Require WebSocket origins to be whitelisted in order to connect.

Fixes #1281.
This commit is contained in:
Peter Powell 2018-10-10 16:45:35 +01:00
parent 23090cb7e4
commit 553877f7a9
2 changed files with 56 additions and 2 deletions

View File

@ -2167,6 +2167,12 @@
# WebSocket connections. Compatible with SSL/TLS. # WebSocket connections. Compatible with SSL/TLS.
# Requires SHA-1 hash support available in the sha1 module. # Requires SHA-1 hash support available in the sha1 module.
#<module name="websocket"> #<module name="websocket">
#
# If you use the websocket module you MUST specify one or more origins
# which are allowed to connect to the server. You should set this as
# strict as possible to prevent malicious webpages from connecting to
# your server.
# <wsorigin allow="https://webchat.example.com/*">
#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-# #-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#
# XLine database: Stores all *Lines (G/Z/K/R/any added by other modules) # XLine database: Stores all *Lines (G/Z/K/R/any added by other modules)

View File

@ -21,6 +21,8 @@
#include "iohook.h" #include "iohook.h"
#include "modules/hash.h" #include "modules/hash.h"
typedef std::vector<std::string> OriginList;
static const char MagicGUID[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; static const char MagicGUID[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
static const char whitespace[] = " \t\r\n"; static const char whitespace[] = " \t\r\n";
static dynamic_reference_nocheck<HashProvider>* sha1; static dynamic_reference_nocheck<HashProvider>* sha1;
@ -28,6 +30,8 @@ static dynamic_reference_nocheck<HashProvider>* sha1;
class WebSocketHookProvider : public IOHookProvider class WebSocketHookProvider : public IOHookProvider
{ {
public: public:
OriginList allowedorigins;
WebSocketHookProvider(Module* mod) WebSocketHookProvider(Module* mod)
: IOHookProvider(mod, "websocket", IOHookProvider::IOH_UNKNOWN, true) : IOHookProvider(mod, "websocket", IOHookProvider::IOH_UNKNOWN, true)
{ {
@ -101,6 +105,7 @@ class WebSocketHook : public IOHookMiddle
State state; State state;
time_t lastpingpong; time_t lastpingpong;
OriginList& allowedorigins;
static size_t FillHeader(unsigned char* outbuf, size_t sendlength, OpCode opcode) static size_t FillHeader(unsigned char* outbuf, size_t sendlength, OpCode opcode)
{ {
@ -288,6 +293,27 @@ class WebSocketHook : public IOHookMiddle
if (reqend == std::string::npos) if (reqend == std::string::npos)
return 0; return 0;
bool allowedorigin = false;
HTTPHeaderFinder originheader;
if (originheader.Find(recvq, "Origin:", 7, reqend))
{
const std::string origin = originheader.ExtractValue(recvq);
for (OriginList::const_iterator iter = allowedorigins.begin(); iter != allowedorigins.end(); ++iter)
{
if (InspIRCd::Match(origin, *iter, ascii_case_insensitive_map))
{
allowedorigin = true;
break;
}
}
}
if (!allowedorigin)
{
FailHandshake(sock, "HTTP/1.1 403 Forbidden\r\nConnection: close\r\n\r\n", "WebSocket: Received HTTP request from a non-whitelisted origin");
return -1;
}
HTTPHeaderFinder keyheader; HTTPHeaderFinder keyheader;
if (!keyheader.Find(recvq, "Sec-WebSocket-Key:", 18, reqend)) if (!keyheader.Find(recvq, "Sec-WebSocket-Key:", 18, reqend))
{ {
@ -318,10 +344,11 @@ class WebSocketHook : public IOHookMiddle
} }
public: public:
WebSocketHook(IOHookProvider* Prov, StreamSocket* sock) WebSocketHook(IOHookProvider* Prov, StreamSocket* sock, OriginList& AllowedOrigins)
: IOHookMiddle(Prov) : IOHookMiddle(Prov)
, state(STATE_HTTPREQ) , state(STATE_HTTPREQ)
, lastpingpong(0) , lastpingpong(0)
, allowedorigins(AllowedOrigins)
{ {
sock->AddIOHook(this); sock->AddIOHook(this);
} }
@ -370,7 +397,7 @@ class WebSocketHook : public IOHookMiddle
void WebSocketHookProvider::OnAccept(StreamSocket* sock, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server) void WebSocketHookProvider::OnAccept(StreamSocket* sock, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server)
{ {
new WebSocketHook(this, sock); new WebSocketHook(this, sock, allowedorigins);
} }
class ModuleWebSocket : public Module class ModuleWebSocket : public Module
@ -386,6 +413,27 @@ class ModuleWebSocket : public Module
sha1 = &hash; sha1 = &hash;
} }
void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE
{
ConfigTagList tags = ServerInstance->Config->ConfTags("wsorigin");
if (tags.first == tags.second)
throw ModuleException("You have loaded the websocket module but not configured any allowed origins!");
OriginList allowedorigins;
for (ConfigIter i = tags.first; i != tags.second; ++i)
{
ConfigTag* tag = i->second;
// Ensure that we have the <wsorigin:allow> parameter.
const std::string allow = tag->getString("allow");
if (allow.empty())
throw ModuleException("<wsorigin:allow> is a mandatory field, at " + tag->getTagLocation());
allowedorigins.push_back(allow);
}
hookprov->allowedorigins.swap(allowedorigins);
}
void OnCleanup(ExtensionItem::ExtensibleType type, Extensible* item) CXX11_OVERRIDE void OnCleanup(ExtensionItem::ExtensibleType type, Extensible* item) CXX11_OVERRIDE
{ {
if (type != ExtensionItem::EXT_USER) if (type != ExtensionItem::EXT_USER)