Use `hostmatcher` to replace `matchlist`, improve security (#17605)
Use hostmacher to replace matchlist. And we introduce a better DialContext to do a full host/IP check, otherwise the attackers can still bypass the allow/block list by a 302 redirection.tokarchuk/v1.17
parent
c96be0cd98
commit
013fb73068
@ -0,0 +1,58 @@ |
|||||||
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package hostmatcher |
||||||
|
|
||||||
|
import ( |
||||||
|
"context" |
||||||
|
"fmt" |
||||||
|
"net" |
||||||
|
"syscall" |
||||||
|
"time" |
||||||
|
) |
||||||
|
|
||||||
|
// NewDialContext returns a DialContext for Transport, the DialContext will do allow/block list check
|
||||||
|
func NewDialContext(usage string, allowList *HostMatchList, blockList *HostMatchList) func(ctx context.Context, network, addr string) (net.Conn, error) { |
||||||
|
// How Go HTTP Client works with redirection:
|
||||||
|
// transport.RoundTrip URL=http://domain.com, Host=domain.com
|
||||||
|
// transport.DialContext addrOrHost=domain.com:80
|
||||||
|
// dialer.Control tcp4:11.22.33.44:80
|
||||||
|
// transport.RoundTrip URL=http://www.domain.com/, Host=(empty here, in the direction, HTTP client doesn't fill the Host field)
|
||||||
|
// transport.DialContext addrOrHost=domain.com:80
|
||||||
|
// dialer.Control tcp4:11.22.33.44:80
|
||||||
|
return func(ctx context.Context, network, addrOrHost string) (net.Conn, error) { |
||||||
|
dialer := net.Dialer{ |
||||||
|
// default values comes from http.DefaultTransport
|
||||||
|
Timeout: 30 * time.Second, |
||||||
|
KeepAlive: 30 * time.Second, |
||||||
|
|
||||||
|
Control: func(network, ipAddr string, c syscall.RawConn) (err error) { |
||||||
|
var host string |
||||||
|
if host, _, err = net.SplitHostPort(addrOrHost); err != nil { |
||||||
|
return err |
||||||
|
} |
||||||
|
// in Control func, the addr was already resolved to IP:PORT format, there is no cost to do ResolveTCPAddr here
|
||||||
|
tcpAddr, err := net.ResolveTCPAddr(network, ipAddr) |
||||||
|
if err != nil { |
||||||
|
return fmt.Errorf("%s can only call HTTP servers via TCP, deny '%s(%s:%s)', err=%v", usage, host, network, ipAddr, err) |
||||||
|
} |
||||||
|
|
||||||
|
var blockedError error |
||||||
|
if blockList.MatchHostOrIP(host, tcpAddr.IP) { |
||||||
|
blockedError = fmt.Errorf("%s can not call blocked HTTP servers (check your %s setting), deny '%s(%s)'", usage, blockList.SettingKeyHint, host, ipAddr) |
||||||
|
} |
||||||
|
|
||||||
|
// if we have an allow-list, check the allow-list first
|
||||||
|
if !allowList.IsEmpty() { |
||||||
|
if !allowList.MatchHostOrIP(host, tcpAddr.IP) { |
||||||
|
return fmt.Errorf("%s can only call allowed HTTP servers (check your %s setting), deny '%s(%s)'", usage, allowList.SettingKeyHint, host, ipAddr) |
||||||
|
} |
||||||
|
} |
||||||
|
// otherwise, we always follow the blocked list
|
||||||
|
return blockedError |
||||||
|
}, |
||||||
|
} |
||||||
|
return dialer.DialContext(ctx, network, addrOrHost) |
||||||
|
} |
||||||
|
} |
@ -1,46 +0,0 @@ |
|||||||
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a MIT-style
|
|
||||||
// license that can be found in the LICENSE file.
|
|
||||||
|
|
||||||
package matchlist |
|
||||||
|
|
||||||
import ( |
|
||||||
"strings" |
|
||||||
|
|
||||||
"github.com/gobwas/glob" |
|
||||||
) |
|
||||||
|
|
||||||
// Matchlist represents a block or allow list
|
|
||||||
type Matchlist struct { |
|
||||||
ruleGlobs []glob.Glob |
|
||||||
} |
|
||||||
|
|
||||||
// NewMatchlist creates a new block or allow list
|
|
||||||
func NewMatchlist(rules ...string) (*Matchlist, error) { |
|
||||||
for i := range rules { |
|
||||||
rules[i] = strings.ToLower(rules[i]) |
|
||||||
} |
|
||||||
list := Matchlist{ |
|
||||||
ruleGlobs: make([]glob.Glob, 0, len(rules)), |
|
||||||
} |
|
||||||
|
|
||||||
for _, rule := range rules { |
|
||||||
rg, err := glob.Compile(rule) |
|
||||||
if err != nil { |
|
||||||
return nil, err |
|
||||||
} |
|
||||||
list.ruleGlobs = append(list.ruleGlobs, rg) |
|
||||||
} |
|
||||||
|
|
||||||
return &list, nil |
|
||||||
} |
|
||||||
|
|
||||||
// Match will matches
|
|
||||||
func (b *Matchlist) Match(u string) bool { |
|
||||||
for _, r := range b.ruleGlobs { |
|
||||||
if r.Match(u) { |
|
||||||
return true |
|
||||||
} |
|
||||||
} |
|
||||||
return false |
|
||||||
} |
|
@ -0,0 +1,30 @@ |
|||||||
|
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a MIT-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package migrations |
||||||
|
|
||||||
|
import ( |
||||||
|
"crypto/tls" |
||||||
|
"net/http" |
||||||
|
|
||||||
|
"code.gitea.io/gitea/modules/hostmatcher" |
||||||
|
"code.gitea.io/gitea/modules/proxy" |
||||||
|
"code.gitea.io/gitea/modules/setting" |
||||||
|
) |
||||||
|
|
||||||
|
// NewMigrationHTTPClient returns a HTTP client for migration
|
||||||
|
func NewMigrationHTTPClient() *http.Client { |
||||||
|
return &http.Client{ |
||||||
|
Transport: NewMigrationHTTPTransport(), |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
// NewMigrationHTTPTransport returns a HTTP transport for migration
|
||||||
|
func NewMigrationHTTPTransport() *http.Transport { |
||||||
|
return &http.Transport{ |
||||||
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: setting.Migrations.SkipTLSVerify}, |
||||||
|
Proxy: proxy.Proxy(), |
||||||
|
DialContext: hostmatcher.NewDialContext("migration", allowList, blockList), |
||||||
|
} |
||||||
|
} |
Loading…
Reference in new issue