xs/README.md

199 lines
8.8 KiB
Markdown
Raw Permalink Normal View History

[![GoDoc](https://godoc.org/blitter.com/go/xs?status.svg)](https://godoc.org/blitter.com/go/xs)
2018-12-09 05:35:13 +00:00
# XS
--
XS (**X**perimental **S**hell) is a golang implementation of a simple remote shell client and
server, similar in role to ssh, offering encrypted interactive and non-interactive sessions,
file copying and tunnels with traffic obfuscation ('chaffing').
2018-11-14 08:11:12 +00:00
***
2019-04-09 05:24:01 +00:00
**NOTE: Due to the experimental nature of the KEX/KEM algorithms used, and the novelty of the overall codebase, this package SHOULD BE CONSIDERED EXTREMELY EXPERIMENTAL and USED WITH CAUTION. It DEFINITELY SHOULD NOT be used for any sensitive applications. USE AT YOUR OWN RISK. NEITHER WARRANTY NOR CLAIM OF FITNESS FOR PURPOSE IS EXPRESSED OR IMPLIED.**
2018-11-14 08:11:12 +00:00
***
The client and server programs (xs and xsd) use a mostly drop-in
replacement for golang's standard golang/pkg/net facilities (net.Dial(), net.Listen(), net.Accept()
and the net.Conn type), which automatically negotiate keying material for
2018-11-14 07:29:28 +00:00
secure sockets using one of a selectable set of experimental key exchange (KEX) or
2018-10-11 05:08:57 +00:00
key encapsulation mechanisms (KEM).
2019-07-06 06:56:18 +00:00
### Key Exchange
2018-10-11 05:08:57 +00:00
Currently supported exchanges are:
* The HerraduraKEx key exchange algorithm first released at
[Omar Elejandro Herrera Reyna's HerraduraKEx project](http://github.com/Caume/HerraduraKEx);
* The KYBER IND-CCA-2 secure key encapsulation mechanism, [pq-crystals Kyber](https://pq-crystals.org/kyber/) :: [Yawning/kyber golang implementation](https://git.schwanenlied.me/yawning/kyber)
2019-04-09 05:24:01 +00:00
* The NEWHOPE algorithm [newhopecrypto.org](https://www.newhopecrypto.org/) :: [Yawning/go-newhope golang implementation](https://git.schwanenlied.me/yawning/newhope)
2018-10-11 05:08:57 +00:00
2018-11-14 08:11:12 +00:00
Currently supported session algorithms:
2018-10-11 05:08:57 +00:00
2018-11-14 08:11:12 +00:00
[Encryption]
2018-10-11 05:08:57 +00:00
* AES-256
* Twofish-128
* Blowfish-64
2018-12-09 05:35:13 +00:00
* CryptMTv1 (64bit) (https://eprint.iacr.org/2005/165.pdf)
2018-11-14 08:11:12 +00:00
[HMAC]
2018-10-11 05:08:57 +00:00
* HMAC-SHA256
* HMAC-SHA512
2019-07-06 06:56:18 +00:00
### Conn
Calls to xsnet.Dial() and xsnet.Listen()/Accept() are generally the same as calls to the equivalents within the _net_ package; however upon connection a key exchange automatically occurs whereby client and server independently derive the same keying material, and all following traffic is secured by a symmetric encryption algorithm.
2019-07-06 06:56:18 +00:00
### Session Negotiation
Above the xsnet.Conn layer, the server and client apps in this repository (xsd/ and xs/ respectively) negotiate session settings (cipher/hmac algorithms, interactive/non-interactive mode, tunnel specifiers, etc.) to be used for communication.
2019-07-06 06:56:18 +00:00
### Padding and Chaffing
Packets are subject to padding (random size, randomly applied as prefix or postfix), and optionally the client and server channels can both send _chaff_ packets at random defineable intervals to help thwart analysis of session activity (applicable to interactive and non-interactive command sessions, file copies and tunnels).
2018-06-27 22:40:48 +00:00
2019-07-06 06:56:18 +00:00
### Mux/Demux of Chaffing and Tunnel Data
Chaffing and tunnels, if specified, are set up during initial client->server connection. Packets from the client local port(s) are sent through the main secured connection to the server's remote port(s), and vice versa, tagged with a chaff or tunnel specifier so that they can be discarded as chaff or de-multiplexed and delivered to the proper tunnel endpoints, respectively.
