mirror of
https://gitgud.io/fatchan/haproxy-protection.git
synced 2025-05-09 02:05:37 +00:00
458 lines
16 KiB
Lua
458 lines
16 KiB
Lua
_M = {}
|
|
|
|
-- Testing only
|
|
-- require("socket")
|
|
-- require("print_r")
|
|
|
|
-- main libs
|
|
local url = require("url")
|
|
local utils = require("utils")
|
|
local cookie = require("cookie")
|
|
local json = require("json")
|
|
local randbytes = require("randbytes")
|
|
local templates = require("templates")
|
|
local locales_path = "/etc/haproxy/locales/"
|
|
local locales_table = {}
|
|
local locales_strings = {}
|
|
for file_name in io.popen('ls "'..locales_path..'"*.json'):lines() do
|
|
local file_name_with_path = utils.split(file_name, "/")
|
|
local file_name_without_ext = utils.split(file_name_with_path[#file_name_with_path], ".")[1]
|
|
local file = io.open(file_name, "r")
|
|
local json_contents = file:read("*all")
|
|
local json_object = json.decode(json_contents)
|
|
file:close()
|
|
locales_table[file_name_without_ext] = json_object
|
|
locales_strings[file_name_without_ext] = json_contents
|
|
end
|
|
|
|
-- POW
|
|
local pow_type = os.getenv("POW_TYPE") or "argon2"
|
|
local pow_difficulty = tonumber(os.getenv("POW_DIFFICULTY") or 18)
|
|
-- argon2
|
|
local argon2 = require("argon2")
|
|
local argon_kb = tonumber(os.getenv("ARGON_KB") or 6000)
|
|
local argon_time = tonumber(os.getenv("ARGON_TIME") or 1)
|
|
argon2.t_cost(argon_time)
|
|
argon2.m_cost(argon_kb)
|
|
argon2.parallelism(1)
|
|
argon2.hash_len(32)
|
|
argon2.variant(argon2.variants.argon2_id)
|
|
-- sha2
|
|
local sha = require("sha")
|
|
|
|
-- environment variables
|
|
local captcha_secret = os.getenv("HCAPTCHA_SECRET") or os.getenv("RECAPTCHA_SECRET")
|
|
local captcha_sitekey = os.getenv("HCAPTCHA_SITEKEY") or os.getenv("RECAPTCHA_SITEKEY")
|
|
local captcha_cookie_secret = os.getenv("CAPTCHA_COOKIE_SECRET")
|
|
local pow_cookie_secret = os.getenv("POW_COOKIE_SECRET")
|
|
local hmac_cookie_secret = os.getenv("HMAC_COOKIE_SECRET")
|
|
local ray_id = os.getenv("RAY_ID")
|
|
|
|
-- load captcha map and set hcaptcha/recaptch based off env vars
|
|
local captcha_map = Map.new("/etc/haproxy/map/ddos.map", Map._str);
|
|
local captcha_provider_domain = ""
|
|
local captcha_classname = ""
|
|
local captcha_script_src = ""
|
|
local captcha_siteverify_path = ""
|
|
local captcha_backend_name = ""
|
|
if os.getenv("HCAPTCHA_SITEKEY") then
|
|
captcha_provider_domain = "hcaptcha.com"
|
|
captcha_classname = "h-captcha"
|
|
captcha_script_src = "https://hcaptcha.com/1/api.js"
|
|
captcha_siteverify_path = "/siteverify"
|
|
captcha_backend_name = "hcaptcha"
|
|
else
|
|
captcha_provider_domain = "www.google.com"
|
|
captcha_classname = "g-recaptcha"
|
|
captcha_script_src = "https://www.google.com/recaptcha/api.js"
|
|
captcha_siteverify_path = "/recaptcha/api/siteverify"
|
|
captcha_backend_name = "recaptcha"
|
|
end
|
|
|
|
-- kill a tor circuit
|
|
function _M.kill_tor_circuit(txn)
|
|
local ip = txn.sf:src()
|
|
if ip:sub(1,19) ~= "fc00:dead:beef:4dad" then
|
|
return -- not a tor circuit id/ip. we shouldn't get here, but just in case.
