/ node_modules / safe-buffer / README.md
README.md
  1  # safe-buffer [![travis][travis-image]][travis-url] [![npm][npm-image]][npm-url] [![downloads][downloads-image]][downloads-url] [![javascript style guide][standard-image]][standard-url]
  2  
  3  [travis-image]: https://img.shields.io/travis/feross/safe-buffer/master.svg
  4  [travis-url]: https://travis-ci.org/feross/safe-buffer
  5  [npm-image]: https://img.shields.io/npm/v/safe-buffer.svg
  6  [npm-url]: https://npmjs.org/package/safe-buffer
  7  [downloads-image]: https://img.shields.io/npm/dm/safe-buffer.svg
  8  [downloads-url]: https://npmjs.org/package/safe-buffer
  9  [standard-image]: https://img.shields.io/badge/code_style-standard-brightgreen.svg
 10  [standard-url]: https://standardjs.com
 11  
 12  #### Safer Node.js Buffer API
 13  
 14  **Use the new Node.js Buffer APIs (`Buffer.from`, `Buffer.alloc`,
 15  `Buffer.allocUnsafe`, `Buffer.allocUnsafeSlow`) in all versions of Node.js.**
 16  
 17  **Uses the built-in implementation when available.**
 18  
 19  ## install
 20  
 21  ```
 22  npm install safe-buffer
 23  ```
 24  
 25  ## usage
 26  
 27  The goal of this package is to provide a safe replacement for the node.js `Buffer`.
 28  
 29  It's a drop-in replacement for `Buffer`. You can use it by adding one `require` line to
 30  the top of your node.js modules:
 31  
 32  ```js
 33  var Buffer = require('safe-buffer').Buffer
 34  
 35  // Existing buffer code will continue to work without issues:
 36  
 37  new Buffer('hey', 'utf8')
 38  new Buffer([1, 2, 3], 'utf8')
 39  new Buffer(obj)
 40  new Buffer(16) // create an uninitialized buffer (potentially unsafe)
 41  
 42  // But you can use these new explicit APIs to make clear what you want:
 43  
 44  Buffer.from('hey', 'utf8') // convert from many types to a Buffer
 45  Buffer.alloc(16) // create a zero-filled buffer (safe)
 46  Buffer.allocUnsafe(16) // create an uninitialized buffer (potentially unsafe)
 47  ```
 48  
 49  ## api
 50  
 51  ### Class Method: Buffer.from(array)
 52  <!-- YAML
 53  added: v3.0.0
 54  -->
 55  
 56  * `array` {Array}
 57  
 58  Allocates a new `Buffer` using an `array` of octets.
 59  
 60  ```js
 61  const buf = Buffer.from([0x62,0x75,0x66,0x66,0x65,0x72]);
 62    // creates a new Buffer containing ASCII bytes
 63    // ['b','u','f','f','e','r']
 64  ```
 65  
 66  A `TypeError` will be thrown if `array` is not an `Array`.
 67  
 68  ### Class Method: Buffer.from(arrayBuffer[, byteOffset[, length]])
 69  <!-- YAML
 70  added: v5.10.0
 71  -->
 72  
 73  * `arrayBuffer` {ArrayBuffer} The `.buffer` property of a `TypedArray` or
 74    a `new ArrayBuffer()`
 75  * `byteOffset` {Number} Default: `0`
 76  * `length` {Number} Default: `arrayBuffer.length - byteOffset`
 77  
 78  When passed a reference to the `.buffer` property of a `TypedArray` instance,
 79  the newly created `Buffer` will share the same allocated memory as the
 80  TypedArray.
 81  
 82  ```js
 83  const arr = new Uint16Array(2);
 84  arr[0] = 5000;
 85  arr[1] = 4000;
 86  
 87  const buf = Buffer.from(arr.buffer); // shares the memory with arr;
 88  
 89  console.log(buf);
 90    // Prints: <Buffer 88 13 a0 0f>
 91  
 92  // changing the TypedArray changes the Buffer also
 93  arr[1] = 6000;
 94  
 95  console.log(buf);
 96    // Prints: <Buffer 88 13 70 17>
 97  ```
 98  
 99  The optional `byteOffset` and `length` arguments specify a memory range within
100  the `arrayBuffer` that will be shared by the `Buffer`.
101  
102  ```js
103  const ab = new ArrayBuffer(10);
104  const buf = Buffer.from(ab, 0, 2);
105  console.log(buf.length);
106    // Prints: 2
107  ```
108  
109  A `TypeError` will be thrown if `arrayBuffer` is not an `ArrayBuffer`.
110  
111  ### Class Method: Buffer.from(buffer)
112  <!-- YAML
113  added: v3.0.0
114  -->
115  
116  * `buffer` {Buffer}
117  
118  Copies the passed `buffer` data onto a new `Buffer` instance.
119  
120  ```js
121  const buf1 = Buffer.from('buffer');
122  const buf2 = Buffer.from(buf1);
123  
124  buf1[0] = 0x61;
125  console.log(buf1.toString());
126    // 'auffer'
127  console.log(buf2.toString());
128    // 'buffer' (copy is not changed)
129  ```
130  
131  A `TypeError` will be thrown if `buffer` is not a `Buffer`.
132  
133  ### Class Method: Buffer.from(str[, encoding])
134  <!-- YAML
135  added: v5.10.0
136  -->
137  
138  * `str` {String} String to encode.
