2022-03-15 18:00:53 +00:00
|
|
|
// (c) Copyright Ascensio System SIA 2010-2022
|
|
|
|
//
|
|
|
|
// This program is a free software product.
|
|
|
|
// You can redistribute it and/or modify it under the terms
|
|
|
|
// of the GNU Affero General Public License (AGPL) version 3 as published by the Free Software
|
|
|
|
// Foundation. In accordance with Section 7(a) of the GNU AGPL its Section 15 shall be amended
|
|
|
|
// to the effect that Ascensio System SIA expressly excludes the warranty of non-infringement of
|
|
|
|
// any third-party rights.
|
|
|
|
//
|
|
|
|
// This program is distributed WITHOUT ANY WARRANTY, without even the implied warranty
|
|
|
|
// of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. For details, see
|
|
|
|
// the GNU AGPL at: http://www.gnu.org/licenses/agpl-3.0.html
|
|
|
|
//
|
|
|
|
// You can contact Ascensio System SIA at Lubanas st. 125a-25, Riga, Latvia, EU, LV-1021.
|
|
|
|
//
|
|
|
|
// The interactive user interfaces in modified source and object code versions of the Program must
|
|
|
|
// display Appropriate Legal Notices, as required under Section 5 of the GNU AGPL version 3.
|
|
|
|
//
|
|
|
|
// Pursuant to Section 7(b) of the License you must retain the original Product logo when
|
|
|
|
// distributing the program. Pursuant to Section 7(e) we decline to grant you any rights under
|
|
|
|
// trademark law for use of our trademarks.
|
|
|
|
//
|
|
|
|
// All the Product's GUI elements, including illustrations and icon sets, as well as technical writing
|
|
|
|
// content are licensed under the terms of the Creative Commons Attribution-ShareAlike 4.0
|
2022-05-13 10:36:04 +00:00
|
|
|
// International. See the License terms at http://creativecommons.org/licenses/by-sa/4.0/legalcode
|
|
|
|
|
2022-02-11 15:37:45 +00:00
|
|
|
namespace ASC.IPSecurity;
|
|
|
|
|
|
|
|
[Scope]
|
|
|
|
public class IPSecurity
|
|
|
|
{
|
|
|
|
public bool IpSecurityEnabled { get; }
|
|
|
|
|
2022-05-26 09:01:54 +00:00
|
|
|
private readonly ILogger<IPSecurity> _logger;
|
2022-02-11 15:37:45 +00:00
|
|
|
private readonly IHttpContextAccessor _httpContextAccessor;
|
|
|
|
private readonly AuthContext _authContext;
|
|
|
|
private readonly TenantManager _tenantManager;
|
|
|
|
private readonly IPRestrictionsService _ipRestrictionsService;
|
2022-04-21 14:51:31 +00:00
|
|
|
private readonly string _currentIpForTest;
|
|
|
|
private readonly string _myNetworks;
|
2022-09-05 11:48:41 +00:00
|
|
|
private readonly SecurityContext _securityContext;
|
|
|
|
private readonly UserManager _userManager;
|
2022-02-11 15:37:45 +00:00
|
|
|
|
|
|
|
public IPSecurity(
|
|
|
|
IConfiguration configuration,
|
|
|
|
IHttpContextAccessor httpContextAccessor,
|
|
|
|
AuthContext authContext,
|
|
|
|
TenantManager tenantManager,
|
2022-09-05 11:48:41 +00:00
|
|
|
IPRestrictionsService iPRestrictionsService,
|
|
|
|
SecurityContext securityContext,
|
|
|
|
UserManager userManager,
|
2022-05-26 09:01:54 +00:00
|
|
|
ILogger<IPSecurity> logger)
|
2022-02-11 15:37:45 +00:00
|
|
|
{
|
2022-05-26 09:01:54 +00:00
|
|
|
_logger = logger;
|
2022-02-11 15:37:45 +00:00
|
|
|
_httpContextAccessor = httpContextAccessor;
|
|
|
|
_authContext = authContext;
|
|
|
|
_tenantManager = tenantManager;
|
2022-09-05 11:48:41 +00:00
|
|
|
_ipRestrictionsService = iPRestrictionsService;
|
|
|
|
_securityContext = securityContext;
|
|
|
|
_userManager = userManager;
|
2022-04-21 14:51:31 +00:00
|
|
|
_currentIpForTest = configuration["ipsecurity:test"];
|
|
|
|
_myNetworks = configuration["ipsecurity:mynetworks"];
|
2022-02-11 15:37:45 +00:00
|
|
|
var hideSettings = (configuration["web:hide-settings"] ?? "").Split(new[] { ',', ';', ' ' });
|
|
|
|
IpSecurityEnabled = !hideSettings.Contains("IpSecurity", StringComparer.CurrentCultureIgnoreCase);
|
|
|
|
}
|
|
|
|
|
|
|
|
public bool Verify()
|
|
|
|
{
|
|
|
|
var tenant = _tenantManager.GetCurrentTenant();
|
|
|
|
|
|
|
|
if (!IpSecurityEnabled)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (_httpContextAccessor?.HttpContext == null)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tenant == null || _authContext.CurrentAccount.ID == tenant.OwnerId)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
