twitst4tz

twitter statistics web application
Log | Files | Refs | README | LICENSE

README.md (19555B)


      1 # safe-buffer [![travis][travis-image]][travis-url] [![npm][npm-image]][npm-url] [![downloads][downloads-image]][downloads-url] [![javascript style guide][standard-image]][standard-url]
      2 
      3 [travis-image]: https://img.shields.io/travis/feross/safe-buffer/master.svg
      4 [travis-url]: https://travis-ci.org/feross/safe-buffer
      5 [npm-image]: https://img.shields.io/npm/v/safe-buffer.svg
      6 [npm-url]: https://npmjs.org/package/safe-buffer
      7 [downloads-image]: https://img.shields.io/npm/dm/safe-buffer.svg
      8 [downloads-url]: https://npmjs.org/package/safe-buffer
      9 [standard-image]: https://img.shields.io/badge/code_style-standard-brightgreen.svg
     10 [standard-url]: https://standardjs.com
     11 
     12 #### Safer Node.js Buffer API
     13 
     14 **Use the new Node.js Buffer APIs (`Buffer.from`, `Buffer.alloc`,
     15 `Buffer.allocUnsafe`, `Buffer.allocUnsafeSlow`) in all versions of Node.js.**
     16 
     17 **Uses the built-in implementation when available.**
     18 
     19 ## install
     20 
     21 ```
     22 npm install safe-buffer
     23 ```
     24 
     25 ## usage
     26 
     27 The goal of this package is to provide a safe replacement for the node.js `Buffer`.
     28 
     29 It's a drop-in replacement for `Buffer`. You can use it by adding one `require` line to
     30 the top of your node.js modules:
     31 
     32 ```js
     33 var Buffer = require('safe-buffer').Buffer
     34 
     35 // Existing buffer code will continue to work without issues:
     36 
     37 new Buffer('hey', 'utf8')
     38 new Buffer([1, 2, 3], 'utf8')
     39 new Buffer(obj)
     40 new Buffer(16) // create an uninitialized buffer (potentially unsafe)
     41 
     42 // But you can use these new explicit APIs to make clear what you want:
     43 
     44 Buffer.from('hey', 'utf8') // convert from many types to a Buffer
     45 Buffer.alloc(16) // create a zero-filled buffer (safe)
     46 Buffer.allocUnsafe(16) // create an uninitialized buffer (potentially unsafe)
     47 ```
     48 
     49 ## api
     50 
     51 ### Class Method: Buffer.from(array)
     52 <!-- YAML
     53 added: v3.0.0
     54 -->
     55 
     56 * `array` {Array}
     57 
     58 Allocates a new `Buffer` using an `array` of octets.
     59 
     60 ```js
     61 const buf = Buffer.from([0x62,0x75,0x66,0x66,0x65,0x72]);
     62   // creates a new Buffer containing ASCII bytes
     63   // ['b','u','f','f','e','r']
     64 ```
     65 
     66 A `TypeError` will be thrown if `array` is not an `Array`.
     67 
     68 ### Class Method: Buffer.from(arrayBuffer[, byteOffset[, length]])
     69 <!-- YAML
     70 added: v5.10.0
     71 -->
     72 
     73 * `arrayBuffer` {ArrayBuffer} The `.buffer` property of a `TypedArray` or
     74   a `new ArrayBuffer()`
     75 * `byteOffset` {Number} Default: `0`
     76 * `length` {Number} Default: `arrayBuffer.length - byteOffset`
     77 
     78 When passed a reference to the `.buffer` property of a `TypedArray` instance,
     79 the newly created `Buffer` will share the same allocated memory as the
     80 TypedArray.
     81 
     82 ```js
     83 const arr = new Uint16Array(2);
     84 arr[0] = 5000;
     85 arr[1] = 4000;
     86 
     87 const buf = Buffer.from(arr.buffer); // shares the memory with arr;
     88 
     89 console.log(buf);
     90   // Prints: <Buffer 88 13 a0 0f>
     91 
     92 // changing the TypedArray changes the Buffer also
     93 arr[1] = 6000;
     94 
     95 console.log(buf);
     96   // Prints: <Buffer 88 13 70 17>
     97 ```
     98 
     99 The optional `byteOffset` and `length` arguments specify a memory range within
    100 the `arrayBuffer` that will be shared by the `Buffer`.
