Project

General

Profile

Download (8.82 KB) Statistics
| Branch: | Tag: | Revision:
1
#! /usr/local/bin/php -f
2
<?php
3
/*
4
	sshd - Modified to work on disk based system
5
	Copyright 2004 Scott K Ullrich
6

    
7
	Original Copyright (C) 2004 Fred Mol <fredmol@xs4all.nl>.
8
	All rights reserved.
9

    
10
	Redistribution and use in source and binary forms, with or without
11
	modification, are permitted provided that the following conditions are met:
12

    
13
	1. Redistributions of source code must retain the above copyright notice,
14
	   this list of conditions and the following disclaimer.
15

    
16
	2. Redistributions in binary form must reproduce the above copyright
17
	   notice, this list of conditions and the following disclaimer in the
18
	   documentation and/or other materials provided with the distribution.
19

    
20
	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
21
	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
22
	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23
	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
24
	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25
	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26
	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27
	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28
	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29
	POSSIBILITY OF SUCH DAMAGE.
30
*/
31
	require_once("config.inc");
32
	require_once("notices.inc");
33

    
34
	if(isset($config['system']['enablesshd'])) {
35
		/* do nothing, we're enabled */
36
	} else {
37
		if($g['booting'])
38
			echo "SSHD is disabled.";
39
		exit;
40
	}
41

    
42
	function file_size($file) {
43
	  $size = filesize($file);
44
	  return $size;
45
	}
46

    
47
	/*    if any of these files are 0 bytes then they are corrupted.
48
	 *    remove them
49
	 */
50
	$files_to_check = array('ssh_host_dsa_key','ssh_host_dsa_key.pub','ssh_host_key','ssh_host_key.pub','ssh_host_rsa_key','ssh_host_rsa_key.pub','/root/.ssh/authorized_keys');
51
	foreach($files_to_check as $f2c) {
52
		if(file_exists("/etc/ssh/{$f2c}"))
53
			if(file_size("/etc/ssh/{$f2c}")==0) {
54
				mwexec("rm /etc/ssh/ssh_host*");
55
			}
56
	}
57

    
58
	if (!is_dir("/var/empty")) {
59
		/* make ssh home directory */
60
		mkdir("/var/empty", 0555);
61
	}
62

    
63
	if(!file_exists("")) {
64
		/* Login related files. */
65
		touch("/var/log/lastlog");
66
	}
67

    
68
	$sshConfigDir = "/etc/ssh";
69

    
70
	if($config['system']['ssh']['port'] <> "") {
71
		$sshport = $config['system']['ssh']['port'];
72
	} else {
73
		$sshport = 22;
74
	}
75

    
76
	/* Include default configuration for pfSense */
77
	$sshconf = "# This file is automatically generated at startup\n";
78
	$sshconf .= "PermitRootLogin yes\n";
79
	$sshconf .= "Compression yes\n";
80
	$sshconf .= "ClientAliveInterval 30\n";
81
	$sshconf .= "UseDNS no\n";
82
	$sshconf .= "X11Forwarding no\n";
83
	if($config['system']['ssh']['sshdkeyonly'] <> "") {
84
		$sshconf .= "# Login via Key only\n";
85
		$sshconf .= "PasswordAuthentication no\n";
86
		$sshconf .= "ChallengeResponseAuthentication no\n";
87
		$sshconf .= "PubkeyAuthentication yes\n";
88
	} else {
89
		$sshconf .= "# Login via Key and Password\n";
90
		$sshconf .= "PasswordAuthentication yes\n";
91
		$sshconf .= "ChallengeResponseAuthentication yes\n";
92
		$sshconf .= "PubkeyAuthentication yes\n";
93
	}
94
	$sshconf .= "# override default of no subsystems\n";
95
	$sshconf .= "Subsystem       sftp    /usr/libexec/sftp-server\n";
96
	/* Only allow protocol 2, because we say so */
97
	$sshconf .= "Protocol 2\n";
98
	/* Run the server on another port if we have one defined */
99
	$sshconf .= "Port $sshport\n";
100

