File: securingssh.rst

package info (click to toggle)
cedar-backup3 3.12.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 6,172 kB
  • sloc: python: 69,622; sh: 594; makefile: 148
file content (203 lines) | stat: -rw-r--r-- 8,726 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
.. _cedar-securingssh:

Securing Password-less SSH Connections
======================================

Cedar Backup relies on password-less public key SSH connections to make
various parts of its backup process work. Password-less ``scp`` is used
to stage files from remote clients to the master, and password-less
``ssh`` is used to execute actions on managed clients.

Normally, it is a good idea to avoid password-less SSH connections in
favor of using an SSH agent. The SSH agent manages your SSH connections
so that you don't need to type your passphrase over and over. You get
most of the benefits of a password-less connection without the risk.
Unfortunately, because Cedar Backup has to execute without human
involvement (through a cron job), use of an agent really isn't feasable.
We have to rely on true password-less public keys to give the master
access to the client peers.

Traditionally, Cedar Backup has relied on a “segmenting” strategy to
minimize the risk. Although the backup typically runs as root --- so
that all parts of the filesystem can be backed up --- we don't use the
root user for network connections. Instead, we use a dedicated backup
user on the master to initiate network connections, and dedicated users
on each of the remote peers to accept network connections.

With this strategy in place, an attacker with access to the backup user
on the master (or even root access, really) can at best only get access
to the backup user on the remote peers. We still concede a local attack
vector, but at least that vector is restricted to an unprivileged user.

Some Cedar Backup users may not be comfortable with this risk, and
others may not be able to implement the segmentation strategy --- they
simply may not have a way to create a login which is only used for
backups.

Fortunately, there is a solution. The SSH authorized keys file supports 
a way to put a “filter” in place on an SSH connection. This excerpt is 
from the AUTHORIZED_KEYS FILE FORMAT section of man 8 sshd:

::

   command="command"
      Specifies that the command is executed whenever this key is used for
      authentication.  The command supplied by the user (if any) is ignored.  The
      command is run on a pty if the client requests a pty; otherwise it is run
      without a tty.  If an 8-bit clean channel is required, one must not request
      a pty or should specify no-pty.  A quote may be included in the command by
      quoting it with a backslash.  This option might be useful to restrict
      certain public keys to perform just a specific operation.  An example might
      be a key that permits remote backups but nothing else.  Note that the client
      may specify TCP and/or X11 forwarding unless they are explicitly prohibited.
      Note that this option applies to shell, command or subsystem execution.
         

Essentially, this gives us a way to authenticate the commands that are
being executed. We can either accept or reject commands, and we can even
provide a readable error message for commands we reject. The filter is
applied on the remote peer, to the key that provides the master access
to the remote peer.

So, let's imagine that we have two hosts: master “mickey”, and peer
“minnie”. Here is the original ``~/.ssh/authorized_keys`` file for the
backup user on minnie (remember, this is all on one line in the file):

::

   ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAxw7EnqVULBFgPcut3WYp3MsSpVB9q9iZ+awek120391k;mm0c221=3=km
   =m=askdalkS82mlF7SusBTcXiCk1BGsg7axZ2sclgK+FfWV1Jm0/I9yo9FtAZ9U+MmpL901231asdkl;ai1-923ma9s=9=
   1-2341=-a0sd=-sa0=1z= backup@mickey
         

This line is the public key that minnie can use to identify the backup
user on mickey. Assuming that there is no passphrase on the private key
back on mickey, the backup user on mickey can get direct access to
minnie.

To put the filter in place, we add a command option to the key, like
this:

::

   command="/opt/backup/validate-backup" ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAxw7EnqVULBFgPcut3WYp
   3MsSpVB9q9iZ+awek120391k;mm0c221=3=km=m=askdalkS82mlF7SusBTcXiCk1BGsg7axZ2sclgK+FfWV1Jm0/I9yo9F
   tAZ9U+MmpL901231asdkl;ai1-923ma9s=9=1-2341=-a0sd=-sa0=1z= backup@mickey
         

Basically, the command option says that whenever this key is used to
successfully initiate a connection, the ``/opt/backup/validate-backup``
command will be run *instead of* the real command that came over the SSH
connection. Fortunately, the interface gives the command access to
shell variables that can be used to invoke the original command
if you want to.