2018-11-14 07:29:28 +00:00
2019-07-06 06:56:18 +00:00
### Accounts and Passwords
Within the xspasswd/ directory is a password-setting utility. XS uses its own password file distinct from the system /etc/passwd to authenticate clients, using standard bcrypt+salt storage. This is currently done to allow alternate login credentials via xs vs. console/ssh login, due to the experimental nature of the program. At some point in the future an option to use the system's /etc/passwd and /etc/shadow may be implemented, making the use of the auxilliary xspasswd utility optional or obsolete.
2018-11-14 07:29:28 +00:00
2018-10-11 05:08:57 +00:00
HERRADURA KEX
2018-10-11 05:08:57 +00:00
As of this time (Oct 2018) no verdict by acknowledged 'crypto experts' as to
the level of security of the HerraduraKEx algorithm for purposes of session
key exchange over an insecure channel has been rendered.
It is hoped that experts in the field will analyze the algorithm and
determine if it is indeed a suitable one for use in situations where
Diffie-Hellman or other key exchange algorithms are currently utilized.
2018-10-11 05:08:57 +00:00
KYBER IND-CCA-2 KEM
2018-11-14 07:29:28 +00:00
As of this time (Oct 2018) Kyber is one of the candidate algorithms submitted to the [NIST post-quantum cryptography project](https://csrc.nist.gov/Projects/Post-Quantum-Cryptography). The authors recommend using it in "... so-called hybrid mode in combination with established "pre-quantum" security; for example in combination with elliptic-curve Diffie-Hellman." THIS PROJECT DOES NOT DO THIS (in case you didn't notice yet, THIS PROJECT IS EXPERIMENTAL.)
2019-07-06 06:56:18 +00:00
### Dependencies:
* Recent version of go (tested, at various times, with go-1.9 to go-1.12.4)
* [github.com/mattn/go-isatty](http://github.com/mattn/go-isatty) //terminal tty detection
* [github.com/kr/pty](http://github.com/kr/pty) //unix pty control (server pty connections)
* [github.com/jameskeane/bcrypt](http://github.com/jameskeane/bcrypt) //password storage/auth
2019-07-06 06:56:18 +00:00
* [blitter.com/go/goutmp](https://gogs.blitter.com/RLabs/goutmp) // wtmp/lastlog C bindings for user accounting
2018-10-11 05:08:57 +00:00
* [https://git.schwanenlied.me/yawning/kyber](https://git.schwanenlied.me/yawning/kyber) // golang Kyber KEM
2019-04-09 05:24:01 +00:00
* [https://git.schwanenlied.me/yawning/newhope](https://git.schwanenlied.me/yawning/newhope) // golang NEWHOPE,NEWHOPE-SIMPLE KEX
2019-01-12 21:20:49 +00:00
* [blitter.com/go/mtwist](https://gogs.blitter.com/RLabs/mtwist) // 64-bit Mersenne Twister PRNG
* [blitter.com/go/cryptmt](https://gogs.blitter.com/RLabs/cryptmt) // CryptMTv1 stream cipher
2019-07-06 06:56:18 +00:00
### Get source code
2019-08-09 05:34:28 +00:00
```
$ go get -u blitter.com/go/xs
$ cd $GOPATH/src/blitter.com/go/xs
2019-08-09 05:34:28 +00:00
$ go build ./... # install all dependent go pkgs
```
2018-11-14 07:57:36 +00:00
2019-07-06 06:56:18 +00:00
### To build
2019-08-09 05:34:28 +00:00
```
$ cd $GOPATH/src/blitter.com/go/xs
2019-08-09 05:34:28 +00:00
$ make clean all
```
2019-07-06 06:56:18 +00:00
### To install, uninstall, re-install
2019-08-09 05:34:28 +00:00
```
$ sudo make [install | uninstall | reinstall]
```
2018-11-14 07:57:36 +00:00
2019-07-06 06:56:18 +00:00
### To manage service (assuming openrc init)
An example init script (xsd.initrc) is provided. Consult your Linux distribution documentation for proper service/daemon installation. For openrc,
2018-12-09 05:35:13 +00:00
2019-08-09 05:34:28 +00:00
```
$ sudo cp xsd.initrc /etc/init.d/xsd
$ sudo rc-config add xsd default
2019-08-09 05:34:28 +00:00
```
2018-11-14 07:57:36 +00:00
The make system assumes installation in /usr/local/sbin (xsd, xspasswd) and /usr/local/bin (xs/xc symlink).
