1162 lines
38 KiB
C
1162 lines
38 KiB
C
/*
|
|
* NAXSI, a web application firewall for NGINX
|
|
* Copyright (C) 2016, Thibault 'bui' Koechlin
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* In addition, as a special exception, the copyright holders give
|
|
* permission to link the code of portions of this program with the
|
|
* OpenSSL library under certain conditions as described in each
|
|
* individual source file, and distribute linked combinations
|
|
* including the two.
|
|
* You must obey the GNU General Public License in all respects
|
|
* for all of the code used other than OpenSSL. If you modify
|
|
* file(s) with this exception, you may extend this exception to your
|
|
* version of the file(s), but you are not obligated to do so. If you
|
|
* do not wish to do so, delete this exception statement from your
|
|
* version. If you delete this exception statement from all source
|
|
* files in the program, then also delete it here.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
/*
|
|
** This files contains skeleton functions,
|
|
** such as registred handlers. Readers already
|
|
** aware of nginx's modules can skip most of this.
|
|
*/
|
|
|
|
#include "naxsi.h"
|
|
#include <sys/times.h>
|
|
#include <ctype.h>
|
|
|
|
/*
|
|
** Macro used to print incorrect configuration lines
|
|
*/
|
|
#define ngx_http_dummy_line_conf_error(cf, value) do { \
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, \
|
|
"Naxsi-Config : Incorrect line %V %V (%s/%d)...", \
|
|
&(value[0]), &(value[1]), __FILE__, __LINE__); \
|
|
} while (0)
|
|
|
|
|
|
/*
|
|
** Module's registred function/handlers.
|
|
*/
|
|
static ngx_int_t ngx_http_dummy_access_handler(ngx_http_request_t *r);
|
|
static char *ngx_http_dummy_read_main_conf(ngx_conf_t *cf,
|
|
ngx_command_t *cmd,
|
|
void *conf);
|
|
static ngx_int_t ngx_http_dummy_init(ngx_conf_t *cf);
|
|
static char *ngx_http_dummy_read_conf(ngx_conf_t *cf,
|
|
ngx_command_t *cmd,
|
|
void *conf);
|
|
|
|
static char *ngx_http_naxsi_cr_loc_conf(ngx_conf_t *cf,
|
|
ngx_command_t *cmd,
|
|
void *conf);
|
|
|
|
static char *ngx_http_naxsi_ud_loc_conf(ngx_conf_t *cf,
|
|
ngx_command_t *cmd,
|
|
void *conf);
|
|
|
|
static char *ngx_http_naxsi_flags_loc_conf(ngx_conf_t *cf,
|
|
ngx_command_t *cmd,
|
|
void *conf);
|
|
|
|
static void *ngx_http_dummy_create_loc_conf(ngx_conf_t *cf);
|
|
static char *ngx_http_dummy_merge_loc_conf(ngx_conf_t *cf,
|
|
void *parent,
|
|
void *child);
|
|
void *ngx_http_dummy_create_main_conf(ngx_conf_t *cf);
|
|
void ngx_http_dummy_payload_handler(ngx_http_request_t *r);
|
|
|
|
|
|
/* command handled by the module */
|
|
static ngx_command_t ngx_http_dummy_commands[] = {
|
|
/* BasicRule (in main) */
|
|
{ ngx_string(TOP_MAIN_BASIC_RULE_T),
|
|
NGX_HTTP_MAIN_CONF|NGX_CONF_1MORE,
|
|
ngx_http_dummy_read_main_conf,
|
|
NGX_HTTP_MAIN_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* BasicRule (in main) - nginx style */
|
|
{ ngx_string(TOP_MAIN_BASIC_RULE_N),
|
|
NGX_HTTP_MAIN_CONF|NGX_CONF_1MORE,
|
|
ngx_http_dummy_read_main_conf,
|
|
NGX_HTTP_MAIN_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* BasicRule (in loc) */
|
|
{ ngx_string(TOP_BASIC_RULE_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF|NGX_CONF_1MORE,
|
|
ngx_http_dummy_read_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* BasicRule (in loc) - nginx style */
|
|
{ ngx_string(TOP_BASIC_RULE_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF|NGX_CONF_1MORE,
|
|
ngx_http_dummy_read_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* DeniedUrl */
|
|
{ ngx_string(TOP_DENIED_URL_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_1MORE,
|
|
ngx_http_naxsi_ud_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* DeniedUrl - nginx style */
|
|
{ ngx_string(TOP_DENIED_URL_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_1MORE,
|
|
ngx_http_naxsi_ud_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* CheckRule */
|
|
{ ngx_string(TOP_CHECK_RULE_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_1MORE,
|
|
ngx_http_naxsi_cr_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* CheckRule - nginx style*/
|
|
