Hi
I need my esp32 to act as a ssh client (sshing into a server, executing a command and parsing the received output). I made a prototype using esp-idf 4.4 and libssh2, however, for cypher compatibility reasons I would like to switch to libssh or an alternative library supporting ed25519. While trying to port libssh (and failing so far), I saw that openssl, which to my understanding libssh depends on is removed from esp-idf 5. What would be the best library to use and do there exist esp32 ports for esp-idf 5?
Best,
Florian
SSH client library for esp-idf 5
Re: SSH client library for esp-idf 5
Hi Florian,
Did you get any advice on this? I'm in a similar position.
Did you get any advice on this? I'm in a similar position.
-
- Posts: 2
- Joined: Fri Sep 25, 2020 2:52 pm
Re: SSH client library for esp-idf 5
Hi guys I am also in the same situation. any updates ?
Re: SSH client library for esp-idf 5
Yes, I used libssh2 to make a esp component. You can find the component here: https://gitlab.com/ch405labs/ch405labs_esp_libssh2. IMPORTANT: It works with espidf 5.2, but not with 5.3. mbedtls does no longer provide one important function in espidf. This seems related to some missing code in low level file handling functions - which also lead to linker errors. But I could not yet find the cause.
I did not write a readme yet. Make sure to clone with submodules (libssh2 with minor adaptions to surpress some warnings is a submodule of this repo). Once you include it in your project you need to implement certain things (code snippets from my project, not complete examples):
First, you need a function to wait on a socket.
Then you also need functions to establish the session and open a channel:
Hope this helps.
I did not write a readme yet. Make sure to clone with submodules (libssh2 with minor adaptions to surpress some warnings is a submodule of this repo). Once you include it in your project you need to implement certain things (code snippets from my project, not complete examples):
First, you need a function to wait on a socket.
Code: Select all
// TODO proper without delay
int bcd_cyberspace::waitsocket(int socket_fd, LIBSSH2_SESSION *session) {
struct timeval timeout;
int rc;
fd_set fd;
fd_set *writefd = NULL;
fd_set *readfd = NULL;
int dir;
timeout.tv_sec = 1;
timeout.tv_usec = 0;
FD_ZERO(&fd);
FD_SET(socket_fd, &fd);
/* now make sure we wait in the correct direction */
dir = libssh2_session_block_directions(session);
if(dir & LIBSSH2_SESSION_BLOCK_INBOUND)
readfd = &fd;
if(dir & LIBSSH2_SESSION_BLOCK_OUTBOUND)
writefd = &fd;
rc = select(socket_fd + 1, readfd, writefd, NULL, &timeout);
return rc;
}
Code: Select all
cyberspace_err_t bcd_cyberspace::_establish_ssh_channel(LIBSSH2_SESSION **session, LIBSSH2_CHANNEL **channel, int *sock) {
int res;
struct sockaddr_in sin;
ESP_LOGI(TAG_CYBERSPACE, "libssh2_version is %s", LIBSSH2_VERSION);
res = libssh2_init(0);
if(res) {
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_SSH_INIT_FAIL);
return CYBERSPACE_SSH_INIT_FAIL;
}
ESP_LOGI(TAG_CYBERSPACE, "CYBERSPACE_SSH_HOST=%s", CYBERSPACE_SSH_HOST);
ESP_LOGI(TAG_CYBERSPACE, "CYBERSPACE_SSH_PORT=%d", CYBERSPACE_SSH_PORT);
sin.sin_family = AF_INET;
sin.sin_port = htons(CYBERSPACE_SSH_PORT);
sin.sin_addr.s_addr = inet_addr(CYBERSPACE_SSH_HOST);
if (sin.sin_addr.s_addr == 0xffffffff) {
// A domain name was given, need to resolve it
struct hostent *hp = gethostbyname(CYBERSPACE_SSH_HOST);
if (hp == NULL) {
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_GETHOSTBYNAME_FAIL);
return CYBERSPACE_GETHOSTBYNAME_FAIL;
}
struct ip4_addr *ip4_addr = (struct ip4_addr *)hp->h_addr;
sin.sin_addr.s_addr = ip4_addr->addr;
}
// Next we open the socket and connect to it
*sock = socket(AF_INET, SOCK_STREAM, 0);
if(*sock == -1) {
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_CREATE_SOCKET_FAIL);
return CYBERSPACE_CREATE_SOCKET_FAIL;
}
if(connect(*sock, (struct sockaddr*)(&sin), sizeof(struct sockaddr_in)) != 0) {
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_CONNECT_FAIL);
return CYBERSPACE_CONNECT_FAIL;
}
// Create session
//
// Once the socket is open, we can create a session and start it up. This
// will trade welcome banners, exchange keys and setup crypto, compression
// and MAC layers.
