package ssh import ( "context" "fmt" "net" "time" "github.com/go-gost/core/listener" "github.com/go-gost/core/logger" md "github.com/go-gost/core/metadata" admission "github.com/go-gost/x/admission/wrapper" xnet "github.com/go-gost/x/internal/net" "github.com/go-gost/x/internal/net/proxyproto" ssh_util "github.com/go-gost/x/internal/util/ssh" climiter "github.com/go-gost/x/limiter/conn/wrapper" limiter "github.com/go-gost/x/limiter/traffic/wrapper" metrics "github.com/go-gost/x/metrics/wrapper" "github.com/go-gost/x/registry" "golang.org/x/crypto/ssh" ) func init() { registry.ListenerRegistry().Register("ssh", NewListener) } type sshListener struct { net.Listener config *ssh.ServerConfig cqueue chan net.Conn errChan chan error logger logger.Logger md metadata options listener.Options } func NewListener(opts ...listener.Option) listener.Listener { options := listener.Options{} for _, opt := range opts { opt(&options) } return &sshListener{ logger: options.Logger, options: options, } } func (l *sshListener) Init(md md.Metadata) (err error) { if err = l.parseMetadata(md); err != nil { return } network := "tcp" if xnet.IsIPv4(l.options.Addr) { network = "tcp4" } lc := net.ListenConfig{} if l.md.mptcp { lc.SetMultipathTCP(true) l.logger.Debugf("mptcp enabled: %v", lc.MultipathTCP()) } ln, err := lc.Listen(context.Background(), network, l.options.Addr) if err != nil { return err } ln = proxyproto.WrapListener(l.options.ProxyProtocol, ln, 10*time.Second) ln = metrics.WrapListener(l.options.Service, ln) ln = admission.WrapListener(l.options.Admission, ln) ln = limiter.WrapListener(l.options.TrafficLimiter, ln) ln = climiter.WrapListener(l.options.ConnLimiter, ln) l.Listener = ln config := &ssh.ServerConfig{ PasswordCallback: ssh_util.PasswordCallback(l.options.Auther), PublicKeyCallback: ssh_util.PublicKeyCallback(l.md.authorizedKeys), } config.AddHostKey(l.md.signer) if l.options.Auther == nil && len(l.md.authorizedKeys) == 0 { config.NoClientAuth = true } l.config = config l.cqueue = make(chan net.Conn, l.md.backlog) l.errChan = make(chan error, 1) go l.listenLoop() return } func (l *sshListener) Accept() (conn net.Conn, err error) { var ok bool select { case conn = <-l.cqueue: case err, ok = <-l.errChan: if !ok { err = listener.ErrClosed } } return } func (l *sshListener) listenLoop() { for { conn, err := l.Listener.Accept() if err != nil { l.logger.Error("accept:", err) l.errChan <- err close(l.errChan) return } go l.serveConn(conn) } } func (l *sshListener) serveConn(conn net.Conn) { start := time.Now() l.logger.Infof("%s <> %s", conn.RemoteAddr(), conn.LocalAddr()) defer func() { l.logger.WithFields(map[string]any{ "duration": time.Since(start), }).Infof("%s >< %s", conn.RemoteAddr(), conn.LocalAddr()) }() sc, chans, reqs, err := ssh.NewServerConn(conn, l.config) if err != nil { l.logger.Error(err) conn.Close() return } defer sc.Close() go ssh.DiscardRequests(reqs) go func() { for newChannel := range chans { // Check the type of channel t := newChannel.ChannelType() switch t { case ssh_util.GostSSHTunnelRequest: channel, requests, err := newChannel.Accept() if err != nil { l.logger.Warnf("could not accept channel: %s", err.Error()) continue } go ssh.DiscardRequests(requests) cc := ssh_util.NewConn(conn, channel) select { case l.cqueue <- cc: default: l.logger.Warnf("connection queue is full, client %s discarded", conn.RemoteAddr()) newChannel.Reject(ssh.ResourceShortage, "connection queue is full") cc.Close() } default: l.logger.Warnf("unsupported channel type: %s", t) newChannel.Reject(ssh.UnknownChannelType, fmt.Sprintf("unsupported channel type: %s", t)) } } }() sc.Wait() }