{ ngx_string(TOP_CHECK_RULE_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_1MORE,
|
|
ngx_http_naxsi_cr_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
/*
|
|
** flag rules
|
|
*/
|
|
|
|
/* Learning Flag */
|
|
{ ngx_string(TOP_LEARNING_FLAG_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* Learning Flag (nginx style) */
|
|
{ ngx_string(TOP_LEARNING_FLAG_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* EnableFlag */
|
|
{ ngx_string(TOP_ENABLED_FLAG_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* EnableFlag (nginx style) */
|
|
{ ngx_string(TOP_ENABLED_FLAG_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* DisableFlag */
|
|
{ ngx_string(TOP_DISABLED_FLAG_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* DisableFlag (nginx style) */
|
|
{ ngx_string(TOP_DISABLED_FLAG_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* LibInjectionSql */
|
|
{ ngx_string(TOP_LIBINJECTION_SQL_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* LibInjectionSql (nginx style) */
|
|
{ ngx_string(TOP_LIBINJECTION_SQL_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* LibInjectionXss */
|
|
{ ngx_string(TOP_LIBINJECTION_XSS_T),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
/* LibInjectionXss (nginx style) */
|
|
{ ngx_string(TOP_LIBINJECTION_XSS_N),
|
|
NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF
|
|
|NGX_CONF_NOARGS,
|
|
ngx_http_naxsi_flags_loc_conf,
|
|
NGX_HTTP_LOC_CONF_OFFSET,
|
|
0,
|
|
NULL },
|
|
|
|
ngx_null_command
|
|
};
|
|
|
|
/*
|
|
** handlers for configuration phases of the module
|
|
*/
|
|
|
|
static ngx_http_module_t ngx_http_dummy_module_ctx = {
|
|
NULL, /* preconfiguration */
|
|
ngx_http_dummy_init, /* postconfiguration */
|
|
ngx_http_dummy_create_main_conf, /* create main configuration */
|
|
NULL, /* init main configuration */
|
|
NULL, /* create server configuration */
|
|
NULL, /* merge server configuration */
|
|
ngx_http_dummy_create_loc_conf, /* create location configuration */
|
|
ngx_http_dummy_merge_loc_conf /* merge location configuration */
|
|
};
|
|
|
|
|
|
ngx_module_t ngx_http_naxsi_module = {
|
|
NGX_MODULE_V1,
|
|
&ngx_http_dummy_module_ctx, /* module context */
|
|
ngx_http_dummy_commands, /* module directives */
|
|
NGX_HTTP_MODULE, /* module type */
|
|
NULL, /* init master */
|
|
NULL, /* init module */
|
|
NULL, /* init process */
|
|
NULL, /* init thread */
|
|
NULL, /* exit thread */
|
|
NULL, /* exit process */
|
|
NULL, /* exit master */
|
|
NGX_MODULE_V1_PADDING
|
|
};
|
|
|
|
#define DEFAULT_MAX_LOC_T 10
|
|
|
|
void *
|
|
ngx_http_dummy_create_main_conf(ngx_conf_t *cf)
|
|
{
|
|
ngx_http_dummy_main_conf_t *mc;
|
|
|
|
mc = ngx_pcalloc(cf->pool, sizeof(ngx_http_dummy_main_conf_t));
|
|
if (!mc)
|
|
return (NGX_CONF_ERROR); /*LCOV_EXCL_LINE*/
|
|
mc->locations = ngx_array_create(cf->pool, DEFAULT_MAX_LOC_T,
|
|
sizeof(ngx_http_dummy_loc_conf_t *));
|
|
if (!mc->locations)
|
|
return (NGX_CONF_ERROR); /*LCOV_EXCL_LINE*/
|
|
return (mc);
|
|
}
|
|
|
|
|
|
/* create log conf struct */
|
|
static void *
|
|
ngx_http_dummy_create_loc_conf(ngx_conf_t *cf)
|
|
{
|
|
ngx_http_dummy_loc_conf_t *conf;
|
|
|
|
conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_dummy_loc_conf_t));
|
|
if (conf == NULL)
|
|
return NULL;
|
|
return (conf);
|
|
}
|
|
|
|
/* merge loc conf */
|
|
/* NOTE/WARNING : This function wasn't tested correctly.
|
|
Actually, we shouldn't merge anything, as configuration is
|
|
specific 'per' location ? */
|
|
static char *
|
|
ngx_http_dummy_merge_loc_conf(ngx_conf_t *cf, void *parent,
|
|
void *child)
|
|
{
|
|
ngx_http_dummy_loc_conf_t *prev = parent;
|
|
ngx_http_dummy_loc_conf_t *conf = child;
|
|
|
|
if (conf->whitelist_rules == NULL)
|
|
conf->whitelist_rules = prev->whitelist_rules;
|
|
if (conf->check_rules == NULL)
|
|
conf->check_rules = prev->check_rules;
|
|
if (conf->body_rules == NULL)
|
|
conf->body_rules = prev->body_rules;
|
|
if (conf->header_rules == NULL)
|
|
conf->header_rules = prev->header_rules;
|
|
if (conf->generic_rules == NULL)
|
|
conf->generic_rules = prev->generic_rules;
|
|
return NGX_CONF_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
** This function sets up handlers for ACCESS_PHASE,
|
|
** and will call the hashtable creation function
|
|
** (whitelist aggregation)
|
|
*/
|
|
static ngx_int_t
|
|
ngx_http_dummy_init(ngx_conf_t *cf)
|
|
{
|
|
ngx_http_handler_pt *h;
|
|
ngx_http_core_main_conf_t *cmcf;
|
|
ngx_http_dummy_main_conf_t *main_cf;
|
|
ngx_http_dummy_loc_conf_t **loc_cf;
|
|
unsigned int i;
|
|
|
|
cmcf = ngx_http_conf_get_module_main_conf(cf, ngx_http_core_module);
|
|
main_cf = ngx_http_conf_get_module_main_conf(cf, ngx_http_naxsi_module);
|
|
if (cmcf == NULL ||
|
|
main_cf == NULL)
|
|
return (NGX_ERROR); /*LCOV_EXCL_LINE*/
|
|
|
|
/* Register for access phase */
|
|
h = ngx_array_push(&cmcf->phases[NGX_HTTP_REWRITE_PHASE].handlers);
|
|
if (h == NULL)
|
|
return (NGX_ERROR); /*LCOV_EXCL_LINE*/
|
|
|
|
*h = ngx_http_dummy_access_handler;
|
|
/* Go with each locations registred in the srv_conf. */
|
|
loc_cf = main_cf->locations->elts;
|
|
|
|
for (i = 0; i < main_cf->locations->nelts; i++) {
|
|
if (loc_cf[i]->enabled && (!loc_cf[i]->denied_url || loc_cf[i]->denied_url->len <= 0)) {
|
|
/* LCOV_EXCL_START */
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
|
|
"Missing DeniedURL, abort.");
|
|
return (NGX_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
loc_cf[i]->flag_enable_h = ngx_hash_key_lc((u_char *)RT_ENABLE, strlen(RT_ENABLE));
|
|
loc_cf[i]->flag_learning_h = ngx_hash_key_lc((u_char *)RT_LEARNING, strlen(RT_LEARNING));
|
|
loc_cf[i]->flag_post_action_h = ngx_hash_key_lc((u_char *)RT_POST_ACTION, strlen(RT_POST_ACTION));
|
|
loc_cf[i]->flag_extensive_log_h = ngx_hash_key_lc((u_char *)RT_EXTENSIVE_LOG, strlen(RT_EXTENSIVE_LOG));
|
|
loc_cf[i]->flag_libinjection_xss_h = ngx_hash_key_lc((u_char *)RT_LIBINJECTION_XSS, strlen(RT_LIBINJECTION_XSS));
|
|
loc_cf[i]->flag_libinjection_sql_h = ngx_hash_key_lc((u_char *)RT_LIBINJECTION_SQL, strlen(RT_LIBINJECTION_SQL));
|
|
|
|
if(ngx_http_dummy_create_hashtables_n(loc_cf[i], cf) != NGX_OK) {
|
|
/* LCOV_EXCL_START */
|
|
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
|
|
"WhiteList Hash building failed");
|
|
return (NGX_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
}
|
|
|
|
/* initialize prng (used for fragmented logs) */
|
|
srandom(time(0) * getpid());
|
|
|
|
/*
|
|
** initalise internal rules for libinjection sqli/xss
|
|
** (needs proper special scores)
|
|
*/
|
|
nx_int__libinject_sql = ngx_pcalloc(cf->pool, sizeof(ngx_http_rule_t));
|
|
nx_int__libinject_xss = ngx_pcalloc(cf->pool, sizeof(ngx_http_rule_t));
|
|
if (!nx_int__libinject_xss || !nx_int__libinject_sql) return (NGX_ERROR);
|
|
nx_int__libinject_sql->sscores = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_special_score_t));
|
|
nx_int__libinject_xss->sscores = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_special_score_t));
|
|
if (!nx_int__libinject_sql->sscores || !nx_int__libinject_xss->sscores ) return (NGX_ERROR); /* LCOV_EXCL_LINE */
|
|
/* internal ID sqli - 17*/
|
|
nx_int__libinject_sql->rule_id = 17;
|
|
/* internal ID xss - 18*/
|
|
nx_int__libinject_xss->rule_id = 18;
|
|
/* libinjection sqli/xss - special score init */
|
|
ngx_http_special_score_t *libjct_sql = ngx_array_push(nx_int__libinject_sql->sscores);
|
|
ngx_http_special_score_t *libjct_xss = ngx_array_push(nx_int__libinject_xss->sscores);
|
|
if (!libjct_sql || !libjct_xss) return (NGX_ERROR); /* LCOV_EXCL_LINE */
|
|
libjct_sql->sc_tag = ngx_pcalloc(cf->pool, sizeof(ngx_str_t));
|
|
libjct_xss->sc_tag = ngx_pcalloc(cf->pool, sizeof(ngx_str_t));
|
|
if (!libjct_sql->sc_tag || !libjct_xss->sc_tag) return (NGX_ERROR); /* LCOV_EXCL_LINE */
|
|
libjct_sql->sc_tag->data = ngx_pcalloc(cf->pool, 18 /* LIBINJECTION_SQL */);
|
|
libjct_xss->sc_tag->data = ngx_pcalloc(cf->pool, 18 /* LIBINJECTION_XSS */);
|
|
if (!libjct_sql->sc_tag->data || !libjct_xss->sc_tag->data) return (NGX_ERROR); /* LCOV_EXCL_LINE */
|
|
strncpy((char *)libjct_sql->sc_tag->data, (char *)"$LIBINJECTION_SQL", 17);
|
|
strncpy((char *)libjct_xss->sc_tag->data, (char *)"$LIBINJECTION_XSS", 17);
|
|
libjct_xss->sc_tag->len = 17;
|
|
libjct_sql->sc_tag->len = 17;
|
|
libjct_sql->sc_score = 8;
|
|
libjct_xss->sc_score = 8;
|
|
|
|
|
|
return (NGX_OK);
