Merge branch 'captcha-auto-submit' into kikeflare

This commit is contained in:
Thomas Lynch
2022-09-17 15:47:29 +00:00
8 changed files with 86 additions and 88 deletions

View File

@ -18,7 +18,6 @@ Improvements in this fork:
- Choose protection modes "none", "pow" or "pow+captcha" per-domain or per-domain+path, with paths taking priority. - Choose protection modes "none", "pow" or "pow+captcha" per-domain or per-domain+path, with paths taking priority.
- Whitelist IPs/subnets. - Whitelist IPs/subnets.
- Maintenance mode page for selected domains. - Maintenance mode page for selected domains.
- Include dataplaneapi, to sync map files to disk if edited during runtime.
- In POW only mode, provide instructions and an encoded script to find the solution. - In POW only mode, provide instructions and an encoded script to find the solution.
- Many bugfixes. - Many bugfixes.
@ -32,10 +31,11 @@ Add some env vars to docker-compose file:
- RECAPTCHA_SECRET - your recaptcha secret key - RECAPTCHA_SECRET - your recaptcha secret key
- CAPTCHA_COOKIE_SECRET - random string, a salt for captcha cookies - CAPTCHA_COOKIE_SECRET - random string, a salt for captcha cookies
- POW_COOKIE_SECRET - different random string, a salt for pow cookies - POW_COOKIE_SECRET - different random string, a salt for pow cookies
- HMAC_COOKIE_SECRET - different random string, a salt for pow cookies
- RAY_ID - string to identify the HAProxy node by - RAY_ID - string to identify the HAProxy node by
- BUCKET_DURATION - how long between bucket changes, invalidating cookies - BUCKET_DURATION - how long between bucket changes, invalidating cookies
- BACKEND_NAME - name of backend to build from hosts.map - BACKEND_NAME - Optional, name of backend to build from hosts.map
- SERVER_PREFIX - prefix of server names used in server-template - SERVER_PREFIX - Optional, prefix of server names used in server-template
Add a domain name + backend IP to `haproxy/hosts.map` like: Add a domain name + backend IP to `haproxy/hosts.map` like:
```plain ```plain
@ -58,7 +58,6 @@ Before installing the tool, ensure that HAProxy is built with Lua support and ve
- Copy [haproxy.cfg](haproxy/haproxy.cfg) to /etc/haproxy - Copy [haproxy.cfg](haproxy/haproxy.cfg) to /etc/haproxy
- Edit the `lua-load` directive to be the absolute path to [register.lua](src/scripts/register.lua) - Edit the `lua-load` directive to be the absolute path to [register.lua](src/scripts/register.lua)
- Edit the paths of challenge.js and worker.js in the `http-request return` directive to the absolut path to the respective files in the haproxy/js folder - Edit the paths of challenge.js and worker.js in the `http-request return` directive to the absolut path to the respective files in the haproxy/js folder
- Copy [dataplaneapi.hcl](haproxy/dataplaneapi.hcl) to /etc/haproxy
- Copy or link [scripts](src/scripts) to /etc/haproxy/scripts - Copy or link [scripts](src/scripts) to /etc/haproxy/scripts
- Copy or link [libs](src/libs) to /etc/haproxy/libs (or a path where Lua looks for modules). - Copy or link [libs](src/libs) to /etc/haproxy/libs (or a path where Lua looks for modules).
