Skip to content

manage SSH access to multiple applications/environments protected by bastion servers

License

Notifications You must be signed in to change notification settings

AnalogJ/drawbridge

Repository files navigation

drawbridge_view

Drawbridge

Circle CI Coverage Status GitHub license Godoc Go Report Card GitHub release Github All Releases

Bastion/Jumphost tunneling made easy

Introduction

A Jump/Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of a firewall or in a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers.

In secure cloud architectures, jump/bastion hosts are the primary method to access the internal/protected network. This means that all traffic can be audited, and that a single server can be shut down in the event that the network is compromised.

However as this architecture is scaled up and deployed across multiple environments (testing, staging, production), it can be complicated to maintain a single ~/.ssh/config file that allows you to tunnel into your various jump host protected internal networks.

Drawbridge aims to solve this problem in a flexible and scalable way.

Features

  • Single binary (available for macOS and linux), only depends on ssh, ssh-agent and scp
  • Uses customizable templates to ensure that Drawbridge can be used by any organization, in any configuraton
  • Helps organize your SSH config files and PEM files
  • Generates SSH Config files for your servers spread across multiple environments and stacks.
    • multiple ssh users/keypairs
    • multiple environments
    • multiple stacks per environment
    • etc..
  • Can be used to SSH directly into an internal node, routing though bastion, leveraging SSH-Agent
  • Able to download files from internal hosts (through the jump/bastion host) using SCP syntax
  • Supports HTTP proxy to access internal stack urls.
  • Lists all managed config files in a heirarchy that makes sense to your organization
  • Custom templated files can be automatically generated when a new SSH config is created.
    • eg. Chef knife.rb configs, Pac/Proxy files, etc.
  • Cleanup utility is built-in
  • drawbridge update lets you update the binary inplace.
  • Pretty colors. The CLI is all colorized to make it easy to skim for errors/warnings
  • Assign memorable aliases to commonly used configurations

Getting Started

  1. Download the latest release binary from the Releases page for your OS. (Mac, Windows & Linux available)
  2. Rename the downloaded binary to drawbridge
  3. Run chmod +x drawbridge
  4. Move the renamed binary into your path, eg. /usr/bin/local
  5. Run drawbridge help from a terminal to confirm it was installed correctly
  6. Add a configuration file to ~/drawbridge.yaml. See Configuration section.

Usage

$ drawbridge help
 ____  ____    __    _    _  ____  ____  ____  ____    ___  ____
(  _ \(  _ \  /__\  ( \/\/ )(  _ \(  _ \(_  _)(  _ \  / __)( ___)
 )(_) ))   / /(__)\  )    (  ) _ < )   / _)(_  )(_) )( (_-. )__)
(____/(_)\_)(__)(__)(__/\__)(____/(_)\_)(____)(____/  \___/(____)
github.com/AnalogJ/drawbridge                 darwin.amd64-1.0.10

NAME:
   drawbridge - Bastion/Jumphost tunneling made easy

USAGE:
   drawbridge [global options] command [command options] [arguments...]

VERSION:
   1.0.10

AUTHOR:
   Jason Kulatunga <[email protected]>

COMMANDS:
     create         Create a drawbridge managed ssh config & associated files
     list           List all drawbridge managed ssh configs
     connect        Connect to a drawbridge managed ssh config
     alias          Create a named alias for a drawbridge config
     download, scp  Download a file from an internal server using drawbridge managed ssh config, syntax is similar to scp command.
     delete         Delete drawbridge managed ssh config(s)
     proxy          Build/Rebuild a Proxy auto-config (PAC) file to access websites through Drawbridge tunnels
     update         Update drawbridge to the latest version
     help, h        Shows a list of commands or help for one command

GLOBAL OPTIONS:
   --help, -h     show help (default: false)
   --version, -v  print the version (default: false)

Actions

Create

Using the questions & config_template defined in the configuration file (~/drawbridge.yaml) Drawbridge will attempt to generate a managed ssh config file. Drawbrige will prompt the user for any questions which it is unable to determine an answer (no default value and no flag value specified).

Questions & Templates can be customized completely to match your organization.

$ drawbridge create --environment prod --shard us-west-2

Current Answers:
environment: prod
shard: us-west-2
stack_name: app
Please enter a value for `shard_type` [string] - Is this a live (green) or idle (blue) stack?:
idle
Please enter a value for `username` [string] - What username do you use to login to this stack?:
aws
WARNING: PEM file missing. Place it at the following location before attempting to connect. /Users/jason/.ssh/drawbridge/pem/prod/aws-prod.pem
Writing template to /Users/jason/.ssh/drawbridge/prod-app-idle-us-west-2

You can also enable DRYRUN mode to see exactly what files Drawbrige would generate, without actually writing any files.