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
** my hugly configuration parsing function.
|
|
** should be rewritten, cause code is hugly and not bof proof at all
|
|
** does : top level parsing config function,
|
|
** see foo_cfg_parse.c for stuff
|
|
*/
|
|
static char *
|
|
ngx_http_dummy_read_conf(ngx_conf_t *cf, ngx_command_t *cmd,
|
|
void *conf)
|
|
{
|
|
ngx_http_dummy_loc_conf_t *alcf = conf, **bar;
|
|
|
|
ngx_http_dummy_main_conf_t *main_cf;
|
|
ngx_str_t *value;
|
|
ngx_http_rule_t rule, *rule_r;
|
|
|
|
#ifdef _debug_readconf
|
|
if (cf) {
|
|
value = cf->args->elts;
|
|
NX_LOG_DEBUG(_debug_readconf, NGX_LOG_EMERG, cf, 0, "TOP READ CONF %V %V",
|
|
&(value[0]), &(value[1]));
|
|
}
|
|
#endif
|
|
if (!alcf || !cf)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
value = cf->args->elts;
|
|
main_cf = ngx_http_conf_get_module_main_conf(cf, ngx_http_naxsi_module);
|
|
if (!alcf->pushed) {
|
|
bar = ngx_array_push(main_cf->locations);
|
|
if (!bar)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
*bar = alcf;
|
|
alcf->pushed = 1;
|
|
}
|
|
/*
|
|
** if it's a basic rule
|
|
*/
|
|
if (!ngx_strcmp(value[0].data, TOP_BASIC_RULE_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_BASIC_RULE_N)) {
|
|
memset(&rule, 0, sizeof(ngx_http_rule_t));
|
|
if (ngx_http_dummy_cfg_parse_one_rule(cf, value, &rule,
|
|
cf->args->nelts) != NGX_CONF_OK)
|
|
{
|
|
/* LCOV_EXCL_START */
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
/* push in whitelist rules, as it have a whitelist ID array */
|
|
if (rule.wlid_array && rule.wlid_array->nelts > 0) {
|
|
if (alcf->whitelist_rules == NULL) {
|
|
alcf->whitelist_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->whitelist_rules == NULL) {
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
}
|
|
rule_r = ngx_array_push(alcf->whitelist_rules);
|
|
if (!rule_r) {
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
}
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* else push in appropriate ruleset : it's a normal rule */
|
|
else {
|
|
if (rule.br->headers || rule.br->headers_var) {
|
|
if (alcf->header_rules == NULL) {
|
|
alcf->header_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->header_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->header_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in body match rules (POST/PUT) */
|
|
if (rule.br->body || rule.br->body_var) {
|
|
if (alcf->body_rules == NULL) {
|
|
alcf->body_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->body_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->body_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in raw body match rules (POST/PUT) */
|
|
if (rule.br->raw_body) {
|
|
NX_LOG_DEBUG(_debug_readconf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in (read conf) raw_body rules", rule.rule_id);
|
|
if (alcf->raw_body_rules == NULL) {
|
|
alcf->raw_body_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->raw_body_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->raw_body_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in generic rules, as it's matching the URI */
|
|
if (rule.br->url) {
|
|
NX_LOG_DEBUG(_debug_readconf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in generic rules",
|
|
rule.rule_id);
|
|
if (alcf->generic_rules == NULL) {
|
|
alcf->generic_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->generic_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->generic_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in GET arg rules, but we should push in POST rules too */
|
|
if (rule.br->args_var || rule.br->args) {
|
|
NX_LOG_DEBUG(_debug_readconf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in GET rules", rule.rule_id);
|
|
if (alcf->get_rules == NULL) {
|
|
alcf->get_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->get_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->get_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
}
|
|
return (NGX_CONF_OK);
|
|
}
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
}
|
|
|
|
|
|
static char *
|
|
ngx_http_naxsi_cr_loc_conf(ngx_conf_t *cf, ngx_command_t *cmd,
|
|
void *conf)
|
|
{
|
|
|
|
ngx_http_dummy_loc_conf_t *alcf = conf, **bar;
|
|
ngx_http_dummy_main_conf_t *main_cf;
|
|
ngx_str_t *value;
|
|
ngx_http_check_rule_t *rule_c;
|
|
unsigned int i;
|
|
u_char *var_end;
|
|
|
|
|
|
|
|
if (!alcf || !cf)
|
|
return (NGX_CONF_ERROR);
|
|
value = cf->args->elts;
|
|
main_cf = ngx_http_conf_get_module_main_conf(cf, ngx_http_naxsi_module);
|
|
if (!alcf->pushed) {
|
|
bar = ngx_array_push(main_cf->locations);
|
|
if (!bar)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
*bar = alcf;
|
|
