1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
|
// SPDX-License-Identifier: BSD-2-Clause
// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>
package main
import (
"encoding/base64"
"errors"
"log/slog"
"net/http"
"strings"
)
// handler handles an incoming HTTP request.
func handler(writer http.ResponseWriter, request *http.Request) {
remoteIP := getRemoteIP(request)
userAgent := request.Header.Get("User-Agent")
uri := request.RequestURI
// Static resources for powxy itself.
if strings.HasPrefix(request.URL.Path, "/.powxy/") {
http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
return
}
// We attempt to fetch the powxy cookie. Its non-existence
// does not matter here; if the cookie does not exist, it
// will be nil, so validation will simply fail and the user
// will be prompted to solve the PoW challenge.
cookie, err := request.Cookie("powxy")
if err != nil && !errors.Is(err, http.ErrNoCookie) {
slog.Error("error fetching cookie",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
"error", err,
)
http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
return
}
// We generate the identifier that identifies the client,
// and the expected HMAC that the cookie should include.
identifier, expectedMAC := makeIdentifierMAC(request)
// If the cookie exists and is valid, we simply proxy the
// request.
if validateCookie(cookie, expectedMAC) {
slog.Info("proxying request",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
)
proxyRequest(writer, request)
return
}
// A convenience function to render the challenge page,
// since all parameters but the message are constant at this
// point.
challengePage := func(message string) {
err := tmpl.Execute(writer, tparams{
Identifier: base64.StdEncoding.EncodeToString(identifier),
Message: message,
Global: global,
})
if err != nil {
slog.Error("template execution failed",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
"error", err,
)
}
}
// This generally shouldn't happen, at least not for web
// browesrs.
err = request.ParseForm()
if err != nil {
slog.Warn("malformed form submission",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
"error", err,
)
challengePage("You submitted a malformed form.")
return
}
formValues, ok := request.PostForm["powxy"]
if !ok {
// If there's simply no form value, the user is probably
// just visiting the site for the first time or with an
// expired cookie.
slog.Info("serving challenge page",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
)
challengePage("")
return
} else if len(formValues) != 1 {
// This should never happen, at least not for web
// browsers.
slog.Warn("invalid number of form values",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
)
challengePage("You submitted an invalid number of form values.")
return
}
// We validate that the length is reasonable before even
// decoding it with base64.
if len(formValues[0]) > 43 {
slog.Warn("submission too long",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
"form_value", formValues[0],
)
challengePage("Your submission was too long.")
return
}
// Actually decode the base64 value.
nonce, err := base64.StdEncoding.DecodeString(formValues[0])
if err != nil {
slog.Warn("base64 decoding failed",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
"error", err,
)
challengePage("Your submission was improperly encoded.")
return
}
// Validate the nonce.
if !validateNonce(identifier, nonce) {
slog.Warn("wrong nonce",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
)
challengePage("Your submission was incorrect, or your session has expired while submitting.")
return
}
// Everything starting here: the nonce is valid, and we
// can set the cookie and redirect them. The redirection is
// needed as their "normal" request is most definitely
// different from one to expect after solving the PoW
// challenge.
http.SetCookie(writer, &http.Cookie{
Name: "powxy",
Value: base64.StdEncoding.EncodeToString(expectedMAC),
Secure: true,
HttpOnly: true,
})
slog.Info("accepted proof of work",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
)
http.Redirect(writer, request, "", http.StatusSeeOther)
}
// tparams holds parameters for the template.
type tparams struct {
Identifier string
Message string
Global any
}
|