gokrazy/xsrf.go
Michael Stapelberg c74265523b implement XSRF/CSRF protection for /stop and /restart
While stopping/restarting processes seems like a nuisance at best, it’s good
style to prevent these attacks.

This commit the Double-Submit Cookie protection, which seems appropriate for our
architecture and demands. See also:
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet#Double_Submit_Cookie
2018-06-25 18:38:08 +02:00

43 lines
927 B
Go

package gokrazy
import (
cryptorand "crypto/rand"
"encoding/binary"
"log"
"math/rand"
"net/http"
"strconv"
"sync"
)
func xsrfTokenFromCookies(cookies []*http.Cookie) int32 {
for _, c := range cookies {
if c.Name != "gokrazy_xsrf" {
continue
}
if i, err := strconv.ParseInt(c.Value, 0, 32); err == nil {
return int32(i)
}
}
return 0
}
// lazyXsrf is a lazily initialized source of random numbers for generating XSRF
// tokens. It is lazily initialized to not block early boot when reading
// cryptographically strong random bytes to seed the RNG.
var lazyXsrf struct {
once sync.Once
rnd *rand.Rand
}
func xsrfToken() int32 {
lazyXsrf.once.Do(func() {
var buf [8]byte
if _, err := cryptorand.Read(buf[:]); err != nil {
log.Fatalf("lazyXsrf: cryptorand.Read: %v", err)
}
lazyXsrf.rnd = rand.New(rand.NewSource(int64(binary.BigEndian.Uint64(buf[:]))))
})
return lazyXsrf.rnd.Int31()
}