2022-06-25 00:34:27 +03:00
/ * *
* @ description Meshcentral web relay server
* @ author Ylian Saint - Hilaire
* @ copyright Intel Corporation 2018 - 2022
* @ license Apache - 2.0
* @ version v0 . 0.1
* /
/*jslint node: true */
/*jshint node: true */
/*jshint strict:false */
/*jshint -W097 */
/*jshint esversion: 6 */
"use strict" ;
// Construct a HTTP redirection web server object
module . exports . CreateWebRelayServer = function ( parent , db , args , certificates , func ) {
var obj = { } ;
obj . parent = parent ;
obj . db = db ;
obj . express = require ( 'express' ) ;
2022-06-25 23:29:24 +03:00
obj . session = require ( 'cookie-session' ) ;
2022-06-25 00:34:27 +03:00
obj . expressWs = null ;
obj . tlsServer = null ;
obj . net = require ( 'net' ) ;
obj . app = obj . express ( ) ;
obj . webRelayServer = null ;
2022-06-25 02:53:31 +03:00
obj . port = 0 ;
2022-06-27 02:55:07 +03:00
obj . cleanupTimer = null ;
var nextSessionId = 1 ;
var relaySessions = { } // RelayID --> Web Mutli-Tunnel
2022-06-25 00:34:27 +03:00
const constants = ( require ( 'crypto' ) . constants ? require ( 'crypto' ) . constants : require ( 'constants' ) ) ; // require('constants') is deprecated in Node 11.10, use require('crypto').constants instead.
var tlsSessionStore = { } ; // Store TLS session information for quick resume.
var tlsSessionStoreCount = 0 ; // Number of cached TLS session information in store.
2022-06-25 23:29:24 +03:00
function serverStart ( ) {
if ( args . trustedproxy ) {
// Reverse proxy should add the "X-Forwarded-*" headers
try {
obj . app . set ( 'trust proxy' , args . trustedproxy ) ;
} catch ( ex ) {
// If there is an error, try to resolve the string
if ( ( args . trustedproxy . length == 1 ) && ( typeof args . trustedproxy [ 0 ] == 'string' ) ) {
require ( 'dns' ) . lookup ( args . trustedproxy [ 0 ] , function ( err , address , family ) { if ( err == null ) { obj . app . set ( 'trust proxy' , address ) ; args . trustedproxy = [ address ] ; } } ) ;
}
2022-06-25 02:53:31 +03:00
}
}
2022-06-25 23:29:24 +03:00
else if ( typeof args . tlsoffload == 'object' ) {
// Reverse proxy should add the "X-Forwarded-*" headers
try {
obj . app . set ( 'trust proxy' , args . tlsoffload ) ;
} catch ( ex ) {
// If there is an error, try to resolve the string
if ( ( Array . isArray ( args . tlsoffload ) ) && ( args . tlsoffload . length == 1 ) && ( typeof args . tlsoffload [ 0 ] == 'string' ) ) {
require ( 'dns' ) . lookup ( args . tlsoffload [ 0 ] , function ( err , address , family ) { if ( err == null ) { obj . app . set ( 'trust proxy' , address ) ; args . tlsoffload = [ address ] ; } } ) ;
}
2022-06-25 02:53:31 +03:00
}
}
2022-06-25 23:29:24 +03:00
// Setup cookie session
var sessionOptions = {
name : 'xid' , // Recommended security practice to not use the default cookie name
httpOnly : true ,
keys : [ args . sessionkey ] , // If multiple instances of this server are behind a load-balancer, this secret must be the same for all instances
secure : ( args . tlsoffload == null ) , // Use this cookie only over TLS (Check this: https://expressjs.com/en/guide/behind-proxies.html)
sameSite : args . sessionsamesite
}
if ( args . sessiontime != null ) { sessionOptions . maxAge = ( args . sessiontime * 60 * 1000 ) ; }
obj . app . use ( obj . session ( sessionOptions ) ) ;
// Add HTTP security headers to all responses
obj . app . use ( function ( req , res , next ) {
parent . debug ( 'webrequest' , req . url + ' (RelayServer)' ) ;
res . removeHeader ( 'X-Powered-By' ) ;
res . set ( {
'strict-transport-security' : 'max-age=60000; includeSubDomains' ,
'Referrer-Policy' : 'no-referrer' ,
'x-frame-options' : 'SAMEORIGIN' ,
'X-XSS-Protection' : '1; mode=block' ,
'X-Content-Type-Options' : 'nosniff' ,
'Content-Security-Policy' : "default-src 'none'; style-src 'self' 'unsafe-inline';"
} ) ;
// Set the real IP address of the request
// If a trusted reverse-proxy is sending us the remote IP address, use it.
var ipex = '0.0.0.0' , xforwardedhost = req . headers . host ;
if ( typeof req . connection . remoteAddress == 'string' ) { ipex = ( req . connection . remoteAddress . startsWith ( '::ffff:' ) ) ? req . connection . remoteAddress . substring ( 7 ) : req . connection . remoteAddress ; }
if (
( args . trustedproxy === true ) || ( args . tlsoffload === true ) ||
( ( typeof args . trustedproxy == 'object' ) && ( isIPMatch ( ipex , args . trustedproxy ) ) ) ||
( ( typeof args . tlsoffload == 'object' ) && ( isIPMatch ( ipex , args . tlsoffload ) ) )
) {
// Get client IP
if ( req . headers [ 'cf-connecting-ip' ] ) { // Use CloudFlare IP address if present
req . clientIp = req . headers [ 'cf-connecting-ip' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else if ( req . headers [ 'x-forwarded-for' ] ) {
req . clientIp = req . headers [ 'x-forwarded-for' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else if ( req . headers [ 'x-real-ip' ] ) {
req . clientIp = req . headers [ 'x-real-ip' ] . split ( ',' ) [ 0 ] . trim ( ) ;
} else {
req . clientIp = ipex ;
}
// If there is a port number, remove it. This will only work for IPv4, but nice for people that have a bad reverse proxy config.
const clientIpSplit = req . clientIp . split ( ':' ) ;
if ( clientIpSplit . length == 2 ) { req . clientIp = clientIpSplit [ 0 ] ; }
// Get server host
if ( req . headers [ 'x-forwarded-host' ] ) { xforwardedhost = req . headers [ 'x-forwarded-host' ] . split ( ',' ) [ 0 ] ; } // If multiple hosts are specified with a comma, take the first one.
2022-06-25 02:53:31 +03:00
} else {
req . clientIp = ipex ;
}
2022-06-25 23:29:24 +03:00
// Check if this there is a multi-tunnel for this request
if ( req . url . startsWith ( '/control-redirect.ashx?n=' ) ) {
return next ( ) ;
} else {
if ( ( req . session . userid != null ) && ( req . session . rid != null ) ) {
2022-06-27 02:55:07 +03:00
var relaySession = relaySessions [ req . session . userid + '/' + req . session . rid ] ;
if ( relaySession != null ) {
2022-06-26 02:22:51 +03:00
// The multi-tunnel session is valid, use it
2022-06-27 02:55:07 +03:00
relaySession . handleRequest ( req , res ) ;
2022-06-26 02:22:51 +03:00
} else {
// No multi-tunnel session with this relay identifier, close the HTTP request.
res . end ( ) ;
}
2022-06-25 23:29:24 +03:00
} else {
2022-06-26 02:22:51 +03:00
// The user is not logged in or does not have a relay identifier, close the HTTP request.
