Thanks for the feedback. A couple of the goals for this project are that (a) it works for any use cases that utilize SSH (so Git, scp, rsync, etc.) -- meaning that configuration options are highly preferable to a wrapper, and (b) that this application supports Windows, MacOS, and Linux for tunneling (even if the SSH CA feature is unsupported on Windows). Thanks for the link to go-daemon, I'll look a little closer, but I don't think this architecture will work. Is there a reason that load_key_public must occur prior to ssh_exchange_identification? It strikes me that this would be a non-issue if the key were not loaded prior to the banners being exchanged. Though I do understand that this is a very atypical use-case for the ProxyCommand flag. On Thu, Nov 9, 2017 at 10:03 PM, Damien Miller <djm@xxxxxxxxxxx> wrote: > On Thu, 9 Nov 2017, John Maguire wrote: > > > Hi there, > > > > I'm working on a project to write a ProxyCommand that reaches out to an > SSH > > CA to receive an SSH certificate prior to the connection. The > ProxyCommand > > also creates a tunnel to the upstream SSH server. > > > > When using ProxyCommand alone, the issue is that the identity files are > > loaded as soon as SSH has fork/exec'd the process. It does not wait for a > > valid server negotiation. > > > > I found the ProxyUseFdPass flag which seemed promising -- here, the > > identity files weren't loaded until after the file descriptors are passed > > back to the SSH client. Perhaps I could fetch the identity file, return > the > > fds, and then tunnel the traffic. Unfortunately, it blocks on waitpid(), > so > > this doesn't work either -- I need the process to stay open to tunnel > data. > > > > I considered trying to fork, disown the child, and run the tunnel inside > > the child, but unfortunately I am working with Golang, which doesn't > allow > > forking (except to execute another application.) > > > > I'm looking for any tips on how I might be able to work around this > > problem. I'd also be interested in understanding why the identity files > are > > loaded prior to negotiating a valid server connection. > > I don't think you'll be able to achieve what you want with a ProxyCommand - > as far as ssh is concerned, it's just a dumb pipe. > > Couldn't you do it as a wrapper to ssh that does the CA operations then > launches ssh with an explicit ProxyCommand argument? > > Otherwise, you might want to check out https://github.com/sevlyar/go- > daemon > -- it seems to allow a daemon()-like operation that could let you use > fd passing. > > -d > _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev