attempt to use lock in Authentication handler to lock down dictionary access
This commit is contained in:
@@ -1,5 +1,4 @@
|
|||||||
using System;
|
using System;
|
||||||
using System.Collections.Concurrent;
|
|
||||||
using System.Collections.Generic;
|
using System.Collections.Generic;
|
||||||
using System.Linq;
|
using System.Linq;
|
||||||
using System.Security.Claims;
|
using System.Security.Claims;
|
||||||
@@ -9,6 +8,7 @@ using System.Text.Encodings.Web;
|
|||||||
using System.Threading;
|
using System.Threading;
|
||||||
using System.Threading.Tasks;
|
using System.Threading.Tasks;
|
||||||
using MareSynchronosServer.Data;
|
using MareSynchronosServer.Data;
|
||||||
|
using MareSynchronosServer.Metrics;
|
||||||
using Microsoft.AspNetCore.Authentication;
|
using Microsoft.AspNetCore.Authentication;
|
||||||
using Microsoft.AspNetCore.Http;
|
using Microsoft.AspNetCore.Http;
|
||||||
using Microsoft.EntityFrameworkCore;
|
using Microsoft.EntityFrameworkCore;
|
||||||
@@ -23,7 +23,7 @@ namespace MareSynchronosServer.Authentication
|
|||||||
private int failedAttempts = 1;
|
private int failedAttempts = 1;
|
||||||
public int FailedAttempts => failedAttempts;
|
public int FailedAttempts => failedAttempts;
|
||||||
public Task ResetTask { get; set; }
|
public Task ResetTask { get; set; }
|
||||||
public CancellationTokenSource ResetCts { get; set; } = new();
|
public CancellationTokenSource? ResetCts { get; set; }
|
||||||
|
|
||||||
public void Dispose()
|
public void Dispose()
|
||||||
{
|
{
|
||||||
@@ -48,61 +48,81 @@ namespace MareSynchronosServer.Authentication
|
|||||||
private readonly IConfiguration _configuration;
|
private readonly IConfiguration _configuration;
|
||||||
public const string AuthScheme = "SecretKeyAuth";
|
public const string AuthScheme = "SecretKeyAuth";
|
||||||
private const string unauthorized = "Unauthorized";
|
private const string unauthorized = "Unauthorized";
|
||||||
public static ConcurrentDictionary<string, string> Authentications = new();
|
public static readonly Dictionary<string, string> Authentications = new();
|
||||||
private static ConcurrentDictionary<string, FailedAuthorization> FailedAuthorizations = new();
|
private static readonly Dictionary<string, FailedAuthorization> FailedAuthorizations = new();
|
||||||
private static SemaphoreSlim dbLockSemaphore = new SemaphoreSlim(20);
|
private static readonly object authDictLock = new();
|
||||||
private int failedAttemptsForTempBan;
|
private static readonly object failedAuthLock = new();
|
||||||
private int tempBanMinutes;
|
private readonly int failedAttemptsForTempBan;
|
||||||
|
private readonly int tempBanMinutes;
|
||||||
|
|
||||||
public static void ClearUnauthorizedUsers()
|
public static void ClearUnauthorizedUsers()
|
||||||
{
|
{
|
||||||
foreach (var item in Authentications.ToArray())
|
lock (authDictLock)
|
||||||
{
|
{
|
||||||
if (item.Value == unauthorized)
|
foreach (var item in Authentications.ToArray())
|
||||||
{
|
{
|
||||||
Authentications[item.Key] = string.Empty;
|
if (item.Value == unauthorized)
|
||||||
|
{
|
||||||
|
Authentications[item.Key] = string.Empty;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void RemoveAuthentication(string uid)
|
public static void RemoveAuthentication(string uid)
|
||||||
{
|
{
|
||||||
var auth = Authentications.Where(u => u.Value == uid);
|
lock (authDictLock)
|
||||||
if (auth.Any())
|
|
||||||
{
|
{
|
||||||
Authentications.Remove(auth.First().Key, out _);
|
var auth = Authentications.Where(u => u.Value == uid);
|
||||||
|
if (auth.Any())
|
||||||
|
{
|
||||||
|
Authentications.Remove(auth.First().Key);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
