# frozen-string-literal: true
require 'base64'
require 'openssl'
require 'securerandom'
require 'uri'
class Roda
module RodaPlugins
# The route_csrf plugin is the recommended plugin to use to support
# CSRF protection in Roda applications. This plugin allows you set
# where in the routing tree to enforce CSRF protection. Additionally,
# the route_csrf plugin uses modern security practices.
#
# By default, the plugin requires tokens be specific to the request
# method and request path, so a CSRF token generated for one form will
# not be usable to submit a different form.
#
# This plugin also takes care to not expose the underlying CSRF key
# (except in the session), so that it is not possible for an attacker
# to generate valid CSRF tokens specific to an arbitrary request method
# and request path even if they have access to a token that is not
# specific to request method and request path. To get this security
# benefit, you must ensure an attacker does not have access to the
# session. Rack::Session::Cookie uses signed sessions, not encrypted
# sessions, so if the attacker has the ability to read cookie data
# and you are using Rack::Session::Cookie, it will still be possible
# for an attacker to generate valid CSRF tokens specific to arbitrary
# request method and request path. Roda's session plugin uses
# encrypted sessions and therefore is safe even if the attacker can
# read cookie data.
#
# == Usage
#
# It is recommended to use the plugin defaults, loading the
# plugin with no options:
#
# plugin :route_csrf
#
# This plugin supports the following options:
#
# :field :: Form input parameter name for CSRF token (default: '_csrf')
# :header :: HTTP header name for CSRF token (default: 'X-CSRF-Token')
# :key :: Session key for CSRF secret (default: '_roda_csrf_secret')
# :require_request_specific_tokens :: Whether request-specific tokens are required (default: true).
# A false value will allow tokens that are not request-specific
# to also work. You should only set this to false if it is
# impossible to use request-specific tokens. If you must
# use non-request-specific tokens in certain cases, it is best
# to leave this option true by default, and override it on a
# per call basis in those specific cases.
# :csrf_failure :: The action to taken if a request fails the CSRF check (default: :raise). Options:
# :raise :: raise a Roda::RodaPlugins::RouteCsrf::InvalidToken exception
# :empty_403 :: return a blank 403 page (rack_csrf's default behavior)
# :clear_session :: Clear the current session
# Proc :: Treated as a routing block, called with request object
# :check_header :: Whether the HTTP header should be checked for the token value (default: false).
# If true, checks the HTTP header after checking for the form input parameter.
# If :only, only checks the HTTP header and doesn't check the form input parameter.
# :check_request_methods :: Which request methods require CSRF protection
# (default: ['POST', 'DELETE', 'PATCH', 'PUT'])
# :upgrade_from_rack_csrf_key :: If provided, the session key that should be checked for the
# rack_csrf raw token. If the session key is present, the value
# will be checked against the submitted token, and if it matches,
# the CSRF check will be passed. Should only be set temporarily
# if upgrading from using rack_csrf to the route_csrf plugin, and
# should be removed as soon as you are OK with CSRF forms generated
# before the upgrade not longer being usable. The default rack_csrf
# key is 'csrf.token'.
#
# The plugin also supports a block, in which case the block will be used
# as the value of the :csrf_failure option.
#
# == Methods
#
# This adds the following instance methods:
#
# check_csrf!(opts={}) :: Used for checking if the submitted CSRF token is valid.
# If a block is provided, it is treated as a routing block if the
# CSRF token is not valid. Otherwise, by default, raises a
# Roda::RodaPlugins::RouteCsrf::InvalidToken exception if a CSRF
# token is necessary for the request and there is no token provided
# or the provided token is not valid. Options can be provided to
# override any of the plugin options for this specific call.
# The :token option can be used to specify the provided CSRF token
# (instead of looking for the token in the submitted parameters).
# csrf_field :: The field name to use for the hidden tag containing the CSRF token.
# csrf_path(action) :: This takes an argument that would be the value of the HTML form's
# action attribute, and returns a path you can pass to csrf_token
# that should be valid for the form submission. The argument should
# either be nil or a string representing a relative path, absolute
# path, or full URL.
# csrf_tag(path=nil, method='POST') :: An HTML hidden input tag string containing the CSRF token, suitable
# for placing in an HTML form. Takes the same arguments as csrf_token.
