mirror of
https://github.com/apache/httpd.git
synced 2026-01-23 18:21:32 +03:00
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@95151 13f79535-47bb-0310-9956-ffa450edef68
347 lines
9.7 KiB
C
347 lines
9.7 KiB
C
/* ====================================================================
|
|
* The Apache Software License, Version 1.1
|
|
*
|
|
* Copyright (c) 2000-2002 The Apache Software Foundation. All rights
|
|
* reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. The end-user documentation included with the redistribution,
|
|
* if any, must include the following acknowledgment:
|
|
* "This product includes software developed by the
|
|
* Apache Software Foundation (http://www.apache.org/)."
|
|
* Alternately, this acknowledgment may appear in the software itself,
|
|
* if and wherever such third-party acknowledgments normally appear.
|
|
*
|
|
* 4. The names "Apache" and "Apache Software Foundation" must
|
|
* not be used to endorse or promote products derived from this
|
|
* software without prior written permission. For written
|
|
* permission, please contact apache@apache.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "Apache",
|
|
* nor may "Apache" appear in their name, without prior written
|
|
* permission of the Apache Software Foundation.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
|
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
* This software consists of voluntary contributions made by many
|
|
* individuals on behalf of the Apache Software Foundation. For more
|
|
* information on the Apache Software Foundation, please see
|
|
* <http://www.apache.org/>.
|
|
*
|
|
* Portions of this software are based upon public domain software
|
|
* originally written at the National Center for Supercomputing Applications,
|
|
* University of Illinois, Urbana-Champaign.
|
|
*/
|
|
|
|
/*
|
|
* Security options etc.
|
|
*
|
|
* Module derived from code originally written by Rob McCool
|
|
*
|
|
*/
|
|
|
|
#include "apr_strings.h"
|
|
#include "apr_network_io.h"
|
|
#include "apr_lib.h"
|
|
|
|
#define APR_WANT_STRFUNC
|
|
#define APR_WANT_BYTEFUNC
|
|
#include "apr_want.h"
|
|
|
|
#include "ap_config.h"
|
|
#include "httpd.h"
|
|
#include "http_core.h"
|
|
#include "http_config.h"
|
|
#include "http_log.h"
|
|
#include "http_request.h"
|
|
|
|
#if APR_HAVE_NETINET_IN_H
|
|
#include <netinet/in.h>
|
|
#endif
|
|
|
|
enum allowdeny_type {
|
|
T_ENV,
|
|
T_ALL,
|
|
T_IP,
|
|
T_HOST,
|
|
T_FAIL
|
|
};
|
|
|
|
typedef struct {
|
|
apr_int64_t limited;
|
|
union {
|
|
char *from;
|
|
apr_ipsubnet_t *ip;
|
|
} x;
|
|
enum allowdeny_type type;
|
|
} allowdeny;
|
|
|
|
/* things in the 'order' array */
|
|
#define DENY_THEN_ALLOW 0
|
|
#define ALLOW_THEN_DENY 1
|
|
#define MUTUAL_FAILURE 2
|
|
|
|
typedef struct {
|
|
int order[METHODS];
|
|
apr_array_header_t *allows;
|
|
apr_array_header_t *denys;
|
|
} access_dir_conf;
|
|
|
|
module AP_MODULE_DECLARE_DATA access_module;
|
|
|
|
static void *create_access_dir_config(apr_pool_t *p, char *dummy)
|
|
{
|
|
int i;
|
|
access_dir_conf *conf =
|
|
(access_dir_conf *)apr_pcalloc(p, sizeof(access_dir_conf));