|
|
end
|
|
-- split the IP, take the last 2 sections
|
|
local split_ip = utils.split(ip, ":")
|
|
local aa_bb = split_ip[5] or "0000"
|
|
local cc_dd = split_ip[6] or "0000"
|
|
aa_bb = string.rep("0", 4 - #aa_bb) .. aa_bb
|
|
cc_dd = string.rep("0", 4 - #cc_dd) .. cc_dd
|
|
-- convert the last 2 sections to a number from hex, which makes the circuit ID
|
|
local circuit_identifier = tonumber(aa_bb..cc_dd, 16)
|
|
print('Closing Tor circuit ID: '..circuit_identifier..', "IP": '..ip)
|
|
utils.send_tor_control_port(circuit_identifier)
|
|
end
|
|
|
|
-- read first language from accept-language in applet
|
|
local default_lang = "en-US"
|
|
function _M.get_first_language(applet)
|
|
local accept_language = applet.headers["accept-language"] or {}
|
|
accept_language = accept_language[0] or ""
|
|
if #accept_language > 0 and #accept_language < 100 then -- length limit preventing abuse
|
|
for lang in accept_language:gmatch("[^,%s]+") do
|
|
if not lang:find(";") then
|
|
return lang
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
|
|
function _M.view(applet)
|
|
|
|
-- set the ll and ls language var based off header or default to en-US
|
|
local lang = _M.get_first_language(applet)
|
|
local ll = locales_table[lang]
|
|
if ll == nil then
|
|
ll = locales_table[default_lang]
|
|
lang = default_lang
|
|
end
|
|
local ls = locales_strings[lang]
|
|
|
|
-- set response body and declare status code
|
|
local response_body = ""
|
|
local response_status_code
|
|
|
|
-- if request is GET, serve the challenge page
|
|
if applet.method == "GET" then
|
|
|
|
-- get the user_key#challenge#sig
|
|
local user_key = sha.bin_to_hex(randbytes(16))
|
|
local challenge_hash, expiry = utils.generate_challenge(applet, pow_cookie_secret, user_key, true)
|
|
local signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, user_key .. challenge_hash .. expiry)
|
|
local combined_challenge = user_key .. "#" .. challenge_hash .. "#" .. expiry .. "#" .. signature
|
|
|
|
-- define body sections
|
|
local site_name_body = ""
|
|
local captcha_body = ""
|
|
local pow_body = ""
|
|
local noscript_extra_body = ""
|
|
|
|
-- check if captcha is enabled, path+domain priority, then just domain, and 0 otherwise
|
|
local captcha_enabled = false
|
|
local host = applet.headers['host'][0]
|
|
local path = applet.qs; --because on /.basedflare/bot-check?/whatever, .qs (query string) holds the "path"
|
|
|
|
local captcha_map_lookup = captcha_map:lookup(host..path) or captcha_map:lookup(host) or 0
|
|
captcha_map_lookup = tonumber(captcha_map_lookup)
|
|
if captcha_map_lookup == 2 then
|
|
captcha_enabled = true
|
|
end
|
|
|
|
-- return simple json if they send accept: application/json header
|
|
local accept_header = applet.headers['accept']
|
|
if accept_header ~= nil and accept_header[0] == 'application/json' then
|
|
local_pow_combined = string.format('%s#%d#%s#%s', pow_type, math.ceil(pow_difficulty/8), argon_time, argon_kb)
|
|
response_body = "{\"ch\":\""..combined_challenge.."\",\"ca\":"..(captcha_enabled and "true" or "false")..",\"pow\":\""..local_pow_combined.."\"}"
|
|
applet:set_status(403)
|
|
applet:add_header("content-type", "application/json; charset=utf-8")
|
|
applet:add_header("content-length", string.len(response_body))
|
|
applet:start_response()
|
|
applet:send(response_body)
|
|
return
|
|
end
|
|
|
|
-- pow at least is always enabled when reaching bot-check page
|
|
site_name_body = string.format(
|
|
templates.site_name_section,
|
|
string.format(ll["Verifying your connection to %s"], host)
|
|
)
|
|
if captcha_enabled then
|
|
captcha_body = string.format(
|
|
templates.captcha_section,
|
|
ll["Please solve the captcha to continue."],
|
|
captcha_classname,
|
|
captcha_sitekey,
|
|
captcha_script_src
|
|
)
|
|
else
|
|
pow_body = string.format(
|
|
templates.pow_section,
|
|
ll["This process is automatic, please wait a moment..."]
|
|
)
|
|
local noscript_extra
|
|
if pow_type == "argon2" then
|
|
noscript_extra = templates.noscript_extra_argon2
|
|
else
|
|
noscript_extra = templates.noscript_extra_sha256
|
|
end
|
|
noscript_extra_body = string.format(
|
|
noscript_extra,
|
|
ll["No JavaScript?"],
|
|
ll["Run this in a linux terminal (requires <code>perl</code>):"],
|
|
user_key,
|
|
challenge_hash,
|
|
expiry,
|
|
signature,
|
|
math.ceil(pow_difficulty/8),
|
|
argon_time,
|
|
argon_kb,
|
|
ll["Paste the script output into the box and submit:"]
|
|
)
|
|
end
|
|
|
|
-- sub in the body sections
|
|
response_body = string.format(
|
|
templates.body,
|
|
lang,
|
|
ls,
|
|
ll["Hold on..."],
|
|
combined_challenge,
|
|
pow_difficulty,
|
|
argon_time,
|
|
argon_kb,
|
|
pow_type,
|
|
site_name_body,
|
|
pow_body,
|
|
captcha_body,
|
|
ll["JavaScript is required on this page."],
|
|
noscript_extra_body,
|
|
ray_id,
|
|
ll["Performance & security by BasedFlare"]
|
|
)
|
|
response_status_code = 403
|
|
|
|
-- if request is POST, check the answer to the pow/cookie
|
|
elseif applet.method == "POST" then
|
|
|
|
-- if they fail, set a var for use in ACLs later
|
|
local valid_submission = false
|
|
|
|
-- parsed POST body
|
|
local parsed_body = url.parseQuery(applet.receive(applet))
|
|
|
|
-- whether to set cookies sent as secure or not
|
|
local secure_cookie_flag = " Secure=true;"
|
|
if applet.sf:ssl_fc() == "0" then
|
|
secure_cookie_flag = ""
|
|
end
|
|
|
|
-- handle setting the POW cookie
|
|
local user_pow_response = parsed_body["pow_response"]
|
|
local matched_expiry = 0 -- ensure captcha cookie expiry matches POW cookie
|
|
if user_pow_response then
|
|
|
|
-- split the response up (makes the nojs submission easier because it can be a single field)
|
|
local split_response = utils.split(user_pow_response, "#")
|
|
|
|
if #split_response == 5 then
|
|
local given_user_key = split_response[1]
|
|
local given_challenge_hash = split_response[2]
|
|
local given_expiry = split_response[3]
|
|
local given_signature = split_response[4]
|
|
local given_answer = split_response[5]
|
|
|
|
-- expiry check
|
|
local number_expiry = tonumber(given_expiry, 10)
|
|
if number_expiry ~= nil and number_expiry > core.now()['sec'] then
|
|
|
|
-- regenerate the challenge and compare it
|
|
local generated_challenge_hash = utils.generate_challenge(applet, pow_cookie_secret, given_user_key, true)
|
|
|
|
if given_challenge_hash == generated_challenge_hash then
|
|
|
|
-- regenerate the signature and compare it
|
|
local generated_signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, given_user_key .. given_challenge_hash .. given_expiry)
|
|
|
|
if given_signature == generated_signature then
|
|
|
|
-- do the work with their given answer
|
|
local hex_hash_output = ""
|
|
if pow_type == "argon2" then
|
|
local encoded_argon_hash = argon2.hash_encoded(given_challenge_hash .. given_answer, given_user_key)
|
|
local trimmed_argon_hash = utils.split(encoded_argon_hash, '$')[6]:sub(0, 43) -- https://github.com/thibaultcha/lua-argon2/issues/37
|
|
hex_hash_output = sha.bin_to_hex(sha.base64_to_bin(trimmed_argon_hash));
|
|
else
|
|
hex_hash_output = sha.sha256(given_user_key .. given_challenge_hash .. given_answer)
|
|
end
|
|
|
|
if utils.checkdiff(hex_hash_output, pow_difficulty) then
|
|
|
|
-- the answer was good, give them a cookie
|
|
local signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, given_user_key .. given_challenge_hash .. given_expiry .. given_answer)
|
|
local combined_cookie = given_user_key .. "#" .. given_challenge_hash .. "#" .. given_expiry .. "#" .. given_answer .. "#" .. signature
|
|
applet:add_header(
|
|
"set-cookie",
|
|
string.format(
|
|
--"_basedflare_pow=%s; Expires=Thu, 31-Dec-37 23:55:55 GMT; Path=/; Domain=.%s; SameSite=Strict; HttpOnly;%s",
|
|
"_basedflare_pow=%s; Expires=Thu, 31-Dec-37 23:55:55 GMT; Path=/; Domain=.%s; SameSite=Strict; %s",
|
|
combined_cookie,
|
|
applet.headers['host'][0],
|
|
secure_cookie_flag
|
|
)
|
|
)
|
|
valid_submission = true
|
|
matched_expiry = number_expiry
|
|
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
-- handle setting the captcha cookie
|
|
local user_captcha_response = parsed_body["h-captcha-response"] or parsed_body["g-recaptcha-response"]
|
|
|
|
if valid_submission and user_captcha_response then -- only check captcha if POW is already correct
|
|
|
|
-- format the url for verifying the captcha response
|
|
local captcha_url = string.format(
|
|
"https://%s%s",
|
|
--Seems this is no longer needed, captcha_provider_domain works since 2.7
|
|
--core.backends[captcha_backend_name].servers[captcha_backend_name]:get_addr(),
|
|
captcha_provider_domain,
|
|
captcha_siteverify_path
|
|
)
|
|
|
|
-- construct the captcha body to send to the captcha url
|
|
local captcha_body = url.buildQuery({
|
|
secret=captcha_secret,
|
|
response=user_captcha_response
|
|
})
|
|
|
|
-- instantiate an http client and make the request
|
|
local httpclient = core.httpclient()
|
|
local res = httpclient:post{
|
|
url=captcha_url,
|
|
body=captcha_body,
|
|
headers={
|
|
[ "host" ] = { captcha_provider_domain },
|
|
[ "content-type" ] = { "application/x-www-form-urlencoded" },
|
|
[ "user-agent" ] = { "haproxy-protection (haproxy-protection/0.1; +https://gitgud.io/fatchan/haproxy-protection)" }
|
|
}
|
|
}
|
|
|
|
-- try parsing the response as json
|
|
local status, api_response = pcall(json.decode, res.body)
|
|
if not status then
|
|
api_response = {}
|
|
end
|
|
|
|
-- the response was good i.e the captcha provider says they passed, give them a cookie
|
|
if api_response.success == true then
|
|
local user_key = sha.bin_to_hex(randbytes(16))
|
|
local user_hash = utils.generate_challenge(applet, captcha_cookie_secret, user_key, true)
|
|
local signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, user_key .. user_hash .. matched_expiry)
|
|
local combined_cookie = user_key .. "#" .. user_hash .. "#" .. matched_expiry .. "#" .. signature
|
|
applet:add_header(
|
|
"set-cookie",
|
|
string.format(
|
|
"_basedflare_captcha=%s; Expires=Thu, 31-Dec-37 23:55:55 GMT; Path=/; Domain=.%s; SameSite=Strict; HttpOnly;%s",
|
|
combined_cookie,
|
|
applet.headers['host'][0],
|
|
secure_cookie_flag
|
|
)
|
|
)
|
|
valid_submission = valid_submission and true
|
|
end
|
|
|
|
end
|
|
|
|
if not valid_submission then
|
|
_M.kill_tor_circuit(applet)
|
|
end
|
|
|
|
-- redirect them to their desired page in applet.qs (query string)
|
|
-- if they didn't get the appropriate cookies they will be sent back to the challenge page
|
|
response_status_code = 302
|
|
applet:add_header("location", applet.qs)
|
|
|
|
-- else if its another http method, just 403 them
|
|
else
|
|
response_status_code = 403
|
|
end
|
|
|
|
-- finish sending the response
|
|
applet:set_status(response_status_code)
|
|
applet:add_header("content-type", "text/html; charset=utf-8")
