2019-07-02 06:32:26 +00:00
|
|
|
'''
|
|
|
|
Onionr - Private P2P Communication
|
|
|
|
|
|
|
|
Process incoming requests to the public api server for certain attacks
|
|
|
|
'''
|
|
|
|
'''
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2019-08-28 23:33:28 +00:00
|
|
|
from flask import Blueprint, request, abort, g
|
2019-07-02 06:32:26 +00:00
|
|
|
from onionrservices import httpheaders
|
|
|
|
from onionrutils import epoch
|
2019-07-22 05:24:42 +00:00
|
|
|
from utils import gettransports
|
2019-07-02 06:32:26 +00:00
|
|
|
class PublicAPISecurity:
|
|
|
|
def __init__(self, public_api):
|
|
|
|
public_api_security_bp = Blueprint('publicapisecurity', __name__)
|
|
|
|
self.public_api_security_bp = public_api_security_bp
|
|
|
|
|
|
|
|
@public_api_security_bp.before_app_request
|
|
|
|
def validate_request():
|
|
|
|
'''Validate request has the correct hostname'''
|
|
|
|
# If high security level, deny requests to public (HS should be disabled anyway for Tor, but might not be for I2P)
|
2019-07-24 17:22:19 +00:00
|
|
|
transports = gettransports.get()
|
2019-07-02 06:32:26 +00:00
|
|
|
if public_api.config.get('general.security_level', default=1) > 0:
|
|
|
|
abort(403)
|
2019-07-22 05:24:42 +00:00
|
|
|
if request.host not in transports:
|
2019-07-02 06:32:26 +00:00
|
|
|
# Disallow connection if wrong HTTP hostname, in order to prevent DNS rebinding attacks
|
|
|
|
abort(403)
|
|
|
|
public_api.hitCount += 1 # raise hit count for valid requests
|
2019-08-28 23:33:28 +00:00
|
|
|
try:
|
|
|
|
if 'onionr' in request.headers['User-Agent'].lower():
|
|
|
|
g.is_onionr_client = True
|
|
|
|
else:
|
|
|
|
g.is_onionr_client = False
|
|
|
|
except KeyError:
|
|
|
|
g.is_onionr_client = False
|
2019-07-02 06:32:26 +00:00
|
|
|
|
|
|
|
@public_api_security_bp.after_app_request
|
|
|
|
def send_headers(resp):
|
|
|
|
'''Send api, access control headers'''
|
|
|
|
resp = httpheaders.set_default_onionr_http_headers(resp)
|
|
|
|
# Network API version
|
|
|
|
resp.headers['X-API'] = public_api.API_VERSION
|
2019-08-29 06:49:41 +00:00
|
|
|
# Delete some HTTP headers for Onionr user agents
|
2019-09-04 06:20:11 +00:00
|
|
|
NON_NETWORK_HEADERS = ('Content-Security-Policy', 'X-Frame-Options',
|
|
|
|
'X-Content-Type-Options', 'Feature-Policy', 'Clear-Site-Data', 'Referrer-Policy')
|
2019-08-28 23:33:28 +00:00
|
|
|
if g.is_onionr_client:
|
2019-09-04 06:20:11 +00:00
|
|
|
for header in NON_NETWORK_HEADERS: del resp.headers[header]
|
2019-07-02 06:32:26 +00:00
|
|
|
public_api.lastRequest = epoch.get_rounded_epoch(roundS=5)
|
2019-09-04 10:10:17 +00:00
|
|
|
return resp
|