Merge pull request #451 from NuSkooler/449-nntp-write-access

Initial NNTP write access support

This will now be beta tested on Xibalba
This commit is contained in:
Bryan Ashby 2022-09-26 00:32:33 +00:00 committed by GitHub
commit 6e1c470b69
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 418 additions and 21 deletions

View File

@ -55,6 +55,7 @@ const ADDRESS_FLAVOR = {
FTN: 'ftn', // FTN style FTN: 'ftn', // FTN style
Email: 'email', // From email Email: 'email', // From email
QWK: 'qwk', // QWK packet QWK: 'qwk', // QWK packet
NNTP: 'nntp', // NNTP article POST; often a email address
}; };
const STATE_FLAGS0 = { const STATE_FLAGS0 = {

View File

@ -9,6 +9,7 @@ const { getTransactionDatabase, getModDatabasePath } = require('../../database.j
const { const {
getMessageAreaByTag, getMessageAreaByTag,
getMessageConferenceByTag, getMessageConferenceByTag,
persistMessage,
} = require('../../message_area.js'); } = require('../../message_area.js');
const User = require('../../user.js'); const User = require('../../user.js');
const Errors = require('../../enig_error.js').Errors; const Errors = require('../../enig_error.js').Errors;
@ -21,6 +22,7 @@ const {
} = require('../../string_util.js'); } = require('../../string_util.js');
const AnsiPrep = require('../../ansi_prep.js'); const AnsiPrep = require('../../ansi_prep.js');
const { stripMciColorCodes } = require('../../color_codes.js'); const { stripMciColorCodes } = require('../../color_codes.js');
const ACS = require('../../acs');
// deps // deps
const NNTPServerBase = require('nntp-server'); const NNTPServerBase = require('nntp-server');
@ -111,6 +113,38 @@ class NNTPDatabase {
let nntpDatabase; let nntpDatabase;
const AuthCommands = 'POST';
// these aren't exported by the NNTP module, unfortunantely
const Responses = {
ArticlePostedOk: '240 article posted ok',
SendArticle: '340 send article to be posted',
PostingNotAllowed: '440 posting not allowed',
ArticlePostFailed: '441 posting failed',
AuthRequired: '480 authentication required',
};
const PostCommand = {
head: 'POST',
validate: /^POST$/i,
run(session, cmd) {
if (!session.authenticated) {
session.receivingPostArticle = false; // ensure reset
return Responses.AuthRequired;
}
session.receivingPostArticle = true;
return Responses.SendArticle;
},
capability(session, report) {
report.push('POST');
},
};
class NNTPServer extends NNTPServerBase { class NNTPServer extends NNTPServerBase {
constructor(options, serverName) { constructor(options, serverName) {
super(options); super(options);
@ -125,14 +159,26 @@ class NNTPServer extends NNTPServerBase {
} }
_needAuth(session, command) { _needAuth(session, command) {
if (AuthCommands.includes(command)) {
return !session.authenticated && !session.authUser;
}
return super._needAuth(session, command); return super._needAuth(session, command);
} }
_address(session) {
const addr = session.in_stream.remoteAddress;
return addr ? addr.replace(/^::ffff:/, '').replace(/^::1$/, 'localhost') : 'N/A';
}
_authenticate(session) { _authenticate(session) {
const username = session.authinfo_user; const username = session.authinfo_user;
const password = session.authinfo_pass; const password = session.authinfo_pass;
this.log.trace({ username }, 'Authentication request'); this.log.debug(
{ username, ip: this._address(session) },
`NNTP authentication request for "${username}"`
);
return new Promise(resolve => { return new Promise(resolve => {
const user = new User(); const user = new User();
@ -140,17 +186,19 @@ class NNTPServer extends NNTPServerBase {
{ type: User.AuthFactor1Types.Password, username, password }, { type: User.AuthFactor1Types.Password, username, password },
err => { err => {
if (err) { if (err) {
// :TODO: Log IP address this.log.warn(
this.log.debug( { username, reason: err.message, ip: this._address(session) },
{ username, reason: err.message }, `NNTP authentication failure for "${username}"`
'Authentication failure'
); );
return resolve(false); return resolve(false);
} }
session.authUser = user; session.authUser = user;
this.log.debug({ username }, 'User authenticated successfully'); this.log.info(
{ username, ip: this._address(session) },
