server.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package ftpd
  15. import (
  16. "crypto/tls"
  17. "crypto/x509"
  18. "errors"
  19. "fmt"
  20. "net"
  21. "os"
  22. "path/filepath"
  23. "slices"
  24. ftpserver "github.com/fclairamb/ftpserverlib"
  25. "github.com/sftpgo/sdk/plugin/notifier"
  26. "github.com/drakkan/sftpgo/v2/internal/common"
  27. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  28. "github.com/drakkan/sftpgo/v2/internal/logger"
  29. "github.com/drakkan/sftpgo/v2/internal/metric"
  30. "github.com/drakkan/sftpgo/v2/internal/plugin"
  31. "github.com/drakkan/sftpgo/v2/internal/util"
  32. "github.com/drakkan/sftpgo/v2/internal/version"
  33. )
  34. // Server implements the ftpserverlib MainDriver interface
  35. type Server struct {
  36. ID int
  37. config *Configuration
  38. initialMsg string
  39. statusBanner string
  40. binding Binding
  41. tlsConfig *tls.Config
  42. }
  43. // NewServer returns a new FTP server driver
  44. func NewServer(config *Configuration, configDir string, binding Binding, id int) *Server {
  45. binding.setCiphers()
  46. vers := version.GetServerVersion("_", false)
  47. server := &Server{
  48. config: config,
  49. initialMsg: vers,
  50. statusBanner: fmt.Sprintf("%s FTP Server", vers),
  51. binding: binding,
  52. ID: id,
  53. }
  54. if config.BannerFile != "" {
  55. bannerFilePath := config.BannerFile
  56. if !filepath.IsAbs(bannerFilePath) {
  57. bannerFilePath = filepath.Join(configDir, bannerFilePath)
  58. }
  59. bannerContent, err := os.ReadFile(bannerFilePath)
  60. if err == nil {
  61. server.initialMsg = util.BytesToString(bannerContent)
  62. } else {
  63. logger.WarnToConsole("unable to read FTPD banner file: %v", err)
  64. logger.Warn(logSender, "", "unable to read banner file: %v", err)
  65. }
  66. }
  67. server.buildTLSConfig()
  68. return server
  69. }
  70. // GetSettings returns FTP server settings
  71. func (s *Server) GetSettings() (*ftpserver.Settings, error) {
  72. if err := s.binding.checkPassiveIP(); err != nil {
  73. return nil, err
  74. }
  75. if err := s.binding.checkSecuritySettings(); err != nil {
  76. return nil, err
  77. }
  78. var portRange *ftpserver.PortRange
  79. if s.config.PassivePortRange.Start > 0 && s.config.PassivePortRange.End > s.config.PassivePortRange.Start {
  80. portRange = &ftpserver.PortRange{
  81. Start: s.config.PassivePortRange.Start,
  82. End: s.config.PassivePortRange.End,
  83. }
  84. }
  85. var ftpListener net.Listener
  86. if s.binding.HasProxy() {
  87. listener, err := net.Listen("tcp", s.binding.GetAddress())
  88. if err != nil {
  89. logger.Warn(logSender, "", "error starting listener on address %v: %v", s.binding.GetAddress(), err)
  90. return nil, err
  91. }
  92. ftpListener, err = common.Config.GetProxyListener(listener)
  93. if err != nil {
  94. logger.Warn(logSender, "", "error enabling proxy listener: %v", err)
  95. return nil, err
  96. }
  97. if s.binding.TLSMode == 2 && s.tlsConfig != nil {
  98. ftpListener = tls.NewListener(ftpListener, s.tlsConfig)
  99. }
  100. }
  101. if !s.binding.isTLSModeValid() {
  102. return nil, fmt.Errorf("unsupported TLS mode: %d", s.binding.TLSMode)
  103. }
  104. if !s.binding.isTLSSessionReuseValid() {
  105. return nil, fmt.Errorf("unsupported TLS reuse mode %d", s.binding.TLSSessionReuse)
  106. }
  107. if (s.binding.TLSMode > 0 || s.binding.TLSSessionReuse > 0) && certMgr == nil {
  108. return nil, errors.New("to enable TLS you need to provide a certificate")
  109. }
