the channel using the handler we created above.
 | |
| 	server := sftp.NewRequestServer(channel, NewSFTPDriver(sconn.Permissions), sftp.WithRSAllocator())
 | |
| 	defer server.Close()
 | |
| 
 | |
| 	server.Serve()
 | |
| }
 | |
| 
 | |
| func startSFTPServer(c *cli.Context) {
 | |
| 	args := c.StringSlice("sftp")
 | |
| 
 | |
| 	var (
 | |
| 		port          int
 | |
| 		publicIP      string
 | |
| 		sshPrivateKey string
 | |
| 	)
 | |
| 
 | |
| 	var err error
 | |
| 	for _, arg := range args {
 | |
| 		tokens := strings.SplitN(arg, "=", 2)
 | |
| 		if len(tokens) != 2 {
 | |
| 			logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s", arg), "unable to start SFTP server")
 | |
| 		}
 | |
| 		switch tokens[0] {
 | |
| 		case "address":
 | |
| 			host, portStr, err := net.SplitHostPort(tokens[1])
 | |
| 			if err != nil {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s (%v)", arg, err), "unable to start SFTP server")
 | |
| 			}
 | |
| 			port, err = strconv.Atoi(portStr)
 | |
| 			if err != nil {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s (%v)", arg, err), "unable to start SFTP server")
 | |
| 			}
 | |
| 			if port < 1 || port > 65535 {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s, (port number must be between 1 to 65535)", arg), "unable to start SFTP server")
 | |
| 			}
 | |
| 			publicIP = host
 | |
| 		case "ssh-private-key":
 | |
| 			sshPrivateKey = tokens[1]
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if port == 0 {
 | |
| 		port = 8022 // Default SFTP port, since no port was given.
 | |
| 	}
 | |
| 
 | |
| 	if sshPrivateKey == "" {
 | |
| 		logger.Fatal(fmt.Errorf("invalid arguments passed, private key file is mandatory for --sftp='ssh-private-key=path/to/id_ecdsa'"), "unable to start SFTP server")
 | |
| 	}
 | |
| 
 | |
| 	privateBytes, err := os.ReadFile(sshPrivateKey)
 | |
| 	if err != nil {
 | |
| 		logger.Fatal(fmt.Errorf("invalid arguments passed, private key file is not accessible: %v", err), "unable to start SFTP server")
 | |
| 	}
 | |
| 
 | |
| 	private, err := ssh.ParsePrivateKey(privateBytes)
 | |
| 	if err != nil {
 | |
| 		logger.Fatal(fmt.Errorf("invalid arguments passed, private key file is not parseable: %v", err), "unable to start SFTP server")
 | |
| 	}
 | |
| 
 | |
| 	// An SSH server is represented by a ServerConfig, which holds
 | |
| 	// certificate details and handles authentication of ServerConns.
 | |
| 	config := &ssh.ServerConfig{
 | |
| 		PasswordCallback: func(c ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
 | |
| 			if globalIAMSys.LDAPConfig.Enabled() {
 | |
| 				targetUser, targetGroups, err := globalIAMSys.LDAPConfig.Bind(c.User(), string(pass))
 | |
| 				if err != nil {
 | |
| 					return nil, err
 | |
| 				}
 | |
| 				ldapPolicies, _ := globalIAMSys.PolicyDBGet(targetUser, false, targetGroups...)
 | |
| 				if len(ldapPolicies) == 0 {
 | |
| 					return nil, errAuthentication
 | |
| 				}
 | |
| 				return &ssh.Permissions{
 | |
| 					CriticalOptions: map[string]string{
 | |
| 						ldapUser:  targetUser,
 | |
| 						ldapUserN: c.User(),
 | |
| 					},
 | |
| 					Extensions: make(map[string]string),
 | |
| 				}, nil
 | |
| 			}
 | |
| 
 | |
| 			ui, ok := globalIAMSys.GetUser(context.Background(), c.User())
 | |
| 			if !ok {
 | |
| 				return nil, errNoSuchUser
 | |
| 			}
 | |
| 
 | |
| 			if subtle.ConstantTimeCompare([]byte(ui.Credentials.SecretKey), pass) == 1 {
 | |
| 				return &ssh.Permissions{
 | |
| 					CriticalOptions: map[string]string{
 | |
| 						"accessKey": c.User(),
 | |
| 					},
 | |
| 					Extensions: make(map[string]string),
 | |
| 				}, nil
 | |
| 			}
 | |
| 			return nil, errAuthentication
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	config.AddHostKey(private)
 | |
| 
 | |
| 	// Once a ServerConfig has been configured, connections can be accepted.
