| #
3a8fc4bc |
| 26-Feb-2023 |
Glenn Strauss <[email protected]> |
[multiple] store ptrs to remote addr in request_st (#3192)
adds two pointers to (request_st *) (cost: 16 bytes in 64-bit builds)
prepares for upcoming changes to mod_extforward to manage remote add
[multiple] store ptrs to remote addr in request_st (#3192)
adds two pointers to (request_st *) (cost: 16 bytes in 64-bit builds)
prepares for upcoming changes to mod_extforward to manage remote addr per request for HTTP/2 requests, rather than remote addr per connection.
Modern load balancers often provide options to reuse connections for *different* clients, and therefore mod_extforward might change the remote addr per request.
x-ref: "RFE: mod_extforward and multiplexed requests via HTTP/2" https://redmine.lighttpd.net/issues/3192 "Evaluation of remote_addr for mod_maxminddb for multiplexed connections" https://redmine.lighttpd.net/issues/3191
show more ...
|
|
Revision tags: lighttpd-1.4.69 |
|
| #
8f84c7be |
| 14-Jan-2023 |
Glenn Strauss <[email protected]> |
[multiple] quiet some coverity false positives
|
|
Revision tags: lighttpd-1.4.68 |
|
| #
5e14db43 |
| 10-Dec-2022 |
Glenn Strauss <[email protected]> |
[multiple] employ ck_calloc, ck_malloc shared code
employ ck_calloc(), ck_malloc() shared code to slightly reduce code size (centralize the ck_assert() to check that memory allocation succeeded)
|
| #
b82d7b8a |
| 06-Dec-2022 |
Glenn Strauss <[email protected]> |
[multiple] mark mod_*_plugin_init() funcs cold
|
|
Revision tags: lighttpd-1.4.67 |
|
| #
18bbdbbe |
| 16-Sep-2022 |
Glenn Strauss <[email protected]> |
[multiple] quiet coverity warnings using casts
|
|
Revision tags: lighttpd-1.4.66, lighttpd-1.4.65 |
|
| #
f2610d23 |
| 03-May-2022 |
Glenn Strauss <[email protected]> |
[multiple] use buffer_append_char()
|
| #
8b296531 |
| 19-Feb-2022 |
Glenn Strauss <[email protected]> |
[mod_auth] save letter-case diff in require config
(thx dirk4000)
Storing the config list into a data structure with case-insensitive keys meant that if the config list contained multiple entries w
[mod_auth] save letter-case diff in require config
(thx dirk4000)
Storing the config list into a data structure with case-insensitive keys meant that if the config list contained multiple entries which differed in case-only, then only one entry would survive. Case-sensitivity of username matters for HTTP Digest auth. Store config list in value list.
x-ref: "mod_auth (configuration): Change of behavior in user name handling" https://redmine.lighttpd.net/boards/2/topics/10275
show more ...
|
|
Revision tags: lighttpd-1.4.64, lighttpd-1.4.63, lighttpd-1.4.62 |
|
| #
60c9612a |
| 29-Nov-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] quiet coverity warning
|
| #
71175df1 |
| 28-Nov-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] RFC7616 HTTP Digest username* userhash
RFC7616 HTTP Digest username* and userhash support (if configured)
userhash support must be configured to enable: auth.require = ( "/" => ( "user
[mod_auth] RFC7616 HTTP Digest username* userhash
RFC7616 HTTP Digest username* and userhash support (if configured)
userhash support must be configured to enable: auth.require = ( "/" => ( "userhash" => "enable", ... ) ) and one of auth.backend = "htdigest" # mod_authn_file or auth.backend = "dbi" # mod_authn_dbi and appropriate modification to add userhash into htdigest or db table along with adding "sql-userhash" => "..." SQL query for mod_authn_dbi
Note: open issue with curl preventing userhash from working with curl: https://github.com/curl/curl/pull/8066
show more ...