  110. return &ftpserver.Settings{
  111. Listener: ftpListener,
  112. ListenAddr: s.binding.GetAddress(),
  113. PublicIPResolver: s.binding.passiveIPResolver,
  114. PassiveTransferPortRange: portRange,
  115. ActiveTransferPortNon20: s.config.ActiveTransfersPortNon20,
  116. IdleTimeout: -1,
  117. ConnectionTimeout: 20,
  118. Banner: s.statusBanner,
  119. TLSRequired: ftpserver.TLSRequirement(s.binding.TLSMode),
  120. TLSSessionReuse: ftpserver.TLSSessionReuse(s.binding.TLSSessionReuse),
  121. DisableSite: !s.config.EnableSite,
  122. DisableActiveMode: s.config.DisableActiveMode,
  123. EnableHASH: s.config.HASHSupport > 0,
  124. EnableCOMB: s.config.CombineSupport > 0,
  125. DefaultTransferType: ftpserver.TransferTypeBinary,
  126. IgnoreASCIITranferType: s.binding.IgnoreASCIITransferType == 1,
  127. ActiveConnectionsCheck: ftpserver.DataConnectionRequirement(s.binding.ActiveConnectionsSecurity),
  128. PasvConnectionsCheck: ftpserver.DataConnectionRequirement(s.binding.PassiveConnectionsSecurity),
  129. }, nil
  130. }
  131. // ClientConnected is called to send the very first welcome message
  132. func (s *Server) ClientConnected(cc ftpserver.ClientContext) (string, error) {
  133. cc.SetDebug(s.binding.Debug)
  134. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  135. common.Connections.AddClientConnection(ipAddr)
  136. if common.IsBanned(ipAddr, common.ProtocolFTP) {
  137. logger.Log(logger.LevelDebug, common.ProtocolFTP, "", "connection refused, ip %q is banned", ipAddr)
  138. return "Access denied: banned client IP", common.ErrConnectionDenied
  139. }
  140. if err := common.Connections.IsNewConnectionAllowed(ipAddr, common.ProtocolFTP); err != nil {
  141. logger.Log(logger.LevelDebug, common.ProtocolFTP, "", "connection not allowed from ip %q: %v", ipAddr, err)
  142. return "Access denied", err
  143. }
  144. _, err := common.LimitRate(common.ProtocolFTP, ipAddr)
  145. if err != nil {
  146. return fmt.Sprintf("Access denied: %v", err.Error()), err
  147. }
  148. if err := common.Config.ExecutePostConnectHook(ipAddr, common.ProtocolFTP); err != nil {
  149. return "Access denied", err
  150. }
  151. connID := fmt.Sprintf("%v_%v", s.ID, cc.ID())
  152. user := dataprovider.User{}
  153. connection := &Connection{
  154. BaseConnection: common.NewBaseConnection(connID, common.ProtocolFTP, cc.LocalAddr().String(),
  155. cc.RemoteAddr().String(), user),
  156. clientContext: cc,
  157. }
  158. err = common.Connections.Add(connection)
  159. return s.initialMsg, err
  160. }
  161. // ClientDisconnected is called when the user disconnects, even if he never authenticated
  162. func (s *Server) ClientDisconnected(cc ftpserver.ClientContext) {
  163. connID := fmt.Sprintf("%v_%v_%v", common.ProtocolFTP, s.ID, cc.ID())
  164. common.Connections.Remove(connID)
  165. common.Connections.RemoveClientConnection(util.GetIPFromRemoteAddress(cc.RemoteAddr().String()))
  166. }
  167. // AuthUser authenticates the user and selects an handling driver
  168. func (s *Server) AuthUser(cc ftpserver.ClientContext, username, password string) (ftpserver.ClientDriver, error) {
  169. loginMethod := dataprovider.LoginMethodPassword
  170. if verified, ok := cc.Extra().(bool); ok && verified {
  171. loginMethod = dataprovider.LoginMethodTLSCertificateAndPwd
  172. }
  173. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  174. user, err := dataprovider.CheckUserAndPass(username, password, ipAddr, common.ProtocolFTP)
  175. if err != nil {
  176. user.Username = username
  177. updateLoginMetrics(&user, ipAddr, loginMethod, err)
  178. return nil, dataprovider.ErrInvalidCredentials
  179. }
  180. connection, err := s.validateUser(user, cc, loginMethod)
  181. defer updateLoginMetrics(&user, ipAddr, loginMethod, err)
  182. if err != nil {
  183. return nil, err
  184. }
  185. setStartDirectory(user.Filters.StartDirectory, cc)
  186. connection.Log(logger.LevelInfo, "User %q logged in with %q from ip %q, TLS enabled? %t",
  187. user.Username, loginMethod, ipAddr, cc.HasTLSForControl())
  188. dataprovider.UpdateLastLogin(&user)
  189. return connection, nil
  190. }
  191. // PreAuthUser implements the MainDriverExtensionUserVerifier interface
  192. func (s *Server) PreAuthUser(cc ftpserver.ClientContext, username string) error {
  193. if s.binding.TLSMode == 0 && s.tlsConfig != nil {
  194. user, err := dataprovider.GetFTPPreAuthUser(username, util.GetIPFromRemoteAddress(cc.RemoteAddr().String()))
  195. if err == nil {
  196. if user.Filters.FTPSecurity == 1 {
  197. return cc.SetTLSRequirement(ftpserver.MandatoryEncryption)
  198. }
  199. return nil
  200. }
  201. if !errors.Is(err, util.ErrNotFound) {
  202. logger.Error(logSender, fmt.Sprintf("%v_%v_%v", common.ProtocolFTP, s.ID, cc.ID()),
  203. "unable to get user on pre auth: %v", err)
  204. return common.ErrInternalFailure
  205. }
  206. }
  207. return nil
  208. }
  209. // WrapPassiveListener implements the MainDriverExtensionPassiveWrapper interface
  210. func (s *Server) WrapPassiveListener(listener net.Listener) (net.Listener, error) {
  211. if s.binding.HasProxy() {
  212. return common.Config.GetProxyListener(listener)
  213. }
  214. return listener, nil
  215. }
  216. // VerifyConnection checks whether a user should be authenticated using a client certificate without prompting for a password
  217. func (s *Server) VerifyConnection(cc ftpserver.ClientContext, user string, tlsConn *tls.Conn) (ftpserver.ClientDriver, error) {
  218. if !s.binding.isMutualTLSEnabled() {
  219. return nil, nil
  220. }
  221. cc.SetExtra(false)
  222. if tlsConn != nil {
  223. state := tlsConn.ConnectionState()
  224. if len(state.PeerCertificates) > 0 {
  225. ipAddr := util.GetIPFromRemoteAddress(cc.RemoteAddr().String())
  226. dbUser, err := dataprovider.CheckUserBeforeTLSAuth(user, ipAddr, common.ProtocolFTP, state.PeerCertificates[0])
  227. if err != nil {
  228. dbUser.Username = user
  229. updateLoginMetrics(&dbUser, ipAddr, dataprovider.LoginMethodTLSCertificate, err)
  230. return nil, dataprovider.ErrInvalidCredentials
  231. }
  232. if dbUser.IsTLSVerificationEnabled() {
  233. dbUser, err = dataprovider.CheckUserAndTLSCert(user, ipAddr, common.ProtocolFTP, state.PeerCertificates[0])
  234. if err != nil {
  235. return nil, err
  236. }
  237. cc.SetExtra(true)
  238. if dbUser.IsLoginMethodAllowed(dataprovider.LoginMethodTLSCertificate, common.ProtocolFTP) {
  239. connection, err := s.validateUser(dbUser, cc, dataprovider.LoginMethodTLSCertificate)
  240. defer updateLoginMetrics(&dbUser, ipAddr, dataprovider.LoginMethodTLSCertificate, err)
  241. if err != nil {
  242. return nil, err
  243. }
  244. setStartDirectory(dbUser.Filters.StartDirectory, cc)
  245. connection.Log(logger.LevelInfo, "User id: %d, logged in with FTP using a TLS certificate, username: %q, home_dir: %q remote addr: %q",
  246. dbUser.ID, dbUser.Username, dbUser.HomeDir, ipAddr)
  247. dataprovider.UpdateLastLogin(&dbUser)
  248. return connection, nil
  249. }
  250. }
  251. }
  252. }
  253. return nil, nil
  254. }
  255. func (s *Server) buildTLSConfig() {
  256. if certMgr != nil {
  257. certID := common.DefaultTLSKeyPaidID
  258. if getConfigPath(s.binding.CertificateFile, "") != "" && getConfigPath(s.binding.CertificateKeyFile, "") != "" {
  259. certID = s.binding.GetAddress()
  260. }
  261. if !certMgr.HasCertificate(certID) {
  262. return
  263. }
  264. s.tlsConfig = &tls.Config{
  265. GetCertificate: certMgr.GetCertificateFunc(certID),
  266. MinVersion: util.GetTLSVersion(s.binding.MinTLSVersion),
  267. CipherSuites: s.binding.ciphers,
  268. }
  269. logger.Debug(logSender, "", "configured TLS cipher suites for binding %q: %v, certID: %v",
  270. s.binding.GetAddress(), s.binding.ciphers, certID)
  271. if s.binding.isMutualTLSEnabled() {
  272. s.tlsConfig.ClientCAs = certMgr.GetRootCAs()
  273. if s.binding.TLSSessionReuse != int(ftpserver.TLSSessionReuseRequired) {
  274. s.tlsConfig.VerifyConnection = s.verifyTLSConnection
  275. }
  276. switch s.binding.ClientAuthType {
  277. case 1:
  278. s.tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert
  279. case 2:
  280. s.tlsConfig.ClientAuth = tls.VerifyClientCertIfGiven
  281. }
  282. }
  283. }
  284. }
  285. // GetTLSConfig returns the TLS configuration for this server
  286. func (s *Server) GetTLSConfig() (*tls.Config, error) {
  287. if s.tlsConfig != nil {
  288. return s.tlsConfig, nil
  289. }
  290. return nil, errors.New("no TLS certificate configured")
  291. }
  292. // VerifyTLSConnectionState implements the MainDriverExtensionTLSConnectionStateVerifier extension
  293. func (s *Server) VerifyTLSConnectionState(_ ftpserver.ClientContext, cs tls.ConnectionState) error {
  294. if !s.binding.isMutualTLSEnabled() {
  295. return nil
  296. }
  297. return s.verifyTLSConnection(cs)
  298. }
  299. func (s *Server) verifyTLSConnection(state tls.ConnectionState) error {
  300. if certMgr != nil {
  301. var clientCrt *x509.Certificate
  302. var clientCrtName string
  303. if len(state.PeerCertificates) > 0 {
  304. clientCrt = state.PeerCertificates[0]
  305. clientCrtName = clientCrt.Subject.String()
  306. }
  307. if len(state.VerifiedChains) == 0 {
  308. if s.binding.ClientAuthType == 2 {
  309. return nil
  310. }
  311. logger.Warn(logSender, "", "TLS connection cannot be verified: unable to get verification chain")
  312. return errors.New("TLS connection cannot be verified: unable to get verification chain")
  313. }
  314. for _, verifiedChain := range state.VerifiedChains {
  315. var caCrt *x509.Certificate
  316. if len(verifiedChain) > 0 {
  317. caCrt = verifiedChain[len(verifiedChain)-1]
  318. }
  319. if certMgr.IsRevoked(clientCrt, caCrt) {
  320. logger.Debug(logSender, "", "tls handshake error, client certificate %q has beed revoked", clientCrtName)
  321. return common.ErrCrtRevoked
  322. }
  323. }
  324. }
  325. return nil
  326. }
  327. func (s *Server) validateUser(user dataprovider.User, cc ftpserver.ClientContext, loginMethod string) (*Connection, error) {
  328. connectionID := fmt.Sprintf("%v_%v_%v", common.ProtocolFTP, s.ID, cc.ID())
  329. if !filepath.IsAbs(user.HomeDir) {
  330. logger.Warn(logSender, connectionID, "user %q has an invalid home dir: %q. Home dir must be an absolute path, login not allowed",
  331. user.Username, user.HomeDir)
  332. return nil, fmt.Errorf("cannot login user with invalid home dir: %q", user.HomeDir)
  333. }
  334. if slices.Contains(user.Filters.DeniedProtocols, common.ProtocolFTP) {
  335. logger.Info(logSender, connectionID, "cannot login user %q, protocol FTP is not allowed", user.Username)
  336. return nil, fmt.Errorf("protocol FTP is not allowed for user %q", user.Username)
  337. }
  338. if !user.IsLoginMethodAllowed(loginMethod, common.ProtocolFTP) {
  339. logger.Info(logSender, connectionID, "cannot login user %q, %v login method is not allowed",
  340. user.Username, loginMethod)
  341. return nil, fmt.Errorf("login method %v is not allowed for user %q", loginMethod, user.Username)
  342. }
  343. if user.MustSetSecondFactorForProtocol(common.ProtocolFTP) {
  344. logger.Info(logSender, connectionID, "cannot login user %q, second factor authentication is not set",
  345. user.Username)
  346. return nil, fmt.Errorf("second factor authentication is not set for user %q", user.Username)
  347. }
  348. if user.MaxSessions > 0 {
  349. activeSessions := common.Connections.GetActiveSessions(user.Username)
  350. if activeSessions >= user.MaxSessions {
  351. logger.Info(logSender, connectionID, "authentication refused for user: %q, too many open sessions: %v/%v",
  352. user.Username, activeSessions, user.MaxSessions)
  353. return nil, fmt.Errorf("too many open sessions: %v", activeSessions)
  354. }
  355. }
  356. remoteAddr := cc.RemoteAddr().String()
  357. if !user.IsLoginFromAddrAllowed(remoteAddr) {
  358. logger.Info(logSender, connectionID, "cannot login user %q, remote address is not allowed: %v",
  359. user.Username, remoteAddr)
  360. return nil, fmt.Errorf("login for user %q is not allowed from this address: %v", user.Username, remoteAddr)
  361. }
  362. err := user.CheckFsRoot(connectionID)
  363. if err != nil {
  364. errClose := user.CloseFs()
  365. logger.Warn(logSender, connectionID, "unable to check fs root: %v close fs error: %v", err, errClose)
  366. return nil, common.ErrInternalFailure
  367. }
  368. connection := &Connection{
  369. BaseConnection: common.NewBaseConnection(fmt.Sprintf("%v_%v", s.ID, cc.ID()), common.ProtocolFTP,
  370. cc.LocalAddr().String(), remoteAddr, user),
  371. clientContext: cc,
  372. }
  373. err = common.Connections.Swap(connection)
  374. if err != nil {
  375. errClose := user.CloseFs()
  376. logger.Warn(logSender, connectionID, "unable to swap connection: %v, close fs error: %v", err, errClose)
  377. return nil, err
  378. }
  379. return connection, nil
  380. }
  381. func setStartDirectory(startDirectory string, cc ftpserver.ClientContext) {
  382. if startDirectory == "" {
  383. return
  384. }
  385. cc.SetPath(startDirectory)
  386. }
  387. func updateLoginMetrics(user *dataprovider.User, ip, loginMethod string, err error) {
  388. metric.AddLoginAttempt(loginMethod)
  389. if err == nil {
  390. plugin.Handler.NotifyLogEvent(notifier.LogEventTypeLoginOK, common.ProtocolFTP, user.Username, ip, "", nil)
  391. common.DelayLogin(nil)
  392. } else if err != common.ErrInternalFailure {
  393. logger.ConnectionFailedLog(user.Username, ip, loginMethod, common.ProtocolFTP, err.Error())
  394. event := common.HostEventLoginFailed
  395. logEv := notifier.LogEventTypeLoginFailed
  396. if errors.Is(err, util.ErrNotFound) {
  397. event = common.HostEventUserNotFound
  398. logEv = notifier.LogEventTypeLoginNoUser
  399. }
  400. common.AddDefenderEvent(ip, common.ProtocolFTP, event)
  401. plugin.Handler.NotifyLogEvent(logEv, common.ProtocolFTP, user.Username, ip, "", err)
  402. if loginMethod != dataprovider.LoginMethodTLSCertificate {
  403. common.DelayLogin(err)
  404. }
  405. }
  406. metric.AddLoginResult(loginMethod, err)
  407. dataprovider.ExecutePostLoginHook(user, loginMethod, ip, common.ProtocolFTP, err)
  408. }