2022-06-25 23:29:24 +03:00
res . end ( ) ;
}
}
} ) ;
// This is the magic URL that will setup the relay session
obj . app . get ( '/control-redirect.ashx' , function ( req , res ) {
if ( ( req . session == null ) || ( req . session . userid == null ) ) { res . redirect ( '/' ) ; return ; }
res . set ( { 'Cache-Control' : 'no-store' } ) ;
parent . debug ( 'web' , 'webRelaySetup' ) ;
2022-06-25 02:53:31 +03:00
2022-06-25 23:29:24 +03:00
// Check that all the required arguments are present
if ( ( req . session . userid == null ) || ( req . query . n == null ) || ( req . query . p == null ) || ( ( req . query . appid != 1 ) && ( req . query . appid != 2 ) ) ) { res . redirect ( '/' ) ; return ; }
// Get the user and domain information
const userid = req . session . userid ;
const domainid = userid . split ( '/' ) [ 1 ] ;
const domain = parent . config . domains [ domainid ] ;
2022-06-26 02:22:51 +03:00
const nodeid = ( ( req . query . relayid != null ) ? req . query . relayid : req . query . n ) ;
const addr = ( req . query . addr != null ) ? req . query . addr : '127.0.0.1' ;
const port = parseInt ( req . query . p ) ;
2022-06-26 08:10:07 +03:00
const appid = parseInt ( req . query . appid ) ;
2022-06-26 02:22:51 +03:00
// Check to see if we already have a multi-relay session that matches exactly this device and port for this user
2022-06-27 02:55:07 +03:00
var relaySession = null ;
for ( var i in relaySessions ) {
const xrelaySession = relaySessions [ i ] ;
if ( ( xrelaySession . domain . id == domain . id ) && ( xrelaySession . userid == userid ) && ( xrelaySession . nodeid == nodeid ) && ( xrelaySession . addr == addr ) && ( xrelaySession . port == port ) && ( xrelaySession . appid == appid ) ) {
relaySession = xrelaySession ; // We found an exact match
2022-06-26 02:22:51 +03:00
}
}
2022-06-25 23:29:24 +03:00
2022-06-27 02:55:07 +03:00
if ( relaySession != null ) {
2022-06-26 02:22:51 +03:00
// Since we found a match, use it
2022-06-27 02:55:07 +03:00
req . session . rid = relaySession . sessionId ;
2022-06-26 02:22:51 +03:00
} else {
2022-06-27 02:55:07 +03:00
// Create a web relay session
relaySession = require ( './apprelays.js' ) . CreateWebRelaySession ( parent , db , req , args , domain , userid , nodeid , addr , port , appid ) ;
relaySession . onclose = function ( sessionId ) {
// Remove the relay session
delete relaySessions [ sessionId ] ;
// If there are not more relay sessions, clear the cleanup timer
if ( ( Object . keys ( relaySessions ) . length == 0 ) && ( obj . cleanupTimer != null ) ) { clearInterval ( obj . cleanupTimer ) ; obj . cleanupTimer = null ; }
}
relaySession . sessionId = nextSessionId ++ ;
// Set the multi-tunnel session
relaySessions [ userid + '/' + relaySession . sessionId ] = relaySession ;
req . session . rid = relaySession . sessionId ;
// Setup the cleanup timer if needed
if ( obj . cleanupTimer == null ) { obj . cleanupTimer = setInterval ( checkTimeout , 10000 ) ; }
2022-06-26 02:22:51 +03:00
}
2022-06-25 23:29:24 +03:00
// Redirect to root
res . redirect ( '/' ) ;
} ) ;
// Start the server, only after users and meshes are loaded from the database.
if ( args . tlsoffload ) {
// Setup the HTTP server without TLS
obj . expressWs = require ( 'express-ws' ) ( obj . app , null , { wsOptions : { perMessageDeflate : ( args . wscompression === true ) } } ) ;
2022-06-25 02:53:31 +03:00
} else {
2022-06-25 23:29:24 +03:00
// Setup the HTTP server with TLS, use only TLS 1.2 and higher with perfect forward secrecy (PFS).
