server.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382
  1. package ftpd
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "os"
  9. "path/filepath"
  10. "sync"
  11. ftpserver "github.com/fclairamb/ftpserverlib"
  12. "github.com/drakkan/sftpgo/v2/common"
  13. "github.com/drakkan/sftpgo/v2/dataprovider"
  14. "github.com/drakkan/sftpgo/v2/logger"
  15. "github.com/drakkan/sftpgo/v2/metric"
  16. "github.com/drakkan/sftpgo/v2/util"
  17. "github.com/drakkan/sftpgo/v2/version"
  18. )
  19. // Server implements the ftpserverlib MainDriver interface
  20. type Server struct {
  21. ID int
  22. config *Configuration
  23. initialMsg string
  24. statusBanner string
  25. binding Binding
  26. tlsConfig *tls.Config
  27. mu sync.RWMutex
  28. verifiedTLSConns map[uint32]bool
  29. }
  30. // NewServer returns a new FTP server driver
  31. func NewServer(config *Configuration, configDir string, binding Binding, id int) *Server {
  32. binding.setCiphers()
  33. server := &Server{
  34. config: config,
  35. initialMsg: config.Banner,
  36. statusBanner: fmt.Sprintf("SFTPGo %v FTP Server", version.Get().Version),
  37. binding: binding,
  38. ID: id,
  39. verifiedTLSConns: make(map[uint32]bool),
  40. }
  41. if config.BannerFile != "" {
  42. bannerFilePath := config.BannerFile
  43. if !filepath.IsAbs(bannerFilePath) {
  44. bannerFilePath = filepath.Join(configDir, bannerFilePath)
  45. }
  46. bannerContent, err := os.ReadFile(bannerFilePath)
  47. if err == nil {
  48. server.initialMsg = string(bannerContent)
  49. } else {
  50. logger.WarnToConsole("unable to read FTPD banner file: %v", err)
  51. logger.Warn(logSender, "", "unable to read banner file: %v", err)
  52. }
  53. }
  54. server.buildTLSConfig()
  55. return server
  56. }
  57. func (s *Server) isTLSConnVerified(id uint32) bool {
  58. s.mu.RLock()
  59. defer s.mu.RUnlock()
  60. return s.verifiedTLSConns[id]
  61. }
  62. func (s *Server) setTLSConnVerified(id uint32, value bool) {
  63. s.mu.Lock()
  64. defer s.mu.Unlock()
  65. s.verifiedTLSConns[id] = value
  66. }
  67. func (s *Server) cleanTLSConnVerification(id uint32) {
  68. s.mu.Lock()
  69. defer s.mu.Unlock()
  70. delete(s.verifiedTLSConns, id)
  71. }
  72. // GetSettings returns FTP server settings
  73. func (s *Server) GetSettings() (*ftpserver.Settings, error) {
  74. if err := s.binding.checkPassiveIP(); err != nil {
  75. return nil, err
  76. }
  77. if err := s.binding.checkSecuritySettings(); err != nil {
  78. return nil, err
  79. }
  80. var portRange *ftpserver.PortRange
  81. if s.config.PassivePortRange.Start > 0 && s.config.PassivePortRange.End > s.config.PassivePortRange.Start {
  82. portRange = &ftpserver.PortRange{
  83. Start: s.config.PassivePortRange.Start,
  84. End: s.config.PassivePortRange.End,
  85. }
  86. }
  87. var ftpListener net.Listener
  88. if s.binding.HasProxy() {
  89. listener, err := net.Listen("tcp", s.binding.GetAddress())
  90. if err != nil {
  91. logger.Warn(logSender, "", "error starting listener on address %v: %v", s.binding.GetAddress(), err)
  92. return nil, err
  93. }
  94. ftpListener, err = common.Config.GetProxyListener(listener)
  95. if err != nil {
  96. logger.Warn(logSender, "", "error enabling proxy listener: %v", err)
  97. return nil, err
  98. }
  99. if s.binding.TLSMode == 2 && s.tlsConfig != nil {
  100. ftpListener = tls.NewListener(ftpListener, s.tlsConfig)
  101. }
  102. }
  103. if s.binding.TLSMode < 0 || s.binding.TLSMode > 2 {
  104. return nil, errors.New("unsupported TLS mode")
  105. }
  106. if s.binding.TLSMode > 0 && certMgr == nil {
  107. return nil, errors.New("to enable TLS you need to provide a certificate")
  108. }
  109. return &ftpserver.Settings{
  110. Listener: ftpListener,
