2022-06-24 17:34:27 -04:00
/ * *
* @ description Meshcentral web relay server
* @ author Ylian Saint - Hilaire
* @ copyright Intel Corporation 2018 - 2022
* @ license Apache - 2.0
* @ version v0 . 0.1
* /
/*jslint node: true */
/*jshint node: true */
/*jshint strict:false */
/*jshint -W097 */
/*jshint esversion: 6 */
"use strict" ;
// Construct a HTTP redirection web server object
module . exports . CreateWebRelayServer = function ( parent , db , args , certificates , func ) {
var obj = { } ;
obj . parent = parent ;
obj . db = db ;
obj . express = require ( 'express' ) ;
2022-06-25 16:29:24 -04:00
obj . session = require ( 'cookie-session' ) ;
2022-06-24 17:34:27 -04:00
obj . expressWs = null ;
obj . tlsServer = null ;
obj . net = require ( 'net' ) ;
obj . app = obj . express ( ) ;
2022-06-28 02:08:07 -04:00
if ( args . compression !== false ) { obj . app . use ( require ( 'compression' ) ( ) ) ; }
obj . app . disable ( 'x-powered-by' ) ;
2022-06-24 17:34:27 -04:00
obj . webRelayServer = null ;
2022-06-24 19:53:31 -04:00
obj . port = 0 ;
2022-06-26 19:55:07 -04:00
obj . cleanupTimer = null ;
var relaySessions = { } // RelayID --> Web Mutli-Tunnel
2022-06-24 17:34:27 -04:00
const constants = ( require ( 'crypto' ) . constants ? require ( 'crypto' ) . constants : require ( 'constants' ) ) ; // require('constants') is deprecated in Node 11.10, use require('crypto').constants instead.
var tlsSessionStore = { } ; // Store TLS session information for quick resume.
var tlsSessionStoreCount = 0 ; // Number of cached TLS session information in store.
2022-06-25 16:29:24 -04:00
function serverStart ( ) {
2022-07-06 23:34:04 -04:00
// Setup CrowdSec bouncer middleware if needed
if ( parent . crowdsecMiddleware != null ) { obj . app . use ( parent . crowdsecMiddleware ) ; }
2022-06-25 16:29:24 -04:00
if ( args . trustedproxy ) {
// Reverse proxy should add the "X-Forwarded-*" headers
try {
obj . app . set ( 'trust proxy' , args . trustedproxy ) ;
} catch ( ex ) {
// If there is an error, try to resolve the string
if ( ( args . trustedproxy . length == 1 ) && ( typeof args . trustedproxy [ 0 ] == 'string' ) ) {
require ( 'dns' ) . lookup ( args . trustedproxy [ 0 ] , function ( err , address , family ) { if ( err == null ) { obj . app . set ( 'trust proxy' , address ) ; args . trustedproxy = [ address ] ; } } ) ;
}
2022-06-24 19:53:31 -04:00
}
}
2022-06-25 16:29:24 -04:00
else if ( typeof args . tlsoffload == 'object' ) {
// Reverse proxy should add the "X-Forwarded-*" headers
try {
obj . app . set ( 'trust proxy' , args . tlsoffload ) ;
} catch ( ex ) {
// If there is an error, try to resolve the string
if ( ( Array . isArray ( args . tlsoffload ) ) && ( args . tlsoffload . length == 1 ) && ( typeof args . tlsoffload [ 0 ] == 'string' ) ) {
require ( 'dns' ) . lookup ( args . tlsoffload [ 0 ] , function ( err , address , family ) { if ( err == null ) { obj . app . set ( 'trust proxy' , address ) ; args . tlsoffload = [ address ] ; } } ) ;
}
2022-06-24 19:53:31 -04:00
}
}
2022-07-11 14:11:03 -04:00
// Setup a keygrip instance with higher default security, default hash is SHA1, we want to bump that up with SHA384
// If multiple instances of this server are behind a load-balancer, this secret must be the same for all instances
// If args.sessionkey is a string, use it as a single key, but args.sessionkey can also be used as an array of keys.
