summaryrefslogtreecommitdiffstats
path: root/modules/setting
diff options
context:
space:
mode:
authorGibheer <gibheer+git@zero-knowledge.org>2016-02-16 23:01:56 +0100
committerGibheer <gibheer+git@zero-knowledge.org>2016-02-16 23:01:56 +0100
commit12403bdfb098d8118df734275c302c8c5de20ee4 (patch)
treeb289b891ed4d1f56aa6ee98a875efb9c131ee14d /modules/setting
parent3af1d3c5810bd94b2f3f80831f2be3a97fc1ceb1 (diff)
downloadgitea-12403bdfb098d8118df734275c302c8c5de20ee4.tar.gz
gitea-12403bdfb098d8118df734275c302c8c5de20ee4.zip
allow native and ssh-keygen public key check
This commit adds the possibibility to use either the native golang libraries or ssh-keygen to check public keys. The check is adjusted depending on the settings, so that only supported keys are let through. This commit also brings back the blacklist feature, which was removed in 7ef9a055886574655d9f2be70c957bc16bf30500. This allows to blacklist algorythms or keys based on the key length. This works with the native and the ssh-keygen way. Because of #2179 it also includes a way to adjust the path to ssh-keygen and the working directory for ssh-keygen. With this, sysadmins should be able to adjust the settings in a way, that SELinux is okay with it. In the worst case, they can switch to the native implementation and only loose support for ed25519 keys at the moment. There are some other places which need adjustment to utilize the parameters and the native implementation, but this sets the ground work.
Diffstat (limited to 'modules/setting')
-rw-r--r--modules/setting/setting.go45
1 files changed, 42 insertions, 3 deletions
diff --git a/modules/setting/setting.go b/modules/setting/setting.go
index d82f16dbc2..e667ee7433 100644
--- a/modules/setting/setting.go
+++ b/modules/setting/setting.go
@@ -30,9 +30,11 @@ import (
type Scheme string
const (
- HTTP Scheme = "http"
- HTTPS Scheme = "https"
- FCGI Scheme = "fcgi"
+ HTTP Scheme = "http"
+ HTTPS Scheme = "https"
+ FCGI Scheme = "fcgi"
+ SSH_PUBLICKEY_CHECK_NATIVE = "native"
+ SSH_PUBLICKEY_CHECK_KEYGEN = "ssh-keygen"
)
type LandingPage string
@@ -66,6 +68,9 @@ var (
SSHDomain string
SSHPort int
SSHRootPath string
+ SSHPublicKeyCheck string
+ SSHWorkPath string
+ SSHKeyGenPath string
OfflineMode bool
DisableRouterLog bool
CertFile, KeyFile string
@@ -328,6 +333,29 @@ func NewContext() {
if err := os.MkdirAll(SSHRootPath, 0700); err != nil {
log.Fatal(4, "Fail to create '%s': %v", SSHRootPath, err)
}
+ checkDefault := SSH_PUBLICKEY_CHECK_KEYGEN
+ if DisableSSH {
+ checkDefault = SSH_PUBLICKEY_CHECK_NATIVE
+ }
+ SSHPublicKeyCheck = sec.Key("SSH_PUBLICKEY_CHECK").MustString(checkDefault)
+ if SSHPublicKeyCheck != SSH_PUBLICKEY_CHECK_NATIVE &&
+ SSHPublicKeyCheck != SSH_PUBLICKEY_CHECK_KEYGEN {
+ log.Fatal(4, "SSH_PUBLICKEY_CHECK must be ssh-keygen or native")
+ }
+ SSHWorkPath = sec.Key("SSH_WORK_PATH").MustString(os.TempDir())
+ if !DisableSSH && (!StartSSHServer || SSHPublicKeyCheck == SSH_PUBLICKEY_CHECK_KEYGEN) {
+ if tmpDirStat, err := os.Stat(SSHWorkPath); err != nil || !tmpDirStat.IsDir() {
+ log.Fatal(4, "directory '%s' set in SSHWorkPath is not a directory: %s", SSHWorkPath, err)
+ }
+ }
+ SSHKeyGenPath = sec.Key("SSH_KEYGEN_PATH").MustString("")
+ if !DisableSSH && !StartSSHServer &&
+ SSHKeyGenPath == "" && SSHPublicKeyCheck == SSH_PUBLICKEY_CHECK_KEYGEN {
+ SSHKeyGenPath, err = exec.LookPath("ssh-keygen")
+ if err != nil {
+ log.Fatal(4, "could not find ssh-keygen, maybe set DISABLE_SSH to use the internal ssh server")
+ }
+ }
OfflineMode = sec.Key("OFFLINE_MODE").MustBool()
DisableRouterLog = sec.Key("DISABLE_ROUTER_LOG").MustBool()
StaticRootPath = sec.Key("STATIC_ROOT_PATH").MustString(workDir)
@@ -459,6 +487,8 @@ var Service struct {
EnableReverseProxyAuth bool
EnableReverseProxyAutoRegister bool
EnableCaptcha bool
+ EnableMinimumKeySizeCheck bool
+ MinimumKeySizes map[string]int
}
func newService() {
@@ -471,6 +501,15 @@ func newService() {
Service.EnableReverseProxyAuth = sec.Key("ENABLE_REVERSE_PROXY_AUTHENTICATION").MustBool()
Service.EnableReverseProxyAutoRegister = sec.Key("ENABLE_REVERSE_PROXY_AUTO_REGISTRATION").MustBool()
Service.EnableCaptcha = sec.Key("ENABLE_CAPTCHA").MustBool()
+ Service.EnableMinimumKeySizeCheck = sec.Key("ENABLE_MINIMUM_KEY_SIZE_CHECK").MustBool()
+ Service.MinimumKeySizes = map[string]int{}
+
+ minimumKeySizes := Cfg.Section("service.minimum_key_sizes").Keys()
+ for _, key := range minimumKeySizes {
+ if key.MustInt() != -1 {
+ Service.MinimumKeySizes[strings.ToLower(key.Name())] = key.MustInt()
+ }
+ }
}
var logLevels = map[string]string{