  111. ListenAddr: s.binding.GetAddress(),
  112. PublicHost: s.binding.ForcePassiveIP,
  113. PassiveTransferPortRange: portRange,
  114. ActiveTransferPortNon20: s.config.ActiveTransfersPortNon20,
  115. IdleTimeout: -1,
  116. ConnectionTimeout: 20,
  117. Banner: s.statusBanner,
  118. TLSRequired: ftpserver.TLSRequirement(s.binding.TLSMode),
  119. DisableSite: !s.config.EnableSite,
  120. DisableActiveMode: s.config.DisableActiveMode,
  121. EnableHASH: s.config.HASHSupport > 0,
  122. EnableCOMB: s.config.CombineSupport > 0,
  123. DefaultTransferType: ftpserver.TransferTypeBinary,
  124. ActiveConnectionsCheck: ftpserver.DataConnectionRequirement(s.binding.ActiveConnectionsSecurity),
  125. PasvConnectionsCheck: ftpserver.DataConnectionRequirement(s.binding.PassiveConnectionsSecurity),
  126. }, nil
  127. }
  128. // ClientConnected is called to send the very first welcome message
  129. func (s *Server) ClientConnected(cc ftpserver.ClientContext) (string, error) {
  130. cc.SetDebug(s.binding.Debug)
  131. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  132. common.Connections.AddClientConnection(ipAddr)
  133. if common.IsBanned(ipAddr) {
  134. logger.Log(logger.LevelDebug, common.ProtocolFTP, "", "connection refused, ip %#v is banned", ipAddr)
  135. return "Access denied: banned client IP", common.ErrConnectionDenied
  136. }
  137. if !common.Connections.IsNewConnectionAllowed(ipAddr) {
  138. logger.Log(logger.LevelDebug, common.ProtocolFTP, "", "connection refused, configured limit reached")
  139. return "Access denied: max allowed connection exceeded", common.ErrConnectionDenied
  140. }
  141. _, err := common.LimitRate(common.ProtocolFTP, ipAddr)
  142. if err != nil {
  143. return fmt.Sprintf("Access denied: %v", err.Error()), err
  144. }
  145. if err := common.Config.ExecutePostConnectHook(ipAddr, common.ProtocolFTP); err != nil {
  146. return "Access denied by post connect hook", err
  147. }
  148. connID := fmt.Sprintf("%v_%v", s.ID, cc.ID())
  149. user := dataprovider.User{}
  150. connection := &Connection{
  151. BaseConnection: common.NewBaseConnection(connID, common.ProtocolFTP, cc.LocalAddr().String(),
  152. cc.RemoteAddr().String(), user),
  153. clientContext: cc,
  154. }
  155. common.Connections.Add(connection)
  156. return s.initialMsg, nil
  157. }
  158. // ClientDisconnected is called when the user disconnects, even if he never authenticated
  159. func (s *Server) ClientDisconnected(cc ftpserver.ClientContext) {
  160. s.cleanTLSConnVerification(cc.ID())
  161. connID := fmt.Sprintf("%v_%v_%v", common.ProtocolFTP, s.ID, cc.ID())
  162. common.Connections.Remove(connID)
  163. common.Connections.RemoveClientConnection(util.GetIPFromRemoteAddress(cc.RemoteAddr().String()))
  164. }
  165. // AuthUser authenticates the user and selects an handling driver
  166. func (s *Server) AuthUser(cc ftpserver.ClientContext, username, password string) (ftpserver.ClientDriver, error) {
  167. loginMethod := dataprovider.LoginMethodPassword
  168. if s.isTLSConnVerified(cc.ID()) {
  169. loginMethod = dataprovider.LoginMethodTLSCertificateAndPwd
  170. }
  171. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  172. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, common.ProtocolFTP)
  173. if err != nil {
  174. user.Username = username
  175. updateLoginMetrics(&user, ipAddr, loginMethod, err)
  176. return nil, dataprovider.ErrInvalidCredentials
  177. }
  178. connection, err := s.validateUser(user, cc, loginMethod)
  179. defer updateLoginMetrics(&user, ipAddr, loginMethod, err)
  180. if err != nil {
  181. return nil, err
  182. }
  183. connection.Log(logger.LevelInfo, "User id: %d, logged in with FTP, username: %#v, home_dir: %#v remote addr: %#v",