|
|
|
|
for (i = 0; i < METHODS; ++i) {
|
|
conf->order[i] = DENY_THEN_ALLOW;
|
|
}
|
|
conf->allows = apr_array_make(p, 1, sizeof(allowdeny));
|
|
conf->denys = apr_array_make(p, 1, sizeof(allowdeny));
|
|
|
|
return (void *)conf;
|
|
}
|
|
|
|
static const char *order(cmd_parms *cmd, void *dv, const char *arg)
|
|
{
|
|
access_dir_conf *d = (access_dir_conf *) dv;
|
|
int i, o;
|
|
|
|
if (!strcasecmp(arg, "allow,deny"))
|
|
o = ALLOW_THEN_DENY;
|
|
else if (!strcasecmp(arg, "deny,allow"))
|
|
o = DENY_THEN_ALLOW;
|
|
else if (!strcasecmp(arg, "mutual-failure"))
|
|
o = MUTUAL_FAILURE;
|
|
else
|
|
return "unknown order";
|
|
|
|
for (i = 0; i < METHODS; ++i)
|
|
if (cmd->limited & (AP_METHOD_BIT << i))
|
|
d->order[i] = o;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static const char *allow_cmd(cmd_parms *cmd, void *dv, const char *from,
|
|
const char *where_c)
|
|
{
|
|
access_dir_conf *d = (access_dir_conf *) dv;
|
|
allowdeny *a;
|
|
char *where = apr_pstrdup(cmd->pool, where_c);
|
|
char *s;
|
|
char msgbuf[120];
|
|
apr_status_t rv;
|
|
|
|
if (strcasecmp(from, "from"))
|
|
return "allow and deny must be followed by 'from'";
|
|
|
|
a = (allowdeny *) apr_array_push(cmd->info ? d->allows : d->denys);
|
|
a->x.from = where;
|
|
a->limited = cmd->limited;
|
|
|
|
if (!strncasecmp(where, "env=", 4)) {
|
|
a->type = T_ENV;
|
|
a->x.from += 4;
|
|
|
|
}
|
|
else if (!strcasecmp(where, "all")) {
|
|
a->type = T_ALL;
|
|
}
|
|
else if ((s = strchr(where, '/'))) {
|
|
*s++ = '\0';
|
|
rv = apr_ipsubnet_create(&a->x.ip, where, s, cmd->pool);
|
|
if(APR_STATUS_IS_EINVAL(rv)) {
|
|
/* looked nothing like an IP address */
|
|
return "An IP address was expected";
|
|
}
|
|
else if (rv != APR_SUCCESS) {
|
|
apr_strerror(rv, msgbuf, sizeof msgbuf);
|
|
return apr_pstrdup(cmd->pool, msgbuf);
|
|
}
|
|
a->type = T_IP;
|
|
}
|
|
else if (!APR_STATUS_IS_EINVAL(rv = apr_ipsubnet_create(&a->x.ip, where, NULL, cmd->pool))) {
|
|
if (rv != APR_SUCCESS) {
|
|
apr_strerror(rv, msgbuf, sizeof msgbuf);
|
|
return apr_pstrdup(cmd->pool, msgbuf);
|
|
}
|
|
a->type = T_IP;
|
|
}
|
|
else { /* no slash, didn't look like an IP address => must be a host */
|
|
a->type = T_HOST;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static char its_an_allow;
|
|
|
|
static const command_rec access_cmds[] =
|
|
{
|
|
AP_INIT_TAKE1("order", order, NULL, OR_LIMIT,
|
|
"'allow,deny', 'deny,allow', or 'mutual-failure'"),
|
|
AP_INIT_ITERATE2("allow", allow_cmd, &its_an_allow, OR_LIMIT,
|
|
"'from' followed by hostnames or IP-address wildcards"),
|
|
AP_INIT_ITERATE2("deny", allow_cmd, NULL, OR_LIMIT,
|
|
"'from' followed by hostnames or IP-address wildcards"),
|
|
{NULL}
|
|
};
|
|
|
|
static int in_domain(const char *domain, const char *what)
|
|
{
|
|
int dl = strlen(domain);
|
|
int wl = strlen(what);
|
|
|
|
if ((wl - dl) >= 0) {
|
|
if (strcasecmp(domain, &what[wl - dl]) != 0)
|
|
return 0;
|
|
|
|
/* Make sure we matched an *entire* subdomain --- if the user
|
|
* said 'allow from good.com', we don't want people from nogood.com
|
|
* to be able to get in.
|
|
*/
|
|
|
|
if (wl == dl)
|
|
return 1; /* matched whole thing */
|
|
else
|
|
return (domain[0] == '.' || what[wl - dl - 1] == '.');
|
|
}
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
static int find_allowdeny(request_rec *r, apr_array_header_t *a, int method)
|
|
{
|
|
|
|
allowdeny *ap = (allowdeny *) a->elts;
|
|
apr_int64_t mmask = (AP_METHOD_BIT << method);
|
|
int i;
|
|
int gothost = 0;
|
|
const char *remotehost = NULL;
|
|
|
|
for (i = 0; i < a->nelts; ++i) {
|
|
if (!(mmask & ap[i].limited))
|
|
continue;
|
|
|
|
switch (ap[i].type) {
|
|
case T_ENV:
|
|
if (apr_table_get(r->subprocess_env, ap[i].x.from)) {
|
|
return 1;
|
|
}
|
|
break;
|
|
|
|
case T_ALL:
|
|
return 1;
|
|
|
|
case T_IP:
|
|
if (apr_ipsubnet_test(ap[i].x.ip, r->connection->remote_addr)) {
|
|
return 1;
|
|
}
|
|
break;
|
|
|
|
case T_HOST:
|
|
if (!gothost) {
|
|
int remotehost_is_ip;
|
|
|
|
remotehost = ap_get_remote_host(r->connection, r->per_dir_config,
|
|
REMOTE_DOUBLE_REV, &remotehost_is_ip);
|
|
|
|
if ((remotehost == NULL) || remotehost_is_ip)
|
|
gothost = 1;
|
|
else
|
|
gothost = 2;
|
|
}
|
|
|
|
if ((gothost == 2) && in_domain(ap[i].x.from, remotehost))
|
|
return 1;
|
|
break;
|
|
|
|
case T_FAIL:
|
|
/* do nothing? */
|
|
break;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int check_dir_access(request_rec *r)
|
|
{
|
|
int method = r->method_number;
|
|
int ret = OK;
|
|
access_dir_conf *a = (access_dir_conf *)
|
|
ap_get_module_config(r->per_dir_config, &access_module);
|
|
|
|
if (a->order[method] == ALLOW_THEN_DENY) {
|
|
ret = HTTP_FORBIDDEN;
|
|
if (find_allowdeny(r, a->allows, method))
|
|
ret = OK;
|
|
if (find_allowdeny(r, a->denys, method))
|
|
ret = HTTP_FORBIDDEN;
|
|
}
|
|
else if (a->order[method] == DENY_THEN_ALLOW) {
|
|
if (find_allowdeny(r, a->denys, method))
|
|
ret = HTTP_FORBIDDEN;
|
|
if (find_allowdeny(r, a->allows, method))
|
|
ret = OK;
|
|
}
|
|
else {
|
|
if (find_allowdeny(r, a->allows, method)
|
|
&& !find_allowdeny(r, a->denys, method))
|
|
ret = OK;
|
|
else
|
|
ret = HTTP_FORBIDDEN;
|
|
}
|
|
|
|
if (ret == HTTP_FORBIDDEN
|
|
&& (ap_satisfies(r) != SATISFY_ANY || !ap_some_auth_required(r))) {
|
|
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
|
"client denied by server configuration: %s",
|
|
r->filename);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void register_hooks(apr_pool_t *p)
|
|
{
|
|
ap_hook_access_checker(check_dir_access,NULL,NULL,APR_HOOK_MIDDLE);
|
|
}
|
|
|
|
module AP_MODULE_DECLARE_DATA access_module =
|
|
{
|
|
STANDARD20_MODULE_STUFF,
|
|
create_access_dir_config, /* dir config creater */
|
|
NULL, /* dir merger --- default is to override */
|
|
NULL, /* server config */
|
|
NULL, /* merge server config */
|
|
access_cmds,
|
|
register_hooks /* register hooks */
|
|
};
|