Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
Openfire
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
Openfire
Commits
277f3f21
Commit
277f3f21
authored
Oct 27, 2014
by
Dave Cridland
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #89 from tevans/master
OF-807 + OF-670: Prep for 3.10.0
parents
27ccb695
8baf255a
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
96 additions
and
14 deletions
+96
-14
MultiUserChatServiceImpl.java
...vesoftware/openfire/muc/spi/MultiUserChatServiceImpl.java
+13
-4
StringUtils.java
src/java/org/jivesoftware/util/StringUtils.java
+25
-1
StringUtilsTest.java
src/test/java/org/jivesoftware/util/StringUtilsTest.java
+48
-0
server2server-settings.jsp
src/web/server2server-settings.jsp
+10
-9
No files found.
src/java/org/jivesoftware/openfire/muc/spi/MultiUserChatServiceImpl.java
View file @
277f3f21
...
@@ -74,6 +74,7 @@ import org.xmpp.packet.IQ;
...
@@ -74,6 +74,7 @@ import org.xmpp.packet.IQ;
import
org.xmpp.packet.JID
;
import
org.xmpp.packet.JID
;
import
org.xmpp.packet.Message
;
import
org.xmpp.packet.Message
;
import
org.xmpp.packet.Packet
;
import
org.xmpp.packet.Packet
;
import
org.xmpp.packet.PacketError
;
import
org.xmpp.packet.Presence
;
import
org.xmpp.packet.Presence
;
import
org.xmpp.resultsetmanagement.ResultSet
;
import
org.xmpp.resultsetmanagement.ResultSet
;
...
@@ -308,11 +309,19 @@ public class MultiUserChatServiceImpl implements Component, MultiUserChatService
...
@@ -308,11 +309,19 @@ public class MultiUserChatServiceImpl implements Component, MultiUserChatService
return
;
return
;
}
}
}
}
// OF-670: Kick MUC users who return permanent error conditions;
// also detects S2S-based users from non-responsive domains.
if
(
packet
.
getError
()
!=
null
&&
packet
.
getError
().
getType
().
equals
(
PacketError
.
Type
.
cancel
))
{
removeUser
(
packet
.
getFrom
());
}
else
{
// The packet is a normal packet that should possibly be sent to the room
// The packet is a normal packet that should possibly be sent to the room
JID
receipient
=
packet
.
getTo
();
JID
receipient
=
packet
.
getTo
();
String
roomName
=
receipient
!=
null
?
receipient
.
getNode
()
:
null
;
String
roomName
=
receipient
!=
null
?
receipient
.
getNode
()
:
null
;
getChatUser
(
packet
.
getFrom
(),
roomName
).
process
(
packet
);
getChatUser
(
packet
.
getFrom
(),
roomName
).
process
(
packet
);
}
}
}
catch
(
Exception
e
)
{
catch
(
Exception
e
)
{
Log
.
error
(
LocaleUtils
.
getLocalizedString
(
"admin.error"
),
e
);
Log
.
error
(
LocaleUtils
.
getLocalizedString
(
"admin.error"
),
e
);
}
}
...
...
src/java/org/jivesoftware/util/StringUtils.java
View file @
277f3f21
...
@@ -20,9 +20,11 @@
...
@@ -20,9 +20,11 @@
package
org
.
jivesoftware
.
util
;
package
org
.
jivesoftware
.
util
;
import
java.io.UnsupportedEncodingException
;
import
java.io.UnsupportedEncodingException
;
import
java.net.IDN
;
import
java.security.MessageDigest
;
import
java.security.MessageDigest
;
import
java.security.NoSuchAlgorithmException
;
import
java.security.NoSuchAlgorithmException
;
import
java.text.BreakIterator
;
import
java.text.BreakIterator
;
import
java.text.MessageFormat
;
import
java.util.ArrayList
;
import
java.util.ArrayList
;
import
java.util.Collection
;
import
java.util.Collection
;
import
java.util.Collections
;
import
java.util.Collections
;
...
@@ -1118,6 +1120,28 @@ public class StringUtils {
...
@@ -1118,6 +1120,28 @@ public class StringUtils {
}
}
}
}
/**
* Returns a valid domain name, possibly as an ACE-encoded IDN
* (per <a href="http://www.ietf.org/rfc/rfc3490.txt">RFC 3490</a>).
*
* @param domain Proposed domain name
* @return The validated domain name, possibly ACE-encoded
* @throws IllegalArgumentException The given domain name is not valid
*/
public
static
String
validateDomainName
(
String
domain
)
{
if
(
domain
==
null
||
domain
.
trim
().
length
()
==
0
)
{
throw
new
IllegalArgumentException
(
"Domain name cannot be null or empty"
);
}
String
result
=
IDN
.
toASCII
(
domain
);
if
(
result
.
equals
(
domain
))
{
// no conversion; validate again via USE_STD3_ASCII_RULES
IDN
.
toASCII
(
domain
,
IDN
.
USE_STD3_ASCII_RULES
);
}
else
{
Log
.
info
(
MessageFormat
.
format
(
"Converted domain name: from '{0}' to '{1}'"
,
domain
,
result
));
}
return
result
;
}
/**
/**
* Removes characters likely to enable Cross Site Scripting attacks from the
* Removes characters likely to enable Cross Site Scripting attacks from the
* provided input string. The characters that are removed from the input
* provided input string. The characters that are removed from the input
...
...
src/test/java/org/jivesoftware/util/StringUtilsTest.java
0 → 100644
View file @
277f3f21
package
org
.
jivesoftware
.
util
;
import
static
org
.
junit
.
Assert
.
assertEquals
;
import
static
org
.
junit
.
Assert
.
fail
;
import
org.junit.Test
;
public
class
StringUtilsTest
{
@Test
public
void
testValidDomainNames
()
{
assertValidDomainName
(
"www.mycompany.com"
);
assertValidDomainName
(
"www.my-company.com"
);
assertValidDomainName
(
"abc.de"
);
assertValidDomainName
(
"tronçon.be"
,
"xn--tronon-zua.be"
);
assertValidDomainName
(
"öbb.at"
,
"xn--bb-eka.at"
);
}
@Test
public
void
testInvalidDomainNames
()
{
assertInvalidDomainName
(
"www.my_company.com"
,
"Contains non-LDH characters"
);
assertInvalidDomainName
(
"www.-dash.com"
,
"Has leading or trailing hyphen"
);
assertInvalidDomainName
(
"www.dash-.com"
,
"Has leading or trailing hyphen"
);
assertInvalidDomainName
(
"abc.<test>.de"
,
"Contains non-LDH characters"
);
}
private
void
assertValidDomainName
(
String
domain
)
{
assertValidDomainName
(
domain
,
domain
);
}
private
void
assertValidDomainName
(
String
domain
,
String
expected
)
{
assertEquals
(
"Domain should be valid: "
+
domain
,
expected
,
StringUtils
.
validateDomainName
(
domain
));
}
private
void
assertInvalidDomainName
(
String
domain
,
String
expectedCause
)
{
try
{
StringUtils
.
validateDomainName
(
domain
);
fail
(
"Domain should not be valid: "
+
domain
);
}
catch
(
IllegalArgumentException
iae
)
{
// this is not part of the official API, so leave off for now
//assertEquals("Unexpected cause: " + iae.getMessage(), expectedCause, iae.getMessage());
}
}
}
src/web/server2server-settings.jsp
View file @
277f3f21
...
@@ -46,11 +46,8 @@
...
@@ -46,11 +46,8 @@
boolean
serverAllowed
=
request
.
getParameter
(
"serverAllowed"
)
!=
null
;
boolean
serverAllowed
=
request
.
getParameter
(
"serverAllowed"
)
!=
null
;
boolean
serverBlocked
=
request
.
getParameter
(
"serverBlocked"
)
!=
null
;
boolean
serverBlocked
=
request
.
getParameter
(
"serverBlocked"
)
!=
null
;
String
domain
=
ParamUtils
.
getParameter
(
request
,
"domain"
);
String
domain
=
ParamUtils
.
getParameter
(
request
,
"domain"
);
// OF-671
if
(
domain
!=
null
)
{
domain
=
StringUtils
.
removeXSSCharacters
(
domain
);
}
String
remotePort
=
ParamUtils
.
getParameter
(
request
,
"remotePort"
);
String
remotePort
=
ParamUtils
.
getParameter
(
request
,
"remotePort"
);
boolean
updateSucess
=
false
;
boolean
updateSucess
=
false
;
boolean
allowSuccess
=
false
;
boolean
allowSuccess
=
false
;
boolean
blockSuccess
=
false
;
boolean
blockSuccess
=
false
;
...
@@ -139,8 +136,10 @@
...
@@ -139,8 +136,10 @@
if
(
serverAllowed
)
{
if
(
serverAllowed
)
{
int
intRemotePort
=
0
;
int
intRemotePort
=
0
;
// Validate params
// Validate params
if
(
domain
==
null
||
domain
.
trim
().
length
()
==
0
)
{
try
{
errors
.
put
(
"domain"
,
""
);
StringUtils
.
validateDomainName
(
domain
);
}
catch
(
IllegalArgumentException
iae
)
{
errors
.
put
(
"domain"
,
""
);
}
}
if
(
remotePort
==
null
||
remotePort
.
trim
().
length
()
==
0
||
"0"
.
equals
(
remotePort
))
{
if
(
remotePort
==
null
||
remotePort
.
trim
().
length
()
==
0
||
"0"
.
equals
(
remotePort
))
{
errors
.
put
(
"remotePort"
,
""
);
errors
.
put
(
"remotePort"
,
""
);
...
@@ -167,8 +166,10 @@
...
@@ -167,8 +166,10 @@
if
(
serverBlocked
)
{
if
(
serverBlocked
)
{
// Validate params
// Validate params
if
(
domain
==
null
||
domain
.
trim
().
length
()
==
0
)
{
try
{
errors
.
put
(
"domain"
,
""
);
StringUtils
.
validateDomainName
(
domain
);
}
catch
(
IllegalArgumentException
iae
)
{
errors
.
put
(
"domain"
,
""
);
}
}
// If no errors, continue:
// If no errors, continue:
if
(
errors
.
isEmpty
())
{
if
(
errors
.
isEmpty
())
{
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment