private_address_check 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of private_address_check might be problematic. Click here for more details.

@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 69dffe5d95058be5d6d131dd7e27843b02e736ac
4
+ data.tar.gz: 12043ad0e982f7bfc4e95050151b69a8fb3575f9
5
+ SHA512:
6
+ metadata.gz: 230e58a7c57213f83ee7975b05329aaa17b0a5c2f99d55325ff50fc1b9d76faeb616e4ce4ce24aa4b722bf819743e2ec75b36d2c113a91e1d89a929d63d58192
7
+ data.tar.gz: f93358263bdd8fd37a62495a33402dc149a51d67c0a00928f54f1aaf0073e748654a36ba37f8b3b5f49ba1c04ee5bf7b233a35e633ff37a1bde9e834040e1935
@@ -0,0 +1,49 @@
1
+ # Contributor Code of Conduct
2
+
3
+ As contributors and maintainers of this project, and in the interest of
4
+ fostering an open and welcoming community, we pledge to respect all people who
5
+ contribute through reporting issues, posting feature requests, updating
6
+ documentation, submitting pull requests or patches, and other activities.
7
+
8
+ We are committed to making participation in this project a harassment-free
9
+ experience for everyone, regardless of level of experience, gender, gender
10
+ identity and expression, sexual orientation, disability, personal appearance,
11
+ body size, race, ethnicity, age, religion, or nationality.
12
+
13
+ Examples of unacceptable behavior by participants include:
14
+
15
+ * The use of sexualized language or imagery
16
+ * Personal attacks
17
+ * Trolling or insulting/derogatory comments
18
+ * Public or private harassment
19
+ * Publishing other's private information, such as physical or electronic
20
+ addresses, without explicit permission
21
+ * Other unethical or unprofessional conduct
22
+
23
+ Project maintainers have the right and responsibility to remove, edit, or
24
+ reject comments, commits, code, wiki edits, issues, and other contributions
25
+ that are not aligned to this Code of Conduct, or to ban temporarily or
26
+ permanently any contributor for other behaviors that they deem inappropriate,
27
+ threatening, offensive, or harmful.
28
+
29
+ By adopting this Code of Conduct, project maintainers commit themselves to
30
+ fairly and consistently applying these principles to every aspect of managing
31
+ this project. Project maintainers who do not follow or enforce the Code of
32
+ Conduct may be permanently removed from the project team.
33
+
34
+ This code of conduct applies both within project spaces and in public spaces
35
+ when an individual is representing the project or its community.
36
+
37
+ Instances of abusive, harassing, or otherwise unacceptable behavior may be
38
+ reported by contacting a project maintainer at jdowney@gmail.com. All
39
+ complaints will be reviewed and investigated and will result in a response that
40
+ is deemed necessary and appropriate to the circumstances. Maintainers are
41
+ obligated to maintain confidentiality with regard to the reporter of an
42
+ incident.
43
+
44
+ This Code of Conduct is adapted from the [Contributor Covenant][homepage],
45
+ version 1.3.0, available at
46
+ [http://contributor-covenant.org/version/1/3/0/][version]
47
+
48
+ [homepage]: http://contributor-covenant.org
49
+ [version]: http://contributor-covenant.org/version/1/3/0/
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'https://rubygems.org'
2
+
3
+ # Specify your gem's dependencies in private_address_check.gemspec
4
+ gemspec
@@ -0,0 +1,21 @@
1
+ The MIT License (MIT)
2
+
3
+ Copyright (c) 2016 John Downey
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in
13
+ all copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
+ THE SOFTWARE.
@@ -0,0 +1,68 @@
1
+ # PrivateAddressCheck
2
+
3
+ [![Build Status](https://travis-ci.org/jtdowney/private_address_check.svg?branch=master)](https://travis-ci.org/jtdowney/private_address_check)
4
+ [![Code Climate](https://codeclimate.com/github/jtdowney/private_address_check/badges/gpa.svg)](https://codeclimate.com/github/jtdowney/private_address_check)
5
+
6
+ Checks if a URL or hostname would cause a request to a private network (RFC 1918). This is useful in preventing attacks like [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html).