protected override async Task<AuthenticateResult> HandleAuthenticateAsync()
|
protected override async Task<AuthenticateResult> HandleAuthenticateAsync()
|
||||||
{
|
{
|
||||||
|
MareMetrics.AuthenticationRequests.Inc();
|
||||||
|
|
||||||
if (!Request.Headers.ContainsKey("Authorization"))
|
if (!Request.Headers.ContainsKey("Authorization"))
|
||||||
{
|
{
|
||||||
|
MareMetrics.AuthenticationFailures.Inc();
|
||||||
return AuthenticateResult.Fail("Failed Authorization");
|
return AuthenticateResult.Fail("Failed Authorization");
|
||||||
}
|
}
|
||||||
|
|
||||||
var authHeader = Request.Headers["Authorization"].ToString();
|
var authHeader = Request.Headers["Authorization"].ToString();
|
||||||
|
|
||||||
if (string.IsNullOrEmpty(authHeader))
|
if (string.IsNullOrEmpty(authHeader))
|
||||||
|
{
|
||||||
|
MareMetrics.AuthenticationFailures.Inc();
|
||||||
return AuthenticateResult.Fail("Failed Authorization");
|
return AuthenticateResult.Fail("Failed Authorization");
|
||||||
|
}
|
||||||
|
|
||||||
var ip = _accessor.GetIpAddress();
|
var ip = _accessor.GetIpAddress();
|
||||||
|
|
||||||
if (FailedAuthorizations.TryGetValue(ip, out var failedAuth))
|
lock (failedAuthLock)
|
||||||
{
|
{
|
||||||
if (failedAuth.FailedAttempts > failedAttemptsForTempBan)
|
if (FailedAuthorizations.TryGetValue(ip, out var failedAuth) && failedAuth.FailedAttempts > failedAttemptsForTempBan)
|
||||||
{
|
{
|
||||||
failedAuth.ResetCts.Cancel();
|
MareMetrics.AuthenticationFailures.Inc();
|
||||||
failedAuth.ResetCts.Dispose();
|
|
||||||
|
failedAuth.ResetCts?.Cancel();
|
||||||
|
failedAuth.ResetCts?.Dispose();
|
||||||
failedAuth.ResetCts = new CancellationTokenSource();
|
failedAuth.ResetCts = new CancellationTokenSource();
|
||||||
var token = failedAuth.ResetCts.Token;
|
var token = failedAuth.ResetCts.Token;
|
||||||
failedAuth.ResetTask = Task.Run(async () =>
|
failedAuth.ResetTask = Task.Run(async () =>
|
||||||
{
|
{
|
||||||
await Task.Delay(TimeSpan.FromMinutes(tempBanMinutes), token);
|
await Task.Delay(TimeSpan.FromMinutes(tempBanMinutes), token);
|
||||||
if (token.IsCancellationRequested) return;
|
if (token.IsCancellationRequested) return;
|
||||||
FailedAuthorizations.Remove(ip, out var fauth);
|
FailedAuthorization fauth;
|
||||||
|
lock (failedAuthLock)
|
||||||
|
{
|
||||||
|
FailedAuthorizations.Remove(ip, out fauth);
|
||||||
|
}
|
||||||
fauth.Dispose();
|
fauth.Dispose();
|
||||||
}, token);
|
}, token);
|
||||||
|
|
||||||
Logger.LogWarning("TempBan " + ip + " for authorization spam");
|
Logger.LogWarning("TempBan " + ip + " for authorization spam");
|
||||||
return AuthenticateResult.Fail("Failed Authorization");
|
return AuthenticateResult.Fail("Failed Authorization");
|
||||||
}
|
}
|
||||||
@@ -111,49 +131,61 @@ namespace MareSynchronosServer.Authentication
|
|||||||
using var sha256 = SHA256.Create();
|
using var sha256 = SHA256.Create();
|
||||||
var hashedHeader = BitConverter.ToString(sha256.ComputeHash(Encoding.UTF8.GetBytes(authHeader))).Replace("-", "");
|
var hashedHeader = BitConverter.ToString(sha256.ComputeHash(Encoding.UTF8.GetBytes(authHeader))).Replace("-", "");
|
||||||
|
|
||||||
if (Authentications.TryGetValue(hashedHeader, out string uid))
|
string uid;
|
||||||
|
lock (authDictLock)
|
||||||
{
|
{
|
||||||
if (uid == unauthorized)
|
if (Authentications.TryGetValue(hashedHeader, out uid))
|
||||||
{
|
{
|
||||||
Logger.LogWarning("Failed authorization from " + ip);
|
if (uid == unauthorized)
|
||||||
if (FailedAuthorizations.TryGetValue(ip, out var auth))
|
|
||||||
{
|
{
|
||||||
auth.IncreaseFailedAttempts();
|
MareMetrics.AuthenticationFailures.Inc();
|
||||||
|
|
||||||
|
lock (failedAuthLock)
|
||||||
|
{
|
||||||
|
Logger.LogWarning("Failed authorization from " + ip);
|
||||||
|
if (FailedAuthorizations.TryGetValue(ip, out var auth))
|
||||||
|
{
|
||||||
|
auth.IncreaseFailedAttempts();
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
FailedAuthorizations[ip] = new FailedAuthorization();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return AuthenticateResult.Fail("Failed Authorization");
|
||||||
}
|
}
|
||||||
else
|
|
||||||
{
|
MareMetrics.AuthenticationCacheHits.Inc();
|
||||||
FailedAuthorizations[ip] = new FailedAuthorization();
|
|
||||||
}
|
|
||||||
return AuthenticateResult.Fail("Failed Authorization");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (string.IsNullOrEmpty(uid))
|
if (string.IsNullOrEmpty(uid))
|
||||||
{
|
{
|
||||||
try
|
uid = (await _mareDbContext.Auth.AsNoTracking()
|
||||||
{
|
.FirstOrDefaultAsync(m => m.HashedKey == hashedHeader))?.UserUID;
|
||||||
await dbLockSemaphore.WaitAsync();
|
|
||||||
uid = (await _mareDbContext.Auth.Include("User").AsNoTracking()
|
|
||||||
.FirstOrDefaultAsync(m => m.HashedKey == hashedHeader))?.UserUID;
|
|
||||||
}
|
|
||||||
catch { }
|
|
||||||
finally
|
|
||||||
{
|
|
||||||
dbLockSemaphore.Release();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (uid == null)
|
if (uid == null)
|
||||||
{
|
{
|
||||||
Authentications[hashedHeader] = unauthorized;
|
lock (authDictLock)
|
||||||
|
{
|
||||||
|
Authentications[hashedHeader] = unauthorized;
|
||||||
|
}
|
||||||
|
|
||||||
Logger.LogWarning("Failed authorization from " + ip);
|
Logger.LogWarning("Failed authorization from " + ip);
|
||||||
if (FailedAuthorizations.TryGetValue(ip, out var auth))
|
lock (failedAuthLock)
|
||||||
{
|
{
|
||||||
auth.IncreaseFailedAttempts();
|
if (FailedAuthorizations.TryGetValue(ip, out var auth))
|
||||||
}
|
{
|
||||||
else
|
auth.IncreaseFailedAttempts();
|
||||||
{
|
}
|
||||||
FailedAuthorizations[ip] = new FailedAuthorization();
|
else
|
||||||
|
{
|
||||||
|
FailedAuthorizations[ip] = new FailedAuthorization();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
MareMetrics.AuthenticationFailures.Inc();
|
||||||
return AuthenticateResult.Fail("Failed Authorization");
|
return AuthenticateResult.Fail("Failed Authorization");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -170,6 +202,8 @@ namespace MareSynchronosServer.Authentication
|
|||||||
var principal = new ClaimsPrincipal(identity);
|
var principal = new ClaimsPrincipal(identity);
|
||||||
var ticket = new AuthenticationTicket(principal, Scheme.Name);
|
var ticket = new AuthenticationTicket(principal, Scheme.Name);
|
||||||
|
|
||||||
|
MareMetrics.AuthenticationSuccesses.Inc();
|
||||||
|
|
||||||
return AuthenticateResult.Success(ticket);
|
return AuthenticateResult.Success(ticket);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,22 +0,0 @@
|
|||||||
using Prometheus;
|
|
||||||
|
|
||||||
namespace MareSynchronosServer.Metrics
|
|
||||||
{
|
|
||||||
public class LockedProxyCounter
|
|
||||||
{
|
|
||||||
private readonly Counter _c;
|
|
||||||
|
|
||||||
public LockedProxyCounter(Counter c)
|
|
||||||
{
|
|
||||||
_c = c;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void Inc(double inc = 1d)
|
|
||||||
{
|
|
||||||
//lock (_c)
|
|
||||||
//{
|
|
||||||
_c.Inc(inc);
|
|
||||||
//}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,47 +0,0 @@
|
|||||||
using Prometheus;
|
|
||||||
|
|
||||||
namespace MareSynchronosServer.Metrics;
|
|
||||||
|
|
||||||
public class LockedProxyGauge
|
|
||||||
{
|
|
||||||
private readonly Gauge _g;
|
|
||||||
|
|
||||||
