1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
|
# Copyright 2009 Canonical Ltd. This software is licensed under the
# GNU Affero General Public License version 3 (see the file LICENSE).
# pylint: disable-msg=W0231
"""Custom authentication for the SSH server.
Launchpad's SSH server authenticates users against a XML-RPC service (see
`lp.services.authserver.interfaces.IAuthServer` and
`PublicKeyFromLaunchpadChecker`) and provides richer error messages in the
case of failed authentication (see `SSHUserAuthServer`).
"""
__metaclass__ = type
__all__ = [
'LaunchpadAvatar',
'PublicKeyFromLaunchpadChecker',
'SSHUserAuthServer',
]
import binascii
from twisted.conch import avatar
from twisted.conch.checkers import SSHPublicKeyDatabase
from twisted.conch.error import ConchError
from twisted.conch.interfaces import IConchUser
from twisted.conch.ssh import (
keys,
userauth,
)
from twisted.conch.ssh.common import (
getNS,
NS,
)
from twisted.cred import credentials
from twisted.cred.checkers import ICredentialsChecker
from twisted.cred.error import UnauthorizedLogin
from twisted.internet import defer
from twisted.python import failure
from zope.event import notify
from zope.interface import implements
from canonical.launchpad.xmlrpc import faults
from lp.services.sshserver import events
from lp.services.sshserver.session import PatchedSSHSession
from lp.services.sshserver.sftp import FileTransferServer
from lp.services.twistedsupport.xmlrpc import trap_fault
class LaunchpadAvatar(avatar.ConchUser):
"""An account on the SSH server, corresponding to a Launchpad person.
:ivar channelLookup: See `avatar.ConchUser`.
:ivar subsystemLookup: See `avatar.ConchUser`.
:ivar user_id: The Launchpad database ID of the Person for this account.
:ivar username: The Launchpad username for this account.
"""
def __init__(self, user_dict):
"""Construct a `LaunchpadAvatar`.
:param user_dict: The result of a call to
`IAuthServer.getUserAndSSHKeys`.
"""
avatar.ConchUser.__init__(self)
self.user_id = user_dict['id']
self.username = user_dict['name']
# Set the only channel as a standard SSH session (with a couple of bug
# fixes).
self.channelLookup = {'session': PatchedSSHSession}
# ...and set the only subsystem to be SFTP.
self.subsystemLookup = {'sftp': FileTransferServer}
def logout(self):
notify(events.UserLoggedOut(self))
class UserDisplayedUnauthorizedLogin(UnauthorizedLogin):
"""UnauthorizedLogin which should be reported to the user."""
class ISSHPrivateKeyWithMind(credentials.ISSHPrivateKey):
"""Marker interface for SSH credentials that reference a Mind."""
class SSHPrivateKeyWithMind(credentials.SSHPrivateKey):
"""SSH credentials that also reference a Mind."""
implements(ISSHPrivateKeyWithMind)
def __init__(self, username, algName, blob, sigData, signature, mind):
credentials.SSHPrivateKey.__init__(
self, username, algName, blob, sigData, signature)
self.mind = mind
class UserDetailsMind:
"""A 'Mind' object that answers and caches requests for user details.
A mind is a (poorly named) concept from twisted.cred that basically can be
passed to portal.login to represent the client side view of
authentication. In our case we attach a mind to the SSHUserAuthServer
object that corresponds to an attempt to authenticate against the server.
"""
def __init__(self):
self.cache = {}
def lookupUserDetails(self, proxy, username):
"""Find details for the named user, including registered SSH keys.
This method basically wraps `IAuthServer.getUserAndSSHKeys` -- see the
documentation of that method for more details -- and caches the
details found for any particular user.
:param proxy: A twisted.web.xmlrpc.Proxy object for the authentication
endpoint.
:param username: The username to look up.
"""
if username in self.cache:
return defer.succeed(self.cache[username])
else:
d = proxy.callRemote('getUserAndSSHKeys', username)
d.addBoth(self._add_to_cache, username)
return d
def _add_to_cache(self, result, username):
"""Add the results to our cache."""
self.cache[username] = result
return result
class SSHUserAuthServer(userauth.SSHUserAuthServer):
"""Subclass of Conch's SSHUserAuthServer to customize various behaviors.
There are two main differences:
* We override ssh_USERAUTH_REQUEST to display as a banner the reason why
an authentication attempt failed.
* We override auth_publickey to create credentials that reference a
UserDetailsMind and pass the same mind to self.portal.login.
Conch is not written in a way to make this easy; we've had to copy and
paste and change the implementations of these methods.
