DocSpace-buildtools/common/ASC.IPSecurity/IPSecurity.cs

158 lines
6.5 KiB
C#

/*
*
* (c) Copyright Ascensio System Limited 2010-2018
*
* This program is freeware. You can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) version 3 as published by the Free Software Foundation (https://www.gnu.org/copyleft/gpl.html).
* In accordance with Section 7(a) of the GNU GPL its Section 15 shall be amended to the effect that
* Ascensio System SIA expressly excludes the warranty of non-infringement of any third-party rights.
*
* THIS PROGRAM IS DISTRIBUTED WITHOUT ANY WARRANTY; WITHOUT EVEN THE IMPLIED WARRANTY OF MERCHANTABILITY OR
* FITNESS FOR A PARTICULAR PURPOSE. For more details, see GNU GPL at https://www.gnu.org/copyleft/gpl.html
*
* You can contact Ascensio System SIA by email at sales@onlyoffice.com
*
* The interactive user interfaces in modified source and object code versions of ONLYOFFICE must display
* Appropriate Legal Notices, as required under Section 5 of the GNU GPL version 3.
*
* Pursuant to Section 7 § 3(b) of the GNU GPL you must retain the original ONLYOFFICE logo which contains
* relevant author attributions when distributing the software. If the display of the logo in its graphic
* form is not reasonably feasible for technical reasons, you must include the words "Powered by ONLYOFFICE"
* in every copy of the program you distribute.
* Pursuant to Section 7 § 3(e) we decline to grant you any rights under trademark law for use of our trademarks.
*
*/
using System;
using System.Linq;
using System.Net;
using System.Web;
using ASC.Common.Logging;
using ASC.Core;
using ASC.Core.Common.Settings;
using Microsoft.AspNetCore.Http;
using Microsoft.AspNetCore.Http.Extensions;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.DependencyInjection.Extensions;
using Microsoft.Extensions.Options;
namespace ASC.IPSecurity
{
public class IPSecurity
{
private readonly ILog Log;
public bool IpSecurityEnabled { get; }
public IConfiguration Configuration { get; }
public IHttpContextAccessor HttpContextAccessor { get; }
public AuthContext AuthContext { get; }
public TenantManager TenantManager { get; }
public IPRestrictionsService IPRestrictionsService { get; }
public SettingsManager SettingsManager { get; }
private readonly string CurrentIpForTest;
public IPSecurity(
IConfiguration configuration,
IHttpContextAccessor httpContextAccessor,
AuthContext authContext,
TenantManager tenantManager,
IPRestrictionsService iPRestrictionsService,
SettingsManager settingsManager,
IOptionsMonitor<ILog> options)
{
Log = options.Get("ASC.IPSecurity");
Configuration = configuration;
HttpContextAccessor = httpContextAccessor;
AuthContext = authContext;
TenantManager = tenantManager;
IPRestrictionsService = iPRestrictionsService;
SettingsManager = settingsManager;
CurrentIpForTest = configuration["ipsecurity:test"];
var hideSettings = (configuration["web:hide-settings"] ?? "").Split(new[] { ',', ';', ' ' });
IpSecurityEnabled = !hideSettings.Contains("IpSecurity", StringComparer.CurrentCultureIgnoreCase);
}
public bool Verify()
{
var tenant = TenantManager.GetCurrentTenant();
var settings = SettingsManager.Load<IPRestrictionsSettings>();
if (!IpSecurityEnabled) return true;
if (HttpContextAccessor?.HttpContext == null) return true;
if (tenant == null || AuthContext.CurrentAccount.ID == tenant.OwnerId) return true;
string requestIps = null;
try
{
var restrictions = IPRestrictionsService.Get(tenant.TenantId).ToList();
if (!restrictions.Any()) return true;
if (string.IsNullOrWhiteSpace(requestIps = CurrentIpForTest))
{
var request = HttpContextAccessor.HttpContext.Request;
requestIps = request.Headers["X-Forwarded-For"].FirstOrDefault() ?? request.GetUserHostAddress();
}
var ips = string.IsNullOrWhiteSpace(requestIps)
? new string[] { }
: requestIps.Split(new[] { ",", " " }, StringSplitOptions.RemoveEmptyEntries);
if (ips.Any(requestIp => restrictions.Any(restriction => MatchIPs(GetIpWithoutPort(requestIp), restriction.Ip))))
{
return true;
}
}
catch (Exception ex)
{
Log.ErrorFormat("Can't verify request with IP-address: {0}. Tenant: {1}. Error: {2} ", requestIps ?? "", tenant, ex);
return false;
}
Log.InfoFormat("Restricted from IP-address: {0}. Tenant: {1}. Request to: {2}", requestIps ?? "", tenant, HttpContextAccessor.HttpContext.Request.GetDisplayUrl());
return false;
}
private static bool MatchIPs(string requestIp, string restrictionIp)
{
var dividerIdx = restrictionIp.IndexOf('-');
if (restrictionIp.IndexOf('-') > 0)
{
var lower = IPAddress.Parse(restrictionIp.Substring(0, dividerIdx).Trim());
var upper = IPAddress.Parse(restrictionIp.Substring(dividerIdx + 1).Trim());
var range = new IPAddressRange(lower, upper);
return range.IsInRange(IPAddress.Parse(requestIp));
}
return requestIp == restrictionIp;
}
private static string GetIpWithoutPort(string ip)
{
var portIdx = ip.IndexOf(':');
return portIdx > 0 ? ip.Substring(0, portIdx) : ip;
}
}
public static class IPSecurityExtension
{
public static IServiceCollection AddIPSecurityService(this IServiceCollection services)
{
services.TryAddScoped<IPSecurity>();
return services
.AddIPRestrictionsService()
.AddSettingsManagerService()
.AddHttpContextAccessor()
.AddAuthContextService()
.AddTenantManagerService();
}
}
}