- Copy the map files from the haproxy folder to /etc/haproxy - Copy the map files from the haproxy folder to /etc/haproxy

View File

@ -18,15 +18,17 @@ services:
- ./haproxy/blocked.map:/etc/haproxy/blocked.map - ./haproxy/blocked.map:/etc/haproxy/blocked.map
- ./haproxy/whitelist.map:/etc/haproxy/whitelist.map - ./haproxy/whitelist.map:/etc/haproxy/whitelist.map
- ./haproxy/maintenance.map:/etc/haproxy/maintenance.map - ./haproxy/maintenance.map:/etc/haproxy/maintenance.map
- ./haproxy/dataplaneapi.hcl:/etc/haproxy/dataplaneapi.hcl
- ./haproxy/trace.txt:/etc/haproxy/trace.txt - ./haproxy/trace.txt:/etc/haproxy/trace.txt
- ./src/scripts/:/etc/haproxy/scripts/ - ./src/scripts/:/etc/haproxy/scripts/
- ./src/libs/:/etc/haproxy/libs/ - ./src/libs/:/etc/haproxy/libs/
- ./haproxy/js/:/var/www/js/ - ./haproxy/js/:/var/www/js/
- ./haproxy/html/maintenance.html:/var/www/html/maintenance.html - ./haproxy/html/maintenance.html:/var/www/html/maintenance.html
environment: environment:
- RECAPTCHA_SECRET=6LeIxAcTAAAAAGG-vFI1TnRWxMZNFuojJ4WifJWe # These are the hcaptcha and recaptcha test keys, not leaking any dont worry :^)
- RECAPTCHA_SITEKEY=6LeIxAcTAAAAAJcZVRqyHh71UMIEGNQ_MXjiZKhI - HCAPTCHA_SITEKEY=20000000-ffff-ffff-ffff-000000000002
- HCAPTCHA_SECRET=0x0000000000000000000000000000000000000000
#- RECAPTCHA_SECRET=6LeIxAcTAAAAAGG-vFI1TnRWxMZNFuojJ4WifJWe
#- RECAPTCHA_SITEKEY=6LeIxAcTAAAAAJcZVRqyHh71UMIEGNQ_MXjiZKhI
- CAPTCHA_COOKIE_SECRET=changeme - CAPTCHA_COOKIE_SECRET=changeme
- POW_COOKIE_SECRET=changeme - POW_COOKIE_SECRET=changeme
- HMAC_COOKIE_SECRET=changeme - HMAC_COOKIE_SECRET=changeme

View File

@ -37,11 +37,6 @@ RUN set -eux; \
; \ ; \
rm -rf /var/lib/apt/lists/*; \ rm -rf /var/lib/apt/lists/*; \
\ \
wget -O dataplaneapi_2.4.4_Linux_x86_64.tar.gz https://github.com/haproxytech/dataplaneapi/releases/download/v2.4.4/dataplaneapi_2.4.4_Linux_x86_64.tar.gz; \
tar -zxvf dataplaneapi_2.4.4_Linux_x86_64.tar.gz; \
chmod +x build/dataplaneapi; \
cp build/dataplaneapi /usr/local/bin/; \
\
wget -O haproxy.tar.gz "$HAPROXY_URL"; \ wget -O haproxy.tar.gz "$HAPROXY_URL"; \
# echo "$HAPROXY_SHA256 *haproxy.tar.gz" | sha256sum -c; \ # echo "$HAPROXY_SHA256 *haproxy.tar.gz" | sha256sum -c; \
mkdir -p /usr/src/haproxy; \ mkdir -p /usr/src/haproxy; \

View File

@ -1,29 +0,0 @@
config_version = 2
name = "meet_bedbug"
mode = "single"
dataplaneapi {
user "admin" {
insecure = true
password = "adminpwd"
}
transaction {
transaction_dir = "/tmp/haproxy"
}
advertised {}
}
haproxy {
config_file = "/etc/haproxy/haproxy.cfg"
haproxy_bin = "/usr/local/sbin/haproxy"
reload {
reload_delay = 5
reload_cmd = "service haproxy reload"
restart_cmd = "service haproxy restart"
}
}

View File

@ -1,15 +1,17 @@
function finishRedirect() {
window.location=location.search.slice(1)+location.hash || "/";
}
function finishPow(combined, answer) { function finishPow(combined, answer) {
document.cookie='z_ddos_pow='+combined+'#'+answer+';expires=Thu, 31-Dec-37 23:55:55 GMT; path=/; SameSite=Strict; '+(location.protocol==='https:'?'Secure=true; ':''); document.cookie='z_ddos_pow='+combined+'#'+answer+';expires=Thu, 31-Dec-37 23:55:55 GMT; path=/; SameSite=Strict; '+(location.protocol==='https:'?'Secure=true; ':'');
const submitButton = document.querySelector('input[type=submit]') const hasCaptchaForm = document.querySelector('form');
if (submitButton) { if (!hasCaptchaForm) {
