File: cli_protocol.rst

package info (click to toggle)
varnish 7.7.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 13,256 kB
  • sloc: ansic: 104,222; python: 2,679; makefile: 1,303; sh: 1,077; awk: 114; perl: 105; ruby: 41
file content (171 lines) | stat: -rw-r--r-- 5,910 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
..
	Copyright (c) 2021 Varnish Software AS
	SPDX-License-Identifier: BSD-2-Clause
	See LICENSE file for full text of license

.. role:: ref(emphasis)

.. _ref_cli_api:

===========================================
VCLI protocol - Scripting the CLI interface
===========================================

The Varnish CLI has a few bells&whistles when used as an API.

First: `vcli.h` contains magic numbers.

Second: If you use `varnishadm` to connect to `varnishd` for
API purposes, use the `-p` argument to get "pass" mode.

In "pass" mode, or with direct CLI connections (more below), the
first line of responses is always exactly 13 bytes long, including
the NL, and it contains two numbers:  The status code and the count
of bytes in the "body" of the response::

    200␣19␣␣␣␣␣␣␤
    PONG␣1613397488␣1.0

This makes parsing the response unambiguous, even in cases like this
where the response does not end with a NL.

The varnishapi library contains functions to implement the basics of
the CLI protocol, for more, see the `vcli.h` include file.

.. _ref_remote_cli:

Local and remote CLI connections
--------------------------------

The ``varnishd`` process receives the CLI commands via TCP connections
which require PSK authentication (see below), but which provide no secrecy.

"No secrecy" means that if you configure these TCP connections to run
across a network, anybody who can sniff packets can see your CLI
commands.  If you need secrecy, use ``ssh`` to run ``varnishadm`` or
to tunnel the TCP connection.

By default `varnishd` binds to ``localhost`` and ask the kernel to
assign a random port number.  The resulting listen address is
stored in the shared memory, where the ``varnishadm`` program finds it.

You can configure ``varnishd`` to listen to a specific address with
the ``-T`` argument, this will also be written to shared memory, so
``varnishadm`` keeps working::

	# Bind to internal network
	varnishd -T 192.168.10.21:3245

You can also configure ``varnishd`` to actively open a TCP connection
to another "controller" program, with the ``-M`` argument.

Finally, when run in "debug mode" with the ``-d`` argument, ``varnishd``
will stay in the foreground and turn stdin/stdout into a CLI connection.

.. _ref_psk_auth:

Authentication CLI connections
------------------------------

CLI connections to `varnishd` are authenticated with a "pre-shared-key"
authentication scheme, where the other end must prove they know
*the contents of* the secret file ``varnishd`` uses.

They do not have to read the precise same file on that specific
computer, they could read an entirely different file on a different
computer or fetch the secret from a server.

The name of the file can be configured with the ``-S`` option, and
``varnishd`` records the name in shared memory, so ``varnishadm``
can find it.

As a bare minimum ``varnishd`` needs to be able to read the file,
but other than that, it can be restricted any way you want.

Since it is not the file, but only the content of it that matter,
you can make the file unreadable by everybody, and instead place
a copy of the file in the home directories of the authorized users.

The file is read only at the moment when the `auth` CLI command is
issued and the contents is not cached in `varnishd`, so you can
change it as often as you want.

An authenticated session looks like this:

.. code-block:: text

   critter phk> telnet localhost 1234
   Trying ::1...
   Trying 127.0.0.1...
   Connected to localhost.
   Escape character is '^]'.
   107 59
   ixslvvxrgkjptxmcgnnsdxsvdmvfympg

   Authentication required.

   auth 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a
   200 279
   -----------------------------
   Varnish Cache CLI 1.0
   -----------------------------
   FreeBSD,13.0-CURRENT,amd64,-jnone,-sdefault,-sdefault,-hcritbit
   varnish-trunk revision 89a558e56390d425c52732a6c94087eec9083115

   Type 'help' for command list.
   Type 'quit' to close CLI session.
   Type 'start' to launch worker process.

The CLI status of 107 indicates that authentication is necessary. The
first 32 characters of the response text is the challenge
"ixsl...mpg". The challenge is randomly generated for each CLI
connection, and changes each time a 107 is emitted.

The most recently emitted challenge must be used for calculating the
authenticator "455c…c89a".

The authenticator is calculated by applying the SHA256 function to the
following byte sequence:

* Challenge string
* Newline (0x0a) character.
* Contents of the secret file
* Challenge string
* Newline (0x0a) character.

and dumping the resulting digest in lower-case hex.

In the above example, the secret file contains ``foo\n`` and thus:

.. code-block:: text

   critter phk> hexdump secret
   00000000  66 6f 6f 0a                                       |foo.|
   00000004
   critter phk> cat > tmpfile
   ixslvvxrgkjptxmcgnnsdxsvdmvfympg
   foo
   ixslvvxrgkjptxmcgnnsdxsvdmvfympg
   ^D
   critter phk> hexdump -C tmpfile
   00000000  69 78 73 6c 76 76 78 72  67 6b 6a 70 74 78 6d 63  |ixslvvxrgkjptxmc|
   00000010  67 6e 6e 73 64 78 73 76  64 6d 76 66 79 6d 70 67  |gnnsdxsvdmvfympg|
   00000020  0a 66 6f 6f 0a 69 78 73  6c 76 76 78 72 67 6b 6a  |.foo.ixslvvxrgkj|
   00000030  70 74 78 6d 63 67 6e 6e  73 64 78 73 76 64 6d 76  |ptxmcgnnsdxsvdmv|
   00000040  66 79 6d 70 67 0a                                 |fympg.|
   00000046
   critter phk> sha256 tmpfile
   SHA256 (tmpfile) = 455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a
   critter phk> openssl dgst -sha256 < tmpfile
   455ce847f0073c7ab3b1465f74507b75d3dc064c1e7de3b71e00de9092fdc89a

The sourcefile `lib/libvarnish/cli_auth.c` contains a useful function
which calculates the response, given an open filedescriptor to the
secret file, and the challenge string.

See also:
---------

* :ref:`varnishadm(1)`
* :ref:`varnishd(1)`
* :ref:`vcl(7)`