# csrf_token(path=nil, method='POST') :: The value of the csrf token, in case it needs to be accessed
# directly. It is recommended to call this method with a
# path, which will create a request-specific token. Calling
# this method without an argument will create a token that is
# not specific to the request, but such a token will only
# work if you set the :require_request_specific_tokens option
# to false, which is a bad idea from a security standpoint.
# use_request_specific_csrf_tokens? :: Whether the plugin is configured to only support
# request-specific tokens, true by default.
# valid_csrf?(opts={}) :: Returns whether the submitted CSRF token is valid (also true if
# the request does not require a CSRF token). Takes same option hash
# as check_csrf!.
#
# This plugin also adds the following instance methods for compatibility with the
# older csrf plugin, but it is not recommended to use these methods in new code:
#
# csrf_header :: The header name to use for submitting the CSRF token via an HTTP header
# (useful for javascript). Note that this plugin will not look in
# the HTTP header by default, it will only do so if the :check_header
# option is used.
# csrf_metatag :: An HTML meta tag string containing the CSRF token, suitable
# for placing in the page header. It is not recommended to use
# this method, as the token generated is not request-specific and
# will not work unless you set the :require_request_specific_tokens option to
# false, which is a bad idea from a security standpoint.
#
# == Token Cryptography
#
# route_csrf uses HMAC-SHA-256 to generate all CSRF tokens. It generates a random 32-byte secret,
# which is stored base64 encoded in the session. For each CSRF token, it generates 31 bytes
# of random data.
#
# For request-specific CSRF tokens, this pseudocode generates the HMAC:
#
# hmac = HMAC(secret, method + path + random_data)
#
# For CSRF tokens not specific to a request, this pseudocode generates the HMAC:
#
# hmac = HMAC(secret, random_data)
#
# This pseudocode generates the final CSRF token in both cases:
#
# token = Base64Encode(random_data + hmac)
#
# Using this construction for generating CSRF tokens means that generating any
# valid CSRF token without knowledge of the secret is equivalent to a successful generic attack
# on HMAC-SHA-256.
#
# By using an HMAC for tokens not specific to a request, it is not possible to use a
# valid CSRF token that is not specific to a request to generate a valid request-specific
# CSRF token.
#
# By including random data in the HMAC for all tokens, different tokens are generated
# each time, mitigating compression ratio attacks such as BREACH.
module RouteCsrf
# Default CSRF option values
DEFAULTS = {
:field => '_csrf'.freeze,
:header => 'X-CSRF-Token'.freeze,
:key => '_roda_csrf_secret'.freeze,
:require_request_specific_tokens => true,
:csrf_failure => :raise,
:check_header => false,
:check_request_methods => %w'POST DELETE PATCH PUT'.freeze.each(&:freeze)
}.freeze
# Exception class raised when :csrf_failure option is :raise and
# a valid CSRF token was not provided.
class InvalidToken < RodaError; end
def self.configure(app, opts=OPTS, &block)
options = app.opts[:route_csrf] = (app.opts[:route_csrf] || DEFAULTS).merge(opts)
if block || opts[:csrf_failure].is_a?(Proc)
if block && opts[:csrf_failure]
raise RodaError, "Cannot specify both route_csrf plugin block and :csrf_failure option"
end
block ||= opts[:csrf_failure]
options[:csrf_failure] = :csrf_failure_method
app.define_roda_method(:_roda_route_csrf_failure, 1, &app.send(:convert_route_block, block))
end
options[:env_header] = "HTTP_#{options[:header].to_s.gsub('-', '_').upcase}".freeze
options.freeze
end
module InstanceMethods
# Check that the submitted CSRF token is valid, if the request requires a CSRF token.
# If the CSRF token is valid or the request does not require a CSRF token, return nil.
# Otherwise, if a block is given, treat it as a routing block and yield to it, and
# if a block is not given, use the :csrf_failure option to determine how to handle it.
def check_csrf!(opts=OPTS, &block)
if msg = csrf_invalid_message(opts)
if block
@_request.on(&block)
end
case failure_action = opts.fetch(:csrf_failure, csrf_options[:csrf_failure])
when :raise
raise InvalidToken, msg
when :empty_403
@_response.status = 403
@_response.headers.replace('Content-Type'=>'text/html', 'Content-Length'=>'0')
throw :halt, @_response.finish_with_body([])
when :clear_session
session.clear
when :csrf_failure_method
@_request.on{_roda_route_csrf_failure(@_request)}
when Proc
RodaPlugins.warn "Passing a Proc as the :csrf_failure option value to check_csrf! is deprecated"
@_request.on{instance_exec(@_request, &failure_action)} # Deprecated
else
raise RodaError, "Unsupported :csrf_failure option: #{failure_action.inspect}"
end
end
end
# The name of the hidden input tag containing the CSRF token. Also used as the name
# for the meta tag.
def csrf_field
csrf_options[:field]
end
# The HTTP header name to use when submitting CSRF tokens in an HTTP header, if
# such support is enabled (it is not by default).
def csrf_header
csrf_options[:header]