    101 
    102 ```js
    103 const ab = new ArrayBuffer(10);
    104 const buf = Buffer.from(ab, 0, 2);
    105 console.log(buf.length);
    106   // Prints: 2
    107 ```
    108 
    109 A `TypeError` will be thrown if `arrayBuffer` is not an `ArrayBuffer`.
    110 
    111 ### Class Method: Buffer.from(buffer)
    112 <!-- YAML
    113 added: v3.0.0
    114 -->
    115 
    116 * `buffer` {Buffer}
    117 
    118 Copies the passed `buffer` data onto a new `Buffer` instance.
    119 
    120 ```js
    121 const buf1 = Buffer.from('buffer');
    122 const buf2 = Buffer.from(buf1);
    123 
    124 buf1[0] = 0x61;
    125 console.log(buf1.toString());
    126   // 'auffer'
    127 console.log(buf2.toString());
    128   // 'buffer' (copy is not changed)
    129 ```
    130 
    131 A `TypeError` will be thrown if `buffer` is not a `Buffer`.
    132 
    133 ### Class Method: Buffer.from(str[, encoding])
    134 <!-- YAML
    135 added: v5.10.0
    136 -->
    137 
    138 * `str` {String} String to encode.
    139 * `encoding` {String} Encoding to use, Default: `'utf8'`
    140 
    141 Creates a new `Buffer` containing the given JavaScript string `str`. If
    142 provided, the `encoding` parameter identifies the character encoding.
    143 If not provided, `encoding` defaults to `'utf8'`.
    144 
    145 ```js
    146 const buf1 = Buffer.from('this is a tést');
    147 console.log(buf1.toString());
    148   // prints: this is a tést
    149 console.log(buf1.toString('ascii'));
    150   // prints: this is a tC)st
    151 
    152 const buf2 = Buffer.from('7468697320697320612074c3a97374', 'hex');
    153 console.log(buf2.toString());
    154   // prints: this is a tést
    155 ```
    156 
    157 A `TypeError` will be thrown if `str` is not a string.
    158 
    159 ### Class Method: Buffer.alloc(size[, fill[, encoding]])
    160 <!-- YAML
    161 added: v5.10.0
    162 -->
    163 
    164 * `size` {Number}
    165 * `fill` {Value} Default: `undefined`
    166 * `encoding` {String} Default: `utf8`
    167 
    168 Allocates a new `Buffer` of `size` bytes. If `fill` is `undefined`, the
    169 `Buffer` will be *zero-filled*.
    170 
    171 ```js
    172 const buf = Buffer.alloc(5);
    173 console.log(buf);
    174   // <Buffer 00 00 00 00 00>
    175 ```
    176 
    177 The `size` must be less than or equal to the value of
    178 `require('buffer').kMaxLength` (on 64-bit architectures, `kMaxLength` is
    179 `(2^31)-1`). Otherwise, a [`RangeError`][] is thrown. A zero-length Buffer will
    180 be created if a `size` less than or equal to 0 is specified.
    181 
    182 If `fill` is specified, the allocated `Buffer` will be initialized by calling
    183 `buf.fill(fill)`. See [`buf.fill()`][] for more information.
    184 
    185 ```js
    186 const buf = Buffer.alloc(5, 'a');
    187 console.log(buf);
    188   // <Buffer 61 61 61 61 61>
    189 ```
    190 
    191 If both `fill` and `encoding` are specified, the allocated `Buffer` will be
    192 initialized by calling `buf.fill(fill, encoding)`. For example:
    193 
    194 ```js
    195 const buf = Buffer.alloc(11, 'aGVsbG8gd29ybGQ=', 'base64');
    196 console.log(buf);
    197   // <Buffer 68 65 6c 6c 6f 20 77 6f 72 6c 64>
    198 ```
    199 
    200 Calling `Buffer.alloc(size)` can be significantly slower than the alternative
    201 `Buffer.allocUnsafe(size)` but ensures that the newly created `Buffer` instance
    202 contents will *never contain sensitive data*.
