mirror of
https://github.com/mariocandela/beelzebub.git
synced 2025-07-01 18:47:26 -04:00

* Feat: Add support for logging which "command" was matched for SSH and HTTP strategies. * Feat: Convert to precompiling regexp at config load time. This allows for errors to be presented to the user during startup, and provides better performance for complex regexp. * Feat:Bump Golang version to latest stable 1.24 * Feat: Add a cleanup routine for HistoryStore, default TTL for events is 1 hour since last interaction. * Feat: Add new command line flag "memLimitMiB" with a default value of 100. --------- Signed-off-by: Bryan Nolen <bryan@arc.net.au> Signed-off-by: Mario Candela <mario.candela.personal@gmail.com> Co-authored-by: Mario Candela <mario.candela.personal@gmail.com>
226 lines
7.7 KiB
Go
226 lines
7.7 KiB
Go
package SSH
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/mariocandela/beelzebub/v3/historystore"
|
|
"github.com/mariocandela/beelzebub/v3/parser"
|
|
"github.com/mariocandela/beelzebub/v3/plugins"
|
|
"github.com/mariocandela/beelzebub/v3/tracer"
|
|
|
|
"github.com/gliderlabs/ssh"
|
|
"github.com/google/uuid"
|
|
log "github.com/sirupsen/logrus"
|
|
"golang.org/x/term"
|
|
)
|
|
|
|
type SSHStrategy struct {
|
|
Sessions *historystore.HistoryStore
|
|
}
|
|
|
|
func (sshStrategy *SSHStrategy) Init(servConf parser.BeelzebubServiceConfiguration, tr tracer.Tracer) error {
|
|
if sshStrategy.Sessions == nil {
|
|
sshStrategy.Sessions = historystore.NewHistoryStore()
|
|
}
|
|
go sshStrategy.Sessions.HistoryCleaner()
|
|
go func() {
|
|
server := &ssh.Server{
|
|
Addr: servConf.Address,
|
|
MaxTimeout: time.Duration(servConf.DeadlineTimeoutSeconds) * time.Second,
|
|
IdleTimeout: time.Duration(servConf.DeadlineTimeoutSeconds) * time.Second,
|
|
Version: servConf.ServerVersion,
|
|
Handler: func(sess ssh.Session) {
|
|
uuidSession := uuid.New()
|
|
|
|
host, port, _ := net.SplitHostPort(sess.RemoteAddr().String())
|
|
sessionKey := "SSH" + host + sess.User()
|
|
|
|
// Inline SSH command
|
|
if sess.RawCommand() != "" {
|
|
var histories []plugins.Message
|
|
if sshStrategy.Sessions.HasKey(sessionKey) {
|
|
histories = sshStrategy.Sessions.Query(sessionKey)
|
|
}
|
|
for _, command := range servConf.Commands {
|
|
if command.Regex.MatchString(sess.RawCommand()) {
|
|
commandOutput := command.Handler
|
|
if command.Plugin == plugins.LLMPluginName {
|
|
llmProvider, err := plugins.FromStringToLLMProvider(servConf.Plugin.LLMProvider)
|
|
if err != nil {
|
|
log.Errorf("error: %s", err.Error())
|
|
commandOutput = "command not found"
|
|
llmProvider = plugins.OpenAI
|
|
}
|
|
llmHoneypot := plugins.LLMHoneypot{
|
|
Histories: histories,
|
|
OpenAIKey: servConf.Plugin.OpenAISecretKey,
|
|
Protocol: tracer.SSH,
|
|
Host: servConf.Plugin.Host,
|
|
Model: servConf.Plugin.LLMModel,
|
|
Provider: llmProvider,
|
|
CustomPrompt: servConf.Plugin.Prompt,
|
|
}
|
|
llmHoneypotInstance := plugins.InitLLMHoneypot(llmHoneypot)
|
|
if commandOutput, err = llmHoneypotInstance.ExecuteModel(sess.RawCommand()); err != nil {
|
|
log.Errorf("error ExecuteModel: %s, %s", sess.RawCommand(), err.Error())
|
|
commandOutput = "command not found"
|
|
}
|
|
}
|
|
var newEntries []plugins.Message
|
|
newEntries = append(newEntries, plugins.Message{Role: plugins.USER.String(), Content: sess.RawCommand()})
|
|
newEntries = append(newEntries, plugins.Message{Role: plugins.ASSISTANT.String(), Content: commandOutput})
|
|
// Append the new entries to the store.
|
|
sshStrategy.Sessions.Append(sessionKey, newEntries...)