 | |
| 	listener, err := net.Listen("tcp", net.JoinHostPort(publicIP, strconv.Itoa(port)))
 | |
| 	if err != nil {
 | |
| 		logger.Fatal(err, "unable to start listening on --sftp='port=%d'", port)
 | |
| 	}
 | |
| 
 | |
| 	logger.Info(fmt.Sprintf("MinIO SFTP Server listening on %s", net.JoinHostPort(publicIP, strconv.Itoa(port))))
 | |
| 
 | |
| 	var tempDelay time.Duration // how long to sleep on accept failure
 | |
| 
 | |
| 	for {
 | |
| 		conn, err := listener.Accept()
 | |
| 		if err != nil {
 | |
| 			// From https://github.com/golang/go/blob/4aa1efed4853ea067d665a952eee77c52faac774/src/net/http/server.go#L3046
 | |
| 			if ne, ok := err.(net.Error); ok && ne.Temporary() {
 | |
| 				if tempDelay == 0 {
 | |
| 					tempDelay = 5 * time.Millisecond
 | |
| 				} else {
 | |
| 					tempDelay *= 2
 | |
| 				}
 | |
| 				if max := 1 * time.Second; tempDelay > max {
 | |
| 					tempDelay = max
 | |
| 				}
 | |
| 				logger.LogOnceIf(context.Background(), fmt.Errorf("error while accepting connections: %w, retrying in %s", err, tempDelay), "accept-limit-sftp")
 | |
| 				time.Sleep(tempDelay)
 | |
| 				continue
 | |
| 			}
 | |
| 			logger.Fatal(err, "unrecoverable error while accepting new connections")
 | |
| 		}
 | |
| 
 | |
| 		go acceptSFTPConnection(conn, config)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func startFTPServer(c *cli.Context) {
 | |
| 	args := c.StringSlice("ftp")
 | |
| 
 | |
| 	var (
 | |
| 		port          int
 | |
| 		publicIP      string
 | |
| 		portRange     string
 | |
| 		tlsPrivateKey string
 | |
| 		tlsPublicCert string
 | |
| 	)
 | |
| 
 | |
| 	var err error
 | |
| 	for _, arg := range args {
 | |
| 		tokens := strings.SplitN(arg, "=", 2)
 | |
| 		if len(tokens) != 2 {
 | |
| 			logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s", arg), "unable to start FTP server")
 | |
| 		}
 | |
| 		switch tokens[0] {
 | |
| 		case "address":
 | |
| 			host, portStr, err := net.SplitHostPort(tokens[1])
 | |
| 			if err != nil {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s (%v)", arg, err), "unable to start FTP server")
 | |
| 			}
 | |
| 			port, err = strconv.Atoi(portStr)
 | |
| 			if err != nil {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s (%v)", arg, err), "unable to start FTP server")
 | |
| 			}
 | |
| 			if port < 1 || port > 65535 {
 | |
| 				logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s, (port number must be between 1 to 65535)", arg), "unable to start FTP server")
 | |
| 			}
 | |
| 			publicIP = host
 | |
| 		case "passive-port-range":
 | |
| 			portRange = tokens[1]
 | |
| 		case "tls-private-key":
 | |
| 			tlsPrivateKey = tokens[1]
 | |
| 		case "tls-public-cert":
 | |
| 			tlsPublicCert = tokens[1]
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Verify if only partial inputs are given for FTP(secure)
 | |
| 	{
 | |
| 		if tlsPrivateKey == "" && tlsPublicCert != "" {
 | |
| 			logger.Fatal(fmt.Errorf("invalid TLS arguments provided missing private key --ftp=\"tls-private-key=path/to/private.key\""), "unable to start FTP server")
 | |
| 		}
 | |
| 
 | |
| 		if tlsPrivateKey != "" && tlsPublicCert == "" {
 | |
| 			logger.Fatal(fmt.Errorf("invalid TLS arguments provided missing public cert --ftp=\"tls-public-cert=path/to/public.crt\""), "unable to start FTP server")
 | |
| 		}
 | |
| 		if port == 0 {
 | |
| 			port = 8021 // Default FTP port, since no port was given.
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// If no TLS certs were provided, server is running in TLS for S3 API
 | |
| 	// we automatically make FTP also run under TLS mode.
 | |
| 	if globalIsTLS && tlsPrivateKey == "" && tlsPublicCert == "" {
 | |
| 		tlsPrivateKey = getPrivateKeyFile()
 | |
| 		tlsPublicCert = getPublicCertFile()
 | |
| 	}
 | |
| 
 | |
| 	tls := tlsPrivateKey != "" && tlsPublicCert != ""
 | |
| 
 | |
| 	name := "MinIO FTP Server"
 | |
| 	if tls {
 | |
| 		name = "MinIO FTP(Secure) Server"
 | |
| 	}
 | |
| 
 | |
| 	ftpServer, err := ftp.NewServer(&ftp.Options{
 | |
| 		Name:           name,
 | |
| 		WelcomeMessage: fmt.Sprintf("Welcome to MinIO FTP Server Version='%s' License='GNU AGPLv3'", Version),
 | |
| 		Driver:         NewFTPDriver(),
 | |
| 		Port:           port,
 | |
| 		Perm:           ftp.NewSimplePerm("nobody", "nobody"),
 | |
| 		TLS:            tls,
 | |
| 		KeyFile:        tlsPrivateKey,
 | |
| 		CertFile:       tlsPublicCert,
 | |
| 		ExplicitFTPS:   tls,
 | |
| 		Logger:         &minioLogger{},
 | |
| 		PassivePorts:   portRange,
 | |
| 		PublicIP:       publicIP,
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		logger.Fatal(err, "unable to initialize FTP server")
 | |
| 	}
 | |
| 
 | |
| 	logger.Info(fmt.Sprintf("%s listening on %s", name, net.JoinHostPort(publicIP, strconv.Itoa(port))))
 | |
| 
 | |
| 	if err = ftpServer.ListenAndServe(); err != nil {
 | |
| 		logger.Fatal(err, "unable to start FTP server")
 | |
| 	}
 | |
| }
 |