    203 
    204 A `TypeError` will be thrown if `size` is not a number.
    205 
    206 ### Class Method: Buffer.allocUnsafe(size)
    207 <!-- YAML
    208 added: v5.10.0
    209 -->
    210 
    211 * `size` {Number}
    212 
    213 Allocates a new *non-zero-filled* `Buffer` of `size` bytes.  The `size` must
    214 be less than or equal to the value of `require('buffer').kMaxLength` (on 64-bit
    215 architectures, `kMaxLength` is `(2^31)-1`). Otherwise, a [`RangeError`][] is
    216 thrown. A zero-length Buffer will be created if a `size` less than or equal to
    217 0 is specified.
    218 
    219 The underlying memory for `Buffer` instances created in this way is *not
    220 initialized*. The contents of the newly created `Buffer` are unknown and
    221 *may contain sensitive data*. Use [`buf.fill(0)`][] to initialize such
    222 `Buffer` instances to zeroes.
    223 
    224 ```js
    225 const buf = Buffer.allocUnsafe(5);
    226 console.log(buf);
    227   // <Buffer 78 e0 82 02 01>
    228   // (octets will be different, every time)
    229 buf.fill(0);
    230 console.log(buf);
    231   // <Buffer 00 00 00 00 00>
    232 ```
    233 
    234 A `TypeError` will be thrown if `size` is not a number.
    235 
    236 Note that the `Buffer` module pre-allocates an internal `Buffer` instance of
    237 size `Buffer.poolSize` that is used as a pool for the fast allocation of new
    238 `Buffer` instances created using `Buffer.allocUnsafe(size)` (and the deprecated
    239 `new Buffer(size)` constructor) only when `size` is less than or equal to
    240 `Buffer.poolSize >> 1` (floor of `Buffer.poolSize` divided by two). The default
    241 value of `Buffer.poolSize` is `8192` but can be modified.
    242 
    243 Use of this pre-allocated internal memory pool is a key difference between
    244 calling `Buffer.alloc(size, fill)` vs. `Buffer.allocUnsafe(size).fill(fill)`.
    245 Specifically, `Buffer.alloc(size, fill)` will *never* use the internal Buffer
    246 pool, while `Buffer.allocUnsafe(size).fill(fill)` *will* use the internal
    247 Buffer pool if `size` is less than or equal to half `Buffer.poolSize`. The
    248 difference is subtle but can be important when an application requires the
    249 additional performance that `Buffer.allocUnsafe(size)` provides.
    250 
    251 ### Class Method: Buffer.allocUnsafeSlow(size)
    252 <!-- YAML
    253 added: v5.10.0
    254 -->
    255 
    256 * `size` {Number}
    257 
    258 Allocates a new *non-zero-filled* and non-pooled `Buffer` of `size` bytes.  The
    259 `size` must be less than or equal to the value of
    260 `require('buffer').kMaxLength` (on 64-bit architectures, `kMaxLength` is
    261 `(2^31)-1`). Otherwise, a [`RangeError`][] is thrown. A zero-length Buffer will
    262 be created if a `size` less than or equal to 0 is specified.
    263 
    264 The underlying memory for `Buffer` instances created in this way is *not
    265 initialized*. The contents of the newly created `Buffer` are unknown and
    266 *may contain sensitive data*. Use [`buf.fill(0)`][] to initialize such
    267 `Buffer` instances to zeroes.
    268 
    269 When using `Buffer.allocUnsafe()` to allocate new `Buffer` instances,
    270 allocations under 4KB are, by default, sliced from a single pre-allocated
    271 `Buffer`. This allows applications to avoid the garbage collection overhead of
    272 creating many individually allocated Buffers. This approach improves both
    273 performance and memory usage by eliminating the need to track and cleanup as
    274 many `Persistent` objects.
    275 
    276 However, in the case where a developer may need to retain a small chunk of
    277 memory from a pool for an indeterminate amount of time, it may be appropriate
    278 to create an un-pooled Buffer instance using `Buffer.allocUnsafeSlow()` then
    279 copy out the relevant bits.
    280 
    281 ```js
    282 // need to keep around a few small chunks of memory
    283 const store = [];
    284 
    285 socket.on('readable', () => {
    286   const data = socket.read();
    287   // allocate for retained data
    288   const sb = Buffer.allocUnsafeSlow(10);
    289   // copy the data into the new allocation
    290   data.copy(sb, 0, 0, 10);
    291   store.push(sb);
    292 });
    293 ```
    294 
    295 Use of `Buffer.allocUnsafeSlow()` should be used only as a last resort *after*
    296 a developer has observed undue memory retention in their applications.
    297 
    298 A `TypeError` will be thrown if `size` is not a number.
    299 
    300 ### All the Rest
    301 
    302 The rest of the `Buffer` API is exactly the same as in node.js.
    303 [See the docs](https://nodejs.org/api/buffer.html).
    304 
    305 
    306 ## Related links
    307 
    308 - [Node.js issue: Buffer(number) is unsafe](https://github.com/nodejs/node/issues/4660)
    309 - [Node.js Enhancement Proposal: Buffer.from/Buffer.alloc/Buffer.zalloc/Buffer() soft-deprecate](https://github.com/nodejs/node-eps/pull/4)
    310 
    311 ## Why is `Buffer` unsafe?
    312 
    313 Today, the node.js `Buffer` constructor is overloaded to handle many different argument
    314 types like `String`, `Array`, `Object`, `TypedArrayView` (`Uint8Array`, etc.),
    315 `ArrayBuffer`, and also `Number`.
    316 
    317 The API is optimized for convenience: you can throw any type at it, and it will try to do
    318 what you want.
    319 
    320 Because the Buffer constructor is so powerful, you often see code like this:
    321 
    322 ```js
    323 // Convert UTF-8 strings to hex
    324 function toHex (str) {
    325   return new Buffer(str).toString('hex')
    326 }
    327 ```
    328 
    329 ***But what happens if `toHex` is called with a `Number` argument?***
    330 
    331 ### Remote Memory Disclosure
    332 
    333 If an attacker can make your program call the `Buffer` constructor with a `Number`
    334 argument, then they can make it allocate uninitialized memory from the node.js process.
    335 This could potentially disclose TLS private keys, user data, or database passwords.
    336 
    337 When the `Buffer` constructor is passed a `Number` argument, it returns an
    338 **UNINITIALIZED** block of memory of the specified `size`. When you create a `Buffer` like
    339 this, you **MUST** overwrite the contents before returning it to the user.
    340 
    341 From the [node.js docs](https://nodejs.org/api/buffer.html#buffer_new_buffer_size):
    342 
    343 > `new Buffer(size)`
    344 >
    345 > - `size` Number
    346 >
    347 > The underlying memory for `Buffer` instances created in this way is not initialized.
    348 > **The contents of a newly created `Buffer` are unknown and could contain sensitive
    349 > data.** Use `buf.fill(0)` to initialize a Buffer to zeroes.
    350 
    351 (Emphasis our own.)
    352 
    353 Whenever the programmer intended to create an uninitialized `Buffer` you often see code
    354 like this:
    355 
    356 ```js
    357 var buf = new Buffer(16)
    358 
    359 // Immediately overwrite the uninitialized buffer with data from another buffer
    360 for (var i = 0; i < buf.length; i++) {
    361   buf[i] = otherBuf[i]
    362 }
    363 ```
    364 
    365 
    366 ### Would this ever be a problem in real code?
    367 
    368 Yes. It's surprisingly common to forget to check the type of your variables in a
    369 dynamically-typed language like JavaScript.
    370 
    371 Usually the consequences of assuming the wrong type is that your program crashes with an
    372 uncaught exception. But the failure mode for forgetting to check the type of arguments to
    373 the `Buffer` constructor is more catastrophic.
    374 
    375 Here's an example of a vulnerable service that takes a JSON payload and converts it to
    376 hex:
    377 
    378 ```js
    379 // Take a JSON payload {str: "some string"} and convert it to hex
    380 var server = http.createServer(function (req, res) {
    381   var data = ''
    382   req.setEncoding('utf8')
    383   req.on('data', function (chunk) {
    384     data += chunk
    385   })
    386   req.on('end', function () {
    387     var body = JSON.parse(data)
    388     res.end(new Buffer(body.str).toString('hex'))
    389   })
    390 })
    391 
    392 server.listen(8080)
    393 ```
    394 
    395 In this example, an http client just has to send:
    396 
    397 ```json
    398 {
    399   "str": 1000
    400 }
    401 ```
    402 
    403 and it will get back 1,000 bytes of uninitialized memory from the server.
    404 
    405 This is a very serious bug. It's similar in severity to the
    406 [the Heartbleed bug](http://heartbleed.com/) that allowed disclosure of OpenSSL process
    407 memory by remote attackers.
    408 
    409 
    410 ### Which real-world packages were vulnerable?
    411 
    412 #### [`bittorrent-dht`](https://www.npmjs.com/package/bittorrent-dht)
    413 
    414 [Mathias Buus](https://github.com/mafintosh) and I
    415 ([Feross Aboukhadijeh](http://feross.org/)) found this issue in one of our own packages,
    416 [`bittorrent-dht`](https://www.npmjs.com/package/bittorrent-dht). The bug would allow
    417 anyone on the internet to send a series of messages to a user of `bittorrent-dht` and get
    418 them to reveal 20 bytes at a time of uninitialized memory from the node.js process.
    419 
    420 Here's
    421 [the commit](https://github.com/feross/bittorrent-dht/commit/6c7da04025d5633699800a99ec3fbadf70ad35b8)
    422 that fixed it. We released a new fixed version, created a
    423 [Node Security Project disclosure](https://nodesecurity.io/advisories/68), and deprecated all
    424 vulnerable versions on npm so users will get a warning to upgrade to a newer version.
    425 
    426 #### [`ws`](https://www.npmjs.com/package/ws)
    427 
    428 That got us wondering if there were other vulnerable packages. Sure enough, within a short
    429 period of time, we found the same issue in [`ws`](https://www.npmjs.com/package/ws), the
    430 most popular WebSocket implementation in node.js.
    431 
    432 If certain APIs were called with `Number` parameters instead of `String` or `Buffer` as
    433 expected, then uninitialized server memory would be disclosed to the remote peer.
    434 
    435 These were the vulnerable methods:
    436 
    437 ```js
    438 socket.send(number)
    439 socket.ping(number)
    440 socket.pong(number)
    441 ```
    442 
    443 Here's a vulnerable socket server with some echo functionality:
    444 
    445 ```js
    446 server.on('connection', function (socket) {
    447   socket.on('message', function (message) {
    448     message = JSON.parse(message)
    449     if (message.type === 'echo') {
    450       socket.send(message.data) // send back the user's message
    451     }
    452   })
    453 })
    454 ```
    455 
    456 `socket.send(number)` called on the server, will disclose server memory.
    457 
    458 Here's [the release](https://github.com/websockets/ws/releases/tag/1.0.1) where the issue
    459 was fixed, with a more detailed explanation. Props to
    460 [Arnout Kazemier](https://github.com/3rd-Eden) for the quick fix. Here's the
    461 [Node Security Project disclosure](https://nodesecurity.io/advisories/67).
    462 
    463 
    464 ### What's the solution?
    465 
    466 It's important that node.js offers a fast way to get memory otherwise performance-critical
    467 applications would needlessly get a lot slower.
    468 
    469 But we need a better way to *signal our intent* as programmers. **When we want
    470 uninitialized memory, we should request it explicitly.**
    471 
    472 Sensitive functionality should not be packed into a developer-friendly API that loosely
    473 accepts many different types. This type of API encourages the lazy practice of passing
    474 variables in without checking the type very carefully.
    475 
    476 #### A new API: `Buffer.allocUnsafe(number)`
    477 
    478 The functionality of creating buffers with uninitialized memory should be part of another
    479 API. We propose `Buffer.allocUnsafe(number)`. This way, it's not part of an API that
    480 frequently gets user input of all sorts of different types passed into it.
    481 
    482 ```js
    483 var buf = Buffer.allocUnsafe(16) // careful, uninitialized memory!
    484 
    485 // Immediately overwrite the uninitialized buffer with data from another buffer
    486 for (var i = 0; i < buf.length; i++) {
    487   buf[i] = otherBuf[i]
    488 }
    489 ```
    490 
    491 
    492 ### How do we fix node.js core?
