Skip to content
  1. Nov 14, 2016
    • William A. Rowe Jr's avatar
      Fix syntax · f8eec8bb
      William A. Rowe Jr authored
      Submitted by: jailletc36
      Backport: r1756862
      
      Introduce StrictURI|UnsafeURI for RFC3986 enforcement
      Submitted by: wrowe
      Backport: r1756959
      
      Surpress noise about syntax
      Submitted by: wrowe
      Backport: r1756978
      
      Yann is correct, % is distinct from reserved and unreserved
      Submitted by: wrowe
      Backport: r1757062
      
      As commented, ensure we don't flag a request as a rejected 0.9 request
      if we identified any other parsing errors and handle all 0.9 request
      errors as 400 BAD REQUEST, presuming HTTP/1.0 to deliver the error details.
      Do not report 0.9 issues as 505 INVALID PROTOCOL because the client apparently
      specified no protocol, and 505 post-dates the simple HTTP request mechanism.
      Submitted by: wrowe
      Backport: r1757065
      
      Rename LenientWhitespace to UnsafeWhitespace and change StrictWhitespace
      to the default behavior, after discussion with fielding et al about the
      purpose of section 3.5. Update the documentation to clarify this.
      
      This patch removes whitespace considerations from the Strict|Unsafe toggle
      and consolidates them all in the StrictWhitespace|UnsafeWhitespace toggle.
      
      Added a bunch of logic comments to read_request_line parsing.
      
      Dropped the badwhitespace list for an all-or-nothing toggle in rrl.
      
      Leading space before the method is optimized to be evaluated only once.
      
      Toggled the request from HTTP/0.9 to HTTP/1.0 for more BAD_REQUEST cases.
      
      Moved s/[\n\v\f\r]/ / cleanup logic earlier in the cycle, to operate on
      each individual line read, and catch bad whitespace errors earlier.
      This changes the obs-fold to more efficiently condense whitespace and
      forces concatinatination with a single SP, always. Overrides are not
      necessary since obs-fold is clearly deprecated.
      Submitted by: wrowe
      Backport: r1757589
      
      Also catch invalid spaces between the URI <> Protocol in StrictWhitespace mode.
      (matching the test for the Method <> URI)
      Submitted by: wrowe
      Backport: r1757593
      
      Correct RFC reference text (link was right)
      Submitted by: wrowe
      Backport: r1757711
      
      First survey results, all intrinsicly bad input will be logged at the debug
      level, no louder. This patch intentionally dodges the Limit* constrained tests
      since administrators may shoot themselves in the foot, or be confronted with
      impossibly long cookie values, etc.
      
      Adjust the documentation to match.
      Submitted by: wrowe
      Backport: r1757920
      
      Correct URL failure reporting.
      
      Drop the second reporting of HEAD over HTTP/0.9 requests, we short-circuit
      this early now in read_request_line() when presented anything other than
      the sole "GET" method permitted by spec.
      Revert to the correct APLOGNO ID for this case	
      Submitted by: wrowe
      Backport: r1757921, r1757924
      
      Folding StrictWhitespace into the Strict ruleset of RFC7230, per dev@ poll.
      This choice is unanimous, although StrictURI (a different RFC) still hasn't
      found absolute concensus.
      Submitted by: wrowe
      Backport: r1758226
      
      Correct the parser construction for several optimizations,
      based on the fact that bad whitespace shall not be permitted
      or corrected in any operating mode, while preserving the 
      ability to extract bad method/uri/proto for later reporting
      and diagnostics.
      
      This change causes badwhitespace in the request line or any
      request field line to always fail, and not honor the setting
      of the HttpProtocolOptions Unsafe option. Mult SP characters
      or trailing SP characters in the request line are still 
      permitted in Unsafe mode.
      