  184. user.ID, user.Username, user.HomeDir, ipAddr)
  185. dataprovider.UpdateLastLogin(&user)
  186. return connection, nil
  187. }
  188. // WrapPassiveListener implements the MainDriverExtensionPassiveWrapper interface
  189. func (s *Server) WrapPassiveListener(listener net.Listener) (net.Listener, error) {
  190. if s.binding.HasProxy() {
  191. return common.Config.GetProxyListener(listener)
  192. }
  193. return listener, nil
  194. }
  195. // VerifyConnection checks whether a user should be authenticated using a client certificate without prompting for a password
  196. func (s *Server) VerifyConnection(cc ftpserver.ClientContext, user string, tlsConn *tls.Conn) (ftpserver.ClientDriver, error) {
  197. if !s.binding.isMutualTLSEnabled() {
  198. return nil, nil
  199. }
  200. s.setTLSConnVerified(cc.ID(), false)
  201. if tlsConn != nil {
  202. state := tlsConn.ConnectionState()
  203. if len(state.PeerCertificates) > 0 {
  204. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  205. dbUser, err := dataprovider.CheckUserBeforeTLSAuth(user, ipAddr, common.ProtocolFTP, state.PeerCertificates[0])
  206. if err != nil {
  207. dbUser.Username = user
  208. updateLoginMetrics(&dbUser, ipAddr, dataprovider.LoginMethodTLSCertificate, err)
  209. return nil, dataprovider.ErrInvalidCredentials
  210. }
  211. if dbUser.IsTLSUsernameVerificationEnabled() {
  212. dbUser, err = dataprovider.CheckUserAndTLSCert(user, ipAddr, common.ProtocolFTP, state.PeerCertificates[0])
  213. if err != nil {
  214. return nil, err
  215. }
  216. s.setTLSConnVerified(cc.ID(), true)
  217. if dbUser.IsLoginMethodAllowed(dataprovider.LoginMethodTLSCertificate, nil) {
  218. connection, err := s.validateUser(dbUser, cc, dataprovider.LoginMethodTLSCertificate)
  219. defer updateLoginMetrics(&dbUser, ipAddr, dataprovider.LoginMethodTLSCertificate, err)
  220. if err != nil {
  221. return nil, err
  222. }
  223. connection.Log(logger.LevelInfo, "User id: %d, logged in with FTP using a TLS certificate, username: %#v, home_dir: %#v remote addr: %#v",
  224. dbUser.ID, dbUser.Username, dbUser.HomeDir, ipAddr)
  225. dataprovider.UpdateLastLogin(&dbUser)
  226. return connection, nil
  227. }
  228. }
  229. }
  230. }
  231. return nil, nil
  232. }
  233. func (s *Server) buildTLSConfig() {
  234. if certMgr != nil {
  235. s.tlsConfig = &tls.Config{
  236. GetCertificate: certMgr.GetCertificateFunc(),
  237. MinVersion: tls.VersionTLS12,
  238. CipherSuites: s.binding.ciphers,
  239. PreferServerCipherSuites: true,
  240. }
  241. if s.binding.isMutualTLSEnabled() {
  242. s.tlsConfig.ClientCAs = certMgr.GetRootCAs()
  243. s.tlsConfig.VerifyConnection = s.verifyTLSConnection
  244. switch s.binding.ClientAuthType {
  245. case 1:
  246. s.tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert
  247. case 2:
  248. s.tlsConfig.ClientAuth = tls.VerifyClientCertIfGiven
  249. }
  250. }
  251. }
  252. }
  253. // GetTLSConfig returns the TLS configuration for this server
  254. func (s *Server) GetTLSConfig() (*tls.Config, error) {
  255. if s.tlsConfig != nil {
  256. return s.tlsConfig, nil
  257. }
  258. return nil, errors.New("no TLS certificate configured")
  259. }
  260. func (s *Server) verifyTLSConnection(state tls.ConnectionState) error {
  261. if certMgr != nil {
  262. var clientCrt *x509.Certificate
  263. var clientCrtName string
  264. if len(state.PeerCertificates) > 0 {
  265. clientCrt = state.PeerCertificates[0]
  266. clientCrtName = clientCrt.Subject.String()
  267. }
  268. if len(state.VerifiedChains) == 0 {
  269. if s.binding.ClientAuthType == 2 {
  270. return nil
  271. }
  272. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  273. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  274. }