alcf->pushed = 1;
|
|
}
|
|
|
|
if (ngx_strcmp(value[0].data, TOP_CHECK_RULE_T) &&
|
|
ngx_strcmp(value[0].data, TOP_CHECK_RULE_N))
|
|
return (NGX_CONF_ERROR);
|
|
|
|
/* #ifdef _debug_readconf */
|
|
/* ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, */
|
|
/* "pushing rule %d in check rules", rule.rule_id); */
|
|
/* #endif */
|
|
|
|
i = 0;
|
|
if (!alcf->check_rules)
|
|
alcf->check_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_check_rule_t));
|
|
if (!alcf->check_rules)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
rule_c = ngx_array_push(alcf->check_rules);
|
|
if (!rule_c) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memset(rule_c, 0, sizeof(ngx_http_check_rule_t));
|
|
/* process the first word : score rule */
|
|
if (value[1].data[i] == '$') {
|
|
var_end = (u_char *) ngx_strchr((value[1].data)+i, ' ');
|
|
if (!var_end) { /* LCOV_EXCL_START */
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
rule_c->sc_tag.len = var_end - value[1].data;
|
|
rule_c->sc_tag.data = ngx_pcalloc(cf->pool, rule_c->sc_tag.len + 1);
|
|
if (!rule_c->sc_tag.data)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_c->sc_tag.data, value[1].data, rule_c->sc_tag.len);
|
|
i += rule_c->sc_tag.len + 1;
|
|
} else {
|
|
/* LCOV_EXCL_START */
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
// move to next word
|
|
while (value[1].data[i] && value[1].data[i] == ' ')
|
|
i++;
|
|
// get the comparison type
|
|
if (value[1].data[i] == '>' && value[1].data[i+1] == '=')
|
|
rule_c->cmp = SUP_OR_EQUAL;
|
|
else if (value[1].data[i] == '>' && value[1].data[i+1] != '=')
|
|
rule_c->cmp = SUP;
|
|
else if (value[1].data[i] == '<' && value[1].data[i+1] == '=')
|
|
rule_c->cmp = INF_OR_EQUAL;
|
|
else if (value[1].data[i] == '<' && value[1].data[i+1] != '=')
|
|
rule_c->cmp = INF;
|
|
else {
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
}
|
|
// move to next word
|
|
while (value[1].data[i] && !(value[1].data[i] >= '0' &&
|
|
value[1].data[i] <= '9') && (value[1].data[i] != '-'))
|
|
i++;
|
|
NX_LOG_DEBUG(_debug_readconf, NGX_LOG_EMERG, cf, 0,
|
|
"XX-special score in checkrule:%s from (%d)",
|
|
value[1].data, atoi((const char *)value[1].data+i));
|
|
// get the score
|
|
rule_c->sc_score = atoi((const char *)(value[1].data+i));
|
|
/* process the second word : Action rule */
|
|
if (ngx_strstr(value[2].data, "BLOCK"))
|
|
rule_c->block = 1;
|
|
else if (ngx_strstr(value[2].data,"ALLOW"))
|
|
rule_c->allow = 1;
|
|
else if (ngx_strstr(value[2].data, "LOG"))
|
|
rule_c->log = 1;
|
|
else if (ngx_strstr(value[2].data, "DROP"))
|
|
rule_c->drop = 1;
|
|
else {
|
|
/* LCOV_EXCL_START */
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
return (NGX_CONF_OK);
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
** URL denied
|
|
*/
|
|
static char *
|
|
ngx_http_naxsi_ud_loc_conf(ngx_conf_t *cf, ngx_command_t *cmd,
|
|
void *conf)
|
|
{
|
|
ngx_http_dummy_loc_conf_t *alcf = conf, **bar;
|
|
ngx_http_dummy_main_conf_t *main_cf;
|
|
ngx_str_t *value;
|
|
|
|
if (!alcf || !cf)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
value = cf->args->elts;
|
|
main_cf = ngx_http_conf_get_module_main_conf(cf, ngx_http_naxsi_module);
|
|
if (!alcf->pushed) {
|
|
bar = ngx_array_push(main_cf->locations);
|
|
if (!bar)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
*bar = alcf;
|
|
alcf->pushed = 1;
|
|
}
|
|
|
|
/* store denied URL for location */
|
|
if ( (!ngx_strcmp(value[0].data, TOP_DENIED_URL_N) ||
|
|
!ngx_strcmp(value[0].data, TOP_DENIED_URL_T))
|
|
&& value[1].len) {
|
|
alcf->denied_url = ngx_pcalloc(cf->pool, sizeof(ngx_str_t));
|
|
if (!alcf->denied_url)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
alcf->denied_url->data = ngx_pcalloc(cf->pool, value[1].len+1);
|
|
if (!alcf->denied_url->data)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(alcf->denied_url->data, value[1].data, value[1].len);
|
|
alcf->denied_url->len = value[1].len;
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
return NGX_CONF_ERROR;
|
|
|
|
|
|
}
|
|
|
|
|
|
/*
|
|
** handle flags that can be set/modified at runtime
|
|
*/
|
|
static char *
|
|
ngx_http_naxsi_flags_loc_conf(ngx_conf_t *cf, ngx_command_t *cmd,
|
|
void *conf)
|
|
{
|
|
ngx_http_dummy_loc_conf_t *alcf = conf, **bar;
|
|
ngx_http_dummy_main_conf_t *main_cf;
|
|
ngx_str_t *value;
|
|
|
|
if (!alcf || !cf)
|
|
return (NGX_CONF_ERROR);
|
|
value = cf->args->elts;
|
|
main_cf = ngx_http_conf_get_module_main_conf(cf, ngx_http_naxsi_module);
|
|
if (!alcf->pushed) {
|
|
bar = ngx_array_push(main_cf->locations);
|
|
if (!bar)
|
|
return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
*bar = alcf;
|
|
alcf->pushed = 1;
|
|
}
|
|
|
|
/* it's a flagrule, just a hack to enable/disable mod */
|
|
if (!ngx_strcmp(value[0].data, TOP_ENABLED_FLAG_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_ENABLED_FLAG_N)) {
|
|
alcf->enabled = 1;
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
/* it's a flagrule, just a hack to enable/disable mod */
|
|
if (!ngx_strcmp(value[0].data, TOP_DISABLED_FLAG_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_DISABLED_FLAG_N)) {
|
|
alcf->force_disabled = 1;
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
/* it's a flagrule, currently just a hack to enable/disable learning mode */
|
|
if (!ngx_strcmp(value[0].data, TOP_LEARNING_FLAG_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_LEARNING_FLAG_N)) {
|
|
alcf->learning = 1;
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
if (!ngx_strcmp(value[0].data, TOP_LIBINJECTION_SQL_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_LIBINJECTION_SQL_N)) {
|
|
NX_LOG_DEBUG(_debug_loc_conf, NGX_LOG_EMERG, cf, 0,
|
|
"LibInjectionSql enabled");
|
|
alcf->libinjection_sql_enabled = 1;
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
if (!ngx_strcmp(value[0].data, TOP_LIBINJECTION_XSS_T) ||
|
|
!ngx_strcmp(value[0].data, TOP_LIBINJECTION_XSS_N)) {
|
|
alcf->libinjection_xss_enabled = 1;
|
|
NX_LOG_DEBUG(_debug_loc_conf, NGX_LOG_EMERG, cf, 0,
|
|
"LibInjectionXss enabled");
|
|
return (NGX_CONF_OK);
|
|
}
|
|
else
|
|
return (NGX_CONF_ERROR);
|
|
}
|
|
|
|
|
|
|
|
static char *
|
|
ngx_http_dummy_read_main_conf(ngx_conf_t *cf, ngx_command_t *cmd,
|
|
void *conf)
|
|
{
|
|
ngx_http_dummy_main_conf_t *alcf = conf;
|
|
ngx_str_t *value;
|
|
ngx_http_rule_t rule, *rule_r;
|
|
|
|
if (!alcf || !cf)
|
|
return (NGX_CONF_ERROR); /* alloc a new rule */
|
|
|
|
value = cf->args->elts;
|
|
/* parse the line, fill rule struct */
|
|
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"XX-TOP READ CONF %s", value[0].data);
|
|
if (ngx_strcmp(value[0].data, TOP_MAIN_BASIC_RULE_T) &&
|
|
ngx_strcmp(value[0].data, TOP_MAIN_BASIC_RULE_N)) {
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
}
|
|
memset(&rule, 0, sizeof(ngx_http_rule_t));
|
|
|
|
if (ngx_http_dummy_cfg_parse_one_rule(cf/*, alcf*/, value, &rule,
|
|
cf->args->nelts) != NGX_CONF_OK) {
|
|
/* LCOV_EXCL_START */
|
|
ngx_http_dummy_line_conf_error(cf, value);
|
|
return (NGX_CONF_ERROR);
|
|
/* LCOV_EXCL_STOP */
|
|
}
|
|
|
|
if (rule.br->headers || rule.br->headers_var) {
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in header rules", rule.rule_id);
|
|
if (alcf->header_rules == NULL) {
|
|
alcf->header_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->header_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->header_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in body match rules (POST/PUT) */
|
|
if (rule.br->body || rule.br->body_var) {
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in body rules", rule.rule_id);
|
|
if (alcf->body_rules == NULL) {
|
|
alcf->body_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->body_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->body_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in raw body match rules (POST/PUT) xx*/
|
|
if (rule.br->raw_body) {
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in raw (main) body rules", rule.rule_id);
|
|
if (alcf->raw_body_rules == NULL) {
|
|
alcf->raw_body_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->raw_body_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->raw_body_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in generic rules, as it's matching the URI */
|
|
if (rule.br->url) {
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in generic rules", rule.rule_id);
|
|
if (alcf->generic_rules == NULL) {
|
|
alcf->generic_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->generic_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->generic_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
/* push in GET arg rules, but we should push in POST rules too */
|
|
if (rule.br->args_var || rule.br->args) {
|
|
NX_LOG_DEBUG(_debug_main_conf, NGX_LOG_EMERG, cf, 0,
|
|
"pushing rule %d in GET rules", rule.rule_id);
|
|
if (alcf->get_rules == NULL) {
|
|
alcf->get_rules = ngx_array_create(cf->pool, 2,
|
|
sizeof(ngx_http_rule_t));
|
|
if (alcf->get_rules == NULL)
|
|
return NGX_CONF_ERROR; /* LCOV_EXCL_LINE */
|
|
}
|
|
rule_r = ngx_array_push(alcf->get_rules);
|
|
if (!rule_r) return (NGX_CONF_ERROR); /* LCOV_EXCL_LINE */
|
|
memcpy(rule_r, &rule, sizeof(ngx_http_rule_t));
|
|
}
|
|
return (NGX_CONF_OK);
|
|
}
|
|
|
|
|
|
/*
|
|
** [ENTRY POINT] does : this is the function called by nginx :
|