|
|
Revision tags: lighttpd-1.4.61 |
|
| #
97eed364 |
| 18-Oct-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] revert adjustment to auth passwd cache (#3112)
revert b1d1202a which is no longer needed with recent update to ck_memeq_const_time()
x-ref: https://redmine.lighttpd.net/issues/3112 "
[mod_auth] revert adjustment to auth passwd cache (#3112)
revert b1d1202a which is no longer needed with recent update to ck_memeq_const_time()
x-ref: https://redmine.lighttpd.net/issues/3112 "mod_auth cache password doesn't match"
show more ...
|
| #
b1d1202a |
| 15-Oct-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] fix Basic auth passwd cache (fixes #3112)
(thx manfred)
Basic auth passwd cache might fail to match when it should have matched (false negative) when comparing an uninitialized byte. Tha
[mod_auth] fix Basic auth passwd cache (fixes #3112)
(thx manfred)
Basic auth passwd cache might fail to match when it should have matched (false negative) when comparing an uninitialized byte. That bug "fails closed" and does not use the cache when it could. This patch allows for proper match in the cache when it should match.
x-ref: https://redmine.lighttpd.net/issues/3112 "mod_auth cache password doesn't match"
show more ...
|
|
Revision tags: lighttpd-1.4.60 |
|
| #
309c1693 |
| 12-Jul-2021 |
Glenn Strauss <[email protected]> |
[multiple] Y2038 32-bit signed time_t mitigations
Most OS platforms have already provided solutions to Y2038 32-bit signed time_t 5 - 10 years ago (or more!) Notable exceptions are Linux i686 and Fr
[multiple] Y2038 32-bit signed time_t mitigations
Most OS platforms have already provided solutions to Y2038 32-bit signed time_t 5 - 10 years ago (or more!) Notable exceptions are Linux i686 and FreeBSD i386.
Since 32-bit systems tend to be embedded systems, and since many distros take years to pick up new software, this commit aims to provide Y2038 mitigations for lighttpd running on 32-bit systems with Y2038-unsafe 32-bit signed time_t
* Y2038: lighttpd 1.4.60 and later report Y2038 safety $ lighttpd -V + Y2038 support # Y2038-SAFE $ lighttpd -V - Y2038 support (unsafe 32-bit signed time_t) # Y2038-UNSAFE
* Y2038: general platform info * Y2038-SAFE: lighttpd 64-bit builds on platforms using 64-bit time_t - all major 64-bit platforms (known to this author) use 64-bit time_t * Y2038-SAFE: lighttpd 32-bit builds on platforms using 64-bit time_t - Linux x32 ABI (different from i686) - FreeBSD all 32-bit and 64-bit architectures *except* 32-bit i386 - NetBSD 6.0 (released Oct 2012) all 32-bit and 64-bit architectures - OpenBSD 5.5 (released May 2014) all 32-bit and 64-bit architectures - Microsoft Windows XP and Visual Studio 2005 (? unsure ?) Another reference suggests Visual Studio 2015 defaults to 64-bit time_t - MacOS 10.15 Catalina (released 2019) drops support for 32-bit apps * Y2038-SAFE: lighttpd 32-bit builds on platforms using 32-bit unsigned time_t - e.g. OpenVMS (unknown if lighttpd builds on this platform) * Y2038-UNSAFE: lighttpd 32-bit builds on platforms using 32-bit signed time_t - Linux 32-bit (including i686) - glibc 32-bit library support not yet available for 64-bit time_t - https://sourceware.org/glibc/wiki/Y2038ProofnessDesign - Linux kernel 5.6 on 32-bit platforms does support 64-bit time_t https://itsubuntu.com/linux-kernel-5-6-to-fix-the-year-2038-issue-unix-y2k/ - https://www.gnu.org/software/libc/manual/html_node/64_002dbit-time-symbol-handling.html "Note: at this point, 64-bit time support in dual-time configurations is work-in-progress, so for these configurations, the public API only makes the 32-bit time support available. In a later change, the public API will allow user code to choose the time size for a given compilation unit." - compiling with -D_TIME_BITS=64 currently has no effect - glibc recent (Jul 2021) mailing list discussion - https://public-inbox.org/bug-gnulib/[email protected]/T/ - FreeBSD i386 - DragonFlyBSD 32-bit
* Y2038 mitigations attempted on Y2038-UNSAFE platforms (32-bit signed time_t) * lighttpd prefers system monotonic clock instead of realtime clock in places where realtime clock is not required * lighttpd treats negative time_t values as after 19 Jan 2038 03:14:07 GMT * (lighttpd presumes that lighttpd will not encounter dates before 1970 during normal operation.) * lighttpd casts struct stat st.st_mtime (and st.st_*time) through uint64_t to convert negative timestamps for comparisions with 64-bit timestamps (treating negative timestamp values as after 19 Jan 2038 03:14:07 GMT) * lighttpd provides unix_time64_t (int64_t) and * lighttpd provides struct unix_timespec64 (unix_timespec64_t) (struct timespec equivalent using unix_time64_t tv_sec member) * lighttpd provides gmtime64_r() and localtime64_r() wrappers for platforms 32-bit platforms using 32-bit time_t and lighttpd temporarily shifts the year in order to use gmtime_r() and localtime_r() (or gmtime() and localtime()) from standard libraries, before readjusting year and passing struct tm to formatting functions such as strftime() * lighttpd provides TIME64_CAST() macro to cast signed 32-bit time_t to unsigned 32-bit and then to unix_time64_t
* Note: while lighttpd tries handle times past 19 Jan 2038 03:14:07 GMT on 32-bit platforms using 32-bit signed time_t, underlying libraries and underlying filesystems might not behave properly after 32-bit signed time_t overflows (19 Jan 2038 03:14:08 GMT). If a given 32-bit OS does not work properly using negative time_t values, then lighttpd likely will not work properly on that system.
* Other references and blogs - https://en.wikipedia.org/wiki/Year_2038_problem - https://en.wikipedia.org/wiki/Time_formatting_and_storage_bugs - http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/
show more ...
|
| #
6881f79c |
| 26-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] detect and skip BWS (bad whitespace)
detect and skip BWS (bad whitespace) in Authorization
|
| #
9fe8fbaa |
| 20-Jun-2021 |
Glenn Strauss <[email protected]> |
[multiple] http_method_buf()
- http_method_buf() returns (const buffer *) - comment out unused get_http_status_name() - inline func for http_append_method()
config processing requires a persistent
[multiple] http_method_buf()
- http_method_buf() returns (const buffer *) - comment out unused get_http_status_name() - inline func for http_append_method()
config processing requires a persistent buffer for method on the off-chance that the config performed a capturing regex match in $HTTP["method"] condition and used it later (e.g. in mod_rewrite) (Prior behavior using r->tmp_buf was undefined in this case)
show more ...
|
| #
f1e8a82f |
| 16-Jun-2021 |
Glenn Strauss <[email protected]> |
[multiple] inline struct in con->dst_addr_buf
(mod_extforward recently changed to use buffer_move() to save addr instead of swapping pointers)
|
| #
56e2881c |
| 12-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] refactor mod_auth_check_basic()
refactor mod_auth_check_basic() - use stack for base64-decoded username:password, and limit to 1k
|
| #
20c56cec |
| 12-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] refactor mod_auth_check_digest()
refactor mod_auth_check_digest() - smaller functions - collect parsed Authorization header into http_auth_digest_params_t - use string references rather t
[mod_auth] refactor mod_auth_check_digest()
refactor mod_auth_check_digest() - smaller functions - collect parsed Authorization header into http_auth_digest_params_t - use string references rather than copying and modifying Authorization
show more ...
