aboutsummaryrefslogtreecommitdiff
path: root/main.go
blob: 96678419ca15954b4f96dfbc0704d07e962605dc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128

// SPDX-License-Identifier: BSD-2-Clause
// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>

package main

import (
	"encoding/base64"
	"errors"
	"log"
	"net/http"
	"strings"
)

type tparams struct {
	Identifier string
	Message    string
	Global     any
}

func main() {
	log.Fatal(http.ListenAndServe(listenAddr, http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {
		// Static resources for powxy itself.
		if strings.HasPrefix(request.URL.Path, "/.powxy/") {
			http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
			return
		}

		// We attempt to fetch the powxy cookie. Its non-existence
		// does not matter here; if the cookie does not exist, it
		// will be nil, so validation will simply fail and the user
		// will be prompted to solve the PoW challenge.
		cookie, err := request.Cookie("powxy")
		if err != nil && !errors.Is(err, http.ErrNoCookie) {
			log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
			return
		}

		// We generate the identifier that identifies the client,
		// and the expected HMAC that the cookie should include.
		identifier, expectedMAC := makeIdentifierMAC(request)

		// If the cookie exists and is valid, we simply proxy the
		// request.
		if validateCookie(cookie, expectedMAC) {
			log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			proxyRequest(writer, request)
			return
		}

		// A convenience function to render the challenge page,
		// since all parameters but the message are constant at this
		// point.
		challengePage := func(message string) {
			err := tmpl.Execute(writer, tparams{
				Identifier: base64.StdEncoding.EncodeToString(identifier),
				Message:    message,
				Global:     global,
			})
			if err != nil {
				log.Println("Error executing template:", err)
			}
		}

		// This generally shouldn't happen, at least not for web
		// browesrs.
		if request.ParseForm() != nil {
			log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("You submitted a malformed form.")
			return
		}

		formValues, ok := request.PostForm["powxy"]
		if !ok {
			// If there's simply no form value, the user is probably
			// just visiting the site for the first time or with an
			// expired cookie.
			log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("")
			return
		} else if len(formValues) != 1 {
			// This should never happen, at least not for web
			// browsers.
			log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("You submitted an invalid number of form values.")
			return
		}

		// We validate that the length is reasonable before even
		// decoding it with base64.
		if len(formValues[0]) > 43 {
			log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("Your submission was too long.")
			return
		}

		// Actually decode the base64 value.
		nonce, err := base64.StdEncoding.DecodeString(formValues[0])
		if err != nil {
			log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("Your submission was improperly encoded.")
			return
		}

		// Validate the nonce.
		if !validateNonce(identifier, nonce) {
			log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
			challengePage("Your submission was incorrect, or your session has expired while submitting.")
			return
		}

		// Everything starting here: the nonce is valid, and we
		// can set the cookie and redirect them. The redirection is
		// needed as their "normal" request is most definitely
		// different from one to expect after solving the PoW
		// challenge.

		http.SetCookie(writer, &http.Cookie{
			Name:     "powxy",
			Value:    base64.StdEncoding.EncodeToString(expectedMAC),
			Secure:   true,
			HttpOnly: true,
		})

		log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		http.Redirect(writer, request, "", http.StatusSeeOther)
	})))
}