Add http origin checking to built in websockets.

pull/2702/head
Roger A. Light 3 years ago
parent 1e0a07ba5a
commit 5c0cfade12

@ -125,6 +125,7 @@ enum mosq_err_t {
/* 28, 29, 30 - was internal only, moved to MQTT v5 section. */
MOSQ_ERR_ALREADY_EXISTS = 31,
MOSQ_ERR_PLUGIN_IGNORE = 32,
MOSQ_ERR_HTTP_BAD_ORIGIN = 33,
/* MQTT v5 direct equivalents 128-255 */
MOSQ_ERR_UNSPECIFIED = 128,

@ -213,6 +213,19 @@ int http__read(struct mosquitto *mosq)
}
strncpy(mosq->address, forwarded_for, (size_t)forwarded_for_len);
mosq->address[forwarded_for_len] = '\0';
}else if(!strncasecmp(http_headers[i].name, "Origin", http_headers[i].name_len)){
if(mosq->listener){
bool have_match = false;
for(int j=0; j<mosq->listener->ws_origin_count; j++){
if(!strncmp(mosq->listener->ws_origins[j], http_headers[i].value, http_headers[i].value_len)){
have_match = true;
break;
}
}
if(!have_match){
return MOSQ_ERR_HTTP_BAD_ORIGIN;
}
}
}else{
/* Unknown header */
}

@ -368,6 +368,9 @@ void do_disconnect(struct mosquitto *context, int reason)
case MOSQ_ERR_SESSION_TAKEN_OVER:
log__printf(NULL, MOSQ_LOG_NOTICE, "Client %s disconnected, session taken over.", id);
break;
case MOSQ_ERR_HTTP_BAD_ORIGIN:
log__printf(NULL, MOSQ_LOG_NOTICE, "Client %s disconnected, non-matching http origin.", id);
break;
default:
log__printf(NULL, MOSQ_LOG_NOTICE, "Bad socket read/write on client %s: %s", id, mosquitto_strerror(reason));
break;

@ -0,0 +1,90 @@
#!/usr/bin/env python3
from mosq_test_helper import *
rc = 1
def write_config(filename, port):
with open(filename, 'w') as f:
f.write("listener %d\n" % (port))
f.write("allow_anonymous true\n")
f.write("protocol websockets\n")
f.write("websockets_origin example.org\n")
def do_test(publish_packet, reason_code, error_string):
global rc
rc = 1
connect_packet = mosq_test.gen_connect("13-malformed-publish-v5", proto_ver=5)
connack_props = mqtt5_props.gen_uint16_prop(mqtt5_props.PROP_TOPIC_ALIAS_MAXIMUM, 10)
connack_props += mqtt5_props.gen_byte_prop(mqtt5_props.PROP_RETAIN_AVAILABLE, 0)
connack_props += mqtt5_props.gen_uint16_prop(mqtt5_props.PROP_RECEIVE_MAXIMUM, 20)
connack_props += mqtt5_props.gen_byte_prop(mqtt5_props.PROP_MAXIMUM_QOS, 1)
connack_packet = mosq_test.gen_connack(rc=0, proto_ver=5, properties=connack_props, property_helper=False)
mid = 0
disconnect_packet = mosq_test.gen_disconnect(proto_ver=5, reason_code=reason_code)
sock = mosq_test.do_client_connect(connect_packet, connack_packet, port=port)
mosq_test.do_send_receive(sock, publish_packet, disconnect_packet, error_string=error_string)
rc = 0
port = mosq_test.get_port()
conf_file = os.path.basename(__file__).replace('.py', '.conf')
write_config(conf_file, port)
broker = mosq_test.start_broker(filename=os.path.basename(__file__), use_conf=True, port=port)
try:
websocket_req_bad = b"GET /mqtt HTTP/1.1\r\n" \
+ b"Host: localhost\r\n" \
+ b"Upgrade: websocket\r\n" \
+ b"Connection: Upgrade\r\n" \
+ B"Sec-WebSocket-Key: 1JaITHdgDZVd/4OE2AzTTA==\r\n" \
+ b"Sec-WebSocket-Protocol: mqtt\r\n" \
+ b"Sec-WebSocket-Version: 13\r\n" \
+ b"Origin: localhost\r\n" \
+ b"\r\n"
sock = mosq_test.do_client_connect(websocket_req_bad, b"", port=port)
sock.close()
except BrokenPipeError:
pass
try:
websocket_req_good = b"GET /mqtt HTTP/1.1\r\n" \
+ b"Host: localhost\r\n" \
+ b"Upgrade: websocket\r\n" \
+ b"Connection: Upgrade\r\n" \
+ B"Sec-WebSocket-Key: 1JaITHdgDZVd/4OE2AzTTA==\r\n" \
+ b"Sec-WebSocket-Protocol: mqtt\r\n" \
+ b"Sec-WebSocket-Version: 13\r\n" \
+ b"Origin: example.org\r\n" \
+ b"\r\n"
websocket_resp_good = b"HTTP/1.1 101 Switching Protocols\r\n" \
+ b"Upgrade: WebSocket\r\n" \
+ b"Connection: Upgrade\r\n" \
+ b"Sec-WebSocket-Accept: Ako91O0lxiq8gN0+b9YCijMx8lk=\r\n" \
+ b"Sec-WebSocket-Protocol: mqtt\r\n" \
+ b"\r\n"
sock = mosq_test.do_client_connect(websocket_req_good, websocket_resp_good, port=port)
sock.close()
rc = 0
except Exception as err:
print(err)
finally:
broker.terminate()
if mosq_test.wait_for_subprocess(broker):
print("broker not terminated")
if rc == 0: rc=1
(stdo, stde) = broker.communicate()
os.remove(conf_file)
if rc:
print(stde.decode('utf-8'))
exit(rc)

@ -236,6 +236,7 @@ endif
./12-prop-subpub-payload-format.py
13 :
./13-websocket-bad-origin.py
14 :
ifeq ($(WITH_TLS),yes)

@ -201,6 +201,8 @@ tests = [
(1, './12-prop-subpub-content-type.py'),
(1, './12-prop-subpub-payload-format.py'),
(1, './13-websocket-bad-origin.py'),
(1, './14-dynsec-acl.py'),
(1, './14-dynsec-allow-wildcard.py'),
(1, './14-dynsec-anon-group.py'),

Loading…
Cancel
Save