public LockedProxyGauge(Gauge g)
|
|
||||||
{
|
|
||||||
_g = g;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void Inc(double inc = 1d)
|
|
||||||
{
|
|
||||||
//lock (_g)
|
|
||||||
//{
|
|
||||||
_g.Inc(inc);
|
|
||||||
//}
|
|
||||||
}
|
|
||||||
|
|
||||||
public void IncTo(double incTo)
|
|
||||||
{
|
|
||||||
//lock (_g)
|
|
||||||
//{
|
|
||||||
_g.IncTo(incTo);
|
|
||||||
//}
|
|
||||||
}
|
|
||||||
|
|
||||||
public void Dec(double decBy = 1d)
|
|
||||||
{
|
|
||||||
//lock (_g)
|
|
||||||
//{
|
|
||||||
_g.Dec(decBy);
|
|
||||||
//}
|
|
||||||
}
|
|
||||||
|
|
||||||
public void Set(double setTo)
|
|
||||||
{
|
|
||||||
//lock (_g)
|
|
||||||
//{
|
|
||||||
_g.Set(setTo);
|
|
||||||
//}
|
|
||||||
}
|
|
||||||
|
|
||||||
public double Value => _g.Value;
|
|
||||||
}
|
|
||||||
@@ -8,39 +8,43 @@ namespace MareSynchronosServer.Metrics
|
|||||||
{
|
{
|
||||||
public class MareMetrics
|
public class MareMetrics
|
||||||
{
|
{
|
||||||
public static readonly LockedProxyCounter InitializedConnections =
|
public static readonly Counter InitializedConnections =
|
||||||
new(Prometheus.Metrics.CreateCounter("mare_initialized_connections", "Initialized Connections"));
|
Prometheus.Metrics.CreateCounter("mare_initialized_connections", "Initialized Connections");
|
||||||
public static readonly LockedProxyGauge Connections =
|
public static readonly Gauge Connections =
|
||||||
new(Prometheus.Metrics.CreateGauge("mare_unauthorized_connections", "Unauthorized Connections"));
|
Prometheus.Metrics.CreateGauge("mare_unauthorized_connections", "Unauthorized Connections");
|
||||||
public static readonly LockedProxyGauge AuthorizedConnections =
|
public static readonly Gauge AuthorizedConnections =
|
||||||
new(Prometheus.Metrics.CreateGauge("mare_authorized_connections", "Authorized Connections"));
|
Prometheus.Metrics.CreateGauge("mare_authorized_connections", "Authorized Connections");
|
||||||
public static readonly LockedProxyGauge AvailableWorkerThreads = new(Prometheus.Metrics.CreateGauge("mare_available_threadpool", "Available Threadpool Workers"));
|
public static readonly Gauge AvailableWorkerThreads = Prometheus.Metrics.CreateGauge("mare_available_threadpool", "Available Threadpool Workers");
|
||||||
public static readonly LockedProxyGauge AvailableIOWorkerThreads = new(Prometheus.Metrics.CreateGauge("mare_available_threadpool_io", "Available Threadpool IO Workers"));
|
public static readonly Gauge AvailableIOWorkerThreads = Prometheus.Metrics.CreateGauge("mare_available_threadpool_io", "Available Threadpool IO Workers");
|
||||||
|
|
||||||
public static readonly LockedProxyGauge UsersRegistered = new(Prometheus.Metrics.CreateGauge("mare_users_registered", "Total Registrations"));
|
public static readonly Gauge UsersRegistered = Prometheus.Metrics.CreateGauge("mare_users_registered", "Total Registrations");
|
||||||
|
|
||||||
public static readonly LockedProxyGauge Pairs = new(Prometheus.Metrics.CreateGauge("mare_pairs", "Total Pairs"));
|
public static readonly Gauge Pairs = Prometheus.Metrics.CreateGauge("mare_pairs", "Total Pairs");
|
||||||
public static readonly LockedProxyGauge PairsPaused = new(Prometheus.Metrics.CreateGauge("mare_pairs_paused", "Total Paused Pairs"));
|
public static readonly Gauge PairsPaused = Prometheus.Metrics.CreateGauge("mare_pairs_paused", "Total Paused Pairs");
|
||||||
|
|
||||||
public static readonly LockedProxyGauge FilesTotal = new(Prometheus.Metrics.CreateGauge("mare_files", "Total uploaded files"));
|
public static readonly Gauge FilesTotal = Prometheus.Metrics.CreateGauge("mare_files", "Total uploaded files");
|
||||||