const tlsOptions = { cert : certificates . web . cert , key : certificates . web . key , ca : certificates . web . ca , rejectUnauthorized : true , ciphers : "HIGH:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256:TLS_AES_128_CCM_8_SHA256:TLS_AES_128_CCM_SHA256:TLS_CHACHA20_POLY1305_SHA256" , secureOptions : constants . SSL _OP _NO _SSLv2 | constants . SSL _OP _NO _SSLv3 | constants . SSL _OP _NO _COMPRESSION | constants . SSL _OP _CIPHER _SERVER _PREFERENCE | constants . SSL _OP _NO _TLSv1 | constants . SSL _OP _NO _TLSv1 _1 } ;
obj . tlsServer = require ( 'https' ) . createServer ( tlsOptions , obj . app ) ;
obj . tlsServer . on ( 'secureConnection' , function ( ) { /*console.log('tlsServer secureConnection');*/ } ) ;
obj . tlsServer . on ( 'error' , function ( err ) { console . log ( 'tlsServer error' , err ) ; } ) ;
obj . tlsServer . on ( 'newSession' , function ( id , data , cb ) { if ( tlsSessionStoreCount > 1000 ) { tlsSessionStoreCount = 0 ; tlsSessionStore = { } ; } tlsSessionStore [ id . toString ( 'hex' ) ] = data ; tlsSessionStoreCount ++ ; cb ( ) ; } ) ;
obj . tlsServer . on ( 'resumeSession' , function ( id , cb ) { cb ( null , tlsSessionStore [ id . toString ( 'hex' ) ] || null ) ; } ) ;
obj . expressWs = require ( 'express-ws' ) ( obj . app , obj . tlsServer , { wsOptions : { perMessageDeflate : ( args . wscompression === true ) } } ) ;
2022-06-25 02:53:31 +03:00
}
2022-06-25 00:34:27 +03:00
}
2022-06-27 02:55:07 +03:00
// Check that everything is cleaned up
function checkTimeout ( ) {
for ( var i in relaySessions ) { relaySessions [ i ] . checkTimeout ( ) ; }
}
2022-06-25 00:34:27 +03:00
// Find a free port starting with the specified one and going up.
function CheckListenPort ( port , addr , func ) {
var s = obj . net . createServer ( function ( socket ) { } ) ;
obj . webRelayServer = s . listen ( port , addr , function ( ) { s . close ( function ( ) { if ( func ) { func ( port , addr ) ; } } ) ; } ) . on ( "error" , function ( err ) {
if ( args . exactports ) { console . error ( "ERROR: MeshCentral HTTP relay server port " + port + " not available." ) ; process . exit ( ) ; }
else { if ( port < 65535 ) { CheckListenPort ( port + 1 , addr , func ) ; } else { if ( func ) { func ( 0 ) ; } } }
} ) ;
}
// Start the ExpressJS web server, if the port is busy try the next one.
function StartWebRelayServer ( port , addr ) {
if ( port == 0 || port == 65535 ) { return ; }
if ( obj . tlsServer != null ) {
if ( args . lanonly == true ) {
obj . tcpServer = obj . tlsServer . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTPS relay server running on port ' + port + ( ( args . aliasport != null ) ? ( ', alias port ' + args . aliasport ) : '' ) + '.' ) ; } ) ;
} else {
obj . tcpServer = obj . tlsServer . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTPS relay server running on ' + certificates . CommonName + ':' + port + ( ( args . aliasport != null ) ? ( ', alias port ' + args . aliasport ) : '' ) + '.' ) ; } ) ;
obj . parent . updateServerState ( 'servername' , certificates . CommonName ) ;
}
if ( obj . parent . authlog ) { obj . parent . authLog ( 'https' , 'Web relay server listening on ' + ( ( addr != null ) ? addr : '0.0.0.0' ) + ' port ' + port + '.' ) ; }
obj . parent . updateServerState ( 'https-relay-port' , port ) ;
if ( args . aliasport != null ) { obj . parent . updateServerState ( 'https-relay-aliasport' , args . aliasport ) ; }
} else {
obj . tcpServer = obj . app . listen ( port , addr , function ( ) { console . log ( 'MeshCentral HTTP relay server running on port ' + port + ( ( args . aliasport != null ) ? ( ', alias port ' + args . aliasport ) : '' ) + '.' ) ; } ) ;
obj . parent . updateServerState ( 'http-relay-port' , port ) ;
if ( args . aliasport != null ) { obj . parent . updateServerState ( 'http-relay-aliasport' , args . aliasport ) ; }
}
2022-06-25 02:53:31 +03:00
obj . port = port ;
2022-06-25 00:34:27 +03:00
}
2022-06-25 23:29:24 +03:00
function getRandomPassword ( ) { return Buffer . from ( require ( 'crypto' ) . randomBytes ( 9 ) , 'binary' ) . toString ( 'base64' ) . split ( '/' ) . join ( '@' ) ; }
// Start up the web relay server
serverStart ( ) ;
2022-06-25 00:34:27 +03:00
CheckListenPort ( args . relayport , args . relayportbind , StartWebRelayServer ) ;
return obj ;
} ;