//button is shown only if captcha is enabled finishRedirect();
submitButton.disabled = false;
submitButton.value = 'Submit';
} else {
window.location=location.search.slice(1)+location.hash || "/";
} }
} }
const powFinished = new Promise((resolve, reject) => {
window.addEventListener('DOMContentLoaded', (event) => {
const combined = document.querySelector('[data-pow]').dataset.pow; const combined = document.querySelector('[data-pow]').dataset.pow;
const [_userkey, challenge, _signature] = combined.split("#"); const [_userkey, challenge, _signature] = combined.split("#");
const start = Date.now(); const start = Date.now();
@ -23,7 +25,10 @@ if (window.Worker && crypto.subtle) {
const [workerId, answer] = e.data; const [workerId, answer] = e.data;
console.log('Worker', workerId, 'returned answer', answer, 'in', Date.now()-start+'ms'); console.log('Worker', workerId, 'returned answer', answer, 'in', Date.now()-start+'ms');
const dummyTime = 5000 - (Date.now()-start); const dummyTime = 5000 - (Date.now()-start);
window.setTimeout(() => finishPow(combined, answer), dummyTime); window.setTimeout(() => {
finishPow(combined, answer);
resolve();
}, dummyTime);
} }
const workers = []; const workers = [];
for (let i = 0; i < threads; i++) { for (let i = 0; i < threads; i++) {
@ -47,5 +52,32 @@ if (window.Worker && crypto.subtle) {
++i; ++i;
} }
const dummyTime = 5000 - (Date.now()-start); const dummyTime = 5000 - (Date.now()-start);
window.setTimeout(() => finishPow(combined, i), dummyTime); window.setTimeout(() => {
finishPow(combined, i);
resolve();
}, dummyTime);
} }
});
});
function onCaptchaSubmit(callback) {
const captchaElem = document.querySelector('[data-sitekey]');
captchaElem.insertAdjacentHTML('afterend', `<div class="lds-ring"><div></div><div></div><div></div><div></div></div>`);
captchaElem.remove();
powFinished.then(() => {
fetch('/bot-check', {
method: 'POST',
headers: {
'Content-Type': 'application/x-www-form-urlencoded',
},
body: new URLSearchParams({
'h-captcha-response': callback,
'g-recaptcha-response': callback,
}),
redirect: 'manual',
}).then(res => {
finishRedirect();
})
});
}

Binary file not shown.

Before

Width:  |  Height:  |  Size: 35 KiB

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

After

Width:  |  Height:  |  Size: 21 KiB

View File

@ -88,6 +88,7 @@ local body_template = [[
<noscript> <noscript>
<style>.jsonly{display:none}</style> <style>.jsonly{display:none}</style>
</noscript> </noscript>
<script src="/js/challenge.js"></script>
</head> </head>
<body data-pow="%s"> <body data-pow="%s">
%s %s
@ -103,7 +104,6 @@ local body_template = [[
<p>Security and Performance by <a href="https://BasedFlare.com">BasedFlare</a></p> <p>Security and Performance by <a href="https://BasedFlare.com">BasedFlare</a></p>
<p>Node: <code>%s</code></p> <p>Node: <code>%s</code></p>
</footer> </footer>
<script src="/js/challenge.js"></script>
</body> </body>
</html> </html>
]] ]]
@ -147,9 +147,8 @@ local captcha_section_template = [[
Please solve the captcha to continue. Please solve the captcha to continue.
</h3> </h3>
<form class="jsonly" method="POST"> <form class="jsonly" method="POST">
<div class="%s" data-sitekey="%s"></div> <div class="%s" data-sitekey="%s" data-callback="onCaptchaSubmit"></div>
<script src="%s" async defer></script> <script src="%s" async defer></script>
<input type="submit" value="Calculating proof of work..." disabled>
</form> </form>
]] ]]