  275. for _, verifiedChain := range state.VerifiedChains {
  276. var caCrt *x509.Certificate
  277. if len(verifiedChain) > 0 {
  278. caCrt = verifiedChain[len(verifiedChain)-1]
  279. }
  280. if certMgr.IsRevoked(clientCrt, caCrt) {
  281. logger.Debug(logSender, "", "tls handshake error, client certificate %#v has beed revoked", clientCrtName)
  282. return common.ErrCrtRevoked
  283. }
  284. }
  285. }
  286. return nil
  287. }
  288. func (s *Server) validateUser(user dataprovider.User, cc ftpserver.ClientContext, loginMethod string) (*Connection, error) {
  289. connectionID := fmt.Sprintf("%v_%v_%v", common.ProtocolFTP, s.ID, cc.ID())
  290. if !filepath.IsAbs(user.HomeDir) {
  291. logger.Warn(logSender, connectionID, "user %#v has an invalid home dir: %#v. Home dir must be an absolute path, login not allowed",
  292. user.Username, user.HomeDir)
  293. return nil, fmt.Errorf("cannot login user with invalid home dir: %#v", user.HomeDir)
  294. }
  295. if util.IsStringInSlice(common.ProtocolFTP, user.Filters.DeniedProtocols) {
  296. logger.Debug(logSender, connectionID, "cannot login user %#v, protocol FTP is not allowed", user.Username)
  297. return nil, fmt.Errorf("protocol FTP is not allowed for user %#v", user.Username)
  298. }
  299. if !user.IsLoginMethodAllowed(loginMethod, nil) {
  300. logger.Debug(logSender, connectionID, "cannot login user %#v, %v login method is not allowed", user.Username, loginMethod)
  301. return nil, fmt.Errorf("login method %v is not allowed for user %#v", loginMethod, user.Username)
  302. }
  303. if user.MaxSessions > 0 {
  304. activeSessions := common.Connections.GetActiveSessions(user.Username)
  305. if activeSessions >= user.MaxSessions {
  306. logger.Debug(logSender, connectionID, "authentication refused for user: %#v, too many open sessions: %v/%v", user.Username,
  307. activeSessions, user.MaxSessions)
  308. return nil, fmt.Errorf("too many open sessions: %v", activeSessions)
  309. }
  310. }
  311. remoteAddr := cc.RemoteAddr().String()
  312. if !user.IsLoginFromAddrAllowed(remoteAddr) {
  313. logger.Debug(logSender, connectionID, "cannot login user %#v, remote address is not allowed: %v", user.Username, remoteAddr)
  314. return nil, fmt.Errorf("login for user %#v is not allowed from this address: %v", user.Username, remoteAddr)
  315. }
  316. err := user.CheckFsRoot(connectionID)
  317. if err != nil {
  318. errClose := user.CloseFs()
  319. logger.Warn(logSender, connectionID, "unable to check fs root: %v close fs error: %v", err, errClose)
  320. return nil, common.ErrInternalFailure
  321. }
  322. connection := &Connection{
  323. BaseConnection: common.NewBaseConnection(fmt.Sprintf("%v_%v", s.ID, cc.ID()), common.ProtocolFTP,
  324. cc.LocalAddr().String(), remoteAddr, user),
  325. clientContext: cc,
  326. }
  327. err = common.Connections.Swap(connection)
  328. if err != nil {
  329. err = user.CloseFs()
  330. logger.Warn(logSender, connectionID, "unable to swap connection, close fs error: %v", err)
  331. return nil, common.ErrInternalFailure
  332. }
  333. return connection, nil
  334. }
  335. func updateLoginMetrics(user *dataprovider.User, ip, loginMethod string, err error) {
  336. metric.AddLoginAttempt(loginMethod)
  337. if err != nil && err != common.ErrInternalFailure {
  338. logger.ConnectionFailedLog(user.Username, ip, loginMethod,
  339. common.ProtocolFTP, err.Error())
  340. event := common.HostEventLoginFailed
  341. if _, ok := err.(*util.RecordNotFoundError); ok {
  342. event = common.HostEventUserNotFound
  343. }
  344. common.AddDefenderEvent(ip, event)
  345. }
  346. metric.AddLoginResult(loginMethod, err)
  347. dataprovider.ExecutePostLoginHook(user, loginMethod, ip, common.ProtocolFTP, err)
  348. }