$ drawbridge create --environment prod --dryrun
...
2018/04/22 23:56:23 Writing template to /Users/jason/.ssh/drawbridge/prod-app-idle-us-west-1
[DRYRUN] Would have written content to /Users/jason/.ssh/drawbridge/prod-app-idle-us-west-1:

# This file was automatically generated by Drawbridge
# Do not modify.
#
...

Connect

$ drawbridge connect
Rendered Drawbridge Configs:
├── [prod]  environment
│   └── [app]  stack_name
│       ├── [us-east-1]  shard
│       │   ├── [1]  shard_type: idle, username: aws
│       │   └── [2]  shard_type: live, username: aws
│       └── [us-east-2]  shard
│           ├── [3]  shard_type: idle, username: aws
│           └── [4]  shard_type: live, username: aws
├── [stage]  environment
│   └── [app]  stack_name
│       └── [us-east-2]  shard
│           ├── [5]  shard_type: idle, username: aws
│           └── [6]  shard_type: live, username: aws
└── [test]  environment
    └── [app]  stack_name
        ├── [us-east-1]  shard
        │   ├── [7]  shard_type: idle, username: aws
        │   └── [8]  shard_type: live, username: aws
        └── [us-east-2]  shard
            ├── [9]  shard_type: idle, username: aws
            └── [10]  shard_type: live, username: aws

Enter number of drawbridge config you would like to connect to (1-10, alias):

drawbridge connect will connect you to the bastion/jump host using a specified Drawbridge config file. It'll also add the associated PEM key to your ssh-agent.

If you want to connect directly to a internal server, you can do so by selecting a config id and specifying the hostname/short name

drawbridge connect 1 database-1

You can also connect directly to a environment using an alias

drawbridge connect my_custom_alias database-1

Alias

You can assign an alias to a commonly used drawbridge configuration by using the drawbridge alias command.

$ drawbridge alias
...
        └── [us-east-2]  shard
            ├── [9]  shard_type: idle, username: aws
            └── [10]  shard_type: live, username: aws

Enter drawbridge config number to create alias for (1-2, alias):
10
Please provide an alias for the configuration above (a-zA-Z0-9-_.):
my_new_alias
Setting alias (my_new_alias) for config (10)

Now when you run drawbridge connect, drawbridge list or most other drawbridge commands, you can use the alias instead of the id.

$ drawbridge list
...
        └── [us-east-2]  shard
            ├── [9]  shard_type: idle, username: aws
            └── [10, my_new_alias]  shard_type: live, username: aws


$ drawbridge connect my_new_alias
...

You can also set the alias for a configuration in one command:

$ drawbridge alias 10 my_custom_alias

Setting alias (my_custom_alias) for config (10)
Warning: replacing existing alias (my_new_alias) with new value: my_custom_alias

Delete

$ drawbridge delete
...
        └── [us-east-2]  shard
            ├── [9]  shard_type: idle, username: aws
            └── [10]  shard_type: live, username: aws

Enter number of drawbridge config you would like to delete:
10
Are you sure you would like to delete this config and associated templates? (PEM files will not be deleted)

environment: test
shard: us-east-2
shard_type: live
stack_name: app
username: aws

Please confirm [true/false]:
true
Deleting config file: /Users/jason/.ssh/drawbridge/test-app-live-us-east-2
Deleting answers file
Finished

You can use the --force flag to disable the confirm prompt. The --all flag can be used to delete all Drawbridge managed configs in one command.

You can use the following command to completely wipe out all Drawbridge files and start over.

drawbridge delete --all --force

Update

$ drawbridge update

Update drawbridge to the latest version
Current: v1.0.9 [2018-04-26]. Available: v1.0.10 [2018-04-27]
Release notes are available here: https://github.com/AnalogJ/drawbridge/releases/tag/v1.0.10
Are you sure you would like to update drawbridge to v1.0.10?
Please confirm [yes/no]:

Download

$ drawbridge scp 1 database-1:/tmp/test-file.txt ~/test-file.text

Download a file from an internal server using drawbridge managed ssh config, syntax is similar to scp command. 
Adding PEM key to ssh-agent
Begin downloading file through bastion
test-file.text                                                      100% 4099     4.4KB/s   00:00    

Downloading files through the bastion is simple and easy.

Proxy

$ drawbridge proxy
Build/Rebuild a Proxy auto-config (PAC) file to access websites through Drawbridge tunnels
Pac file already exists, updating.
2018/04/27 15:31:55 Writing template to ~/drawbridge.pac

PAC files, when used with a compatible browser, allow you to access internal dashboards and websites as you would any publicly accessible site.

As you create Drawbride configurations, just run drawbridge proxy to update the PAC file, written to ~/drawbridge.pac by default.

Configuration

We support a global YAML configuration file that must be located at ~/drawbridge.yaml

Check the example.drawbridge.yml file for a fully commented version.

Testing Circle CI

Drawbridge provides an extensive test-suite based on go test. You can run all the integration & unit tests with go test $(go list ./... | grep -v /vendor/)

CircleCI is used for continuous integration testing: https://circleci.com/gh/AnalogJ/drawbridge

Contributing

If you'd like to help improve Drawbridge, clone the project with Git and install dependencies by running:

$ git clone git://github.com/AnalogJ/drawbridge
$ go mod vendor

Work your magic and then submit a pull request. We love pull requests!

If you find the documentation lacking, help us out and update this README.md. If you don't have the time to work on Drawbridge, but found something we should know about, please submit an issue.

To-Do List

We're actively looking for pull requests in the following areas:

  • RDP/VNC generation & viewer.
  • Secure storage of PEM keys in keychain/keyring

Versioning

We use SemVer for versioning. For the versions available, see the tags on this repository.

Authors

Jason Kulatunga - Initial Development - @AnalogJ

License

References

About

manage SSH access to multiple applications/environments protected by bastion servers

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages