-- (C) 2011, Marco Cirillo (LW.Org) -- Block or restrict by blacklist remote access to local components or hosts. module:set_global() local guard_blockall = module:get_option_set("host_guard_blockall", {}) local guard_ball_wl = module:get_option_set("host_guard_blockall_exceptions", {}) local guard_protect = module:get_option_set("host_guard_selective", {}) local guard_block_bl = module:get_option_set("host_guard_blacklist", {}) local s2smanager = require "core.s2smanager" local config = require "core.configmanager" local nameprep = require "util.encodings".stringprep.nameprep local _make_connect = s2smanager.make_connect function s2smanager.make_connect(session, connect_host, connect_port) if not session.s2sValidation then if guard_blockall:contains(session.from_host) and not guard_ball_wl:contains(session.to_host) or guard_block_bl:contains(session.to_host) and guard_protect:contains(session.from_host) then module:log("error", "remote service %s attempted to access restricted host %s", session.to_host, session.from_host) s2smanager.destroy_session(session, "You're not authorized, good bye.") return false; end end return _make_connect(session, connect_host, connect_port) end local _stream_opened = s2smanager.streamopened function s2smanager.streamopened(session, attr) local host = attr.to and nameprep(attr.to) local from = attr.from and nameprep(attr.from) if not from then session.s2sValidation = false else session.s2sValidation = true end if guard_blockall:contains(host) and not guard_ball_wl:contains(from) or guard_block_bl:contains(from) and guard_protect:contains(host) then module:log("error", "remote service %s attempted to access restricted host %s", from, host) session:close({condition = "policy-violation", text = "You're not authorized, good bye."}) return false; end _stream_opened(session, attr) end local function sdr_hook (event) local origin, stanza = event.origin, event.stanza if origin.type == "s2sin" or origin.type == "s2sin_unauthed" then if guard_blockall:contains(stanza.attr.to) and not guard_ball_wl:contains(stanza.attr.from) or guard_block_bl:contains(stanza.attr.from) and guard_protect:contains(stanza.attr.to) then module:log("error", "remote service %s attempted to access restricted host %s", stanza.attr.from, stanza.attr.to) origin:close({condition = "policy-violation", text = "You're not authorized, good bye."}) return false end end return nil end local function handle_activation (host) if guard_blockall:contains(host) or guard_protect:contains(host) then if hosts[host] and hosts[host].events then hosts[host].events.add_handler("stanza/jabber:server:dialback:result", sdr_hook, 100) module:log ("debug", "adding host protection for: "..host) end end end local function handle_deactivation (host) if guard_blockall:contains(host) or guard_protect:contains(host) then if hosts[host] and hosts[host].events then hosts[host].events.remove_handler("stanza/jabber:server:dialback:result", sdr_hook) module:log ("debug", "removing host protection for: "..host) end end end local function reload() module:log ("debug", "server configuration reloaded, rehashing plugin tables...") guard_blockall = module:get_option_set("host_guard_blockall", {}) guard_ball_wl = module:get_option_set("host_guard_blockall_exceptions", {}) guard_protect = module:get_option_set("host_guard_components", {}) guard_block_bl = module:get_option_set("host_guard_blacklist", {}) end local function setup() module:log ("debug", "initializing host guard module...") module:hook ("component-activated", handle_activation) module:hook ("component-deactivated", handle_deactivation) module:hook ("config-reloaded", reload) for n,table in pairs(hosts) do if table.type == "component" then if guard_blockall:contains(n) or guard_protect:contains(n) then hosts[n].events.remove_handler("stanza/jabber:server:dialback:result", sdr_hook) handle_activation(n) end end end end if prosody.start_time then setup() else module:hook ("server-started", setup) end