`NTTP authentication success for "${username}"`
);
return resolve(true); return resolve(true);
} }
); );
@ -232,6 +280,7 @@ class NNTPServer extends NNTPServerBase {
message.nntpHeaders = { message.nntpHeaders = {
From: this.getJAMStyleFrom(message, fromName), From: this.getJAMStyleFrom(message, fromName),
'X-Comment-To': toName, 'X-Comment-To': toName,
To: toName, // JAM-ish
Newsgroups: session.group.name, Newsgroups: session.group.name,
Subject: message.subject, Subject: message.subject,
Date: this.getMessageDate(message), Date: this.getMessageDate(message),
@ -343,7 +392,7 @@ class NNTPServer extends NNTPServerBase {
messageUuid = msg && msg.messageUuid; messageUuid = msg && msg.messageUuid;
} else { } else {
// <Message-ID> request // <Message-ID> request
[, messageUuid] = this.getMessageIdentifierParts(messageId); [, messageUuid] = NNTPServer.getMessageIdentifierParts(messageId);
} }
if (!_.isString(messageUuid)) { if (!_.isString(messageUuid)) {
@ -394,7 +443,7 @@ class NNTPServer extends NNTPServerBase {
) )
) { ) {
this.log.info( this.log.info(
{ messageUuid, messageId }, { messageUuid, messageId, ip: this._address(session) },
'Access denied for message' 'Access denied for message'
); );
return resolve(null); return resolve(null);
@ -592,15 +641,33 @@ class NNTPServer extends NNTPServerBase {
if (!conf) { if (!conf) {
return false; return false;
} }
// :TODO: validate ACS
const area = getMessageAreaByTag(areaTag, confTag); const area = getMessageAreaByTag(areaTag, confTag);
if (!area) { if (!area) {
return false; return false;
} }
// :TODO: validate ACS
return false; const acs = new ACS({ client: null, user: session.authUser });
return acs.hasMessageConfRead(conf) && acs.hasMessageAreaRead(area);
}
static hasConfAndAreaWriteAccess(session, confTag, areaTag) {
if (Message.isPrivateAreaTag(areaTag)) {
return false;
}
const conf = getMessageConferenceByTag(confTag);
if (!conf) {
return false;
}
const area = getMessageAreaByTag(areaTag, confTag);
if (!area) {
return false;
}
const acs = new ACS({ client: null, user: session.authUser });
return acs.hasMessageConfWrite(conf) && acs.hasMessageAreaWrite(area);
} }
getGroup(session, groupName, cb) { getGroup(session, groupName, cb) {
@ -861,7 +928,7 @@ class NNTPServer extends NNTPServerBase {
return this.makeMessageIdentifier(message.messageId, message.messageUuid); return this.makeMessageIdentifier(message.messageId, message.messageUuid);
} }
getMessageIdentifierParts(messageId) { static getMessageIdentifierParts(messageId) {
const m = messageId.match( const m = messageId.match(
/<([0-9]+)\.([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})@enigma-bbs>/ /<([0-9]+)\.([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})@enigma-bbs>/
); );
@ -919,6 +986,240 @@ class NNTPServer extends NNTPServerBase {
areaTag areaTag
).replace(/\./g, '_')}`; ).replace(/\./g, '_')}`;
} }
static _importMessage(session, articleLines, cb) {
const tidyFrom = f => {
if (f) {
// remove quotes around name, if present
let m = /^"([^"]+)" <([^>]+)>$/.exec(f);
if (m && m[1] && m[2]) {
f = `${m[1]} <${m[2]}>`;
}
}
return f;
};
asyncWaterfall(
[
callback => {
return NNTPServer._parseArticleLines(articleLines, callback);
},
(parsed, callback) => {
// gather some initially important bits
const subject = parsed.header.get('subject');
const to = parsed.header.get('to') || parsed.header.get('x-jam-to'); // non-standard, may be missing
const from = tidyFrom(
parsed.header.get('from') ||
parsed.header.get('sender') ||
parsed.header.get('x-jam-from')
);
const date = parsed.header.get('date'); // if not present we'll use 'now'
const newsgroups = parsed.header
.get('newsgroups')
.split(',')
.map(ng => {
const [confTag, areaTag] = ng.split('.');
return { confTag, areaTag };
});
// validate areaTag exists -- currently only a single area/post; no x-posts
// :TODO: look into x-posting
const area = getMessageAreaByTag(newsgroups[0].areaTag);
if (!area) {
return callback(
Errors.DoesNotExist(
`No area by tag "${newsgroups[0].areaTag}" exists!`
)
);
}
// NOTE: Not all ACS checks work with NNTP since we don't have a standard client;
// If a particular ACS requires a |client|, it will return false!
