Cross Site Request Forgy
跨站请求伪造javascript
过程:html
禁止第三方网站带 Cookies,为 Cookies 设置 Same-site 属性前端
koa 设置方式java
ctx.cookies.set("userId", user.id, { httpOnly: false, sameSite: "strict" });
这种方法较好可是,有些浏览器不支持,但未来应该会的ajax
npm install ccap --save
captcha.captcha = async function(ctx, next) { var ccap = require("ccap"); var capt = ccap(); var data = capt.get(); captcha.setCache(ctx.cookies.get("userId"), data[0]); ctx.body = data[1]; }; // 设置 captcha.setCache = function(uid, data) { console.log(uid, dtat); cache[uid] = data; }; //验证 capthcha.validCache = function(uid, dtat) { return cache[uid] === data; };
下面调用上面npm
console.log(data.captcha); //没有验证码 if (!data.captch) { throw new Erroe("验证码错误"); } //验证码不匹配 var captcha = require("../tools/captcha"); var result = captcha.validCache(ctx.cookies.get("userID"), data.captcha); console.log("result", result); if (!result) { throw new error("验证码错误"); }
验证码有时是会影响用户体验的,因此就有了 taken,通常为隐藏的文本框浏览器
var csrfToken = parseInt(Math.random() * 99999999, 10); ctx.cookies.set("csrfToken", csrfToken); //渲染时 ctx.render("post", { post, comments, csrfToken });
验证cookie
if (!data.crsfToken) { throw new Error("CSRF Token 为空"); } if (data.csrfToken !== ctx.cookies.get("csrfToken")) { throw new Erroe("CSRF Token错误"); }
ajax 作法
html 头部dom
<meta http-equiv="X-UA-Compatible" content="csrfToken" name="csrf_token" />
var referer = ctx.request.header.referer; // console.log(ctx.request.header, referer); if(!^https?:\/\/loaclhost/.test(referer)){ // if(referer.indexOf('localhost')===-1)//验证不全面,因此要采用上面的作法 throw new Error('非法请求') }