7
+
8
+ ## Requirements
9
+
10
+ * Ruby >= 2.0
11
+
12
+ ## Installation
13
+
14
+ Add this line to your application's Gemfile:
15
+
16
+ ```ruby
17
+ gem 'private_address_check'
18
+ ```
19
+
20
+ And then execute:
21
+
22
+ $ bundle
23
+
24
+ Or install it yourself as:
25
+
26
+ $ gem install private_address_check
27
+
28
+ ## Usage
29
+
30
+ ```ruby
31
+ require "private_address_check"
32
+
33
+ PrivateAddressCheck.private_address?("8.8.8.8") # => false
34
+ PrivateAddressCheck.private_address?("10.10.10.2") # => true
35
+ PrivateAddressCheck.private_address?("127.0.0.1") # => true
36
+ PrivateAddressCheck.private_address?("172.16.2.10") # => true
37
+ PrivateAddressCheck.private_address?("192.168.1.10") # => true
38
+ PrivateAddressCheck.private_address?("fd00::2") # => true
39
+ PrivateAddressCheck.resolves_to_private_address?("github.com") # => false
40
+ PrivateAddressCheck.resolves_to_private_address?("localhost") # => true
41
+
42
+ require "private_address_check/tcpsocket_ext"
43
+ require "net/http"
44
+ require "require "uri""
45
+
46
+ Net::HTTP.get_response(URI.parse("http://192.168.1.1")) # => attempts connection like normal
47
+
48
+ PrivateAddressCheck.only_public_connections do
49
+ Net::HTTP.get_response(URI.parse("http://192.168.1.1"))
50
+ end
51
+ # => raises PrivateAddressCheck::PrivateConnectionAttemptedError
52
+ ```
53
+
54
+ ## Development
55
+
56
+ After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake test` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
57
+
58
+ To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).
59
+
60
+ ## Contributing
61
+
62
+ Bug reports and pull requests are welcome on GitHub at https://github.com/jtdowney/private_address_check. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [Contributor Covenant](http://contributor-covenant.org) code of conduct.
63
+
64
+
65
+ ## License
66
+
67
+ The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
68
+
@@ -0,0 +1,10 @@
1
+ require "bundler/gem_tasks"
2
+ require "rake/testtask"
3
+
4
+ Rake::TestTask.new(:test) do |t|
5
+ t.libs << "test"
6
+ t.libs << "lib"
7
+ t.test_files = FileList['test/**/*_test.rb']
8
+ end
9
+
10
+ task :default => :test
@@ -0,0 +1,38 @@
1
+ require "ipaddr"
2
+ require "resolv"
3
+
4
+ require "private_address_check/version"
5
+
6
+ module PrivateAddressCheck
7
+ module_function
8
+
9
+ CIDR_LIST = [
10
+ # Loopback
11
+ IPAddr.new("127.0.0.0/8"),
12
+ IPAddr.new("::1/64"),
13
+
14
+ # Link Local,
15
+ IPAddr.new("169.254.0.0/16"),
16
+
17
+ # RFC 1918
18
+ IPAddr.new("10.0.0.0/8"),
19
+ IPAddr.new("172.16.0.0/12"),
20
+ IPAddr.new("192.168.0.0/16"),
21
+
22
+ # RFC 4193
23
+ IPAddr.new("fc00::/7"),
24
+ ]
25
+
26
+ def private_address?(address)
27
+ CIDR_LIST.any? do |cidr|
28
+ cidr.include?(address)
29
+ end
30
+ end
31
+
32
+ def resolves_to_private_address?(hostname)
33
+ ips = Resolv.getaddresses(hostname)
34
+ ips.any? do |ip|
35
+ private_address?(ip)
36
+ end
37
+ end
38
+ end
@@ -0,0 +1,29 @@
1
+ module PrivateAddressCheck
2
+ PrivateConnectionAttemptedError = Class.new(StandardError)
3
+
4
+ module_function
5
+
6
+ def only_public_connections
7
+ Thread.current[:private_address_check] = true
8
+ yield
9
+ ensure
10
+ Thread.current[:private_address_check] = false
11
+ end
12
+
13
+ module TCPSocketExt
14
+ def initialize(remote_host, remote_port, local_host = nil, local_port = nil)
15
+ if Thread.current[:private_address_check]
16
+ ip = Resolv.getaddress(remote_host)
17
+ if PrivateAddressCheck.private_address?(ip)
18
+ raise PrivateAddressCheck::PrivateConnectionAttemptedError
19
+ end
20
+
21
+ super(ip, remote_port, local_host, local_port)
22
+ else
23
+ super
24
+ end
25
+ end
26
+ end
27
+ end
28
+
29
+ TCPSocket.send(:prepend, PrivateAddressCheck::TCPSocketExt)
@@ -0,0 +1,3 @@
1
+ module PrivateAddressCheck
2
+ VERSION = "0.1.0"
3
+ end
@@ -0,0 +1,38 @@
1
+ require 'test_helper'
2
+
3
+ class PrivateAddressCheckTest < Minitest::Test
4
+ def test_private_address_for_public_addresses
5
+ refute PrivateAddressCheck.private_address?("192.30.253.113")