if (
!NNTPServer.hasConfAndAreaWriteAccess(
session,
area.confTag,
area.areaTag
)
) {
return callback(
Errors.AccessDenied(
`No ACS to ${area.confTag}/${area.areaTag}`
)
);
}
if (
!_.isString(subject) ||
!_.isString(from) ||
!Array.isArray(newsgroups)
) {
return callback(
Errors.Invalid('Missing one or more required article fields')
);
}
return callback(null, {
subject,
from,
date,
newsgroups,
to,
parsed,
});
},
(msgData, callback) => {
if (msgData.to) {
return callback(null, msgData);
}
//
// We don't have a 'to' field, try to derive if this is a
// response to a message. If not, just fall back 'All'
//
// 'References'
// - https://www.rfc-editor.org/rfc/rfc5536#section-3.2.10
// - https://www.rfc-editor.org/rfc/rfc5322.html
//
// 'In-Reply-To'
// - https://www.rfc-editor.org/rfc/rfc5322.html
//
// Both may contain 1:N, "optionally" separated by CFWS; by this
// point in the code, they should be space separated at most.
//
// Each entry is in msg-id format. That is:
// "<" id-left "@" id-right ">"
//
msgData.to = 'All'; // fallback
let parentMessageId = (
msgData.parsed.header.get('in-reply-to') ||
msgData.parsed.header.get('references') ||
''
).split(' ')[0];
if (parentMessageId) {
let [_, messageUuid] =
NNTPServer.getMessageIdentifierParts(parentMessageId);
if (messageUuid) {
const filter = {
resultType: 'messageList',
uuids: messageUuid,
limit: 1,
};
return Message.findMessages(filter, (err, messageList) => {
if (err) {
return callback(err);
}
// current message/article is a reply to this message:
msgData.to = messageList[0].fromUserName;
msgData.replyToMsgId = messageList[0].replyToMsgId; // may not be present
return callback(null, msgData);
});
}
}
return callback(null, msgData);
},
(msgData, callback) => {
const message = new Message({
toUserName: msgData.to,
fromUserName: msgData.from,
subject: msgData.subject,
replyToMsgId: msgData.replyToMsgId || 0,
modTimestamp: msgData.date, // moment can generally parse these
// :TODO: inspect Content-Type 'charset' if present & attempt to properly decode if not UTF-8
message: msgData.parsed.body.join('\n'),
areaTag: msgData.newsgroups[0].areaTag,
});
message.meta.System[Message.SystemMetaNames.ExternalFlavor] =
Message.AddressFlavor.NNTP;
// :TODO: investigate JAMNTTP clients/etc.
// :TODO: slurp in various X-XXXX kludges/etc. and bring them in
persistMessage(message, err => {
if (!err) {
Log.info(
`NNTP post to "${message.areaTag}" by "${session.authUser.username}": "${message.subject}"`
);
}
return callback(err);
});
},
],
err => {
return cb(err);
}
);
}
static _parseArticleLines(articleLines, cb) {
//
// Split articleLines into:
// - Header split into N:V pairs
// - Message Body lines
// -
const header = new Map();
const body = [];
let inHeader = true;
let currentHeaderName;
forEachSeries(
articleLines,
(line, nextLine) => {
if (inHeader) {
if (line === '.' || line === '') {
inHeader = false;
return nextLine(null);
}
const sep = line.indexOf(':');
if (sep < 1) {
// at least a single char name
// entries can split across lines -- they will be prefixed with a single space.
