gotosocial/internal/middleware/nollamas.go

245 lines
6.2 KiB
Go
Raw Normal View History

2025-04-22 16:06:51 +01:00
// GoToSocial
// Copyright (C) GoToSocial Authors admin@gotosocial.org
// SPDX-License-Identifier: AGPL-3.0-or-later
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package middleware
import (
2025-04-23 12:17:47 +02:00
"context"
"crypto/rand"
"crypto/rsa"
2025-04-22 16:06:51 +01:00
"crypto/sha256"
"crypto/sha512"
2025-04-22 16:06:51 +01:00
"crypto/subtle"
"crypto/x509"
2025-04-22 16:06:51 +01:00
"encoding/hex"
"hash"
"net/http"
"time"
"codeberg.org/gruf/go-byteutil"
"github.com/gin-gonic/gin"
2025-04-23 12:17:47 +02:00
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
2025-04-22 16:06:51 +01:00
"github.com/superseriousbusiness/gotosocial/internal/oauth"
)
2025-04-23 12:17:47 +02:00
func NoLLaMas(
getInstance func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode),
) gin.HandlerFunc {
privKey, err := rsa.GenerateKey(rand.Reader, 2048)
if err != nil {
panic(err)
}
// Generate seed hash
// from this private key.
bpriv := x509.MarshalPKCS1PrivateKey(privKey)
seed := sha512.Sum512(bpriv)
2025-04-22 16:06:51 +01:00
// Configure nollamas.
2025-04-22 16:06:51 +01:00
var nollamas nollamas
nollamas.seed = seed[:]
nollamas.ttl = time.Hour
nollamas.diff = 4
2025-04-23 12:17:47 +02:00
nollamas.getInstance = getInstance
2025-04-22 16:06:51 +01:00
return nollamas.Serve
}
// i.e. outputted hash slice length.
const hashLen = sha256.BlockSize
// i.e. hex.EncodedLen(hashLen).
const encodedHashLen = 2 * hashLen
func newHash() hash.Hash { return sha256.New() }
type nollamas struct {
2025-04-23 12:17:47 +02:00
seed []byte // securely hashed private key
ttl time.Duration
diff uint8
getInstance func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode)
2025-04-22 16:06:51 +01:00
}
func (m *nollamas) Serve(c *gin.Context) {
if c.Request.Method != http.MethodGet {
// Only interested in protecting
// crawlable 'GET' endpoints.
c.Next()
return
}
if _, ok := c.Get(oauth.SessionAuthorizedToken); ok {
// Don't guard against requests
// providing valid OAuth tokens.
c.Next()
return
}
// Get new hasher.
hash := newHash()
// Reset hash.
hash.Reset()
// Generate a unique token for
// this request only valid for
// a period of now +- m.ttl.
token := m.token(c, hash)
// For unique challenge string just use a
// portion of their unique 'success' token.
// SHA256 is not yet cracked, this is not an
// application of a hash requiring serious
// cryptographic security and it rotates on
// a TTL basis, so it should be fine.
challenge := token[:len(token)/2]
// Check for a provided success token.
cookie, _ := c.Cookie("gts-nollamas")
if len(cookie) > encodedHashLen {
2025-04-22 19:46:36 +01:00
// Clearly invalid cookie, just
2025-04-22 16:06:51 +01:00
// present them with new challenge.
m.renderChallenge(c, challenge)
return
}
// Check whether passed cookie
// is the expected success token.
if subtle.ConstantTimeCompare(
byteutil.S2B(token),
byteutil.S2B(cookie),
) == 1 {
// They passed us a valid, expected
// token. They already passed checks.
c.Next()
return
}
// Check query to see if an in-progress
// challenge solution has been provided.
query := c.Request.URL.Query()
nonce := query.Get("nollamas_solution")
if nonce == "" || len(nonce) > 20 {
2025-04-22 16:06:51 +01:00
2025-04-22 19:57:38 +01:00
// An invalid solution string, just
2025-04-22 16:06:51 +01:00
// present them with new challenge.
m.renderChallenge(c, challenge)
return
}
// Reset hash.
hash.Reset()
// Hash and encode input challenge with
// proposed nonce as a possible solution.
_, _ = hash.Write(byteutil.S2B(challenge))
_, _ = hash.Write(byteutil.S2B(nonce))
solution := hex.AppendEncode(nil, hash.Sum(nil))
// Check that the first 'diff'
// many chars are indeed zeroes.
for i := range m.diff {
if solution[i] != '0' {
2025-04-22 16:06:51 +01:00
// They failed challenge,
// re-present challenge page.
m.renderChallenge(c, challenge)
2025-04-22 16:06:51 +01:00
return
}
}
// Drop the solution from query.
query.Del("nollamas_solution")
c.Request.URL.RawQuery = query.Encode()
2025-04-22 16:06:51 +01:00
// They passed the challenge! Set success
// token cookie and allow them to continue.
c.SetCookie("gts-nollamas", token, int(m.ttl/time.Second),
"", "", false, false)
c.Next()
}
func (m *nollamas) renderChallenge(c *gin.Context, challenge string) {
// Don't pass to further
// handlers, they only get
// our challenge page.
c.Abort()
2025-04-23 12:17:47 +02:00
instance, errWithCode := m.getInstance(c.Request.Context())
if errWithCode != nil {
apiutil.ErrorHandler(c, errWithCode, m.getInstance)
return
}
// Write the templated challenge HTML response to client.
2025-04-23 12:17:47 +02:00
apiutil.TemplateWebPage(c, apiutil.WebPage{
Template: "nollamas.tmpl",
Instance: instance,
Extra: map[string]any{
"challenge": challenge,
"difficulty": m.diff,
},
Javascript: []apiutil.JavascriptEntry{
{
Src: "/assets/dist/nollamas.js",
Defer: true,
},
},
})
2025-04-22 16:06:51 +01:00
}
func (m *nollamas) token(c *gin.Context, hash hash.Hash) string {
// Use our safe, unique input seed which
// is already hashed, but will get rehashed.
// This ensures we don't leak private keys,
// but also we have cryptographically safe
// deterministic tokens for comparisons.
_, _ = hash.Write(m.seed)
// Include difficulty level in
// hash input data so if config
// changes then token invalidates.
_, _ = hash.Write([]byte{m.diff})
// Also seed the generated input with
2025-04-22 19:57:38 +01:00
// current time rounded to TTL, so our
// single comparison handles expiries.
2025-04-22 16:06:51 +01:00
now := time.Now().Round(m.ttl).Unix()
_, _ = hash.Write([]byte{
byte(now >> 56),
byte(now >> 48),
byte(now >> 40),
byte(now >> 32),
byte(now >> 24),
byte(now >> 16),
byte(now >> 8),
byte(now),
})
// Finally, append unique client request data.
2025-04-22 16:06:51 +01:00
userAgent := c.Request.Header.Get("User-Agent")
_, _ = hash.Write(byteutil.S2B(userAgent))
clientIP := c.ClientIP()
_, _ = hash.Write(byteutil.S2B(clientIP))
// Return hex encoded hash output.
return hex.EncodeToString(hash.Sum(nil))
}