|
** - Set up the context for the request
|
|
** - Check if the job is done and we're called again
|
|
** - if it's a POST/PUT request, setup hook for body dataz
|
|
** - call dummy_data_parse
|
|
** - check our context struct (with scores & stuff) against custom check rules
|
|
** - check if the request should be denied
|
|
*/
|
|
static ngx_int_t ngx_http_dummy_access_handler(ngx_http_request_t *r)
|
|
{
|
|
ngx_http_request_ctx_t *ctx;
|
|
ngx_int_t rc;
|
|
ngx_http_dummy_loc_conf_t *cf;
|
|
struct tms tmsstart, tmsend;
|
|
clock_t start, end;
|
|
ngx_http_variable_value_t *lookup;
|
|
|
|
|
|
static ngx_str_t learning_flag = ngx_string(RT_LEARNING);
|
|
static ngx_str_t enable_flag = ngx_string(RT_ENABLE);
|
|
static ngx_str_t post_action_flag = ngx_string(RT_POST_ACTION);
|
|
static ngx_str_t extensive_log_flag = ngx_string(RT_EXTENSIVE_LOG);
|
|
static ngx_str_t libinjection_sql_flag = ngx_string(RT_LIBINJECTION_SQL);
|
|
static ngx_str_t libinjection_xss_flag = ngx_string(RT_LIBINJECTION_XSS);
|
|
|
|
|
|
ctx = ngx_http_get_module_ctx(r, ngx_http_naxsi_module);
|
|
cf = ngx_http_get_module_loc_conf(r, ngx_http_naxsi_module);
|
|
|
|
if (ctx && ctx->over)
|
|
return (NGX_DECLINED);
|
|
if (ctx && ctx->wait_for_body) {
|
|
NX_DEBUG(_debug_mechanics, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"naxsi:NGX_AGAIN");
|
|
return (NGX_DONE);
|
|
}
|
|
if (!cf)
|
|
return (NGX_ERROR);
|
|
/* the module is not enabled here */
|
|
/* if enable directive is not present at all in the location,
|
|
don't try to do dynamic lookup for "live" enabled
|
|
naxsi, this would be very rude. */
|
|
if (!cf->enabled)
|
|
return (NGX_DECLINED);
|
|
/* On the other hand, if naxsi has been explicitly disabled
|
|
in this location (using naxsi directive), user is probably
|
|
trying to do something. */
|
|
if (cf->force_disabled) {
|
|
/* Look if the user did not try to enable naxsi dynamically */
|
|
lookup = ngx_http_get_variable(r, &enable_flag, cf->flag_enable_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ngx_log_debug(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"live enable is present %d", lookup->data[0] - '0');
|
|
if (lookup->data[0] - '0' != 1) {
|
|
return (NGX_DECLINED);}
|
|
}
|
|
else
|
|
return (NGX_DECLINED);
|
|
}
|
|
/* don't process internal requests. */
|
|
if (r->internal) {
|
|
NX_DEBUG(_debug_mechanics, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-DON'T PROCESS (%V)|CTX:%p|ARGS:%V|METHOD=%s|INTERNAL:%d", &(r->uri), ctx, &(r->args),
|
|
r->method == NGX_HTTP_POST ? "POST" : r->method == NGX_HTTP_PUT ? "PUT" : r->method == NGX_HTTP_GET ? "GET" : "UNKNOWN!!",
|
|
r->internal);
|
|
return (NGX_DECLINED);
|
|
}
|
|
NX_DEBUG(_debug_mechanics, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-processing (%V)|CTX:%p|ARGS:%V|METHOD=%s|INTERNAL:%d", &(r->uri), ctx, &(r->args),
|
|
r->method == NGX_HTTP_POST ? "POST" : r->method == NGX_HTTP_PUT ? "PUT" : r->method == NGX_HTTP_GET ? "GET" : "UNKNOWN!!",
|
|
r->internal);
|
|
if (!ctx) {
|
|
ctx = ngx_pcalloc(r->pool, sizeof(ngx_http_request_ctx_t));
|
|
if (ctx == NULL)
|
|
return NGX_ERROR;
|
|
ngx_http_set_ctx(r, ctx, ngx_http_naxsi_module);
|
|
NX_DEBUG(_debug_modifier, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig learning : %d", cf->learning ? 1 : 0);
|
|
/* it seems that nginx will - in some cases -
|
|
have a variable with empty content but with lookup->not_found set to 0,
|
|
so check len as well */
|
|
ctx->learning = cf->learning;
|
|
|
|
lookup = ngx_http_get_variable(r, &learning_flag, cf->flag_learning_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
|
|
ctx->learning = lookup->data[0] - '0';
|
|
NX_DEBUG(_debug_modifier, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override learning : %d (raw=%d)",
|
|
ctx->learning ? 1 : 0, lookup->len);
|
|
}
|
|
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] learning : %d", ctx->learning ? 1 : 0);
|
|
|
|
|
|
ctx->enabled = cf->enabled;
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig enabled : %d", ctx->enabled ? 1 : 0);
|
|
|
|
lookup = ngx_http_get_variable(r, &enable_flag, cf->flag_enable_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ctx->enabled = lookup->data[0] - '0';
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override enable : %d", ctx->enabled ? 1 : 0);
|
|
|
|
|
|
}
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] enabled : %d", ctx->enabled ? 1 : 0);
|
|
|
|
|
|
|
|
/*
|
|
** LIBINJECTION_SQL
|
|
*/
|
|
ctx->libinjection_sql = cf->libinjection_sql_enabled;
|
|
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig libinjection_sql : %d", ctx->libinjection_sql ? 1 : 0);
|
|
|
