package main import ( "crypto/rand" "crypto/rsa" "crypto/x509" "encoding/pem" "fmt" "log" "net" "os" "time" "golang.org/x/crypto/ssh" ) func main() { path := os.Getenv("PATH") if path == "" { path = "./ssh-honeypot.log" } logFile, err := os.OpenFile(path, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666) if err != nil { log.Fatalf("Unable to open log file: %v", err) } defer logFile.Close() log.SetOutput(logFile) port := os.Getenv("PORT") if port == "" { port = "22" } key, err := generateKeyPair() if err != nil { log.Fatalf("Failed to generate key pair: %v", err) } config := &ssh.ServerConfig{ PasswordCallback: func(c ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) { ip, _, err := net.SplitHostPort(c.RemoteAddr().String()) if err != nil { ip = c.RemoteAddr().String() } log.Printf("[%s] \"honeypot connection attempt: ssh - %s - %s - %s\"\n", time.Now().Format("2006-01-02 15:04:05.000"), ip, c.User(), string(pass)) return nil, fmt.Errorf("password rejected for %q", c.User()) }, } config.AddHostKey(key) listener, err := net.Listen("tcp", "0.0.0.0:"+port) if err != nil { log.Fatalf("Failed to listen on port %s: %v", port, err) } log.Printf("Listening on port %s...", port) for { conn, err := listener.Accept() if err != nil { log.Printf("Failed to accept incoming connection: %s", err) continue } go handleConn(conn, config) } } func generateKeyPair() (ssh.Signer, error) { privateKey, err := rsa.GenerateKey(rand.Reader, 2048) if err != nil { return nil, err } privateKeyPEM := pem.EncodeToMemory(&pem.Block{ Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(privateKey), }) signer, err := ssh.ParsePrivateKey(privateKeyPEM) if err != nil { return nil, err } return signer, nil } func handleConn(c net.Conn, config *ssh.ServerConfig) { ssh.NewServerConn(c, config) }