    493 
    494 We sent [a PR to node.js core](https://github.com/nodejs/node/pull/4514) (merged as
    495 `semver-major`) which defends against one case:
    496 
    497 ```js
    498 var str = 16
    499 new Buffer(str, 'utf8')
    500 ```
    501 
    502 In this situation, it's implied that the programmer intended the first argument to be a
    503 string, since they passed an encoding as a second argument. Today, node.js will allocate
    504 uninitialized memory in the case of `new Buffer(number, encoding)`, which is probably not
    505 what the programmer intended.
    506 
    507 But this is only a partial solution, since if the programmer does `new Buffer(variable)`
    508 (without an `encoding` parameter) there's no way to know what they intended. If `variable`
    509 is sometimes a number, then uninitialized memory will sometimes be returned.
    510 
    511 ### What's the real long-term fix?
    512 
    513 We could deprecate and remove `new Buffer(number)` and use `Buffer.allocUnsafe(number)` when
    514 we need uninitialized memory. But that would break 1000s of packages.
    515 
    516 ~~We believe the best solution is to:~~
    517 
    518 ~~1. Change `new Buffer(number)` to return safe, zeroed-out memory~~
    519 
    520 ~~2. Create a new API for creating uninitialized Buffers. We propose: `Buffer.allocUnsafe(number)`~~
    521 
    522 #### Update
    523 
    524 We now support adding three new APIs:
    525 
    526 - `Buffer.from(value)` - convert from any type to a buffer
    527 - `Buffer.alloc(size)` - create a zero-filled buffer
    528 - `Buffer.allocUnsafe(size)` - create an uninitialized buffer with given size
    529 
    530 This solves the core problem that affected `ws` and `bittorrent-dht` which is
    531 `Buffer(variable)` getting tricked into taking a number argument.
    532 
    533 This way, existing code continues working and the impact on the npm ecosystem will be
    534 minimal. Over time, npm maintainers can migrate performance-critical code to use
    535 `Buffer.allocUnsafe(number)` instead of `new Buffer(number)`.
    536 
    537 
    538 ### Conclusion
    539 
    540 We think there's a serious design issue with the `Buffer` API as it exists today. It
    541 promotes insecure software by putting high-risk functionality into a convenient API
    542 with friendly "developer ergonomics".
    543 
    544 This wasn't merely a theoretical exercise because we found the issue in some of the
    545 most popular npm packages.
    546 
    547 Fortunately, there's an easy fix that can be applied today. Use `safe-buffer` in place of
    548 `buffer`.
    549 
    550 ```js
    551 var Buffer = require('safe-buffer').Buffer
    552 ```
    553 
    554 Eventually, we hope that node.js core can switch to this new, safer behavior. We believe
    555 the impact on the ecosystem would be minimal since it's not a breaking change.
    556 Well-maintained, popular packages would be updated to use `Buffer.alloc` quickly, while
    557 older, insecure packages would magically become safe from this attack vector.
    558 
    559 
    560 ## links
    561 
    562 - [Node.js PR: buffer: throw if both length and enc are passed](https://github.com/nodejs/node/pull/4514)
    563 - [Node Security Project disclosure for `ws`](https://nodesecurity.io/advisories/67)
    564 - [Node Security Project disclosure for`bittorrent-dht`](https://nodesecurity.io/advisories/68)
    565 
    566 
    567 ## credit
    568 
    569 The original issues in `bittorrent-dht`
    570 ([disclosure](https://nodesecurity.io/advisories/68)) and
    571 `ws` ([disclosure](https://nodesecurity.io/advisories/67)) were discovered by
    572 [Mathias Buus](https://github.com/mafintosh) and
    573 [Feross Aboukhadijeh](http://feross.org/).
    574 
    575 Thanks to [Adam Baldwin](https://github.com/evilpacket) for helping disclose these issues
    576 and for his work running the [Node Security Project](https://nodesecurity.io/).
    577 
    578 Thanks to [John Hiesey](https://github.com/jhiesey) for proofreading this README and
    579 auditing the code.
    580 
    581 
    582 ## license
    583 
    584 MIT. Copyright (C) [Feross Aboukhadijeh](http://feross.org)