    
101
	/* Write the new sshd config file */
102
	$fd = fopen("/etc/ssh/sshd_config", "w");
103
	fwrite($fd, $sshconf);
104
	fclose($fd);
105

    
106
	if($config['system']['ssh']['authorizedkeys'] <> "") {
107
		echo "writing /root/.ssh/authorized_keys\n";
108
		if (!is_dir("/root/.ssh")) {
109
			mkdir('/root/.ssh', 0700);
110
		}
111
		$authorizedkeys  = "# This file is automatically generated at startup\n";
112
		$authorizedkeys .= base64_decode($config['system']['ssh']['authorizedkeys']);
113
		$fd = fopen("/root/.ssh/authorized_keys", "w");
114
		fwrite($fd, $authorizedkeys);
115
		pclose($fd);
116
		chmod("/root/.ssh/authorized_keys",0644);
117
	} else {
118
		if(file_exists("/root/.ssh/authorized_keys")) {
119
			unlink("/root/.ssh/authorized_keys");
120
		}
121
	} 
122

    
123
	/* mop up from a badly implemented ssh keys -> cf backup */
124
	if($config['ssh']['dsa_key'] <> "") {
125
		unset($config['ssh']['dsa_key']);
126
		unset($config['ssh']['rsa_key']);
127
		unset($config['ssh']['rsa1_key']);
128
		unset($config['ssh']['dsa']);
129
		unset($config['ssh']['rsa']);
130
		unset($config['ssh']['rsa1']);
131
		unset($config['ssh']['ak']);
132
		write_config("Clearing SSH keys from config.xml");
133
	}
134

    
135
	/* are we already running?  if so exit */
136
	if(file_exists("/tmp/keys_generating"))
137
		exit;
138

    
139
	if (!file_exists("$sshConfigDir/ssh_host_key") or file_exists("/etc/keys_generating")) {
140
		/* remove previous keys and regen later */
141
		file_notice("SSH", "pfSense has started creating your SSH keys.  SSH Startup will be delayed.  Please note that reloading the filter rules and changes will be delayed until this operation is completed.", "SSH KeyGen", "");
142
		conf_mount_rw();
143
		mwexec("rm /etc/ssh/ssh_host_*");
144
		touch("/etc/keys_generating");
145
		touch("/tmp/keys_generating");
146
		echo " Generating Keys:\n";
147
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t rsa1 -N '' -f $sshConfigDir/ssh_host_key");
148
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t rsa -N '' -f $sshConfigDir/ssh_host_rsa_key");
149
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t dsa -N '' -f $sshConfigDir/ssh_host_dsa_key");
150
		unlink("/etc/keys_generating");
151
		unlink("/tmp/keys_generating");
152
		file_notice("SSH", "pfSense has completed creating your SSH keys.  SSH is now started.", "SSH Startup", "");
153
		echo "Starting SSH... ";
154
	}
155

    
156
	/* kill existing sshd process, server only, not the childs */
157
	$sshd_pid = exec("ps ax | egrep '/usr/sbin/[s]shd' | awk '{print $1}'");
158
	if($sshd_pid <> "") {
159
		echo "stopping ssh process $sshd_pid \n";
160
		mwexec("kill $sshd_pid");
161
	}
162
	/* Launch new server process */
163
	$status = mwexec("/usr/sbin/sshd");
164
	if($status <> 0) {
165
		file_notice("sshd_startup", "SSHD failed to start.", "SSHD Daemon", "");
166
		echo "error!\n";
167
	} else {
168
		echo "done.\n";
169
	}
170

    
171
	conf_mount_ro();
172

    
173

    
174

    
175

    
176

    
177

    
178

    
179

    
180

    
181

    
182

    
183

    
184

    
185

    
186

    
187

    
188

    
189

    
190

    
191

    
192

    
193

    
194

    
195

    
196

    
197

    
198

    
199

    
200

    
201

    
202

    
203

    
204

    
205

    
206

    
207

    
208

    
209

    
210
	exit;
211

    
212
	/* exit early, this needs more testing. */
213

    
214
	if (!file_exists("$sshConfigDir/ssh_host_key") and $config['ssh']['dsa'] == "") {
215
		/* generate keys */
216
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t rsa1 -N '' -f $sshConfigDir/ssh_host_key");
217
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t rsa -N '' -f $sshConfigDir/ssh_host_rsa_key");
218
		system("/usr/bin/nice -n20 /usr/bin/ssh-keygen -t dsa -N '' -f $sshConfigDir/ssh_host_dsa_key");
219

