| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | package httpclient | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"net/netip" | 
					
						
							|  |  |  | 	"syscall" | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | var ( | 
					
						
							|  |  |  | 	// ipv6GlobalUnicast is the prefix set aside by IANA for global unicast assignments, i.e "the internet". | 
					
						
							|  |  |  | 	// https://www.iana.org/assignments/ipv6-unicast-address-assignments/ipv6-unicast-address-assignments.xhtml | 
					
						
							|  |  |  | 	ipv6GlobalUnicast = netip.MustParsePrefix("2000::/3") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// ipv6Reserved contains IPv6 reserved IP prefixes that fall within ipv6GlobalUnicast. | 
					
						
							|  |  |  | 	// https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml | 
					
						
							|  |  |  | 	ipv6Reserved = [...]netip.Prefix{ | 
					
						
							|  |  |  | 		netip.MustParsePrefix("2001::/23"),         // IETF Protocol Assignments (RFC 2928) | 
					
						
							|  |  |  | 		netip.MustParsePrefix("2001:db8::/32"),     // Documentation (RFC 3849) | 
					
						
							|  |  |  | 		netip.MustParsePrefix("2002::/16"),         // 6to4 (RFC 3056) | 
					
						
							|  |  |  | 		netip.MustParsePrefix("2620:4f:8000::/48"), // Direct Delegation AS112 Service (RFC 7534) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// ipv4Reserved contains IPv4 reserved IP prefixes. | 
					
						
							|  |  |  | 	// https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml | 
					
						
							|  |  |  | 	ipv4Reserved = [...]netip.Prefix{ | 
					
						
							|  |  |  | 		netip.MustParsePrefix("0.0.0.0/8"),       // Current network | 
					
						
							|  |  |  | 		netip.MustParsePrefix("10.0.0.0/8"),      // Private | 
					
						
							|  |  |  | 		netip.MustParsePrefix("100.64.0.0/10"),   // RFC6598 | 
					
						
							|  |  |  | 		netip.MustParsePrefix("127.0.0.0/8"),     // Loopback | 
					
						
							|  |  |  | 		netip.MustParsePrefix("169.254.0.0/16"),  // Link-local | 
					
						
							|  |  |  | 		netip.MustParsePrefix("172.16.0.0/12"),   // Private | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.0.0.0/24"),    // RFC6890 | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.0.2.0/24"),    // Test, doc, examples | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.31.196.0/24"), // AS112-v4, RFC 7535 | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.52.193.0/24"), // AMT, RFC 7450 | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.88.99.0/24"),  // IPv6 to IPv4 relay | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.168.0.0/16"),  // Private | 
					
						
							|  |  |  | 		netip.MustParsePrefix("192.175.48.0/24"), // Direct Delegation AS112 Service, RFC 7534 | 
					
						
							|  |  |  | 		netip.MustParsePrefix("198.18.0.0/15"),   // Benchmarking tests | 
					
						
							|  |  |  | 		netip.MustParsePrefix("198.51.100.0/24"), // Test, doc, examples | 
					
						
							|  |  |  | 		netip.MustParsePrefix("203.0.113.0/24"),  // Test, doc, examples | 
					
						
							|  |  |  | 		netip.MustParsePrefix("224.0.0.0/4"),     // Multicast | 
					
						
							|  |  |  | 		netip.MustParsePrefix("240.0.0.0/4"),     // Reserved (includes broadcast / 255.255.255.255) | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | type Sanitizer struct { | 
					
						
							|  |  |  | 	Allow []netip.Prefix | 
					
						
							|  |  |  | 	Block []netip.Prefix | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Sanitize implements the required net.Dialer.Control function signature. | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | func (s *Sanitizer) Sanitize(ntwrk, addr string, _ syscall.RawConn) error { | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 	// Parse IP+port from addr | 
					
						
							|  |  |  | 	ipport, err := netip.ParseAddrPort(addr) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// Ensure valid network. | 
					
						
							|  |  |  | 	const ( | 
					
						
							|  |  |  | 		tcp4 = "tcp4" | 
					
						
							|  |  |  | 		tcp6 = "tcp6" | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if !(ntwrk == tcp4 || ntwrk == tcp6) { | 
					
						
							| 
									
										
										
										
											2022-11-26 12:09:55 +01:00
										 |  |  | 		return ErrInvalidNetwork | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// Separate the IP. | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 	ip := ipport.Addr() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// Check if this IP is explicitly allowed. | 
					
						
							|  |  |  | 	for i := 0; i < len(s.Allow); i++ { | 
					
						
							|  |  |  | 		if s.Allow[i].Contains(ip) { | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 			return nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// Check if this IP is explicitly blocked. | 
					
						
							|  |  |  | 	for i := 0; i < len(s.Block); i++ { | 
					
						
							|  |  |  | 		if s.Block[i].Contains(ip) { | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 			return ErrReservedAddr | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 	// Validate this is a safe IP. | 
					
						
							|  |  |  | 	if !SafeIP(ip) { | 
					
						
							| 
									
										
										
										
											2022-05-15 10:16:43 +01:00
										 |  |  | 		return ErrReservedAddr | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2023-07-07 16:17:39 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | // SafeIP returns whether ip is an IPv4/6 | 
					
						
							|  |  |  | // address in a non-reserved, public range. | 
					
						
							|  |  |  | func SafeIP(ip netip.Addr) bool { | 
					
						
							|  |  |  | 	switch { | 
					
						
							|  |  |  | 	// IPv4: check if IPv4 in reserved nets | 
					
						
							|  |  |  | 	case ip.Is4(): | 
					
						
							|  |  |  | 		for _, reserved := range ipv4Reserved { | 
					
						
							|  |  |  | 			if reserved.Contains(ip) { | 
					
						
							|  |  |  | 				return false | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// IPv6: check if IP in IPv6 reserved nets | 
					
						
							|  |  |  | 	case ip.Is6(): | 
					
						
							|  |  |  | 		if !ipv6GlobalUnicast.Contains(ip) { | 
					
						
							|  |  |  | 			// Address is not globally routeable, | 
					
						
							|  |  |  | 			// ie., not "on the internet". | 
					
						
							|  |  |  | 			return false | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		for _, reserved := range ipv6Reserved { | 
					
						
							|  |  |  | 			if reserved.Contains(ip) { | 
					
						
							|  |  |  | 				// Address is globally routeable | 
					
						
							|  |  |  | 				// but falls in a reserved range. | 
					
						
							|  |  |  | 				return false | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		return true | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Assume malicious by default | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		return false | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } |