sermoni

"Service monitor" / cronjob status service
Log | Files | Refs

commit e0001487424dc23d4c58e179ef231afd5a5c4968
parent 20b074689d0c7ddab1069b5eda6ef4ae50eb6e64
Author: Vetle Haflan <vetle@haflan.dev>
Date:   Sun, 19 Apr 2020 22:30:28 +0200

More secure cookies and CSRF protection

- CSRF protection is now cryptosecure and put to use.
- CSRF protection is only applied to authenticated requests. For this
  single-user website there should be no risk of login attacks as
  described here: https://security.stackexchange.com/a/62772
- Cookie *secure* flag depends on whether PRODUCTION is true

Diffstat:
Minternal/http/auth.go | 43++++++++++++++++---------------------------
Minternal/http/html_dev.go | 3+++
Minternal/http/http.go | 3+++
Mui/generate.sh | 2++
4 files changed, 24 insertions(+), 27 deletions(-)

diff --git a/internal/http/auth.go b/internal/http/auth.go @@ -1,15 +1,12 @@ package http import ( + "crypto/rand" "crypto/sha256" + "encoding/hex" "encoding/json" "io/ioutil" - "math/rand" "net/http" - "strings" - "time" - - "github.com/gorilla/sessions" ) // Deal with login, logout, and general security stuff @@ -28,11 +25,11 @@ const ( // It then returns an object on the form {"auth": true, "csrftoken": "<long string>"} // This is requested immediately when the website is loaded. func initHandler(w http.ResponseWriter, r *http.Request) { - session, _ := store.Get(r, "session") + session, _ := store.Get(r, keySessionName) val := session.Values[keyCSRFToken] token, ok := val.(string) if !ok { - token = temporary32CharRandomString() + token = generateCSRFToken() session.Values[keyCSRFToken] = token session.Save(r, w) // TODO: Error handling, as always } @@ -41,14 +38,13 @@ func initHandler(w http.ResponseWriter, r *http.Request) { Authenticated bool `json:"authenticated"` }{ token, - authorized(session), + authorized(r), }) w.Write(b) } func loginHandler(w http.ResponseWriter, r *http.Request) { - session, _ := store.Get(r, keySessionName) - if authorized(session) { + if authorized(r) { return } defer r.Body.Close() // needed? @@ -59,6 +55,7 @@ func loginHandler(w http.ResponseWriter, r *http.Request) { passphrase := data[keyPassphrase] passhash := sha256.Sum256([]byte(passphrase)) if string(passhash[:]) == string(conf.PassHash) { + session, _ := store.Get(r, keySessionName) session.Values[keyAuthenticated] = true err = session.Save(r, w) check(err) @@ -76,7 +73,8 @@ func logoutHandler(w http.ResponseWriter, r *http.Request) { w.Write([]byte("Logged out")) } -func authorized(session *sessions.Session) bool { +func authorized(r *http.Request) bool { + session, _ := store.Get(r, keySessionName) val := session.Values[keyAuthenticated] auth, ok := val.(bool) return ok && auth @@ -86,8 +84,7 @@ func authorized(session *sessions.Session) bool { func auth(handler http.HandlerFunc) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { // store is the global CookieStore - session, _ := store.Get(r, keySessionName) - if !authorized(session) { + if !authorized(r) || !csrfCheckPassed(r) { status := http.StatusUnauthorized http.Error(w, http.StatusText(status), status) return @@ -96,7 +93,8 @@ func auth(handler http.HandlerFunc) http.Handler { }) } -func csrfCheckPassed(r *http.Request, session *sessions.Session) bool { +func csrfCheckPassed(r *http.Request) bool { + session, _ := store.Get(r, keySessionName) // CSRF protect anything but GET requests if r.Method == http.MethodGet { return true @@ -113,17 +111,8 @@ func csrfCheckPassed(r *http.Request, session *sessions.Session) bool { } } -// not cryptosecure, only for testing! -// thanks: https://yourbasic.org/golang/generate-random-string/ -func temporary32CharRandomString() string { - rand.Seed(time.Now().UnixNano()) - chars := []rune("ABCDEFGHIJKLMNOPQRSTUVWXYZ" + - "abcdefghijklmnopqrstuvwxyz" + - "0123456789") - length := 32 - var b strings.Builder - for i := 0; i < length; i++ { - b.WriteRune(chars[rand.Intn(len(chars))]) - } - return b.String() +func generateCSRFToken() string { + randBytes := make([]byte, 32) + rand.Read(randBytes) + return hex.EncodeToString(randBytes) } diff --git a/internal/http/html_dev.go b/internal/http/html_dev.go @@ -4,6 +4,9 @@ package http import "io/ioutil" +// Can't use secure cookies in dev mode +const PRODUCTION = false; + // In production mode, the website is embedded in (generated) code // In dev mode it's more useful to read the html file on every request func getWebsite() []byte { diff --git a/internal/http/http.go b/internal/http/http.go @@ -19,6 +19,9 @@ var store *sessions.CookieStore func StartServer(port int) { conf = config.GetConfig() store = sessions.NewCookieStore(conf.SessionKey) + store.Options.MaxAge = 604800; + store.Options.HttpOnly = true; + store.Options.Secure = PRODUCTION; // Found in html.go / html_dev.go router := mux.NewRouter() router.HandleFunc("/", homeHandler) diff --git a/ui/generate.sh b/ui/generate.sh @@ -26,6 +26,8 @@ cat <<EOF > $HTML_GO package http +const PRODUCTION = true; + func getWebsite() []byte { return []byte(\` $(cat $HTML_GO)