From 3aed336a3c66711d57315a569fd41fdf8e3a5b0f Mon Sep 17 00:00:00 2001 From: simon987 Date: Mon, 2 Mar 2020 15:47:34 -0500 Subject: [PATCH] Configuration options, tweak challenge, update readme --- LICENSE | 4 +- README.md | 67 +++++++++- build.sh | 18 +-- ngx_http_js_challenge.c | 288 ++++++++++++++++++++++++++++------------ 4 files changed, 270 insertions(+), 107 deletions(-) diff --git a/LICENSE b/LICENSE index f288702..af4eaf7 100644 --- a/LICENSE +++ b/LICENSE @@ -123,7 +123,7 @@ is widely used among developers working in that language. The "System Libraries" of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major -Component, and (b) serves only to enable use of the work with that +Component, and (b) serves only to enabled use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A "Major Component", in this context, means a major essential component @@ -671,4 +671,4 @@ into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read -. +. diff --git a/README.md b/README.md index c2f97ce..8785b08 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,6 @@ ![GitHub](https://img.shields.io/github/license/simon987/ngx_http_js_challenge_module.svg) [![CodeFactor](https://www.codefactor.io/repository/github/simon987/ngx_http_js_challenge_module/badge)](https://www.codefactor.io/repository/github/simon987/ngx_http_js_challenge_module) -[![Development snapshots](https://ci.simon987.net/app/rest/builds/buildType(JsChallenge_Build)/statusIcon)](https://files.simon987.net/artifacts/JsChallenge/Build/) Simple javascript proof-of-work based access for Nginx with virtually no overhead. @@ -16,13 +15,69 @@ Easy installation: just add `load_module /path/to/ngx_http_js_challenge_module.s ### Configuration -//todo +**Simple configuration** +```nginx +server { + js_challenge on; + js_challenge_secret "change me!"; + # ... +} +``` + + +**Advanced configuration** +```nginx +server { + js_challenge on; + js_challenge_secret "change me!"; + js_challenge_html /path/to/body.html; + js_challenge_bucket_duration 3600; + js_challenge_title "Verifying your browser..."; + + location /static { + js_challenge off; + alias /static_files/; + } + + location /sensitive { + js_challenge_bucket_duration 600; + #... + } + + #... +} +``` + +* `js_challenge on|off` Toggle javascript challenges for this config block +* `js_challenge_secret "secret"` Secret for generating the challenges. DEFAULT: "changeme" +* `js_challenge_html "/path/to/file.html"` Path to html file to be inserted in the `` tag of the interstitial page +* `js_challenge_title "title"` Will be inserted in the `` tag of the interstitial page. DEFAULT "Verifying your browser..." +* `js_challenge_bucket_duration time` Interval to prompt js challenge, in seconds. DEFAULT: 3600 + +### Installation + +1. Add `load_module ngx_http_js_challenge_module.so;` to `/etc/nginx/nginx.conf` +1. Reload `nginx -s reload` ### Build from source -//todo +These steps have to be performed on machine with compatible configuration (same nginx, glibc, openssl version etc.) -```bash -apt install libperl-dev libgeoip-dev libgd-dev libxslt1-dev -``` +1. Install dependencies + ```bash + apt install libperl-dev libgeoip-dev libgd-dev libxslt1-dev + ``` +2. Download nginx tarball corresponding to your current version (Check with `nginx -v`) + ```bash + wget https://nginx.org/download/nginx-1.16.1.tar.gz + tar -xzf nginx-1.16.1.tar.gz + export NGINX_PATH=$(pwd)/nginx-1.16.1/ + ``` +3. Compile the module + ```bash + git clone https://github.com/simon987/ngx_http_js_challenge_module + cd ngx_http_js_challenge_module + ./build.sh + ``` +4. The dynamic module can be found at `${NGINX_PATH}/objs/ngx_http_js_challenge_module.so` diff --git a/build.sh b/build.sh index 7e7fc64..5a426b4 100755 --- a/build.sh +++ b/build.sh @@ -1,20 +1,16 @@ -NGINX_PATH=/home/simon/Downloads/nginx-1.16.1/ +if [ -z ${NGINX_PATH+x} ]; then + echo "Please set the NGINX_PATH variable"; + exit +fi MODULE_PATH=$(pwd)/ CONFIG_ARGS=$(nginx -V 2>&1 | tail -n 1 | cut -c 21- | sed 's/--add-dynamic-module=.*//g') - CONFIG_ARGS="${CONFIG_ARGS} --add-dynamic-module=${MODULE_PATH}" - echo $CONFIG_ARGS ( -cd ${NGINX_PATH} -#bash -c "./configure ${CONFIG_ARGS}" -make modules -#cp objs/ "${WD}" + cd ${NGINX_PATH} || exit + bash -c "./configure ${CONFIG_ARGS}" + make modules -j "$(nproc)" ) -rm /test/*.so -mv /home/simon/Downloads/nginx-1.16.1/objs/ngx_http_js_challenge_module.so /test/module.so -chown -R www-data /test/ -systemctl restart nginx diff --git a/ngx_http_js_challenge.c b/ngx_http_js_challenge.c index 7b992c9..d94e5e4 100644 --- a/ngx_http_js_challenge.c +++ b/ngx_http_js_challenge.c @@ -1,25 +1,98 @@ #include <stdio.h> #include "ngx_http.c" +#define DEFAULT_SECRET "changeme" +#define SHA1_MD_LEN 20 +#define SHA1_STR_LEN 40 + +#define JS_SOLVER_TEMPLATE \ + "<!DOCTYPE html>" \ + "<html>" \ + "<head>" \ + "<meta charset='UTF-8'>" \ + "<title>%s" \ + "" \ + "" \ + "" \ + "" \ + "%s" \ + "" \ + "" + +#define DEFAULT_TITLE "Verifying your browser..." + +typedef struct { + ngx_flag_t enabled; + ngx_uint_t bucket_duration; + ngx_str_t secret; + ngx_str_t html_path; + ngx_str_t title; + char *html; +} ngx_http_js_challenge_loc_conf_t; + static ngx_int_t ngx_http_js_challenge(ngx_conf_t *cf); -static char *setup1(ngx_conf_t *cf, ngx_command_t *cmd, void *conf); +static void *ngx_http_js_challenge_create_loc_conf(ngx_conf_t *cf); + +static char *ngx_http_js_challenge_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child); static ngx_int_t ngx_http_js_challenge_handler(ngx_http_request_t *r); static ngx_command_t ngx_http_js_challenge_commands[] = { - {ngx_string("hello_world"), - - // NGX_CONF_TAKE1, for 1 arg etc - // NGX_CONF_FLAG for boolean - NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_NOARGS, - - setup1, /* configuration setup function */ - 0, /* No offset. Only one context is supported. */ - 0, /* No offset when storing the module configuration on struct. */ - NULL}, + { + ngx_string("js_challenge"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_FLAG, + ngx_conf_set_flag_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, enabled), + NULL + }, + { + ngx_string("js_challenge_bucket_duration"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_TAKE1, + ngx_conf_set_num_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, bucket_duration), + NULL + }, + { + ngx_string("js_challenge_secret"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_TAKE1, + ngx_conf_set_str_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, secret), + NULL + }, + { + ngx_string("js_challenge_secret"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_TAKE1, + ngx_conf_set_str_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, secret), + NULL + }, + { + ngx_string("js_challenge_html"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_TAKE1, + ngx_conf_set_str_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, html_path), + NULL + }, + { + ngx_string("js_challenge_title"), + NGX_HTTP_LOC_CONF | NGX_HTTP_SRV_CONF | NGX_CONF_TAKE1, + ngx_conf_set_str_slot, + NGX_HTTP_LOC_CONF_OFFSET, + offsetof(ngx_http_js_challenge_loc_conf_t, title), + NULL + }, ngx_null_command }; @@ -36,9 +109,8 @@ static ngx_http_module_t ngx_http_js_challenge_module_ctx = { NULL, /* create server configuration */ NULL, /* merge server configuration */ - //todo - NULL, /* create location configuration */ - NULL /* merge location configuration */ + ngx_http_js_challenge_create_loc_conf, + ngx_http_js_challenge_merge_loc_conf }; /* Module definition. */ @@ -57,6 +129,68 @@ ngx_module_t ngx_http_js_challenge_module = { NGX_MODULE_V1_PADDING }; + +static void *ngx_http_js_challenge_create_loc_conf(ngx_conf_t *cf) { + ngx_http_js_challenge_loc_conf_t *conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_js_challenge_loc_conf_t)); + if (conf == NULL) { + return NGX_CONF_ERROR; + } + + conf->secret = (ngx_str_t) {0, NULL}; + conf->bucket_duration = NGX_CONF_UNSET_UINT; + conf->enabled = NGX_CONF_UNSET; + + return conf; +} + + +static