if (
currentHeaderName &&
(line.startsWith(' ') || line.startsWith('\t'))
) {
let v = header.get(currentHeaderName);
v += line
.replace(/^\t/, ' ') // if we're dealign with a legacy tab
.trimRight();
header.set(currentHeaderName, v);
return nextLine(null);
}
return nextLine(
Errors.Invalid(
`"${line}" is not a valid NNTP message header!`
)
);
}
currentHeaderName = line.slice(0, sep).trim().toLowerCase();
const value = line.slice(sep + 1).trim();
header.set(currentHeaderName, value);
return nextLine(null);
}
// body
if (line !== '.') {
// lines consisting of a single '.' are escaped to '..'
if (line.startsWith('..')) {
body.push(line.slice(1));
} else {
body.push(line);
}
}
return nextLine(null);
},
err => {
return cb(err, { header, body });
}
);
}
} }
exports.getModule = class NNTPServerModule extends ServerModule { exports.getModule = class NNTPServerModule extends ServerModule {
@ -985,11 +1286,92 @@ exports.getModule = class NNTPServerModule extends ServerModule {
const config = Config(); const config = Config();
// :TODO: nntp-server doesn't currently allow posting in a nice way, so this is kludged in. Fork+MR something cleaner at some point
class ProxySession extends NNTPServerBase.Session {
constructor(server, stream) {
super(server, stream);
this.articleLinesBuffer = [];
}
parse(data) {
if (this.receivingPostArticle) {
return this.receivePostArticleData(data);
}
super.parse(data);
}
receivePostArticleData(data) {
this.articleLinesBuffer.push(...data.split(/r?\n/));
const endOfPost = data.length === 1 && data[0] === '.';
if (endOfPost) {
this.receivingPostArticle = false;
// Command is not exported currently; maybe submit a MR to allow posting in a nicer way...
function Command(runner, articleLines, session) {
this.state = 0; // CMD_WAIT
this.cmd_line = 'POST';
this.resolved_value = null;
this.rejected_value = null;
this.run = runner;
this.articleLines = articleLines;
this.session = session;
}
this.pipeline.push(
new Command(
this._processarticleLinesBuffer,
this.articleLinesBuffer,
this
)
);
this.articleLinesBuffer = [];
this.tick();
}
}
_processarticleLinesBuffer() {
return new Promise(resolve => {
NNTPServer._importMessage(this.session, this.articleLines, err => {
if (err) {
this.rejected_value = err; // will be serialized and 403 sent back currently; not really ideal as we want ArticlePostFailed
// :TODO: tick() needs updated in session.js such that we can write back a proper code
this.state = 3; // CMD_REJECTED
Log.error(
{ error: err.message },
`NNTP post failed: ${err.message}`
);
} else {
this.resolved_value = Responses.ArticlePostedOk;
this.state = 2; // CMD_RESOLVED
}
return resolve();
});
});
}
static create(server, stream) {
return new ProxySession(server, stream);
}
}
const commonOptions = { const commonOptions = {
//requireAuth : true, // :TODO: re-enable! // :TODO: How to hook into debugging?!
// :TODO: override |session| - use our own debug to Bunyan, etc.
}; };
if (true === _.get(config, 'contentServers.nntp.allowPosts')) {
// add in some additional supported commands
const commands = Object.assign({}, NNTPServerBase.commands, {
POST: PostCommand,
});
commonOptions.commands = commands;
commonOptions.session = ProxySession;
}
if (this.enableNntp) { if (this.enableNntp) {
this.nntpServer = new NNTPServer( this.nntpServer = new NNTPServer(
// :TODO: according to docs: if connection is non-tls, but behind proxy (assuming TLS termination?!!) then set this to true // :TODO: according to docs: if connection is non-tls, but behind proxy (assuming TLS termination?!!) then set this to true

View File

@ -6,14 +6,17 @@ title: NNTP Server
The NNTP *content server* provides access to publicly exposed message conferences and areas over either **secure** NNTPS (NNTP over TLS or nttps://) and/or non-secure NNTP (nntp://). The NNTP *content server* provides access to publicly exposed message conferences and areas over either **secure** NNTPS (NNTP over TLS or nttps://) and/or non-secure NNTP (nntp://).
