-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcli.py
More file actions
197 lines (145 loc) · 5.23 KB
/
cli.py
File metadata and controls
197 lines (145 loc) · 5.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
import argparse
import base64
import os
import socketserver
import struct
import sys
import threading
import tempfile
import time
import shutil
import requests
SSH_AGENT_FAILURE = struct.pack('B', 5)
SSH_AGENT_SUCCESS = struct.pack('B', 6)
SSH2_AGENT_IDENTITIES_ANSWER = struct.pack('B', 12)
SSH2_AGENT_SIGN_RESPONSE = struct.pack('B', 14)
def _write_byte(data):
if len(data) > 1:
raise ValueError("Data larger than expected")
return data
def _write_int(data):
return struct.pack(">I", data)
def _write_string(data):
return _write_int(len(data)) + data
def _read_byte(data):
return data[0], data[1:]
def _read_int(data):
if len(data) < 4:
raise ValueError("Data smaller than exepected - minimum 4 bytes")
value, = struct.unpack('>I', data[:4])
return value, data[4:]
def _read_string(data):
if len(data) < 4:
raise ValueError("Data smaller than exepected - minimum 4 bytes")
length, = struct.unpack('>I', data[:4])
if len(data) < length + 4:
raise ValueError("Data smaller than expected")
return data[4:4 + length], data[4 + length:]
class ConnectionError(Exception):
pass
class AgentHandler(socketserver.BaseRequestHandler):
def handler_11(self, msg):
# SSH2_AGENTC_REQUEST_IDENTITIES = 11
response = requests.get('http://localhost:8000/api/v1/keys').json()
for key in response:
key_type, key_body = key['public_key'].split(' ')
decoded_body = base64.b64decode(key_body)
self.server.add(decoded_body, key['name'], key['id'])
message = []
message.append(_write_byte(SSH2_AGENT_IDENTITIES_ANSWER))
message.append(_write_int(len(self.server.identities)))
for pkey, metadata in self.server.identities.items():
message.append(_write_string(pkey))
message.append(_write_string(metadata['comment'].encode('utf-8')))
return b''.join(message)
def handler_13(self, msg):
# SSH2_AGENTC_SIGN_REQUEST = 13
identity, msg = _read_string(msg)
data, msg = _read_string(msg)
someint, msg = _read_int(msg)
metadata = self.server.identities.get(identity, None)
if not metadata:
return _write_byte(SSH_AGENT_FAILURE)
print("Agentless: Will sign request with key {id} ({comment})".format(**metadata))
response = requests.post(
'http://localhost:8000/api/v1/keys/{}/sign'.format(metadata['id']),
json={'data': base64.b64encode(data).decode('utf-8')}
)
sig = base64.b64decode(response.json()['signature'])
return b''.join((
_write_byte(SSH2_AGENT_SIGN_RESPONSE),
_write_string(
_write_string(b'ssh-rsa') + _write_string(sig)
)
))
def _read(self, wanted):
result = b''
while len(result) < wanted:
buf = self.request.recv(wanted - len(result))
if not buf:
raise ConnectionError()
result += buf
return result
def read_message(self):
size, _ = _read_int(self._read(4))
msg = self._read(size)
msgtype, msg = _read_byte(msg)
return msgtype, msg
def handle(self):
while True:
try:
mtype, msg = self.read_message()
except ConnectionError:
return
handler = getattr(self, 'handler_{}'.format(mtype))
if not handler:
continue
response = _write_string(handler(msg))
# print(response)
self.request.sendall(response)
class AgentServer(socketserver.ThreadingUnixStreamServer):
def __init__(self, socket_file):
socketserver.ThreadingUnixStreamServer.__init__(self, socket_file, AgentHandler)
self.identities = {}
def add(self, pkey, comment, id):
self.identities[pkey] = {
'comment': comment,
'id': id,
}
def serve_while_pid(self, pid):
self.listen_start()
while os.waitpid(pid, 0)[0] != pid:
pass
self.listen_stop()
def listen_start(self):
self.listen_thread = threading.Thread(target=self.serve_forever)
self.listen_thread.daemon = True
self.listen_thread.start()
def listen_stop(self):
if self.listen_thread:
self.listen_thread = None
self.shutdown()
self.server_close()
def run(argv=None):
parser = argparse.ArgumentParser(description="Agentless SSH Wrapper")
parser.add_argument('--identity', '-i', action='append')
args, unknown_args = parser.parse_known_args(argv or sys.argv[1:])
environ = os.environ.copy()
socket_dir = tempfile.mkdtemp(prefix='ssh-')
socket_file = os.path.join(socket_dir, 'agent.{}'.format(os.getpid()))
environ['SSH_AUTH_SOCK'] = socket_file
del environ['SHELL']
child_pid = os.fork()
if child_pid:
a = AgentServer(socket_file)
try:
a.serve_while_pid(child_pid)
finally:
shutil.rmtree(socket_dir)
return
while not os.path.exists(socket_file):
time.sleep(0.5)
cmd = ["ssh"] + unknown_args
os.execvpe(cmd[0], cmd, environ)
if __name__ == "__main__":
run()