char *ngx_http_js_challenge_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child) { + ngx_http_js_challenge_loc_conf_t *prev = parent; + ngx_http_js_challenge_loc_conf_t *conf = child; + + ngx_conf_merge_uint_value(conf->bucket_duration, prev->bucket_duration, 3600) + ngx_conf_merge_value(conf->enabled, prev->enabled, 0) + ngx_conf_merge_str_value(conf->secret, prev->secret, DEFAULT_SECRET) + ngx_conf_merge_str_value(conf->html_path, prev->html_path, NULL) + ngx_conf_merge_str_value(conf->title, prev->title, DEFAULT_TITLE) + + if (conf->bucket_duration < 1) { + ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, "bucket_duration must be equal or more than 1"); + return NGX_CONF_ERROR; + } + + if (conf->html_path.data == NULL) { + conf->html = NULL; + } else if (conf->enabled) { + + // Read file in memory + char path[PATH_MAX]; + memcpy(path, conf->html_path.data, conf->html_path.len); + *(path + conf->html_path.len) = '\0'; + + struct stat info; + stat(path, &info); + + int fd = open(path, O_RDONLY, 0); + if (fd < 0) { + ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, "js_challenge_html: Could not open file '%s': %s", path, + strerror(errno)); + return NGX_CONF_ERROR; + } + + conf->html = ngx_palloc(cf->pool, info.st_size); + int ret = read(fd, conf->html, info.st_size); + if (ret < 0) { + ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, "js_challenge_html: Could not read file '%s': %s", path, + strerror(errno)); + return NGX_CONF_ERROR; + } + } + + return NGX_CONF_OK; +} + + __always_inline static void buf2hex(const unsigned char *buf, size_t buflen, char *hex_string) { static const char hexdig[] = "0123456789ABCDEF"; @@ -71,79 +205,68 @@ static void buf2hex(const unsigned char *buf, size_t buflen, char *hex_string) { } } -#define SHA1_MD_LEN 20 -#define SHA1_STR_LEN 40 -const int JS_SOLVER_CHALLENGE_OFFSET = 84 + 8 + 13; -//static const u_char JS_SOLVER[] = "Hello, workd"; -static const u_char JS_SOLVER[] = - "" - "Hello"; - -int serve_challenge(ngx_http_request_t *r, const char *challenge) { +int serve_challenge(ngx_http_request_t *r, const char *challenge, const char *html, ngx_str_t title) { ngx_buf_t *b = ngx_pcalloc(r->pool, sizeof(ngx_buf_t)); ngx_chain_t out; - unsigned char buf[9000]; - memcpy(buf, JS_SOLVER, sizeof(JS_SOLVER)); - memcpy(buf + JS_SOLVER_CHALLENGE_OFFSET, challenge, SHA1_STR_LEN); + char challenge_c_str[SHA1_STR_LEN + 1]; + memcpy(challenge_c_str, challenge, SHA1_STR_LEN); + *(challenge_c_str + SHA1_STR_LEN) = '\0'; + + char title_c_str[4096]; + memcpy(title_c_str, title.data, title.len); + *(title_c_str + title.len) = '\0'; + + unsigned char buf[32768]; + + if (html == NULL) { + html = "

Set the js_challenge_html /path/to/body.html; directive to change this page.

"; + } + + size_t size = snprintf((char *) buf, sizeof(buf), JS_SOLVER_TEMPLATE, title_c_str, challenge_c_str, html); out.buf = b; out.next = NULL; // TODO: is that stack buffer gonna cause problems? b->pos = buf; - b->last = buf + sizeof(JS_SOLVER) - 1; + b->last = buf + size; b->memory = 1; b->last_buf = 1; r->headers_out.status = NGX_HTTP_OK; - r->headers_out.content_length_n = sizeof(JS_SOLVER) - 1; + r->headers_out.content_length_n = size; ngx_http_send_header(r); return ngx_http_output_filter(r, &out); } /** - * @param bucket - * @param addr - * @param secret * @param out 40 bytes long string! */ -void get_challenge_string(int32_t bucket, ngx_str_t addr, const char *secret, char *out) { +void get_challenge_string(int32_t bucket, ngx_str_t addr, ngx_str_t secret, char *out) { char buf[4096]; unsigned char md[SHA1_MD_LEN]; + char * p = (char*)&bucket; /* * Challenge= hex( SHA1( concat(bucket, addr, secret) ) ) */ - *((int32_t *) buf) = bucket; + memcpy(buf, p, sizeof(bucket)); memcpy((buf + sizeof(int32_t)), addr.data, addr.len); - memcpy((buf + sizeof(int32_t) + addr.len), secret, strlen(secret)); + memcpy((buf + sizeof(int32_t) + addr.len), secret.data, secret.len); - SHA1((unsigned char *) buf, (size_t) (sizeof(int32_t) + addr.len + strlen(secret)), md); + SHA1((unsigned char *) buf, (size_t) (sizeof(int32_t) + addr.len + secret.len), md); buf2hex(md, SHA1_MD_LEN, out); } -int verify_response(int32_t bucket, ngx_str_t addr, const char *secret, ngx_str_t response, char *challenge) { +int verify_response(ngx_str_t response, char *challenge) { /* * Response is valid if it starts by the challenge, and - * its SHA1 hash contains the digits 0xB00B5 at the offset + * its SHA1 hash contains the digits 0xB00B at the offset * of the first digit * * e.g. @@ -165,9 +288,14 @@ int verify_response(int32_t bucket, ngx_str_t addr, const char *secret, ngx_str_ unsigned char md[SHA1_MD_LEN]; SHA1((unsigned char *) response.data, response.len, md); - unsigned int nibble1 = challenge[0] & 0xF0; + unsigned int nibble1; + if (challenge[0] <= '9') { + nibble1 = challenge[0] - '0'; + } else { + nibble1 = challenge[0] - 'A' + 10; + } - return md[nibble1] == 0 && md[nibble1 + 1] == 0; + return md[nibble1] == 0xB0 && md[nibble1 + 1] == 0x0B ? 0 : -1; } int get_cookie(ngx_http_request_t *r, ngx_str_t *name, ngx_str_t *value) { @@ -200,60 +328,44 @@ int get_cookie(ngx_http_request_t *r, ngx_str_t *name, ngx_str_t *value) { static ngx_int_t ngx_http_js_challenge_handler(ngx_http_request_t *r) { - //TODO: If the bucket is less than 5sec away from the next one, accept both current and latest bucket + ngx_http_js_challenge_loc_conf_t *conf = ngx_http_get_module_loc_conf(r, ngx_http_js_challenge_module); - //TODO: argument - const char *secret = "my secret"; + if (!conf->enabled) { + return NGX_DECLINED; + } - //TODO: argument - const long bucketSize = 30; - - long bucket = r->start_sec - (r->start_sec % bucketSize); + unsigned long bucket = r->start_sec - (r->start_sec % conf->bucket_duration); ngx_str_t addr = r->connection->addr_text; - // Use real-ip ? char challenge[SHA1_STR_LEN]; - get_challenge_string(bucket, addr, secret, challenge); + get_challenge_string(bucket, addr, conf->secret, challenge); ngx_str_t response; int ret = get_cookie(r, &((ngx_str_t) ngx_string("res")), &response); - //TODO: remove debug msg - char msg[4096]; - - sprintf(msg, "TS=%lu BUCKET=%lu SECRET=%s CHALLENGE=%s RET=%d COOKIE=%s", - r->start_sec, bucket, secret, challenge, ret, response.data); - ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, msg); - - get_challenge_string(bucket, addr, secret, challenge); - - if (ret == NGX_DECLINED || verify_response(bucket, addr, secret, response, challenge) != 0) { - //Serve challenge - return serve_challenge(r, challenge); + if (ret < 0) { + return serve_challenge(r, challenge, conf->html, conf->title); } + get_challenge_string(bucket, addr, conf->secret, challenge); + + if (verify_response(response, challenge) != 0) { + return serve_challenge(r, challenge, conf->html, conf->title); + } + + // Fallthrough next handler return NGX_DECLINED; } -//ngx_conf_set_flag_slot: translates "on" or "off" to 1 or 0 -//ngx_conf_set_str_slot: saves a string as an ngx_str_t -//ngx_conf_set_num_slot: parses a number and saves it to an int -//ngx_conf_set_size_slot: parses a data size ("8k", "1m", etc.) and saves it to a size_t - - -static char *setup1(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) { -// ngx_http_core_loc_conf_t *clcf; /* pointer to core location configuration */ -// clcf = ngx_http_conf_get_module_loc_conf(cf, ngx_http_core_module); -// clcf->handler = ngx_http_js_challenge_handler; - return NGX_CONF_OK; -} - +/** + * post configuration + */ static ngx_int_t ngx_http_js_challenge(ngx_conf_t *cf) { ngx_http_handler_pt *h; - ngx_http_core_main_conf_t *cmcf = ngx_http_conf_get_module_main_conf(cf, ngx_http_core_module); + ngx_http_core_main_conf_t *main_conf = ngx_http_conf_get_module_main_conf(cf, ngx_http_core_module); - h = ngx_array_push(&cmcf->phases[NGX_HTTP_CONTENT_PHASE].handlers); + h = ngx_array_push(&main_conf->phases[NGX_HTTP_PRECONTENT_PHASE].handlers); if (h == NULL) { ngx_log_error(NGX_LOG_ERR, cf->log, 0, "null"); return NGX_ERROR;