    
220
		/* save keys */
221
		$dsa  = file_get_contents("{$sshConfigDir}/ssh_host_dsa_key");
222
		$rsa  = file_get_contents("{$sshConfigDir}/ssh_host_rsa_key");
223
		$rsa1 = file_get_contents("{$sshConfigDir}/ssh_host_key");
224
		$config['ssh']['dsa'] = base64_encode($dsa);
225
		$config['ssh']['rsa'] = base64_encode($rsa);
226
		$config['ssh']['rsa1']= base64_encode($rsa1);
227

    
228
		/* save public keys */
229
		$dsapub  = file_get_contents("{$sshConfigDir}/ssh_host_dsa_key.pub");
230
		$rsapub  = file_get_contents("{$sshConfigDir}/ssh_host_rsa_key.pub");
231
		$rsa1pub = file_get_contents("{$sshConfigDir}/ssh_host_key.pub");
232
		$config['ssh']['dsa_key'] = base64_encode($dsapub);
233
		$config['ssh']['rsa_key'] = base64_encode($rsapub);
234
		$config['ssh']['rsa1_key']= base64_encode($rsa1pub);
235
		write_config("Saved SSH keys.");
236
	} else {
237
		/* restore keys */
238
		$rsa1 = base64_decode($config['ssh']['rsa1']);
239
		$rsa  = base64_decode($config['ssh']['rsa']);
240
		$dsa  = base64_decode($config['ssh']['dsa']);
241
		file_put_contents("{$sshConfigDir}/ssh_host_key", $rsa1);
242
		file_put_contents("{$sshConfigDir}/ssh_host_rsa_key", $rsa);
243
		file_put_contents("{$sshConfigDir}/ssh_host_dsa_key", $dsa);
244

    
245
		/* restore public keys */
246
		$rsa1_pub = base64_decode($config['ssh']['rsa1_key']);
247
		$rsa_pub  = base64_decode($config['ssh']['rsa_key']);
248
		$dsa_pub  = base64_decode($config['ssh']['dsa_key']);
249
		file_put_contents("{$sshConfigDir}/ssh_host_key.pub", $rsa1_pub);
250
		file_put_contents("{$sshConfigDir}/ssh_host_rsa_key.pub", $rsa_pub);
251
		file_put_contents("{$sshConfigDir}/ssh_host_dsa_key.pub", $dsa_pub);
252

    
253
		/* change keys owner to root */
254
		chown("{$sshConfigDir}/ssh_host_key", "root");
255
		chown("{$sshConfigDir}/ssh_host_rsa_key", "root");
256
		chown("{$sshConfigDir}/ssh_host_dsa_key", "root");
257

    
258
		/* change public keys owner to root */
259
		chown("{$sshConfigDir}/ssh_host_key.pub", "root");
260
		chown("{$sshConfigDir}/ssh_host_rsa_key.pub", "root");
261
		chown("{$sshConfigDir}/ssh_host_dsa_key.pub", "root");
262

    
263
		/* change mode on keys to u+rw */
264
		chmod("{$sshConfigDir}/ssh_host_key",0600);
265
		chmod("{$sshConfigDir}/ssh_host_rsa_key",0600);
266
		chmod("{$sshConfigDir}/ssh_host_dsa_key",0600);
267

    
268
		/* change mode on public keys to u+rw */
269
		chmod("{$sshConfigDir}/ssh_host_key.pub",0600);
270
		chmod("{$sshConfigDir}/ssh_host_rsa_key.pub",0600);
271
		chmod("{$sshConfigDir}/ssh_host_dsa_key.pub",0600);
272
	}
273

    
274
	/* start sshd */
275
	system("/usr/sbin/sshd");
276
	echo "done.\n";
277

    
278
?>
(73-73/79)