|
|
applet:add_header("content-length", string.len(response_body))
|
|
applet:start_response()
|
|
applet:send(response_body)
|
|
|
|
end
|
|
|
|
-- check if captcha is enabled, path+domain priority, then just domain, and 0 otherwise
|
|
function _M.decide_checks_necessary(txn)
|
|
local host = txn.sf:hdr("Host")
|
|
local path = txn.sf:path();
|
|
local captcha_map_lookup = captcha_map:lookup(host..path) or captcha_map:lookup(host) or 0
|
|
captcha_map_lookup = tonumber(captcha_map_lookup)
|
|
if captcha_map_lookup == 1 then
|
|
txn:set_var("txn.validate_pow", true)
|
|
elseif captcha_map_lookup == 2 then
|
|
txn:set_var("txn.validate_captcha", true)
|
|
txn:set_var("txn.validate_pow", true)
|
|
end
|
|
-- otherwise, domain+path was set to 0 (whitelist) or there is no entry in the map
|
|
end
|
|
|
|
-- check if captcha cookie is valid, separate secret from POW
|
|
function _M.check_captcha_status(txn)
|
|
local parsed_request_cookies = cookie.get_cookie_table(txn.sf:hdr("Cookie"))
|
|
local received_captcha_cookie = parsed_request_cookies["_basedflare_captcha"] or ""
|
|
-- split the cookie up
|
|
local split_cookie = utils.split(received_captcha_cookie, "#")
|
|
if #split_cookie ~= 4 then
|
|
return
|
|
end
|
|
local given_user_key = split_cookie[1]
|
|
local given_user_hash = split_cookie[2]
|
|
local given_expiry = split_cookie[3]
|
|
local given_signature = split_cookie[4]
|
|
|
|
-- expiry check
|
|
local number_expiry = tonumber(given_expiry, 10)
|
|
if number_expiry == nil or number_expiry <= core.now()['sec'] then
|
|
return
|
|
end
|
|
-- regenerate the user hash and compare it
|
|
local generated_user_hash = utils.generate_challenge(txn, captcha_cookie_secret, given_user_key, false)
|
|
if generated_user_hash ~= given_user_hash then
|
|
return
|
|
end
|
|
-- regenerate the signature and compare it
|
|
local generated_signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, given_user_key .. given_user_hash .. given_expiry)
|
|
if given_signature == generated_signature then
|
|
return txn:set_var("txn.captcha_passed", true)
|
|
end
|
|
end
|
|
|
|
-- check if pow cookie is valid
|
|
function _M.check_pow_status(txn)
|
|
local parsed_request_cookies = cookie.get_cookie_table(txn.sf:hdr("Cookie"))
|
|
local received_pow_cookie = parsed_request_cookies["_basedflare_pow"] or ""
|
|
-- split the cookie up
|
|
local split_cookie = utils.split(received_pow_cookie, "#")
|
|
if #split_cookie ~= 5 then
|
|
return
|
|
end
|
|
local given_user_key = split_cookie[1]
|
|
local given_challenge_hash = split_cookie[2]
|
|
local given_expiry = split_cookie[3]
|
|
local given_answer = split_cookie[4]
|
|
local given_signature = split_cookie[5]
|
|
|
|
-- expiry check
|
|
local number_expiry = tonumber(given_expiry, 10)
|
|
if number_expiry == nil or number_expiry <= core.now()['sec'] then
|
|
return
|
|
end
|
|
-- regenerate the challenge and compare it
|
|
local generated_challenge_hash = utils.generate_challenge(txn, pow_cookie_secret, given_user_key, false)
|
|
if given_challenge_hash ~= generated_challenge_hash then
|
|
return
|
|
end
|
|
-- regenerate the signature and compare it
|
|
local generated_signature = sha.hmac(sha.sha3_256, hmac_cookie_secret, given_user_key .. given_challenge_hash .. given_expiry .. given_answer)
|
|
if given_signature == generated_signature then
|
|
return txn:set_var("txn.pow_passed", true)
|
|
end
|
|
end
|
|
|
|
return _M
|