|
|
|
lookup = ngx_http_get_variable(r, &libinjection_sql_flag, cf->flag_libinjection_sql_h);
|
|
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ctx->libinjection_sql = lookup->data[0] - '0';
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override libinjection_sql : %d", ctx->libinjection_sql ? 1 : 0);
|
|
|
|
}
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] libinjection_sql : %d", ctx->libinjection_sql ? 1 : 0);
|
|
|
|
/*
|
|
** LIBINJECTION_XSS
|
|
*/
|
|
ctx->libinjection_xss = cf->libinjection_xss_enabled;
|
|
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig libinjection_xss : %d", ctx->libinjection_xss ? 1 : 0);
|
|
|
|
|
|
lookup = ngx_http_get_variable(r, &libinjection_xss_flag, cf->flag_libinjection_xss_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ctx->libinjection_xss = lookup->data[0] - '0';
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override libinjection_xss : %d", ctx->libinjection_xss ? 1 : 0);
|
|
|
|
}
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] libinjection_xss : %d", ctx->libinjection_xss ? 1 : 0);
|
|
|
|
|
|
/* post_action is off by default. */
|
|
ctx->post_action = 0;
|
|
NX_DEBUG( _debug_modifier ,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig post_action : %d", ctx->post_action ? 1 : 0);
|
|
|
|
lookup = ngx_http_get_variable(r, &post_action_flag, cf->flag_post_action_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ctx->post_action = lookup->data[0] - '0';
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override post_action : %d", ctx->post_action ? 1 : 0);
|
|
|
|
}
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] post_action : %d", ctx->post_action ? 1 : 0);
|
|
|
|
NX_DEBUG( _debug_modifier ,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : orig extensive_log : %d", ctx->extensive_log ? 1 : 0);
|
|
|
|
lookup = ngx_http_get_variable(r, &extensive_log_flag, cf->flag_extensive_log_h);
|
|
if (lookup && !lookup->not_found && lookup->len > 0) {
|
|
ctx->extensive_log = lookup->data[0] - '0';
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : override extensive_log : %d", ctx->extensive_log ? 1 : 0);
|
|
|
|
}
|
|
NX_DEBUG( _debug_modifier,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : [final] extensive_log : %d", ctx->extensive_log ? 1 : 0);
|
|
|
|
|
|
/* the module is not enabled here */
|
|
if (!ctx->enabled)
|
|
return (NGX_DECLINED);
|
|
|
|
|
|
if ((r->method == NGX_HTTP_POST || r->method == NGX_HTTP_PUT)
|
|
&& !ctx->ready) {
|
|
NX_DEBUG( _debug_mechanics, NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : body_request : before !");
|
|
|
|
rc = ngx_http_read_client_request_body(r, ngx_http_dummy_payload_handler);
|
|
/* this might happen quite often, especially with big files /
|
|
** low network speed. our handler is called when headers are read,
|
|
** but, often, the full body request hasn't yet, so
|
|
** read client request body will return ngx_again. Then we need
|
|
** to return ngx_done, wait for our handler to be called once
|
|
** body request arrived, and let him call core_run_phases
|
|
** to be able to process the request.
|
|
*/
|
|
if (rc == NGX_AGAIN) {
|
|
ctx->wait_for_body = 1;
|
|
NX_DEBUG( _debug_mechanics,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : body_request : NGX_AGAIN !");
|
|
|
|
return (NGX_DONE);
|
|
}
|
|
else
|
|
if (rc >= NGX_HTTP_SPECIAL_RESPONSE) {
|
|
/*
|
|
** might happen but never saw it, let the debug print.
|
|
*/
|
|
ngx_log_debug(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : SPECIAL RESPONSE !!!!");
|
|
return rc;
|
|
}
|
|
}
|
|
else
|
|
ctx->ready = 1;
|
|
}
|
|
if (ctx && ctx->ready && !ctx->over) {
|
|
|
|
if ((start = times(&tmsstart)) == (clock_t)-1)
|
|
ngx_log_debug(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : Failed to get time");
|
|
ngx_http_dummy_data_parse(ctx, r);
|
|
cf->request_processed++;
|
|
if ((end = times(&tmsend)) == (clock_t)-1)
|
|
ngx_log_debug(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"XX-dummy : Failed to get time");
|
|
if (end - start > 10)
|
|
ngx_log_debug(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"[MORE THAN 10MS] times : start:%l end:%l diff:%l",
|
|
start, end, (end-start));
|
|
ctx->over = 1;
|
|
if (ctx->block || ctx->drop) {
|
|
cf->request_blocked++;
|
|
rc = ngx_http_output_forbidden_page(ctx, r);
|
|
//nothing: return (NGX_OK);
|
|
//redirect : return (NGX_HTTP_OK);
|
|
return rc;
|
|
}
|
|
else if (ctx->log)
|
|
rc = ngx_http_output_forbidden_page(ctx, r);
|
|
}
|
|
NX_DEBUG(_debug_mechanics,
|
|
NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
"NGX_FINISHED !");
|
|
|
|
return NGX_DECLINED;
|
|
}
|
|
|