|
| #
870b0c13 |
| 12-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] mod_auth_algorithm_parse() w/ algo len
mod_auth_algorithm_parse() now takes an additional arg: algorithm strlen
|
| #
c841ce3b |
| 12-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] mod_auth_digest_get()
create func mod_auth_digest_get() with code pulled from mod_auth_check_digest(), and have mod_auth_check_digest() call mod_auth_digest_get()
|
| #
c987bec1 |
| 10-Jun-2021 |
Glenn Strauss <[email protected]> |
[multiple] use <algo>_iov() digest funcs
reduce code duplication make it easier to add new algos
mod_authn_file: - leverage r->tmp_buf instead of temporary allocating buffer_init() - mod_authn_file
[multiple] use <algo>_iov() digest funcs
reduce code duplication make it easier to add new algos
mod_authn_file: - leverage r->tmp_buf instead of temporary allocating buffer_init() - mod_authn_file_htpasswd_basic() - compare binary SHA1 (shorter) rather than base64 (longer) - split crypt() from mod_authn_file_htpasswd_basic() to separate func - apr_md5_encode() modifications for slightly better performance
show more ...
|
| #
ffc7a0bf |
| 09-Jun-2021 |
Glenn Strauss <[email protected]> |
[mod_auth] merge some repeated code; code reuse
|
| #
af3df29a |
| 09-Jun-2021 |
Glenn Strauss <[email protected]> |
[multiple] reduce redundant NULL buffer checks
This commit is a large set of code changes and results in removal of hundreds, perhaps thousands, of CPU instructions, a portion of which are on hot co
[multiple] reduce redundant NULL buffer checks
This commit is a large set of code changes and results in removal of hundreds, perhaps thousands, of CPU instructions, a portion of which are on hot code paths.
Most (buffer *) used by lighttpd are not NULL, especially since buffers were inlined into numerous larger structs such as request_st and chunk.
In the small number of instances where that is not the case, a NULL check is often performed earlier in a function where that buffer is later used with a buffer_* func. In the handful of cases that remained, a NULL check was added, e.g. with r->http_host and r->conf.server_tag.
- check for empty strings at config time and set value to NULL if blank string will be ignored at runtime; at runtime, simple pointer check for NULL can be used to check for a value that has been set and is not blank ("") - use buffer_is_blank() instead of buffer_string_is_empty(), and use buffer_is_unset() instead of buffer_is_empty(), where buffer is known not to be NULL so that NULL check can be skipped - use buffer_clen() instead of buffer_string_length() when buffer is known not to be NULL (to avoid NULL check at runtime) - use buffer_truncate() instead of buffer_string_set_length() to truncate string, and use buffer_extend() to extend
Examples where buffer known not to be NULL: - cpv->v.b from config_plugin_values_init is not NULL if T_CONFIG_BOOL (though we might set it to NULL if buffer_is_blank(cpv->v.b)) - address of buffer is arg (&foo) (compiler optimizer detects this in most, but not all, cases) - buffer is checked for NULL earlier in func - buffer is accessed in same scope without a NULL check (e.g. b->ptr)
internal behavior change: callers must not pass a NULL buffer to some funcs. - buffer_init_buffer() requires non-null args - buffer_copy_buffer() requires non-null args - buffer_append_string_buffer() requires non-null args - buffer_string_space() requires non-null arg
show more ...
|
| #
3538f8f2 |
| 22-May-2021 |
Glenn Strauss <[email protected]> |
[mod_auth*] rename http_auth.* -> mod_auth_api.*
rename http_auth.[ch] -> mod_auth_api.[ch]
|
| #
1a8ac120 |
| 22-May-2021 |
Glenn Strauss <[email protected]> |
[mod_auth,mod_vhostdb] move helper funcs to mods
link http_auth.c into mod_auth link http_vhostdb.c into mod_vhostdb ensure that mod_auth loads before mod_authn_* ensure that mod_vhostdb loads befor
[mod_auth,mod_vhostdb] move helper funcs to mods
link http_auth.c into mod_auth link http_vhostdb.c into mod_vhostdb ensure that mod_auth loads before mod_authn_* ensure that mod_vhostdb loads before mod_vhostdb_*
show more ...
|
| #
e110b062 |
| 22-May-2021 |
Glenn Strauss <[email protected]> |
[multiple] http_auth_digest_hex2bin -> li_hex2bin
move http_auth.c:http_auth_digest_hex2bin() to buffer.c:li_hex2bin() for reuse, e.g. for use by mod_secdownload, which is not mod_auth*
|