Middleware for validating host headers in requests to protect against DNS rebinding attacks.
Note
DNS rebinding attacks are not effective against HTTPS sites. Since HTTPS is now commonly used for production environments, this middleware is generally unnecessary for production sites.
npm i -D host-validation-middleware # pnpm add -D host-validation-middlewareThis middleware is compatible with Connect and frameworks like Express that support Connect-style middleware.
import connect from 'connect'
import { hostValidationMiddleware } from 'host-validation-middleware'
const app = connect()
app.use(
hostValidationMiddleware({
// Values starting with `.` will allow all the subdomains under that domain
allowedHosts: Object.freeze(['example.com', '.mydomain.com']),
// Optionally customize the error message:
generateErrorMessage: (hostname) => `Access denied for host: ${hostname}`,
// Optionally set the error response content type:
errorResponseContentType: 'text/plain',
}),
)
app.use((req, res) => {
res.end('Hello, world!')
})
app.listen(3000, () => {
console.log('Server running on http://localhost:3000')
})If the host header is not in the allowed hosts list, a 403 Forbidden response is sent.
You can also use the core host validation logic directly:
import { isHostAllowed } from 'host-validation-middleware'
const allowedHosts = Object.freeze(['example.com', '.mydomain.com'])
console.log(isHostAllowed('example.com', allowedHosts)) // true
console.log(isHostAllowed('sub.mydomain.com', allowedHosts)) // true
console.log(isHostAllowed('evil.com', allowedHosts)) // falseThis function will cache the result if the allowedHosts array is frozen.
The host names listed in the allowedHosts options will be allowed.
If the host name starts with a dot, the domain without the dot and any subdomain of it will be allowed.
- Example: With
allowedHosts: ['example.com', '.mydomain.com']:- Requests to
example.comare allowed. - Requests to
mydomain.com,foo.mydomain.com,bar.foo.mydomain.comare also allowed.
- Requests to
Also the following hosts that cannot be used for DNS rebinding attacks are always allowed:
- Any
localhostor subdomain oflocalhost(e.g.,localhost,foo.localhost) - Any IPv4 or IPv6 address (e.g.,
127.0.0.1,[::1]) - Any host using the
file:or browser extension protocol
The API interface and the original implementation is based on webpack-dev-server's allowedHosts option.