Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade-safe URL-safe CSRF tokens #39076

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -98,6 +98,10 @@ module RequestForgeryProtection
config_accessor :default_protect_from_forgery
self.default_protect_from_forgery = false

# Controls whether URL-safe CSRF tokens are generated.
config_accessor :urlsafe_csrf_tokens, instance_writer: false
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The other config_accessors in that file don't disable the instance_writer, but I didn't think it was worth being able to set this option in a controller, especially given it's not something we really want to keep long term in my opinion.

self.urlsafe_csrf_tokens = false

helper_method :form_authenticity_token
helper_method :protect_against_forgery?
end
Expand Down Expand Up @@ -337,7 +341,7 @@ def valid_authenticity_token?(session, encoded_masked_token) # :doc:
end

begin
masked_token = Base64.urlsafe_decode64(encoded_masked_token)
masked_token = decode_csrf_token(encoded_masked_token)
rescue ArgumentError # encoded_masked_token is invalid Base64
return false
end
Expand Down Expand Up @@ -375,7 +379,7 @@ def mask_token(raw_token) # :doc:
one_time_pad = SecureRandom.random_bytes(AUTHENTICITY_TOKEN_LENGTH)
encrypted_csrf_token = xor_byte_strings(one_time_pad, raw_token)
masked_token = one_time_pad + encrypted_csrf_token
Base64.urlsafe_encode64(masked_token, padding: false)
encode_csrf_token(masked_token)
end

def compare_with_real_token(token, session) # :doc:
Expand All @@ -401,8 +405,8 @@ def valid_per_form_csrf_token?(token, session) # :doc:
end

def real_csrf_token(session) # :doc:
session[:_csrf_token] ||= SecureRandom.urlsafe_base64(AUTHENTICITY_TOKEN_LENGTH, padding: false)
Base64.urlsafe_decode64(session[:_csrf_token])
session[:_csrf_token] ||= generate_csrf_token
decode_csrf_token(session[:_csrf_token])
end

def per_form_csrf_token(session, action_path, method) # :doc:
Expand Down Expand Up @@ -470,5 +474,33 @@ def normalize_action_path(action_path) # :doc:
uri = URI.parse(action_path)
uri.path.chomp("/")
end

def generate_csrf_token # :nodoc:
if urlsafe_csrf_tokens
SecureRandom.urlsafe_base64(AUTHENTICITY_TOKEN_LENGTH, padding: false)
else
SecureRandom.base64(AUTHENTICITY_TOKEN_LENGTH)
end
end

def encode_csrf_token(csrf_token) # :nodoc:
if urlsafe_csrf_tokens
Base64.urlsafe_encode64(csrf_token, padding: false)
else
Base64.strict_encode64(csrf_token)
end
end

def decode_csrf_token(encoded_csrf_token) # :nodoc:
if urlsafe_csrf_tokens
Base64.urlsafe_decode64(encoded_csrf_token)
else
begin
Base64.strict_decode64(encoded_csrf_token)
rescue ArgumentError
Base64.urlsafe_decode64(encoded_csrf_token)
end
end
end
end
end
24 changes: 21 additions & 3 deletions actionpack/test/controller/request_forgery_protection_test.rb
Original file line number Diff line number Diff line change
Expand Up @@ -175,12 +175,15 @@ class SkipProtectionController < ActionController::Base
# common test methods
module RequestForgeryProtectionTests
def setup
@old_urlsafe_csrf_tokens = ActionController::Base.urlsafe_csrf_tokens
ActionController::Base.urlsafe_csrf_tokens = true
@token = Base64.urlsafe_encode64("railstestrailstestrailstestrails")
@old_request_forgery_protection_token = ActionController::Base.request_forgery_protection_token
ActionController::Base.request_forgery_protection_token = :custom_authenticity_token
end

def teardown
ActionController::Base.urlsafe_csrf_tokens = @old_urlsafe_csrf_tokens
ActionController::Base.request_forgery_protection_token = @old_request_forgery_protection_token
end

Expand Down Expand Up @@ -378,10 +381,25 @@ def test_should_allow_post_with_token
end

def test_should_allow_post_with_strict_encoded_token
session[:_csrf_token] = Base64.strict_encode64("railstestrailstestrailstestrails")
@controller.stub :form_authenticity_token, @token do
assert_not_blocked { post :index, params: { custom_authenticity_token: @token } }
token_length = (ActionController::RequestForgeryProtection::AUTHENTICITY_TOKEN_LENGTH * 4.0 / 3).ceil
token_including_url_unsafe_chars = "+/".ljust(token_length, "A")
session[:_csrf_token] = token_including_url_unsafe_chars
@controller.stub :form_authenticity_token, token_including_url_unsafe_chars do
assert_not_blocked { post :index, params: { custom_authenticity_token: token_including_url_unsafe_chars } }
end
end

def test_should_allow_post_with_urlsafe_token_when_migrating
config_before = ActionController::Base.urlsafe_csrf_tokens
ActionController::Base.urlsafe_csrf_tokens = false
token_length = (ActionController::RequestForgeryProtection::AUTHENTICITY_TOKEN_LENGTH * 4.0 / 3).ceil
token_including_url_safe_chars = "-_".ljust(token_length, "A")
session[:_csrf_token] = token_including_url_safe_chars
@controller.stub :form_authenticity_token, token_including_url_safe_chars do
assert_not_blocked { post :index, params: { custom_authenticity_token: token_including_url_safe_chars } }
end
ensure
ActionController::Base.urlsafe_csrf_tokens = config_before
end

def test_should_allow_patch_with_token
Expand Down
1 change: 1 addition & 0 deletions guides/source/configuring.md
Original file line number Diff line number Diff line change
Expand Up @@ -970,6 +970,7 @@ text/javascript image/svg+xml application/postscript application/x-shockwave-fla

- `config.active_record.has_many_inversing`: `true`
- `config.active_storage.track_variants`: `true`
- `config.action_controller.urlsafe_csrf_tokens`: `true`

#### For '6.0', new defaults from previous versions below and:

Expand Down
4 changes: 4 additions & 0 deletions railties/lib/rails/application/configuration.rb
Original file line number Diff line number Diff line change
Expand Up @@ -176,6 +176,10 @@ def load_defaults(target_version)
action_dispatch.cookies_same_site_protection = :lax
end

if respond_to?(:action_controller)
action_controller.urlsafe_csrf_tokens = true
end

ActiveSupport.utc_to_local_returns_utc_offset_times = true
else
raise "Unknown version #{target_version.to_s.inspect}"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@
# It's best enabled when your entire app is migrated and stable on 6.1.
# Rails.application.config.action_dispatch.cookies_same_site_protection = :lax

# Generate CSRF tokens that are encoded in URL-safe Base64.
# Rails.application.config.action_controller.urlsafe_csrf_tokens = true

# Specify whether `ActiveSupport::TimeZone.utc_to_local` returns a time with an
# UTC offset or a UTC time.
# ActiveSupport.utc_to_local_returns_utc_offset_times = true