Description
What version of Go are you using (go version
)?
Not applicable. Affects x/crypto version v0.15.0
Does this issue reproduce with the latest release?
Yes
What operating system and processor architecture are you using (go env
)?
Not applicable
What did you do?
In ListenUnix():
it sends the message to request remote forwarding of Unix domain sockets before it is prepared to receive forwards, which it sets later: https://github.com/golang/crypto/blob/1cf1811d7195fe9bb436a00e335567575fac9b07/ssh/streamlocal.go#L47
This sets up a race between the server forwarding a connection and the client being prepared to receive it. The client should set itself to receive the forward before sending the request (and if the request fails, clean up) to avoid a race condition. I see this in unit testing where a test SSH server can very quickly respond to a request to forward sockets, but in principal it could happen in a live system too.
A similar issue affects TCP sockets.
What did you expect to see?
- the SSH server accepts the message to begin forwarding Unix sockets
- the SSH server opens a channel back to the client to forward the socket
- the client accepts the channel
What did you see instead?
- the SSH server accepts the message to begin forwarding Unix sockets
- the SSH server opens a channel to forward the socket back to the client
- occasionally, the SSH client rejects the channel with "administratively prohibited (no forward for address)", even though it is the address the client just requested.