const keygrip = require ( 'keygrip' ) ( ( typeof obj . args . sessionkey == 'string' ) ? [ obj . args . sessionkey ] : obj . args . sessionkey , 'sha384' , 'base64' ) ;
2022-06-25 16:29:24 -04:00
// Setup cookie session
2022-07-11 14:11:03 -04:00
const sessionOptions = {
2022-06-25 16:29:24 -04:00
name : 'xid' , // Recommended security practice to not use the default cookie name
httpOnly : true ,
2022-07-11 14:11:03 -04:00
keys : keygrip ,
2022-06-25 16:29:24 -04:00
secure : ( args . tlsoffload == null ) , // Use this cookie only over TLS (Check this: https://expressjs.com/en/guide/behind-proxies.html)
2022-07-08 21:00:15 -04:00
sameSite : ( args . sessionsamesite ? args . sessionsamesite : 'lax' )
2022-06-25 16:29:24 -04:00
}
if ( args . sessiontime != null ) { sessionOptions . maxAge = ( args . sessiontime * 60 * 1000 ) ; }
obj . app . use ( obj . session ( sessionOptions ) ) ;
// Add HTTP security headers to all responses
obj . app . use ( function ( req , res , next ) {
2022-07-08 21:00:15 -04:00
parent . debug ( 'webrelay' , req . url ) ;
2022-06-25 16:29:24 -04:00
res . removeHeader ( 'X-Powered-By' ) ;
res . set ( {
'strict-transport-security' : 'max-age=60000; includeSubDomains' ,
'Referrer-Policy' : 'no-referrer' ,
'x-frame-options' : 'SAMEORIGIN' ,
'X-XSS-Protection' : '1; mode=block' ,
'X-Content-Type-Options' : 'nosniff' ,
2022-07-08 21:00:15 -04:00
'Content-Security-Policy' : "default-src 'self'; style-src 'self' 'unsafe-inline';"
2022-06-25 16:29:24 -04:00
} ) ;
// Set the real IP address of the request
// If a trusted reverse-proxy is sending us the remote IP address, use it.
var ipex = '0.0.0.0' , xforwardedhost = req . headers . host ;
if ( typeof req . connection . remoteAddress == 'string' ) { ipex = ( req . connection . remoteAddress . startsWith ( '::ffff:' ) ) ? req . connection . remoteAddress . substring ( 7 ) : req . connection . remoteAddress ; }
if (
( args . trustedproxy === true ) || ( args . tlsoffload === true ) ||
( ( typeof args . trustedproxy == 'object' ) && ( isIPMatch ( ipex , args . trustedproxy ) ) ) ||
( ( typeof args . tlsoffload == 'object' ) && ( isIPMatch ( ipex , args . tlsoffload ) ) )
) {
// Get client IP
if ( req . headers [ 'cf-connecting-ip' ] ) { // Use CloudFlare IP address if present
req . clientIp = req . headers [ 'cf-connecting-ip' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else if ( req . headers [ 'x-forwarded-for' ] ) {
req . clientIp = req . headers [ 'x-forwarded-for' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else if ( req . headers [ 'x-real-ip' ] ) {
req . clientIp = req . headers [ 'x-real-ip' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else {
req . clientIp = ipex ;
}
// If there is a port number, remove it. This will only work for IPv4, but nice for people that have a bad reverse proxy config.
const clientIpSplit = req . clientIp . split ( ':' ) ;
if ( clientIpSplit . length == 2 ) { req . clientIp = clientIpSplit [ 0 ] ; }
// Get server host
if ( req . headers [ 'x-forwarded-host' ] ) { xforwardedhost = req . headers [ 'x-forwarded-host' ] . split ( ',' ) [ 0 ] ; } // If multiple hosts are specified with a comma, take the first one.
2022-06-24 19:53:31 -04:00
} else {
req . clientIp = ipex ;
}
2022-06-28 02:08:07 -04:00
// If this is a session start or a websocket, have the application handle this
if ( ( req . headers . upgrade == 'websocket' ) || ( req . url . startsWith ( '/control-redirect.ashx?n=' ) ) ) {
2022-06-25 16:29:24 -04:00
return next ( ) ;
} else {
2022-06-28 02:08:07 -04:00
// If this is a normal request (GET, POST, etc) handle it here
2022-07-09 16:32:55 -04:00
if ( ( req . session . userid != null ) && ( req . session . x != null ) && ( parent . webserver . destroyedSessions [ req . session . userid + '/' + req . session . x ] == null ) ) {
2022-07-08 21:00:15 -04:00
var relaySession = relaySessions [ req . session . userid + '/' + req . session . x ] ;
2022-06-26 19:55:07 -04:00
if ( relaySession != null ) {
2022-06-28 02:08:07 -04:00
// The web relay session is valid, use it
2022-06-26 19:55:07 -04:00
relaySession . handleRequest ( req , res ) ;
2022-06-25 19:22:51 -04:00
} else {
2022-06-28 02:08:07 -04:00
// No web relay ession with this relay identifier, close the HTTP request.
2022-06-25 19:22:51 -04:00
res . end ( ) ;
}
2022-06-25 16:29:24 -04:00
} else {
2022-06-25 19:22:51 -04:00
// The user is not logged in or does not have a relay identifier, close the HTTP request.
2022-06-25 16:29:24 -04:00
res . end ( ) ;
}
}
} ) ;
2022-06-28 02:08:07 -04:00
// Start the server, only after users and meshes are loaded from the database.
if ( args . tlsoffload ) {
// Setup the HTTP server without TLS
obj . expressWs = require ( 'express-ws' ) ( obj . app , null , { wsOptions : { perMessageDeflate : ( args . wscompression === true ) } } ) ;
} else {
// Setup the HTTP server with TLS, use only TLS 1.2 and higher with perfect forward secrecy (PFS).
const tlsOptions = { cert : certificates . web . cert , key : certificates . web . key , ca : certificates . web . ca , rejectUnauthorized : true , ciphers : "HIGH:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256:TLS_AES_128_CCM_8_SHA256:TLS_AES_128_CCM_SHA256:TLS_CHACHA20_POLY1305_SHA256" , secureOptions : constants . SSL _OP _NO _SSLv2 | constants . SSL _OP _NO _SSLv3 | constants . SSL _OP _NO _COMPRESSION | constants . SSL _OP _CIPHER _SERVER _PREFERENCE | constants . SSL _OP _NO _TLSv1 | constants . SSL _OP _NO _TLSv1 _1 } ;
obj . tlsServer = require ( 'https' ) . createServer ( tlsOptions , obj . app ) ;
obj . tlsServer . on ( 'secureConnection' , function ( ) { /*console.log('tlsServer secureConnection');*/ } ) ;
obj . tlsServer . on ( 'error' , function ( err ) { console . log ( 'tlsServer error' , err ) ; } ) ;
obj . tlsServer . on ( 'newSession' , function ( id , data , cb ) { if ( tlsSessionStoreCount > 1000 ) { tlsSessionStoreCount = 0 ; tlsSessionStore = { } ; } tlsSessionStore [ id . toString ( 'hex' ) ] = data ; tlsSessionStoreCount ++ ; cb ( ) ; } ) ;
obj . tlsServer . on ( 'resumeSession' , function ( id , cb ) { cb ( null , tlsSessionStore [ id . toString ( 'hex' ) ] || null ) ; } ) ;
obj . expressWs = require ( 'express-ws' ) ( obj . app , obj . tlsServer , { wsOptions : { perMessageDeflate : ( args . wscompression === true ) } } ) ;
}
// Handle incoming web socket calls
obj . app . ws ( '/*' , function ( ws , req ) {
2022-07-09 16:32:55 -04:00
if ( ( req . session . userid != null ) && ( req . session . x != null ) && ( parent . webserver . destroyedSessions [ req . session . userid + '/' + req . session . x ] == null ) ) {
2022-07-08 21:00:15 -04:00
var relaySession = relaySessions [ req . session . userid + '/' + req . session . x ] ;
2022-06-28 02:08:07 -04:00
if ( relaySession != null ) {
// The multi-tunnel session is valid, use it
relaySession . handleWebSocket ( ws , req ) ;
} else {
// No multi-tunnel session with this relay identifier, close the websocket.
ws . close ( ) ;
}
} else {
// The user is not logged in or does not have a relay identifier, close the websocket.