public static readonly LockedProxyGauge FilesTotalSize =
|
public static readonly Gauge FilesTotalSize =
|
||||||
new(Prometheus.Metrics.CreateGauge("mare_files_size", "Total uploaded files (bytes)"));
|
Prometheus.Metrics.CreateGauge("mare_files_size", "Total uploaded files (bytes)");
|
||||||
|
|
||||||
public static readonly LockedProxyCounter UserPushData = new(Prometheus.Metrics.CreateCounter("mare_user_push", "Users pushing data"));
|
public static readonly Counter UserPushData = Prometheus.Metrics.CreateCounter("mare_user_push", "Users pushing data");
|
||||||
public static readonly LockedProxyCounter UserPushDataTo =
|
public static readonly Counter UserPushDataTo =
|
||||||
new(Prometheus.Metrics.CreateCounter("mare_user_push_to", "Users Receiving Data"));
|
Prometheus.Metrics.CreateCounter("mare_user_push_to", "Users Receiving Data");
|
||||||
|
|
||||||
public static readonly LockedProxyCounter UserDownloadedFiles =
|
public static readonly Counter UserDownloadedFiles =
|
||||||
new(Prometheus.Metrics.CreateCounter("mare_user_downloaded_files", "Total Downloaded Files by Users"));
|
Prometheus.Metrics.CreateCounter("mare_user_downloaded_files", "Total Downloaded Files by Users");
|
||||||
public static readonly LockedProxyCounter UserDownloadedFilesSize =
|
public static readonly Counter UserDownloadedFilesSize =
|
||||||
new(Prometheus.Metrics.CreateCounter("mare_user_downloaded_files_size", "Total Downloaded Files Size by Users"));
|
Prometheus.Metrics.CreateCounter("mare_user_downloaded_files_size", "Total Downloaded Files Size by Users");
|
||||||
|
|
||||||
public static readonly LockedProxyGauge
|
public static readonly Gauge
|
||||||
CPUUsage = new(Prometheus.Metrics.CreateGauge("mare_cpu_usage", "Total calculated CPU usage in %"));
|
CPUUsage = Prometheus.Metrics.CreateGauge("mare_cpu_usage", "Total calculated CPU usage in %");
|
||||||
public static readonly LockedProxyGauge RAMUsage =
|
public static readonly Gauge RAMUsage =
|
||||||
new(Prometheus.Metrics.CreateGauge("mare_ram_usage", "Total calculated RAM usage in bytes for Mare + MSSQL"));
|
Prometheus.Metrics.CreateGauge("mare_ram_usage", "Total calculated RAM usage in bytes for Mare + MSSQL");
|
||||||
public static readonly LockedProxyGauge NetworkOut = new(Prometheus.Metrics.CreateGauge("mare_network_out", "Network out in byte/s"));
|
public static readonly Gauge NetworkOut = Prometheus.Metrics.CreateGauge("mare_network_out", "Network out in byte/s");
|
||||||
public static readonly LockedProxyGauge NetworkIn = new(Prometheus.Metrics.CreateGauge("mare_network_in", "Network in in byte/s"));
|
public static readonly Gauge NetworkIn = Prometheus.Metrics.CreateGauge("mare_network_in", "Network in in byte/s");
|
||||||
|
public static readonly Counter AuthenticationRequests = Prometheus.Metrics.CreateCounter("mare_auth_requests", "Mare Authentication Requests");
|
||||||
|
public static readonly Counter AuthenticationCacheHits = Prometheus.Metrics.CreateCounter("mare_auth_requests_cachehit", "Mare Authentication Requests Cache Hits");
|
||||||
|
public static readonly Counter AuthenticationFailures = Prometheus.Metrics.CreateCounter("mare_auth_requests_fail", "Mare Authentication Requests Failed");
|
||||||
|
public static readonly Counter AuthenticationSuccesses = Prometheus.Metrics.CreateCounter("mare_auth_requests_success", "Mare Authentication Requests Success");
|
||||||
|
|
||||||
public static void InitializeMetrics(MareDbContext dbContext, IConfiguration configuration)
|
public static void InitializeMetrics(MareDbContext dbContext, IConfiguration configuration)
|
||||||
{
|
{
|
||||||
|
|||||||
Reference in New Issue
Block a user