AUTH-2067: Log commands correctly
This commit is contained in:
parent
2789d0cf36
commit
979e5be8ab
|
@ -386,7 +386,7 @@ func StartServer(c *cli.Context, version string, shutdownC, graceShutdownC chan
|
||||||
return errors.Wrap(err, msg)
|
return errors.Wrap(err, msg)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := os.Mkdir(sshLogFileDirectory, 0600); err != nil {
|
if err := os.MkdirAll(sshLogFileDirectory, 0600); err != nil {
|
||||||
msg := fmt.Sprintf("Cannot create SSH log file directory %s", sshLogFileDirectory)
|
msg := fmt.Sprintf("Cannot create SSH log file directory %s", sshLogFileDirectory)
|
||||||
logger.WithError(err).Errorf(msg)
|
logger.WithError(err).Errorf(msg)
|
||||||
return errors.Wrap(err, msg)
|
return errors.Wrap(err, msg)
|
||||||
|
|
|
@ -30,5 +30,5 @@ func (m *manager) NewLogger(name string, logger *logrus.Logger) (io.WriteCloser,
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *manager) NewSessionLogger(name string, logger *logrus.Logger) (io.WriteCloser, error) {
|
func (m *manager) NewSessionLogger(name string, logger *logrus.Logger) (io.WriteCloser, error) {
|
||||||
return NewSessionLogger(name, logger, time.Second, defaultFileSizeLimit)
|
return NewSessionLogger(filepath.Join(m.baseDirectory, name), logger, time.Second, defaultFileSizeLimit)
|
||||||
}
|
}
|
||||||
|
|
|
@ -33,6 +33,8 @@ const (
|
||||||
auditEventExec = "exec"
|
auditEventExec = "exec"
|
||||||
auditEventScp = "scp"
|
auditEventScp = "scp"
|
||||||
auditEventResize = "resize"
|
auditEventResize = "resize"
|
||||||
|
sshContextSessionID = "sessionID"
|
||||||
|
sshContextEventLogger = "eventLogger"
|
||||||
)
|
)
|
||||||
|
|
||||||
type auditEvent struct {
|
type auditEvent struct {
|
||||||
|
@ -144,14 +146,42 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sshContext, ok := session.Context().(ssh.Context)
|
||||||
|
if !ok {
|
||||||
|
s.logger.Error("Could not retrieve session context")
|
||||||
|
s.errorAndExit(session, "", nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
sshContext.SetValue(sshContextSessionID, sessionID)
|
||||||
|
sshContext.SetValue(sshContextEventLogger, eventLogger)
|
||||||
|
|
||||||
// Get uid and gid of user attempting to login
|
// Get uid and gid of user attempting to login
|
||||||
sshUser, uidInt, gidInt, success := s.getSSHUser(session, sessionID, eventLogger)
|
sshUser, uidInt, gidInt, success := s.getSSHUser(session, eventLogger)
|
||||||
if !success {
|
if !success {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spawn shell under user
|
// Spawn shell under user
|
||||||
cmd := s.spawnCmd(session, sshUser, uidInt, gidInt)
|
var cmd *exec.Cmd
|
||||||
|
if session.RawCommand() != "" {
|
||||||
|
cmd = exec.Command(sshUser.Shell, "-c", session.RawCommand())
|
||||||
|
|
||||||
|
event := auditEventExec
|
||||||
|
if strings.HasPrefix(session.RawCommand(), "scp") {
|
||||||
|
event = auditEventScp
|
||||||
|
}
|
||||||
|
s.logAuditEvent(session, event)
|
||||||
|
} else {
|
||||||
|
cmd = exec.Command(sshUser.Shell)
|
||||||
|
s.logAuditEvent(session, auditEventStart)
|
||||||
|
defer s.logAuditEvent(session, auditEventStop)
|
||||||
|
}
|
||||||
|
// Supplementary groups are not explicitly specified. They seem to be inherited by default.
|
||||||
|
cmd.SysProcAttr = &syscall.SysProcAttr{Credential: &syscall.Credential{Uid: uidInt, Gid: gidInt}, Setsid: true}
|
||||||
|
cmd.Env = append(cmd.Env, session.Environ()...)