      Adjusted several error message emits to match these changes.
      Submitted by: wrowe
      Backport: r1758263
      
      Clarify documentation based on concensus decisions discussed on dev@
      and reflecting the current implementation, clean up stray <p>
      Submitted by: wrowe
      Backport: r1758265, r1758266
      
      New optional flag to enforce <CR><LF> line delimiters in ap_[r]getline,
      created by overloading 'int fold' (1 or 0) as 'int flags', with the same
      value 1 for AP_GETLINE_FOLD (which httpd doesn't use), and a new value
      2 for AP_GETLINE_CRLF
      
      Enforce CRLF when HttpProtocolOptions Strict is in force.
      
      Correctly introduces a new t/TEST fail.
      Submitted by: wrowe
      Backport: r1758304
      
      Calm some overly agressive crlf handling, and clarify
      Submitted by: wrowe
      Backport: r1758305, r1758313
      
      Review of IE 11, Firefox 48 and Chrome 53 all indicate that ';' URI characters
      are transmitted unencoded, per RFC3986 section 3.3 grammer. Correct httpd's
      behavior to not encode ';' in proxied URI's or Location: response headers.
      Submitted by: wrowe
      Backport: r1760444
      
      
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x-merge-http-strict@1769669 13f79535-47bb-0310-9956-ffa450edef68
      f8eec8bb
    • William A. Rowe Jr's avatar
      Drop unused, previously sscanf() target variables · 62f8456e
      William A. Rowe Jr authored
      Submitted by: wrowe
      Backport: r1756821
      
      Drop redundant == --rrl_none evaluation
      Submitted by: rpluem
      Backport: r1756823
      
      server/protocol.c (read_request_line): Fix compiler warnings with GCC.
      Submitted by: jorton
      Backport: r1756824
      
      Correct request header handling of whitespace with the new possible config of
      HttpProtocolOptions Unsafe StrictWhitespace
      
      I have elected not to preserve any significance to excess whitespace in the
      now-deprecated obs-fold code path, that's certainly open for discussion.
      
      This can be reviewed by tweaking t/conf/extra.conf to switch Strict to Unsafe.
      Submitted by: wrowe
      Backport: r1756847
      
      A band-aid to resolve an immediate IBM MVS'ism
      Submitted by: wrowe
      Backport: r1756849
      
      Resolve Netware (and other arch) build error for non-portable isascii()
      Submitted by: wrowe
      Backport: r1756934
      
      Generally, the cart comes before the horse, this mirrors apr_lib.h
      Submitted by: wrowe
      Backport: r1756937
      
      After lengthy investigation with covener's assistance, it seems we cannot
      use a static table. We cannot change this to dynamic use of the local iconv
      without build changes to avoid such use on cross-platform builds.
      
      I'm satisfied if we trust iscntrl to at least catch all the most lethal
      C0 Ctrls (we are promised it catches bad carriage control/line endings)
      and leave this in the short term with an XXX to revisit at a future time.
      
      The token stop never needed this table, because we can use the affirmative
      list of token characters to define it.
      Submitted by: wrowe, covener
      Backport: r1756946
      
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x-merge-http-strict@1769664 13f79535-47bb-0310-9956-ffa450edef68
      62f8456e
    • William A. Rowe Jr's avatar
      · 2cffd4c4
      William A. Rowe Jr authored
      Rename the previously undocumented HTTPProtocol directive
      to EnforceHTTPProtocol, and invert the default behavior
      to strictly observe RFC 7230 unless otherwise configured.
      And Document This.
      
      The relaxation option is renamed 'Unsafe'. 'Strict' is no
      longer case sensitive. 'min=0.9|1.0' is now the verbose
      'Allow0.9' or 'Require1.0' case-insenstive grammer. The
      exclusivity tests have been modified to detect conflicts.
      
      The 'strict,log' option failed to enforce strict conformance,
      and has been removed. Unsafe, informational logging is possible
      in any loadable module, after the request data is unsafely
      accepted.
      
