unofficial mirror of guile-user@gnu.org 
 help / color / mirror / Atom feed
From: divoplade <d@divoplade.fr>
To: Zelphir Kaltstahl <zelphirkaltstahl@posteo.de>,
	Guile User <guile-user@gnu.org>
Subject: Re: Guile web server example serving static files
Date: Fri, 18 Sep 2020 07:56:04 +0200	[thread overview]
Message-ID: <c83137b77d42e0f8a231570e7af276d22c59f0b4.camel@divoplade.fr> (raw)
In-Reply-To: <04e63ab3-93b7-a0fe-6db8-34f00e6098e0@posteo.de>

Hello Zelphir,

Le jeudi 17 septembre 2020 à 23:45 +0200, Zelphir Kaltstahl a écrit :
> I finally managed to create an example for using Guile's web server
> and
> serving static files. A rather silly bug kept me for a few days from
> making progress, but finally today I fixed it.
> 
> I tried to implement some security checks about the path of the
> requested static assets. If anyone wants to look at it and point out
> issues with it, I will try to fix it, or you could make a pull
> request.
> If there are any other issues, it would also be great to know them :
> )
> 
> Here is the code in my repository:
> 
> https://notabug.org/ZelphirKaltstahl/guile-examples/src/65ba7cead2983f1ceb8aa2d4eedfe37734e5ca56/web-development/example-03-serve-static-assets
> 
> I tried to comment most stuff, so that the code can be understood
> more
> easily.
> 
> And here is a pointer to the path security stuff:
> 
> https://notabug.org/ZelphirKaltstahl/guile-examples/src/65ba7cead2983f1ceb8aa2d4eedfe37734e5ca56/web-development/example-03-serve-static-assets/web-path-handling.scm#L50

As for why guile avoid reasoning about "paths", see 
https://www.gnu.org/prep/standards/standards.html#GNU-Manuals
https://www.gnu.org/prep/standards/standards.html#GNU-Manuals:

Please do not use the term “pathname” that is used in Unix
documentation; use “file name” (two words) instead. We use the term
“path” only for search paths, which are lists of directory names.

Also, your functions "absolute-path" and "complex-path?" in path-
handling.scm 
https://notabug.org/ZelphirKaltstahl/guile-examples/src/65ba7cead2983f1ceb8aa2d4eedfe37734e5ca56/web-development/example-03-serve-static-assets/path-handling.scm

do not seem to me that they would work correctly when passed something
starting with "../" (as opposed to containing "/../"). I think that
with a little bit of work you could accept "../" in arguments and tweak
path-join to go up (by discarding anything in path1 after the last '/'
and go to the next part, if there is something to discard).

Also I am not sure how it would remove inclusions of '/./' or leading
'./' in the name.

The URI RFC (https://tools.ietf.org/html/rfc3986#section-5) describes
an algorithm in section 5.2. Relative resolution that does the
canonization of an URI relative to an absolute URI (you just need to
ignore the scheme, authority, query and fragment parts and focus on the
path). This is similar to canonicalization of file names, except for
the \\ difficulty. In particular, see 5.2.4, Remove dot segments.

Also, you should refrain from checking if a file exists, because it
could be deleted between your call to file-exists? and when you
actually open the file. Thus, passing the file-exists? test will not
guarantee that the file will exist when you want to use it, and even
less that you will be able to open it and read it.

Finally, you don't need to check if a file name is "safe" at all. the
file procedures do not interpret or substitute variables or ~ or ``
(try it: change directory to /tmp and write to files named ~root,
`pwd`, $PATH, '*', ... just be aware that you will have a hard time
deleting them from bash!), and there is nothing special with files
named as a series of dots. That's good, otherwise you would also need
to check for '%' in mingw and whatever stuff microsoft invented to
change the file name experience.

Best regards,

divoplade




  reply	other threads:[~2020-09-18  5:56 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-09-17 21:45 Guile web server example serving static files Zelphir Kaltstahl
2020-09-18  5:56 ` divoplade [this message]
2020-09-19 10:39   ` Zelphir Kaltstahl
2020-09-20  7:48   ` tomas
2020-09-20  7:52     ` divoplade
2020-09-20  8:29       ` tomas
2020-09-20  8:54         ` divoplade
2020-09-20  9:07           ` tomas
2020-09-18  7:47 ` Dr. Arne Babenhauserheide
2020-09-19 10:57   ` Zelphir Kaltstahl

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://www.gnu.org/software/guile/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c83137b77d42e0f8a231570e7af276d22c59f0b4.camel@divoplade.fr \
    --to=d@divoplade.fr \
    --cc=guile-user@gnu.org \
    --cc=zelphirkaltstahl@posteo.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).