/* * InspIRCd -- Internet Relay Chat Daemon * * Copyright (C) 2018-2019 linuxdaemon * Copyright (C) 2013, 2017-2018, 2020 Sadie Powell * Copyright (C) 2013, 2015 Attila Molnar * Copyright (C) 2012, 2019 Robby * Copyright (C) 2009-2010 Daniel De Graaf * Copyright (C) 2008, 2010 Craig Edwards * Copyright (C) 2008 Robin Burchell * * This file is part of InspIRCd. InspIRCd is free software: you can * redistribute it and/or modify it under the terms of the GNU General Public * License as published by the Free Software Foundation, version 2. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more * details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include "inspircd.h" #include "modules/httpd.h" class HTTPACL { public: std::string path; std::string username; std::string password; std::string whitelist; std::string blacklist; HTTPACL(const std::string &set_path, const std::string &set_username, const std::string &set_password, const std::string &set_whitelist, const std::string &set_blacklist) : path(set_path), username(set_username), password(set_password), whitelist(set_whitelist), blacklist(set_blacklist) { } }; class ModuleHTTPAccessList : public Module, public HTTPACLEventListener { private: std::vector acl_list; HTTPdAPI API; public: ModuleHTTPAccessList() : HTTPACLEventListener(this) , API(this) { } void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE { std::vector new_acls; ConfigTagList acls = ServerInstance->Config->ConfTags("httpdacl"); for (ConfigIter i = acls.first; i != acls.second; i++) { ConfigTag* c = i->second; std::string path = c->getString("path"); std::string types = c->getString("types"); irc::commasepstream sep(types); std::string type; std::string username; std::string password; std::string whitelist; std::string blacklist; while (sep.GetToken(type)) { if (stdalgo::string::equalsci(type, "password")) { username = c->getString("username"); password = c->getString("password"); } else if (stdalgo::string::equalsci(type, "whitelist")) { whitelist = c->getString("whitelist"); } else if (stdalgo::string::equalsci(type, "blacklist")) { blacklist = c->getString("blacklist"); } else { throw ModuleException("Invalid HTTP ACL type '" + type + "'"); } } ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Read ACL: path=%s pass=%s whitelist=%s blacklist=%s", path.c_str(), password.c_str(), whitelist.c_str(), blacklist.c_str()); new_acls.push_back(HTTPACL(path, username, password, whitelist, blacklist)); } acl_list.swap(new_acls); } void BlockAccess(HTTPRequest* http, unsigned int returnval, const std::string &extraheaderkey = "", const std::string &extraheaderval="") { ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "BlockAccess (%u)", returnval); std::stringstream data; data << "" << "

Error " << returnval << "

" << "

Access to this resource is denied by an access control list.

" << "

Please contact your IRC administrator.


" << "Powered by InspIRCd"; HTTPDocumentResponse response(this, *http, &data, returnval); response.headers.SetHeader("X-Powered-By", MODNAME); if (!extraheaderkey.empty()) response.headers.SetHeader(extraheaderkey, extraheaderval); API->SendResponse(response); } bool IsAccessAllowed(HTTPRequest* http) { { ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Handling httpd acl event"); for (std::vector::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl) { if (InspIRCd::Match(http->GetPath(), this_acl->path, ascii_case_insensitive_map)) { if (!this_acl->blacklist.empty()) { /* Blacklist */ irc::commasepstream sep(this_acl->blacklist); std::string entry; while (sep.GetToken(entry)) { if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map)) { ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to blacklisted resource %s (matched by pattern %s) from ip %s (matched by entry %s)", http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), entry.c_str()); BlockAccess(http, 403); return false; } } } if (!this_acl->whitelist.empty()) { /* Whitelist */ irc::commasepstream sep(this_acl->whitelist); std::string entry; bool allow_access = false; while (sep.GetToken(entry)) { if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map)) allow_access = true; } if (!allow_access) { ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to whitelisted resource %s (matched by pattern %s) from ip %s (Not in whitelist)", http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str()); BlockAccess(http, 403); return false; } } if (!this_acl->password.empty() && !this_acl->username.empty()) { /* Password auth, first look to see if we have a basic authentication header */ ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Checking HTTP auth password for resource %s (matched by pattern %s) from ip %s, against username %s", http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), this_acl->username.c_str()); if (http->headers->IsSet("Authorization")) { /* Password has been given, validate it */ std::string authorization = http->headers->GetHeader("Authorization"); irc::spacesepstream sep(authorization); std::string authtype; std::string base64; sep.GetToken(authtype); if (authtype == "Basic") { std::string user; std::string pass; sep.GetToken(base64); std::string userpass = Base64ToBin(base64); ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: %s (%s)", userpass.c_str(), base64.c_str()); irc::sepstream userpasspair(userpass, ':'); if (userpasspair.GetToken(user)) { userpasspair.GetToken(pass); /* Access granted if username and password are correct */ if (user == this_acl->username && pass == this_acl->password) { ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username match"); return true; } else { /* Invalid password */ ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username do not match"); BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); } } else { /* Malformed user:pass pair */ ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username malformed"); BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); } } else { /* Unsupported authentication type */ ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: unsupported auth type: %s", authtype.c_str()); BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); } } else { /* No password given at all, access denied */ ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username not sent"); BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); } return false; } /* A path may only match one ACL (the first it finds in the config file) */ break; } } } return true; } ModResult OnHTTPACLCheck(HTTPRequest& req) CXX11_OVERRIDE { if (IsAccessAllowed(&req)) return MOD_RES_PASSTHRU; return MOD_RES_DENY; } Version GetVersion() CXX11_OVERRIDE { return Version("Allows the server administrator to control who can access resources served over HTTP with the httpd module.", VF_VENDOR); } }; MODULE_INIT(ModuleHTTPAccessList)