*session = libssh2_session_init();
if(!(*session)) {
// Failed to initialise session
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_SSH_SESSION_FAIL);
return CYBERSPACE_SSH_SESSION_FAIL;
}
res = libssh2_session_handshake(*session, *sock);
if(res) {
// Handshake failed
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_SSH_HANDSHAKE_FAIL);
return CYBERSPACE_SSH_HANDSHAKE_FAIL;
}
// Authenticate
//
// Next we authenticate either by username / password or with a private /
// public keypair, depending on the setting in menuconfig.
#if CONFIG_CYBERSPACE_AUTH_PASS
/* We could authenticate via password */
if(libssh2_userauth_password(*session, CYBERSPACE_SSH_USER, CYBERSPACE_SSH_PASSWORD)) {
char *error_message = NULL;
libssh2_session_last_error(*session, &error_message, NULL, 0);
ESP_LOGD(TAG_CYBERSPACE, "Authentication by password failed: %s (username : [%s])", error_message, CYBERSPACE_SSH_USER);
free(error_message);
_terminate_ssh_session(*session, *sock, CYBERSPACE_SSH_AUTH_FAIL);
return CYBERSPACE_SSH_AUTH_FAIL;
}
#else //CONFIG_CYBERSPACE_AUTH_PASS
// Authenticate via privatekey
char publickey[64];
char privatekey[64];
strcpy(publickey, "/spiffs/bcd_id_rsa.pub");
strcpy(privatekey, "/spiffs/bcd_id_rsa");
if(libssh2_userauth_publickey_fromfile(*session, CYBERSPACE_SSH_USER, publickey, privatekey, NULL)) {
char *error_message;
int error_message_len;
int lerr = libssh2_session_last_error(*session, &error_message, &error_message_len, 0);
if(error_message != NULL) {
ESP_LOGD(TAG_CYBERSPACE, "Authentication by privatekey failed: %s (%d).", error_message, lerr);
} else {
ESP_LOGD(TAG_CYBERSPACE, "Authentication by privatekey failed: %d.", lerr);
}
//free(*error_message); // TODO check: I assume should not be freed as want bug is 0
// TODO display on screen
// Close session and terminate task
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_SSH_AUTH_FAIL);
return CYBERSPACE_SSH_AUTH_FAIL;
}
#endif // CONFIG_CYBERSPACE_AUTH_PASS
// Open a channel
//
// The channel is set to non blocking. Note that receiving an EAGAIN means
// that no content was received yet and thus the channel cannot yet be
// established. So we just try to establish the channel until we get the
// required information or an error occures.
while((*channel = libssh2_channel_open_session(*session)) == NULL &&
libssh2_session_last_error(*session, NULL, NULL, 0) ==
LIBSSH2_ERROR_EAGAIN) {
waitsocket(*sock, *session);
}
if(channel == NULL) {
// If the channel is NULL, an error occured.
_terminate_ssh_session(*channel, *session, *sock, CYBERSPACE_SSH_CHANNEL_OPEN_FAIL);
return CYBERSPACE_SSH_CHANNEL_OPEN_FAIL;
}
libssh2_session_set_blocking(*session, 0);
return CYBERSPACE_OK;
}
Who is online
Users browsing this forum: Google [Bot] and 258 guests