end
# An HTML meta tag string containing a CSRF token that is not request-specific.
# It is not recommended to use this, as it doesn't support request-specific tokens.
def csrf_metatag
""
end
# Given a form action, return the appropriate path to use for the CSRF token.
# This makes it easier to generate request-specific tokens without having to
# worry about the different types of form actions (relative paths, absolute
# paths, URLs, empty paths).
def csrf_path(action)
case action
when nil, '', /\A[#?]/
# use current path
request.path
when /\A(?:https?:\/)?\//
# Either full URI or absolute path, extract just the path
URI.parse(action).path
else
# relative path, join to current path
URI.join(request.url, action).path
end
end
# An HTML hidden input tag string containing the CSRF token. See csrf_token for
# arguments.
def csrf_tag(*args)
""
end
# The value of the csrf token. For a path specific token, provide a path
# argument. By default, it a path is provided, the POST request method will
# be assumed. To generate a token for a non-POST request method, pass the
# method as the second argument.
def csrf_token(path=nil, method=('POST' if path))
token = SecureRandom.random_bytes(31)
token << csrf_hmac(token, method, path)
Base64.strict_encode64(token)
end
# Whether request-specific CSRF tokens should be used by default.
def use_request_specific_csrf_tokens?
csrf_options[:require_request_specific_tokens]
end
# Whether the submitted CSRF token is valid for the request. True if the
# request does not require a CSRF token.
def valid_csrf?(opts=OPTS)
csrf_invalid_message(opts).nil?
end
private
# Returns error message string if the CSRF token is not valid.
# Returns nil if the CSRF token is valid.
def csrf_invalid_message(opts)
opts = opts.empty? ? csrf_options : csrf_options.merge(opts)
method = request.request_method
unless opts[:check_request_methods].include?(method)
return
end
unless encoded_token = opts[:token]
encoded_token = case opts[:check_header]
when :only
env[opts[:env_header]]
when true
return (csrf_invalid_message(opts.merge(:check_header=>false)) && csrf_invalid_message(opts.merge(:check_header=>:only)))
else
@_request.params[opts[:field]]
end
end
unless encoded_token.is_a?(String)
return "encoded token is not a string"
end
if (rack_csrf_key = opts[:upgrade_from_rack_csrf_key]) && (rack_csrf_value = session[rack_csrf_key]) && csrf_compare(rack_csrf_value, encoded_token)
return
end
# 31 byte random initialization vector
# 32 byte HMAC
# 63 bytes total
# 84 bytes when base64 encoded
unless encoded_token.bytesize == 84
return "encoded token length is not 84"
end
begin
submitted_hmac = Base64.strict_decode64(encoded_token)
rescue ArgumentError
return "encoded token is not valid base64"
end
random_data = submitted_hmac.slice!(0...31)
if csrf_compare(csrf_hmac(random_data, method, @_request.path), submitted_hmac)
return
end
if opts[:require_request_specific_tokens]
"decoded token is not valid for request method and path"
else
unless csrf_compare(csrf_hmac(random_data, '', ''), submitted_hmac)
"decoded token is not valid for either request method and path or for blank method and path"
end
end
end
# Helper for getting the plugin options.
def csrf_options
opts[:route_csrf]
end
# Perform a constant-time comparison of the two strings, returning true if they match and false otherwise.
def csrf_compare(s1, s2)
Rack::Utils.secure_compare(s1, s2)
end
# Return the HMAC-SHA-256 for the secret and the given arguments.
def csrf_hmac(random_data, method, path)
OpenSSL::HMAC.digest(OpenSSL::Digest::SHA256.new, csrf_secret, "#{method.to_s.upcase}#{path}#{random_data}")
end
# If a secret has not already been specified, generate a random 32-byte
# secret, stored base64 encoded in the session (to handle cases where
# JSON is used for session serialization).
def csrf_secret
key = session[csrf_options[:key]] ||= SecureRandom.base64(32)
Base64.strict_decode64(key)
end
end
end
register_plugin(:route_csrf, RouteCsrf)
end
end