6
+ refute PrivateAddressCheck.private_address?("8.8.8.8")
7
+ end
8
+
9
+ def test_private_address_for_rfc1918_addresses
10
+ assert PrivateAddressCheck.private_address?("10.10.10.2")
11
+ assert PrivateAddressCheck.private_address?("172.16.2.10")
12
+ assert PrivateAddressCheck.private_address?("192.168.1.10")
13
+ end
14
+
15
+ def test_private_address_for_rfc4193_addresses
16
+ assert PrivateAddressCheck.private_address?("fc00::a")
17
+ assert PrivateAddressCheck.private_address?("fd00::2")
18
+ end
19
+
20
+ def test_private_address_for_loopback_addresses
21
+ assert PrivateAddressCheck.private_address?("127.0.0.1")
22
+ assert PrivateAddressCheck.private_address?("127.2.2.2")
23
+ assert PrivateAddressCheck.private_address?("::1")
24
+ end
25
+
26
+ def test_private_address_for_link_local_addresses
27
+ assert PrivateAddressCheck.private_address?("169.254.2.5")
28
+ end
29
+
30
+ def test_private_hostname_for_public_addresses
31
+ refute PrivateAddressCheck.resolves_to_private_address?("github.com")
32
+ refute PrivateAddressCheck.resolves_to_private_address?("example.com")
33
+ end
34
+
35
+ def test_private_hostname_for_private_addresses
36
+ assert PrivateAddressCheck.resolves_to_private_address?("localhost")
37
+ end
38
+ end
@@ -0,0 +1,22 @@
1
+ require 'test_helper'
2
+ require 'private_address_check/tcpsocket_ext'
3
+
4
+ class TCPSocketExtTest < Minitest::Test
5
+ def test_private_address
6
+ assert_raises PrivateAddressCheck::PrivateConnectionAttemptedError do
7
+ PrivateAddressCheck.only_public_connections do
8
+ TCPSocket.new("localhost", 80)
9
+ end
10
+ end
11
+ end
12
+
13
+ def test_public_address
14
+ connected = false
15
+ PrivateAddressCheck.only_public_connections do
16
+ TCPSocket.new("example.com", 80)
17
+ connected = true
18
+ end
19
+
20
+ assert connected
21
+ end
22
+ end
@@ -0,0 +1,4 @@
1
+ $LOAD_PATH.unshift File.expand_path('../../lib', __FILE__)
2
+ require 'private_address_check'
3
+
4
+ require 'minitest/autorun'
metadata ADDED
@@ -0,0 +1,98 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: private_address_check
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - John Downey
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2016-07-21 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: bundler
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '1.12'
20
+ type: :development
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '1.12'
27
+ - !ruby/object:Gem::Dependency
28
+ name: rake
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '10.0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '10.0'
41
+ - !ruby/object:Gem::Dependency
42
+ name: minitest
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '5.0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '5.0'
55
+ description: Checks if a IP or hostname would cause a request to a private network
56
+ (RFC 1918)
57
+ email:
58
+ - jdowney@gmail.com
59
+ executables: []
60
+ extensions: []
61
+ extra_rdoc_files: []
62
+ files:
63
+ - CODE_OF_CONDUCT.md
64
+ - Gemfile
65
+ - LICENSE.txt
66
+ - README.md
67
+ - Rakefile
68
+ - lib/private_address_check.rb
69
+ - lib/private_address_check/tcpsocket_ext.rb
70
+ - lib/private_address_check/version.rb
71
+ - test/private_address_check_test.rb
72
+ - test/tcpsocket_ext_test.rb
73
+ - test/test_helper.rb
74
+ homepage: https://github.com/jtdowney/private_address_check
75
+ licenses:
76
+ - MIT
77
+ metadata: {}
78
+ post_install_message:
79
+ rdoc_options: []
80
+ require_paths:
81
+ - lib
82
+ required_ruby_version: !ruby/object:Gem::Requirement
83
+ requirements:
84
+ - - ">="
85
+ - !ruby/object:Gem::Version
86
+ version: 2.0.0
87
+ required_rubygems_version: !ruby/object:Gem::Requirement
88
+ requirements:
89
+ - - ">="
90
+ - !ruby/object:Gem::Version
91
+ version: '0'
92
+ requirements: []
93
+ rubyforge_project:
94
+ rubygems_version: 2.5.1
95
+ signing_key:
96
+ specification_version: 4
97
+ summary: Prevent Server Side Request Forgery attacks by checking the destination
98
+ test_files: []