ws . close ( ) ;
}
} ) ;
2022-06-25 16:29:24 -04:00
// This is the magic URL that will setup the relay session
obj . app . get ( '/control-redirect.ashx' , function ( req , res ) {
res . set ( { 'Cache-Control' : 'no-store' } ) ;
2022-07-08 21:00:15 -04:00
parent . debug ( 'webrelay' , 'webRelaySetup' ) ;
2022-06-24 19:53:31 -04:00
2022-07-09 16:32:55 -04:00
// Decode the relay cookie
if ( req . query . c != null ) {
// Decode and check if this relay cookie is valid
const urlCookie = obj . parent . decodeCookie ( req . query . c , parent . loginCookieEncryptionKey ) ;
if ( ( urlCookie != null ) && ( urlCookie . ruserid != null ) && ( urlCookie . x != null ) && ( parent . webserver . destroyedSessions [ urlCookie . ruserid + '/' + urlCookie . x ] == null ) ) {
if ( req . session . x != urlCookie . x ) { req . session . x = urlCookie . x ; } // Set the sessionid if missing
if ( req . session . userid != urlCookie . ruserid ) { req . session . userid = urlCookie . ruserid ; } // Set the session userid if missing
}
}
2022-06-25 16:29:24 -04:00
// Check that all the required arguments are present
2022-07-09 16:32:55 -04:00
if ( ( req . session . userid == null ) || ( req . session . x == null ) || ( req . query . n == null ) || ( req . query . p == null ) || ( parent . webserver . destroyedSessions [ req . session . userid + '/' + req . session . x ] != null ) || ( ( req . query . appid != 1 ) && ( req . query . appid != 2 ) ) ) { res . redirect ( '/' ) ; return ; }
2022-06-25 16:29:24 -04:00
// Get the user and domain information
const userid = req . session . userid ;
const domainid = userid . split ( '/' ) [ 1 ] ;
const domain = parent . config . domains [ domainid ] ;
2022-06-25 19:22:51 -04:00
const nodeid = ( ( req . query . relayid != null ) ? req . query . relayid : req . query . n ) ;
const addr = ( req . query . addr != null ) ? req . query . addr : '127.0.0.1' ;
const port = parseInt ( req . query . p ) ;
2022-06-26 01:10:07 -04:00
const appid = parseInt ( req . query . appid ) ;
2022-06-25 19:22:51 -04:00
// Check to see if we already have a multi-relay session that matches exactly this device and port for this user
2022-07-08 21:00:15 -04:00
const xrelaySession = relaySessions [ req . session . userid + '/' + req . session . x ] ;
if ( ( xrelaySession != null ) && ( xrelaySession . domain . id == domain . id ) && ( xrelaySession . userid == userid ) && ( xrelaySession . nodeid == nodeid ) && ( xrelaySession . addr == addr ) && ( xrelaySession . port == port ) && ( xrelaySession . appid == appid ) ) {
// We found an exact match, we are all setup already, redirect to root
res . redirect ( '/' ) ;
return ;
2022-06-25 19:22:51 -04:00
}
2022-06-25 16:29:24 -04:00
2022-07-08 21:00:15 -04:00
// There is a relay session, but it's not correct, close it.
if ( xrelaySession != null ) { xrelaySession . close ( ) ; delete relaySessions [ req . session . userid + '/' + req . session . x ] ; }
2022-06-26 19:55:07 -04:00
2022-07-08 21:00:15 -04:00
// Create a web relay session
2022-07-10 04:32:11 -04:00
const relaySession = require ( './apprelays.js' ) . CreateWebRelaySession ( obj , db , req , args , domain , userid , nodeid , addr , port , appid , xrelaySession ) ;
2022-07-08 21:00:15 -04:00
relaySession . onclose = function ( sessionId ) {
// Remove the relay session
delete relaySessions [ sessionId ] ;
// If there are not more relay sessions, clear the cleanup timer
if ( ( Object . keys ( relaySessions ) . length == 0 ) && ( obj . cleanupTimer != null ) ) { clearInterval ( obj . cleanupTimer ) ; obj . cleanupTimer = null ; }
2022-06-25 19:22:51 -04:00
}
2022-06-25 16:29:24 -04:00
2022-07-08 21:00:15 -04:00
// Set the multi-tunnel session
relaySessions [ userid + '/' + req . session . x ] = relaySession ;
// Setup the cleanup timer if needed
if ( obj . cleanupTimer == null ) { obj . cleanupTimer = setInterval ( checkTimeout , 10000 ) ; }
2022-06-25 16:29:24 -04:00
// Redirect to root
res . redirect ( '/' ) ;
} ) ;
2022-06-24 17:34:27 -04:00
}
2022-06-26 19:55:07 -04:00
// Check that everything is cleaned up
function checkTimeout ( ) {
for ( var i in relaySessions ) { relaySessions [ i ] . checkTimeout ( ) ; }
}
2022-06-24 17:34:27 -04:00
// Find a free port starting with the specified one and going up.