A very basic ``validate-backup`` script might look something like this:

::

   #!/bin/bash
   if [[ "${SSH_ORIGINAL_COMMAND}" == "ls -l" ]] ; then
       ${SSH_ORIGINAL_COMMAND}
   else
      echo "Security policy does not allow command [${SSH_ORIGINAL_COMMAND}]."
      exit 1
   fi
         

This script allows exactly ``ls -l`` and nothing else. If the user attempts
some other command, they get a nice error message telling them that their
command has been disallowed.  For remote commands executed over ``ssh``, the
original command is exactly what the caller attempted to invoke. 

For remote copies using the legacy SCP protocol, the commands are either ``scp
-f file`` (copy *from* the peer to the master) or ``scp -t file`` (copy *to*
the peer from the master).  When using the SFTP protocol, which is the default
in Debian starting with bookworm, the command is simply ``/usr/lib/openssh/sftp-server``.
As a result, this mechanism is really only useful if you force the legacy SCP
protocol using ``scp -O``.

If you want, you can see what command SSH thinks it is executing by
using ``ssh -v`` or ``scp -O -v``. The command will be right at the top,
something like this:

::

   Executing: program /usr/bin/ssh host mickey, user (unspecified), command scp -v -f .profile
   OpenSSH_4.3p2 Debian-9, OpenSSL 0.9.8c 05 Sep 2006
   debug1: Reading configuration data /home/backup/.ssh/config
   debug1: Applying options for minnie
   debug1: Reading configuration data /etc/ssh/ssh_config
   debug1: Applying options for *
   debug2: ssh_connect: needpriv 0
         

Omit the ``-v`` and you have your command: ``scp -f .profile``.

For a normal, non-managed setup, you need to allow the following
commands, where ``/path/to/collect/`` is replaced with the real path to
the collect directory on the remote peer:

::

   scp -f /path/to/collect/cback.collect
   scp -f /path/to/collect/*
   scp -t /path/to/collect/cback.stage
         

If you are configuring a managed client, then you also need to list the
exact command lines that the master will be invoking on the managed
client. You are guaranteed that the master will invoke one action at a
time, so if you list two lines per action (full and non-full) you should
be fine. Here's an example for the collect action:

::

   /usr/bin/cback3 --full collect
   /usr/bin/cback3 collect
         
Of course, you would have to list the actual path to the ``cback3``
executable --- exactly the one listed in the ``<cback_command>``
configuration option for your managed peer.

Below is the script that I use for my own backups, to allow the
master to stage files from each client.  This is stored as 
``~/.ssh/validate-backup`` and is referenced in ``~/.ssh/authorized-keys``
as described above.

::

   # Since this script is specified as the command in ~/.ssh/authorized_keys, it
   # acts as a "filter" and prevents the backup user from doing anything except
   # specific Cedar Backup actions (stage, in this case, via scp).

   # See the AUTHORIZED_KEYS FILE FORMAT section in sshd(8) for more information.

   # As of Debian bookworm, the sshd server implements SCP over SFTP.  That breaks
   # this filter, because the SSH command is just "/usr/lib/openssh/sftp-server".
   # The workaround is to use `scp -O` to force the old protocol.

   typeset -x COLLECTDIR=/data/backup/collect

   typeset -x CMD1="scp -f ${COLLECTDIR}/cback.collect"    # check collect indicator
   typeset -x CMD2="scp -f ${COLLECTDIR}/*"                # stage all files
   typeset -x CMD3="scp -t ${COLLECTDIR}/cback.stage"      # write the stage indicator

   if [[ "${SSH_ORIGINAL_COMMAND}" == "${CMD1}" ]] ; then
       ${SSH_ORIGINAL_COMMAND}
   elif [[ "${SSH_ORIGINAL_COMMAND}" == "${CMD2}" ]]; then
      ${SSH_ORIGINAL_COMMAND}
   elif [[ "${SSH_ORIGINAL_COMMAND}" == "${CMD3}" ]]; then
      ${SSH_ORIGINAL_COMMAND}
   else
      echo "Security policy does not allow command [${SSH_ORIGINAL_COMMAND}]."
      exit 1
   fi

----------

*Previous*: :doc:`recovering` • *Next*: :doc:`copyright`

.. |note| image:: images/note.png
.. |tip| image:: images/tip.png
.. |warning| image:: images/warning.png