      This triggers a group of failures in t/apache/headers.t as
      expected since those patterns violated RFC 7230 section 3.2.4.
      Submitted by: wrowe
      Backport: r1756540
      
      Correct AP_HTTP_CONFORMANCE_ flags
      Submitted by: wrowe
      Backport: r1756555
      
      Renaming this directive to HttpProtocolOptions after discussion on dev@
      Submitted by: wrowe
      Backport: r1756649
      
      Perform correct, strict parsing of the request line, handling the
      http protocol tag, url and method appropriately, and attempting 
      to extract values even in the presence of unusual whitespace in
      keeping with section 3.5, prior to responding with whatever
      error reply is needed. Conforms to RFC7230 in all respects,
      the section 3.5 optional behavior can be disabled by the user
      with a new HttpProtocolOptions StrictWhitespace flag. In all
      cases, the_request is regenerated from the parsed components
      with exactly two space characters.
      
      Shift sf's 'strict' method check from the Strict behavior because
      it violates forward proxy logic, adding a new RegisteredMethods
      flag, as it will certainly be useful to some.
      Submitted by: wrowe
      Backport: r1756729
      
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x-merge-http-strict@1769662 13f79535-47bb-0310-9956-ffa450edef68
      2cffd4c4
    • William A. Rowe Jr's avatar
      Improve legibility of reviewing the generated table, using hex rather than dec · 80281ca0
      William A. Rowe Jr authored
      Submitted by: wrowe
      Backport: r1754536
      
      Correct T_HTTP_TOKEN_STOP per RFC2068 (2.2) - RFC7230 (3.2.6),
      which has always defined 'token' as CHAR or VCHAR - visible USASCII only.
      NUL char is also a stop, end of parsing.
      Submitted by: wrowe
      Backport: r1754538
      
      Be more explicit about NUL in case iscntrl is inconsistent
      Submitted by: wrowe
      Backport: r1754539
      
      Introduce T_HTTP_CTRLS for efficiently finding non-text chars
      Submitted by: wrowe
      Backport: r1754540
      
      Introduce ap_scan_http_field_content, ap_scan_http_token
      and ap_get_http_token [later reverted] for more efficient
      string handling.
      Submitted by: wrowe
      Backport: r1754541
      
      With NUL as a TOKEN_STOP, this code is more efficient
      Submitted by: wrowe
      Backport: r1754544
      
      We arrive here for more than one cause; offer a more general statement
      Submitted by: wrowe
      Backport: r1754547
      
      Strictly observe spec on obs-fold
      Submitted by: wrowe
      Backport: r1754548
      
      Leave an emphatic TODO per Jeff's observations
      Submitted by: trawick
      Backport: r1754555
      
      Introduce ap_scan_http_token / ap_scan_http_field_content for a much
      more efficient pass through the header text; rather than reparsing
      the strings over and over under the HTTP_CONFORMANCE_STRICT fules.
      
      Improve logic and legibility by eliminating multiple repetitive tests
      of the STRICT flag, and simply reorder 'classic' behavior first and
      this new parser second to simplify the diff. Because of the whitespace
      change (which I had wished to dodge), reading this --ignore-all-space
      is a whole lot easier. Particularly against 2.4.x branch, which is now
      identical in the 'classic' logic flow. Both of which I'll share with dev@
      Submitted by: wrowe
      Backport: r1754556
      
      Friendly catch by Rüdiger, restore line mis-removed by the previous commit
      Submitted by: rpluem
      Backport: r1754568
      
      Clean up doubled-'{'
      Correct usage for ap_scan_http_token (had used _get_ syntax)
      Correct logic, detect no 'token' chars, or missing ':'
      Submitted by: wrowe, rpluem
      Backport: r1754569,r1754570,r1754577
      
      Replacement solution to identify VCHAR/ASCII symbols, even in EBCDIC.
      Looking for someone with an EBCDIC environment to post the output of
      the test_char.h generated file for verification.
      Submitted by: wrowe
      Backport: r1754579
      
      Clean up an edge case where obs-fold continuation preceeds the first header,
      as with r1755098, but this time ensure the previous header processing logic 
      ensures there was a previous header as identified by jchampion.
      