function CheckListenPort ( port , addr , func ) {
var s = obj . net . createServer ( function ( socket ) { } ) ;
obj . webRelayServer = s . listen ( port , addr , function ( ) { s . close ( function ( ) { if ( func ) { func ( port , addr ) ; } } ) ; } ) . on ( "error" , function ( err ) {
if ( args . exactports ) { console . error ( "ERROR: MeshCentral HTTP relay server port " + port + " not available." ) ; process . exit ( ) ; }
else { if ( port < 65535 ) { CheckListenPort ( port + 1 , addr , func ) ; } else { if ( func ) { func ( 0 ) ; } } }
} ) ;
}
// Start the ExpressJS web server, if the port is busy try the next one.
function StartWebRelayServer ( port , addr ) {
if ( port == 0 || port == 65535 ) { return ; }
if ( obj . tlsServer != null ) {
if ( args . lanonly == true ) {
2022-07-04 23:20:25 -04:00
obj . tcpServer = obj . tlsServer . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTPS relay server running on port ' + port + ( ( typeof args . relayaliasport == 'number' ) ? ( ', alias port ' + args . relayaliasport ) : '' ) + '.' ) ; } ) ;
2022-06-24 17:34:27 -04:00
} else {
2022-07-04 23:20:25 -04:00
obj . tcpServer = obj . tlsServer . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTPS relay server running on ' + certificates . CommonName + ':' + port + ( ( typeof args . relayaliasport == 'number' ) ? ( ', alias port ' + args . relayaliasport ) : '' ) + '.' ) ; } ) ;
2022-06-24 17:34:27 -04:00
obj . parent . updateServerState ( 'servername' , certificates . CommonName ) ;
}
if ( obj . parent . authlog ) { obj . parent . authLog ( 'https' , 'Web relay server listening on ' + ( ( addr != null ) ? addr : '0.0.0.0' ) + ' port ' + port + '.' ) ; }
obj . parent . updateServerState ( 'https-relay-port' , port ) ;
2022-07-04 23:20:25 -04:00
if ( typeof args . relayaliasport == 'number' ) { obj . parent . updateServerState ( 'https-relay-aliasport' , args . relayaliasport ) ; }
2022-06-24 17:34:27 -04:00
} else {
2022-07-04 23:20:25 -04:00
obj . tcpServer = obj . app . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTP relay server running on port ' + port + ( ( typeof args . relayaliasport == 'number' ) ? ( ', alias port ' + args . relayaliasport ) : '' ) + '.' ) ; } ) ;
2022-06-24 17:34:27 -04:00
obj . parent . updateServerState ( 'http-relay-port' , port ) ;
2022-07-04 23:20:25 -04:00
if ( typeof args . relayaliasport == 'number' ) { obj . parent . updateServerState ( 'http-relay-aliasport' , args . relayaliasport ) ; }
2022-06-24 17:34:27 -04:00
}
2022-06-24 19:53:31 -04:00
obj . port = port ;
2022-06-24 17:34:27 -04:00
}
2022-06-25 16:29:24 -04:00
function getRandomPassword ( ) { return Buffer . from ( require ( 'crypto' ) . randomBytes ( 9 ) , 'binary' ) . toString ( 'base64' ) . split ( '/' ) . join ( '@' ) ; }
2022-06-29 02:53:52 -04:00
// Perform a IP match against a list
function isIPMatch ( ip , matchList ) {
const ipcheck = require ( 'ipcheck' ) ;
for ( var i in matchList ) { if ( ipcheck . match ( ip , matchList [ i ] ) == true ) return true ; }
return false ;
}
2022-06-25 16:29:24 -04:00
// Start up the web relay server
serverStart ( ) ;
2022-06-24 17:34:27 -04:00
CheckListenPort ( args . relayport , args . relayportbind , StartWebRelayServer ) ;
return obj ;
} ;