2018-11-14 07:57:36 +00:00
2019-08-09 05:34:28 +00:00
```
$ sudo rc-config [start | restart | stop] xsd
2019-08-09 05:34:28 +00:00
```
2018-11-14 07:57:36 +00:00
2019-07-06 06:56:18 +00:00
### To set accounts & passwords:
2019-08-09 05:34:28 +00:00
```
$ sudo touch /etc/xs.passwd
$ sudo xspasswd/xspasswd -u joebloggs
2019-08-09 05:34:28 +00:00
$ <enter a password, enter again to confirm>
```
2018-11-14 07:57:36 +00:00
2019-07-06 06:56:18 +00:00
### Testing Client and Server from $GOPATH dev tree (w/o 'make install')
In separate shells A and B:
2019-08-09 05:34:28 +00:00
```
[A]$ cd xsd && sudo ./xsd & # add -d for debugging
2019-08-09 05:34:28 +00:00
```
Interactive shell
2019-08-09 05:34:28 +00:00
```
[B]$ cd xs && ./xs joebloggs@host-or-ip # add -d for debugging
2019-08-09 05:34:28 +00:00
```
One-shot command
2019-08-09 05:34:28 +00:00
```
[B]$ cd xs && ./xs -x "ls /tmp" joebloggs@host-or-ip
2019-08-09 05:34:28 +00:00
```
2018-06-27 22:40:48 +00:00
2018-10-04 05:44:27 +00:00
WARNING WARNING WARNING: the -d debug flag will echo passwords to the log/console!
Logging on Linux usually goes to /var/log/syslog and/or /var/log/debug, /var/log/daemon.log.
2018-10-04 05:44:27 +00:00
NOTE if running client (xs) with -d, one will likely need to run 'reset' afterwards
2018-10-04 05:44:27 +00:00
to fix up the shell tty afterwards, as stty echo may not be restored if client crashes
2018-07-14 20:54:44 +00:00
or is interrupted.
2018-06-27 22:40:48 +00:00
2019-07-06 06:56:18 +00:00
### Setting up an 'authtoken' for scripted (password-free) logins
Use the -g option of xs to request a token from the remote server, which will return a
hostname:token string. Place this string into $HOME/.xs_id to allow logins without
entering a password (obviously, $HOME/.xs_id on both server and client for the user
2018-10-04 05:44:27 +00:00
should *not* be world-readable.)
### File Copying using xc
2019-07-06 06:56:18 +00:00
xc is a symlink to xs, and the binary checks its own filename to determine whether
2018-10-04 05:44:27 +00:00
it is being invoked in 'shell' or 'copy' mode. Refer to the '-h' output for differences in
accepted options.
General remote syntax is: user@server:[/]src-or-dest-path
2018-10-04 05:44:27 +00:00
If no leading / is specified in src-or-dest-path, it is assumed to be relative to $HOME of the
remote user. File operations are all performed as the remote user, so account permissions apply
as expected.
Local (client) to remote (server) copy:
2019-08-09 05:34:28 +00:00
```
$ xc fileA /some/where/fileB /some/where/else/dirC joebloggs@host-or-ip:remoteDir
2019-08-09 05:34:28 +00:00
```
Remote (server) to local (client) copy:
2019-08-09 05:34:28 +00:00
```
$ xc joebloggs@host-or-ip:/remoteDirOrFile /some/where/local/Dir
2019-08-09 05:34:28 +00:00
```
xc uses a 'tarpipe' to send file data over the encrypted channel. Use the -d flag on client or server to see the generated tar commands if you're curious.
2019-07-06 06:56:18 +00:00
2018-11-14 08:11:12 +00:00
NOTE: Renaming while copying (eg., 'cp /foo/bar/fileA ./fileB') is NOT supported. Put another way, the destination (whether local or remote) must ALWAYS be a directory.
2019-07-06 06:56:18 +00:00
### Tunnels
2018-11-14 08:11:12 +00:00
Simple tunnels (client -> server, no reverse tunnels for now) are supported.
Syntax: xs -T=&lt;tunspec&gt;{,&lt;tunspec&gt;...}
2018-11-14 08:11:12 +00:00
.. where &lt;tunspec&gt; is &lt;localport:remoteport&gt;
Example, tunnelling ssh through xs
2019-08-09 05:34:28 +00:00
* [server side] ```$ sudo /usr/sbin/sshd -p 7002```
* [client side, term A] ```$ xs -T=6002:7002 user@server```
2019-08-09 05:34:28 +00:00
* [client side, term B] ```$ ssh user@localhost -p 6002```