/* * * (c) Copyright Ascensio System Limited 2010-2018 * * This program is freeware. You can redistribute it and/or modify it under the terms of the GNU * General Public License (GPL) version 3 as published by the Free Software Foundation (https://www.gnu.org/copyleft/gpl.html). * In accordance with Section 7(a) of the GNU GPL its Section 15 shall be amended to the effect that * Ascensio System SIA expressly excludes the warranty of non-infringement of any third-party rights. * * THIS PROGRAM IS DISTRIBUTED WITHOUT ANY WARRANTY; WITHOUT EVEN THE IMPLIED WARRANTY OF MERCHANTABILITY OR * FITNESS FOR A PARTICULAR PURPOSE. For more details, see GNU GPL at https://www.gnu.org/copyleft/gpl.html * * You can contact Ascensio System SIA by email at sales@onlyoffice.com * * The interactive user interfaces in modified source and object code versions of ONLYOFFICE must display * Appropriate Legal Notices, as required under Section 5 of the GNU GPL version 3. * * Pursuant to Section 7 § 3(b) of the GNU GPL you must retain the original ONLYOFFICE logo which contains * relevant author attributions when distributing the software. If the display of the logo in its graphic * form is not reasonably feasible for technical reasons, you must include the words "Powered by ONLYOFFICE" * in every copy of the program you distribute. * Pursuant to Section 7 § 3(e) we decline to grant you any rights under trademark law for use of our trademarks. * */ using System; using System.Linq; using System.Net; using System.Web; using ASC.Common.Logging; using ASC.Common.Utils; using ASC.Core; using ASC.Core.Tenants; using Microsoft.AspNetCore.Http; using Microsoft.AspNetCore.Http.Extensions; namespace ASC.IPSecurity { public static class IPSecurity { private static readonly ILog Log = LogManager.GetLogger("ASC.IPSecurity"); private static bool? _ipSecurityEnabled; public static bool IpSecurityEnabled { get { if (_ipSecurityEnabled.HasValue) return _ipSecurityEnabled.Value; var hideSettings = (ConfigurationManager.AppSettings["web.hide-settings"] ?? "").Split(new[] { ',', ';', ' ' }); return (_ipSecurityEnabled = !hideSettings.Contains("IpSecurity", StringComparer.CurrentCultureIgnoreCase)).Value; } } private static readonly string CurrentIpForTest = ConfigurationManager.AppSettings["ipsecurity.test"]; public static bool Verify(HttpContext httpContext, Tenant tenant) { if (!IpSecurityEnabled) return true; if (httpContext == null) return true; if (tenant == null || SecurityContext.CurrentAccount.ID == tenant.OwnerId) return true; string requestIps = null; try { var restrictions = IPRestrictionsService.Get(tenant.TenantId).ToList(); if (!restrictions.Any()) return true; if (string.IsNullOrWhiteSpace(requestIps = CurrentIpForTest)) { var request = httpContext.Request; requestIps = request.Headers["X-Forwarded-For"].FirstOrDefault() ?? request.GetUserHostAddress(); } var ips = string.IsNullOrWhiteSpace(requestIps) ? new string[] { } : requestIps.Split(new[] { ",", " " }, StringSplitOptions.RemoveEmptyEntries); if (ips.Any(requestIp => restrictions.Any(restriction => MatchIPs(GetIpWithoutPort(requestIp), restriction.Ip)))) { return true; } } catch (Exception ex) { Log.ErrorFormat("Can't verify request with IP-address: {0}. Tenant: {1}. Error: {2} ", requestIps ?? "", tenant, ex); return false; } Log.InfoFormat("Restricted from IP-address: {0}. Tenant: {1}. Request to: {2}", requestIps ?? "", tenant, httpContext.Request.GetDisplayUrl()); return false; } private static bool MatchIPs(string requestIp, string restrictionIp) { var dividerIdx = restrictionIp.IndexOf('-'); if (restrictionIp.IndexOf('-') > 0) { var lower = IPAddress.Parse(restrictionIp.Substring(0, dividerIdx).Trim()); var upper = IPAddress.Parse(restrictionIp.Substring(dividerIdx + 1).Trim()); var range = new IPAddressRange(lower, upper); return range.IsInRange(IPAddress.Parse(requestIp)); } return requestIp == restrictionIp; } private static string GetIpWithoutPort(string ip) { var portIdx = ip.IndexOf(':'); return portIdx > 0 ? ip.Substring(0, portIdx) : ip; } } }