|
|
|
|
sess.Write(append([]byte(commandOutput), '\n'))
|
|
|
|
tr.TraceEvent(tracer.Event{
|
|
Msg: "SSH Raw Command",
|
|
Protocol: tracer.SSH.String(),
|
|
RemoteAddr: sess.RemoteAddr().String(),
|
|
SourceIp: host,
|
|
SourcePort: port,
|
|
Status: tracer.Start.String(),
|
|
ID: uuidSession.String(),
|
|
Environ: strings.Join(sess.Environ(), ","),
|
|
User: sess.User(),
|
|
Description: servConf.Description,
|
|
Command: sess.RawCommand(),
|
|
CommandOutput: commandOutput,
|
|
Handler: command.Name,
|
|
})
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
tr.TraceEvent(tracer.Event{
|
|
Msg: "New SSH Terminal Session",
|
|
Protocol: tracer.SSH.String(),
|
|
RemoteAddr: sess.RemoteAddr().String(),
|
|
SourceIp: host,
|
|
SourcePort: port,
|
|
Status: tracer.Start.String(),
|
|
ID: uuidSession.String(),
|
|
Environ: strings.Join(sess.Environ(), ","),
|
|
User: sess.User(),
|
|
Description: servConf.Description,
|
|
})
|
|
|
|
terminal := term.NewTerminal(sess, buildPrompt(sess.User(), servConf.ServerName))
|
|
var histories []plugins.Message
|
|
if sshStrategy.Sessions.HasKey(sessionKey) {
|
|
histories = sshStrategy.Sessions.Query(sessionKey)
|
|
}
|
|
|
|
for {
|
|
commandInput, err := terminal.ReadLine()
|
|
if err != nil {
|
|
break
|
|
}
|
|
if commandInput == "exit" {
|
|
break
|
|
}
|
|
for _, command := range servConf.Commands {
|
|
if command.Regex.MatchString(commandInput) {
|
|
commandOutput := command.Handler
|
|
if command.Plugin == plugins.LLMPluginName {
|
|
llmProvider, err := plugins.FromStringToLLMProvider(servConf.Plugin.LLMProvider)
|
|
if err != nil {
|
|
log.Errorf("error: %s, fallback OpenAI", err.Error())
|
|
llmProvider = plugins.OpenAI
|
|
}
|
|
llmHoneypot := plugins.LLMHoneypot{
|
|
Histories: histories,
|
|
OpenAIKey: servConf.Plugin.OpenAISecretKey,
|
|
Protocol: tracer.SSH,
|
|
Host: servConf.Plugin.Host,
|
|
Model: servConf.Plugin.LLMModel,
|
|
Provider: llmProvider,
|
|
CustomPrompt: servConf.Plugin.Prompt,
|
|
}
|
|
llmHoneypotInstance := plugins.InitLLMHoneypot(llmHoneypot)
|
|
if commandOutput, err = llmHoneypotInstance.ExecuteModel(commandInput); err != nil {
|
|
log.Errorf("error ExecuteModel: %s, %s", commandInput, err.Error())
|
|
commandOutput = "command not found"
|
|
}
|
|
}
|
|
var newEntries []plugins.Message
|
|
newEntries = append(newEntries, plugins.Message{Role: plugins.USER.String(), Content: commandInput})
|
|
newEntries = append(newEntries, plugins.Message{Role: plugins.ASSISTANT.String(), Content: commandOutput})
|
|
// Stash the new entries to the store, and update the history for this running session.
|
|
sshStrategy.Sessions.Append(sessionKey, newEntries...)
|
|
histories = append(histories, newEntries...)
|
|
|
|
terminal.Write(append([]byte(commandOutput), '\n'))
|
|
|
|
tr.TraceEvent(tracer.Event{
|
|
Msg: "SSH Terminal Session Interaction",
|
|
RemoteAddr: sess.RemoteAddr().String(),
|
|
SourceIp: host,
|
|
SourcePort: port,
|
|
Status: tracer.Interaction.String(),
|
|
Command: commandInput,
|
|
CommandOutput: commandOutput,
|
|
ID: uuidSession.String(),
|
|
Protocol: tracer.SSH.String(),
|
|
Description: servConf.Description,
|
|
Handler: command.Name,
|
|
})
|
|
break // Inner range over commands.
|
|
}
|
|
}
|
|
}
|
|
|
|
tr.TraceEvent(tracer.Event{
|
|
Msg: "End SSH Session",
|
|
Status: tracer.End.String(),
|
|
ID: uuidSession.String(),
|
|
Protocol: tracer.SSH.String(),
|
|
})
|
|
},
|
|
PasswordHandler: func(ctx ssh.Context, password string) bool {
|
|
host, port, _ := net.SplitHostPort(ctx.RemoteAddr().String())
|
|
|
|
tr.TraceEvent(tracer.Event{
|
|
Msg: "New SSH Login Attempt",
|
|
Protocol: tracer.SSH.String(),
|
|
Status: tracer.Stateless.String(),
|
|
User: ctx.User(),
|
|
Password: password,
|
|
Client: ctx.ClientVersion(),
|
|
RemoteAddr: ctx.RemoteAddr().String(),
|
|
SourceIp: host,
|
|
SourcePort: port,
|
|
ID: uuid.New().String(),
|
|
Description: servConf.Description,
|
|
})
|
|
matched, err := regexp.MatchString(servConf.PasswordRegex, password)
|
|
if err != nil {
|
|
log.Errorf("error regex: %s, %s", servConf.PasswordRegex, err.Error())
|
|
return false
|
|
}
|
|
return matched
|
|
},
|
|
}
|
|
err := server.ListenAndServe()
|
|
if err != nil {
|
|
log.Errorf("error during init SSH Protocol: %s", err.Error())
|
|
}
|
|
}()
|
|
|
|
log.WithFields(log.Fields{
|
|
"port": servConf.Address,
|
|
"commands": len(servConf.Commands),
|
|
}).Infof("GetInstance service %s", servConf.Protocol)
|
|
return nil
|
|
}
|
|
|
|
func buildPrompt(user string, serverName string) string {
|
|
return fmt.Sprintf("%s@%s:~$ ", user, serverName)
|
|
}
|