|
||||||
|
cmd.Env = append(cmd.Env, fmt.Sprintf("USER=%s", sshUser.Username))
|
||||||
|
cmd.Env = append(cmd.Env, fmt.Sprintf("HOME=%s", sshUser.HomeDir))
|
||||||
|
cmd.Dir = sshUser.HomeDir
|
||||||
|
|
||||||
var shellInput io.WriteCloser
|
var shellInput io.WriteCloser
|
||||||
var shellOutput io.ReadCloser
|
var shellOutput io.ReadCloser
|
||||||
|
@ -163,7 +193,7 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
if isPty {
|
if isPty {
|
||||||
cmd.Env = append(cmd.Env, fmt.Sprintf("TERM=%s", ptyReq.Term))
|
cmd.Env = append(cmd.Env, fmt.Sprintf("TERM=%s", ptyReq.Term))
|
||||||
tty, err := s.startPtySession(cmd, winCh, func() {
|
tty, err := s.startPtySession(cmd, winCh, func() {
|
||||||
s.logAuditEvent(eventLogger, session, sessionID, auditEventResize)
|
s.logAuditEvent(session, auditEventResize)
|
||||||
})
|
})
|
||||||
shellInput = tty
|
shellInput = tty
|
||||||
shellOutput = tty
|
shellOutput = tty
|
||||||
|
@ -172,8 +202,6 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
close(s.shutdownC)
|
close(s.shutdownC)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
s.logAuditEvent(eventLogger, session, sessionID, auditEventStart)
|
|
||||||
defer s.logAuditEvent(eventLogger, session, sessionID, auditEventStop)
|
|
||||||
} else {
|
} else {
|
||||||
var shellError io.ReadCloser
|
var shellError io.ReadCloser
|
||||||
shellInput, shellOutput, shellError, err = s.startNonPtySession(cmd)
|
shellInput, shellOutput, shellError, err = s.startNonPtySession(cmd)
|
||||||
|
@ -182,11 +210,6 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
close(s.shutdownC)
|
close(s.shutdownC)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
event := auditEventExec
|
|
||||||
if strings.HasPrefix(session.RawCommand(), "scp") {
|
|
||||||
event = auditEventScp
|
|
||||||
}
|
|
||||||
s.logAuditEvent(eventLogger, session, sessionID, event)
|
|
||||||
|
|
||||||
// Write stderr to both the command recorder, and remote user
|
// Write stderr to both the command recorder, and remote user
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -205,8 +228,8 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
s.errorAndExit(session, "", nil)
|
s.errorAndExit(session, "", nil)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
defer sessionLogger.Close()
|
|
||||||
go func() {
|
go func() {
|
||||||
|
defer sessionLogger.Close()
|
||||||
defer pr.Close()
|
defer pr.Close()
|
||||||
_, err := io.Copy(sessionLogger, pr)
|
_, err := io.Copy(sessionLogger, pr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -244,32 +267,15 @@ func (s *SSHServer) connectionHandler(session ssh.Session) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// spawnCmd spawns a shell under the user
|
|
||||||
func (s *SSHServer) spawnCmd(session ssh.Session, sshUser *User, uidInt, gidInt uint32) *exec.Cmd {
|
|
||||||
var cmd *exec.Cmd
|
|
||||||
if session.RawCommand() != "" {
|
|
||||||
cmd = exec.Command(sshUser.Shell, "-c", session.RawCommand())
|
|
||||||
} else {
|
|
||||||
cmd = exec.Command(sshUser.Shell)
|
|
||||||
}
|
|
||||||
// Supplementary groups are not explicitly specified. They seem to be inherited by default.
|
|
||||||
cmd.SysProcAttr = &syscall.SysProcAttr{Credential: &syscall.Credential{Uid: uidInt, Gid: gidInt}, Setsid: true}
|
|
||||||
cmd.Env = append(cmd.Env, session.Environ()...)
|
|
||||||
cmd.Env = append(cmd.Env, fmt.Sprintf("USER=%s", sshUser.Username))
|
|
||||||
cmd.Env = append(cmd.Env, fmt.Sprintf("HOME=%s", sshUser.HomeDir))
|
|
||||||
cmd.Dir = sshUser.HomeDir
|
|
||||||
return cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
// getSSHUser gets the ssh user, uid, and gid of the user attempting to login
|
// getSSHUser gets the ssh user, uid, and gid of the user attempting to login
|
||||||
func (s *SSHServer) getSSHUser(session ssh.Session, sessionID string, eventLogger io.WriteCloser) (*User, uint32, uint32, bool) {
|
func (s *SSHServer) getSSHUser(session ssh.Session, eventLogger io.WriteCloser) (*User, uint32, uint32, bool) {
|
||||||
// Get uid and gid of user attempting to login
|
// Get uid and gid of user attempting to login
|
||||||
sshUser, ok := session.Context().Value("sshUser").(*User)
|
sshUser, ok := session.Context().Value("sshUser").(*User)
|
||||||
if !ok || sshUser == nil {
|
if !ok || sshUser == nil {
|
||||||
s.errorAndExit(session, "Error retrieving credentials from session", nil)
|
s.errorAndExit(session, "Error retrieving credentials from session", nil)
|
||||||
return nil, 0, 0, false
|
return nil, 0, 0, false
|
||||||
}
|
}
|
||||||
s.logAuditEvent(eventLogger, session, sessionID, auditEventAuth)
|
s.logAuditEvent(session, auditEventAuth)
|
||||||
|
|
||||||
uidInt, err := stringToUint32(sshUser.Uid)
|
uidInt, err := stringToUint32(sshUser.Uid)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -337,13 +343,24 @@ func (s *SSHServer) startPtySession(cmd *exec.Cmd, winCh <-chan ssh.Window, logC
|
||||||
return tty, nil
|
return tty, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *SSHServer) logAuditEvent(writer io.WriteCloser, session ssh.Session, sessionID string, eventType string) {
|
func (s *SSHServer) logAuditEvent(session ssh.Session, eventType string) {
|
||||||
username := "unknown"
|
username := "unknown"
|
||||||
sshUser, ok := session.Context().Value("sshUser").(*User)
|
sshUser, ok := session.Context().Value("sshUser").(*User)
|
||||||
if ok && sshUser != nil {
|
if ok && sshUser != nil {
|
||||||
username = sshUser.Username
|
username = sshUser.Username
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sessionID, ok := session.Context().Value(sshContextSessionID).(string)
|
||||||
|
if !ok {
|
||||||
|
s.logger.Error("Failed to retrieve sessionID from context")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
writer, ok := session.Context().Value(sshContextEventLogger).(io.WriteCloser)
|
||||||
|
if !ok {
|
||||||
|
s.logger.Error("Failed to retrieve eventLogger from context")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
event := auditEvent{
|
event := auditEvent{
|
||||||
Event: session.RawCommand(),
|
Event: session.RawCommand(),
|
||||||
EventType: eventType,
|
EventType: eventType,
|
||||||
|
|
Loading…
Reference in New Issue