## Configuration ## Configuration
The following keys are available within the `contentServers.nntp` configuration block:
| Item | Required | Description | | Item | Required | Description |
|------|----------|-------------| |------|----------|-------------|
| `nntp` | :-1: | Configuration block for non-secure NNTP. See Non-Secure NNTP Configuration below. | | `nntp` | :-1: | Configuration block for non-secure NNTP. See [Non-Secure NNTP Configuration](#non-secure-configuration). |
| `nntps` | :-1: | Configuration block for secure NNTP. See Secure NNTPS Configuration below. | | `nntps` | :-1: | Configuration block for secure NNTP. See [Secure Configuration (NNTPS)](#secure-configuration-nntps) |
| `publicMessageConferences` | :+1: | A map of *conference tags* to *area tags* that are publicly exposed over NNTP. Anonymous users will get read-only access to these areas. | | `publicMessageConferences` | :+1: | A map of *conference tags* to *area tags* that are publicly exposed over NNTP. <u>Anonymous users will gain read-only access to these areas</u>. |
| `allowPosts` | :-1: | Allow posting from <u>authenticated users</u>. See [Write Access](#write-access). Default is `false`.
### See Non-Secure NNTP Configuration ### Non-Secure Configuration
Under `contentServers.nntp.nntp` the following configuration is allowed: Under `contentServers.nntp.nntp` the following configuration is allowed:
| Item | Required | Description | | Item | Required | Description |
@ -21,7 +24,7 @@ Under `contentServers.nntp.nntp` the following configuration is allowed:
| `enabled` | :+1: | Set to `true` to enable non-secure NNTP access. | | `enabled` | :+1: | Set to `true` to enable non-secure NNTP access. |
| `port` | :-1: | Override the default port of `8119`. | | `port` | :-1: | Override the default port of `8119`. |
### Secure NNTPS Configuration ### Secure Configuration (NNTPS)
Under `contentServers.nntp.nntps` the following configuration is allowed: Under `contentServers.nntp.nntps` the following configuration is allowed:
| Item | Required | Description | | Item | Required | Description |
@ -34,16 +37,27 @@ Under `contentServers.nntp.nntps` the following configuration is allowed:
#### Certificates and Keys #### Certificates and Keys
In order to use secure NNTPS, a TLS certificate and key pair must be provided. You may generate your own but most clients **will not trust** them. A certificate and key from a trusted Certificate Authority is recommended. [Let's Encrypt](https://letsencrypt.org/) provides free TLS certificates. Certificates and private keys must be in [PEM format](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail). In order to use secure NNTPS, a TLS certificate and key pair must be provided. You may generate your own but most clients **will not trust** them. A certificate and key from a trusted Certificate Authority is recommended. [Let's Encrypt](https://letsencrypt.org/) provides free TLS certificates. Certificates and private keys must be in [PEM format](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail).
##### Generating Your Own ##### Generating a Certificate & Key Pair
An example of generating your own cert/key pair: An example of generating your own cert/key pair:
```bash ```bash
openssl req -newkey rsa:2048 -nodes -keyout ./config/nntps_key.pem -x509 -days 3050 -out ./config/nntps_cert.pem openssl req -newkey rsa:2048 -nodes -keyout ./config/nntps_key.pem -x509 -days 3050 -out ./config/nntps_cert.pem
``` ```
### Example Configuration ## Write Access
Authenticated users may write messages to a group given the following are true:
1. `allowPosts` is set to `true`
2. They are connected security (NNTPS). This is a strict requirement due to how NNTP authenticates in plain-text otherwise.
3. The authenticated user has write [ACS](../../configuration/acs.md) to the target message conference and area.
> :warning: Not all [ACS](../../configuration/acs.md) checks can be made over NNTP. Any ACS requiring a "client" will return false (fail), such as `LC` ("is local?").
## Example Configuration
```hjson ```hjson
contentServers: { contentServers: {
nntp: { nntp: {
allowPosts: true
publicMessageConferences: { publicMessageConferences: {
fsxnet: [ fsxnet: [
// Expose these areas of fsxNet // Expose these areas of fsxNet