      This patch restructures the loop for legibility with a loop continuation,
      allowing us to flatten all of this hard-to-follow code. The subsequent
      patch will be a whitespace-only change for formatting.
      
      Testing len > 0 is redundant when *field is a "\0" and mismatches here,
      folded flag was a no-op, unused once we added continue; logic.
      Fix these as initially attempted in r1755114.
      
      Improve comments and reflow whitespace.
      Submitted by: wrowe
      Backport: r1755123,r1755124,r1755125,r1755126
      
      As promised, reduce this logic by net 9 code lines, shifting the burden 
      of killing trailing whitespace to the purpose-agnostic read logic.
      
      Whitespace before or after an obs-fold, and before or after a field value
      have no semantic purpose at all. Because we are building a buffer for all
      folded values, reducing the size of the newly allocated buffer is always
      to our advantage.
      Submitted by: wrowe
      Backport: r1755233
      
      Treat empty obs-fold line as a noop, eliminate all intra-obs-fold excess
      whitespace, and observe the 1 SP per obs-folding per spec.
      Submitted by: wrowe
      Backport: r1755234,r1755235,r1755236
      
      Treat empty obs-fold line as abusive traffic.
      Submitted by: wrowe
      Backport: r1755263
      
      Stop reflecting irrelevant data to the request error notes, particularly
      for abusive and malformed traffic the non-technical consumer of a user-agent
      has no control over.
      
      Simply take note where the administrator-configured limits have been exceeded,
      that administrator can find details in the error log if desired.
      Submitted by: wrowe
      Backport: r1755264
      
      Follow up to r1755264.
      Don't crash when ap_rgetline() returns a NULL field on ENOSPC.
      Submitted by: ylavic
      Backport: r1755343
      
      Follow on to r1755264, for the case of merged header length exceptions,
      and ensure the field header name is truncated to a sane log width.
      Submitted by: wrowe
      Backport: r1755744
      
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x-merge-http-strict@1769649 13f79535-47bb-0310-9956-ffa450edef68
      80281ca0
  2. Nov 12, 2016
  3. Nov 09, 2016
  4. Nov 04, 2016
  5. Nov 03, 2016
  6. Nov 02, 2016
  7. Nov 01, 2016
  8. Oct 28, 2016
  9. Oct 27, 2016
  10. Oct 26, 2016
    • Jim Jagielski's avatar
      Merge r1764040 from trunk: · 6d57c7e3
      Jim Jagielski authored
      mod_dav: Fix a potential cause of unbounded memory usage or incorrect
      behavior in a routine that sends <DAV:response>'s to the output filters.
      
      The dav_send_one_response() function accepts the current head of the output
      filter list as an argument, but the actual head can change between calls to
      ap_pass_brigade().  This can happen with self-removing filters, e.g., with
      the filter from mod_headers or mod_deflate.  Consequently, executing an
      already removed filter can either cause unwanted memory usage or incorrect
      behavior.
      
      This patch changes the signature of the existing mod_dav's public API,
      dav_send_one_response(), because this API is not yet a part of any 2.4.x
      release.
      
      * modules/dav/main/mod_dav.c
        (dav_send_one_response): Accept a request_rec instead of an ap_filter_t.
         Write the response to r->output_filters.
        (dav_send_multistatus, dav_stream_response): Update these calling sites
         of dav_send_one_response().
      
      * modules/dav/main/mod_dav.h
        (dav_send_one_response): Adjust definition.
      
      Submitted by: kotkov
      Reviewed/backported by: jim
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1766683 13f79535-47bb-0310-9956-ffa450edef68
      6d57c7e3
  11. Oct 24, 2016