string requestIps = null;
|
|
|
|
try
|
|
|
|
{
|
2022-02-21 09:51:45 +00:00
|
|
|
var restrictions = _ipRestrictionsService.Get(tenant.Id).ToList();
|
2022-02-11 15:37:45 +00:00
|
|
|
|
|
|
|
if (restrictions.Count == 0)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
requestIps = _currentIpForTest;
|
|
|
|
|
|
|
|
if (string.IsNullOrWhiteSpace(requestIps))
|
|
|
|
{
|
|
|
|
var request = _httpContextAccessor.HttpContext.Request;
|
|
|
|
requestIps = request.Headers["X-Forwarded-For"].FirstOrDefault() ?? request.GetUserHostAddress();
|
|
|
|
}
|
|
|
|
|
|
|
|
var ips = string.IsNullOrWhiteSpace(requestIps)
|
|
|
|
? Array.Empty<string>()
|
2022-09-05 11:48:41 +00:00
|
|
|
: requestIps.Split(new[] { ",", " " }, StringSplitOptions.RemoveEmptyEntries);
|
|
|
|
|
|
|
|
var isAdmin = _userManager.IsUserInGroup(_securityContext.CurrentAccount.ID, Core.Users.Constants.GroupAdmin.ID);
|
2022-02-11 15:37:45 +00:00
|
|
|
|
2022-09-05 11:48:41 +00:00
|
|
|
if (ips.Any(requestIp => restrictions.Any(restriction => (restriction.ForAdmin ? isAdmin : true) && MatchIPs(GetIpWithoutPort(requestIp), restriction.Ip))))
|
2022-02-11 15:37:45 +00:00
|
|
|
{
|
|
|
|
return true;
|
2022-04-21 14:51:31 +00:00
|
|
|
}
|
|
|
|
if (IsMyNetwork(ips))
|
|
|
|
{
|
|
|
|
return true;
|
2022-02-11 15:37:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (Exception ex)
|
|
|
|
{
|
2022-05-13 10:36:04 +00:00
|
|
|
_logger.ErrorCantVerifyRequest(requestIps ?? "", tenant, ex);
|
2022-02-11 15:37:45 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-05-13 10:36:04 +00:00
|
|
|
_logger.InformationRestricted(requestIps ?? "", tenant, _httpContextAccessor.HttpContext.Request.GetDisplayUrl());
|
2022-02-11 15:37:45 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-10-04 09:40:21 +00:00
|
|
|
public static bool MatchIPs(string requestIp, string restrictionIp)
|
2022-02-11 15:37:45 +00:00
|
|
|
{
|
|
|
|
var dividerIdx = restrictionIp.IndexOf('-');
|
|
|
|
if (dividerIdx > -1)
|
|
|
|
{
|
|
|
|
var lower = IPAddress.Parse(restrictionIp.Substring(0, dividerIdx).Trim());
|
|
|
|
var upper = IPAddress.Parse(restrictionIp.Substring(dividerIdx + 1).Trim());
|
|
|
|
|
|
|
|
var range = new IPAddressRange(lower, upper);
|
|
|
|
|
|
|
|
return range.IsInRange(IPAddress.Parse(requestIp));
|
2022-09-05 11:48:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (restrictionIp.IndexOf('/') > -1)
|
|
|
|
{
|
|
|
|
return IPAddressRange.IsInRange(requestIp, restrictionIp);
|
2022-02-11 15:37:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return requestIp == restrictionIp;
|
|
|
|
}
|
|
|
|
|
|
|
|
private static string GetIpWithoutPort(string ip)
|
|
|
|
{
|
|
|
|
var portIdx = ip.IndexOf(':');
|
|
|
|
|
|
|
|
return portIdx > 0 ? ip.Substring(0, portIdx) : ip;
|
2022-04-21 14:51:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private bool IsMyNetwork(string[] ips)
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
if (!string.IsNullOrEmpty(_myNetworks))
|
|
|
|
{
|
|
|
|
var myNetworkIps = _myNetworks.Split(new[] { ",", " " }, StringSplitOptions.RemoveEmptyEntries);
|
|
|
|
|
|
|
|
if (ips.Any(requestIp => myNetworkIps.Any(ipAddress => MatchIPs(GetIpWithoutPort(requestIp), ipAddress))))
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var hostName = Dns.GetHostName();
|
|
|
|
var hostAddresses = Dns.GetHostAddresses(Dns.GetHostName());
|
|
|
|
|
|
|
|
var localIPs = new List<IPAddress> { IPAddress.IPv6Loopback, IPAddress.Loopback };
|
|
|
|
|
|
|
|
localIPs.AddRange(hostAddresses.Where(ip => ip.AddressFamily == AddressFamily.InterNetwork || ip.AddressFamily == AddressFamily.InterNetworkV6));
|
|
|
|
|
|
|
|
foreach (var ipAddress in localIPs)
|
|
|
|
{
|
|
|
|
if (ips.Contains(ipAddress.ToString()))
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (Exception ex)
|
|
|
|
{
|
2022-05-13 10:36:04 +00:00
|
|
|
_logger.ErrorCantVerifyLocalNetWork(string.Join(",", ips), ex);
|
2022-04-21 14:51:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
2022-02-11 15:37:45 +00:00
|
|
|
}
|
|
|
|
}
|