"""
def __init__(self, transport=None, banner=None):
self.transport = transport
self._banner = banner
self._configured_banner_sent = False
self._mind = UserDetailsMind()
self.interfaceToMethod = userauth.SSHUserAuthServer.interfaceToMethod
self.interfaceToMethod[ISSHPrivateKeyWithMind] = 'publickey'
def sendBanner(self, text, language='en'):
bytes = '\r\n'.join(text.encode('UTF8').splitlines() + [''])
self.transport.sendPacket(userauth.MSG_USERAUTH_BANNER,
NS(bytes) + NS(language))
def _sendConfiguredBanner(self, passed_through):
if not self._configured_banner_sent and self._banner:
self._configured_banner_sent = True
self.sendBanner(self._banner)
return passed_through
def ssh_USERAUTH_REQUEST(self, packet):
# This is copied and pasted from twisted/conch/ssh/userauth.py in
# Twisted 8.0.1. We do this so we can add _ebLogToBanner between
# two existing errbacks.
user, nextService, method, rest = getNS(packet, 3)
if user != self.user or nextService != self.nextService:
self.authenticatedWith = [] # clear auth state
self.user = user
self.nextService = nextService
self.method = method
d = self.tryAuth(method, user, rest)
if not d:
self._ebBadAuth(failure.Failure(ConchError('auth returned none')))
return
d.addCallback(self._sendConfiguredBanner)
d.addCallbacks(self._cbFinishedAuth)
d.addErrback(self._ebMaybeBadAuth)
# This line does not appear in the original.
d.addErrback(self._ebLogToBanner)
d.addErrback(self._ebBadAuth)
return d
def _cbFinishedAuth(self, result):
ret = userauth.SSHUserAuthServer._cbFinishedAuth(self, result)
# Tell the avatar about the transport, so we can tie it to the
# connection in the logs.
avatar = self.transport.avatar
avatar.transport = self.transport
notify(events.UserLoggedIn(avatar))
return ret
def _ebLogToBanner(self, reason):
reason.trap(UserDisplayedUnauthorizedLogin)
self.sendBanner(reason.getErrorMessage())
return reason
def getMind(self):
"""Return the mind that should be passed to self.portal.login().
If multiple requests to authenticate within this overall login attempt
should share state, this method can return the same mind each time.
"""
return self._mind
def makePublicKeyCredentials(self, username, algName, blob, sigData,
signature):
"""Construct credentials for a request to login with a public key.
Our implementation returns a SSHPrivateKeyWithMind.
:param username: The username the request is for.
:param algName: The algorithm name for the blob.
:param blob: The public key blob as sent by the client.
:param sigData: The data the signature was made from.
:param signature: The signed data. This is checked to verify that the
user owns the private key.
"""
mind = self.getMind()
return SSHPrivateKeyWithMind(
username, algName, blob, sigData, signature, mind)
def auth_publickey(self, packet):
# This is copied and pasted from twisted/conch/ssh/userauth.py in
# Twisted 8.0.1. We do this so we can customize how the credentials
# are built and pass a mind to self.portal.login.
hasSig = ord(packet[0])
algName, blob, rest = getNS(packet[1:], 2)
pubKey = keys.Key.fromString(blob).keyObject
signature = hasSig and getNS(rest)[0] or None
if hasSig:
b = NS(self.transport.sessionID) + \
chr(userauth.MSG_USERAUTH_REQUEST) + NS(self.user) + \
NS(self.nextService) + NS('publickey') + chr(hasSig) + \
NS(keys.objectType(pubKey)) + NS(blob)
# The next three lines are different from the original.
c = self.makePublicKeyCredentials(
self.user, algName, blob, b, signature)
return self.portal.login(c, self.getMind(), IConchUser)
else:
# The next four lines are different from the original.
c = self.makePublicKeyCredentials(
self.user, algName, blob, None, None)
return self.portal.login(
c, self.getMind(), IConchUser).addErrback(
self._ebCheckKey, packet[1:])
class PublicKeyFromLaunchpadChecker(SSHPublicKeyDatabase):
"""Cred checker for getting public keys from launchpad.
It knows how to get the public keys from the authserver.
"""
credentialInterfaces = ISSHPrivateKeyWithMind,
implements(ICredentialsChecker)
def __init__(self, authserver):
self.authserver = authserver
def checkKey(self, credentials):
"""Check whether `credentials` is a valid request to authenticate.
We check the key data in credentials against the keys the named user
has registered in Launchpad.
"""
d = credentials.mind.lookupUserDetails(
self.authserver, credentials.username)
d.addCallback(self._checkForAuthorizedKey, credentials)
d.addErrback(self._reportNoSuchUser, credentials)
return d
def _reportNoSuchUser(self, failure, credentials):
"""Report the user named in the credentials not existing nicely."""
trap_fault(failure, faults.NoSuchPersonWithName)
raise UserDisplayedUnauthorizedLogin(
"No such Launchpad account: %s" % credentials.username)
def _checkForAuthorizedKey(self, user_dict, credentials):
"""Check the key data in credentials against the keys found in LP."""
if credentials.algName == 'ssh-dss':
wantKeyType = 'DSA'
elif credentials.algName == 'ssh-rsa':
wantKeyType = 'RSA'
else:
# unknown key type
return False
if len(user_dict['keys']) == 0:
raise UserDisplayedUnauthorizedLogin(
"Launchpad user %r doesn't have a registered SSH key"
% credentials.username)
for keytype, keytext in user_dict['keys']:
if keytype != wantKeyType:
continue
try:
if keytext.decode('base64') == credentials.blob:
return True
except binascii.Error:
continue
raise UnauthorizedLogin(
"Your SSH key does not match any key registered for Launchpad "
"user %s" % credentials.username)
|