139  * `encoding` {String} Encoding to use, Default: `'utf8'`
140  
141  Creates a new `Buffer` containing the given JavaScript string `str`. If
142  provided, the `encoding` parameter identifies the character encoding.
143  If not provided, `encoding` defaults to `'utf8'`.
144  
145  ```js
146  const buf1 = Buffer.from('this is a tést');
147  console.log(buf1.toString());
148    // prints: this is a tést
149  console.log(buf1.toString('ascii'));
150    // prints: this is a tC)st
151  
152  const buf2 = Buffer.from('7468697320697320612074c3a97374', 'hex');
153  console.log(buf2.toString());
154    // prints: this is a tést
155  ```
156  
157  A `TypeError` will be thrown if `str` is not a string.
158  
159  ### Class Method: Buffer.alloc(size[, fill[, encoding]])
160  <!-- YAML
161  added: v5.10.0
162  -->
163  
164  * `size` {Number}
165  * `fill` {Value} Default: `undefined`
166  * `encoding` {String} Default: `utf8`
167  
168  Allocates a new `Buffer` of `size` bytes. If `fill` is `undefined`, the
169  `Buffer` will be *zero-filled*.
170  
171  ```js
172  const buf = Buffer.alloc(5);
173  console.log(buf);
174    // <Buffer 00 00 00 00 00>
175  ```
176  
177  The `size` must be less than or equal to the value of
178  `require('buffer').kMaxLength` (on 64-bit architectures, `kMaxLength` is
179  `(2^31)-1`). Otherwise, a [`RangeError`][] is thrown. A zero-length Buffer will
180  be created if a `size` less than or equal to 0 is specified.
181  
182  If `fill` is specified, the allocated `Buffer` will be initialized by calling
183  `buf.fill(fill)`. See [`buf.fill()`][] for more information.
184  
185  ```js
186  const buf = Buffer.alloc(5, 'a');
187  console.log(buf);
188    // <Buffer 61 61 61 61 61>
189  ```
190  
191  If both `fill` and `encoding` are specified, the allocated `Buffer` will be
192  initialized by calling `buf.fill(fill, encoding)`. For example:
193  
194  ```js
195  const buf = Buffer.alloc(11, 'aGVsbG8gd29ybGQ=', 'base64');
196  console.log(buf);
197    // <Buffer 68 65 6c 6c 6f 20 77 6f 72 6c 64>
198  ```
199  
200  Calling `Buffer.alloc(size)` can be significantly slower than the alternative
201  `Buffer.allocUnsafe(size)` but ensures that the newly created `Buffer` instance
202  contents will *never contain sensitive data*.
203  
204  A `TypeError` will be thrown if `size` is not a number.
205  
206  ### Class Method: Buffer.allocUnsafe(size)
207  <!-- YAML
208  added: v5.10.0
209  -->
210  
211  * `size` {Number}
212  
213  Allocates a new *non-zero-filled* `Buffer` of `size` bytes.  The `size` must
214  be less than or equal to the value of `require('buffer').kMaxLength` (on 64-bit
215  architectures, `kMaxLength` is `(2^31)-1`). Otherwise, a [`RangeError`][] is
216  thrown. A zero-length Buffer will be created if a `size` less than or equal to
217  0 is specified.
218  
219  The underlying memory for `Buffer` instances created in this way is *not
220  initialized*. The contents of the newly created `Buffer` are unknown and
221  *may contain sensitive data*. Use [`buf.fill(0)`][] to initialize such
222  `Buffer` instances to zeroes.
223  
224  ```js
225  const buf = Buffer.allocUnsafe(5);
226  console.log(buf);
227    // <Buffer 78 e0 82 02 01>
228    // (octets will be different, every time)
229  buf.fill(0);
230  console.log(buf);
231    // <Buffer 00 00 00 00 00>
232  ```
233  
234  A `TypeError` will be thrown if `size` is not a number.
235  
236  Note that the `Buffer` module pre-allocates an internal `Buffer` instance of
237  size `Buffer.poolSize` that is used as a pool for the fast allocation of new
238  `Buffer` instances created using `Buffer.allocUnsafe(size)` (and the deprecated
239  `new Buffer(size)` constructor) only when `size` is less than or equal to
240  `Buffer.poolSize >> 1` (floor of `Buffer.poolSize` divided by two). The default
241  value of `Buffer.poolSize` is `8192` but can be modified.
242  
243  Use of this pre-allocated internal memory pool is a key difference between
244  calling `Buffer.alloc(size, fill)` vs. `Buffer.allocUnsafe(size).fill(fill)`.
245  Specifically, `Buffer.alloc(size, fill)` will *never* use the internal Buffer
246  pool, while `Buffer.allocUnsafe(size).fill(fill)` *will* use the internal
247  Buffer pool if `size` is less than or equal to half `Buffer.poolSize`. The
248  difference is subtle but can be important when an application requires the
249  additional performance that `Buffer.allocUnsafe(size)` provides.
250  
251  ### Class Method: Buffer.allocUnsafeSlow(size)
252  <!-- YAML
253  added: v5.10.0
254  -->
255  
256  * `size` {Number}
257  
258  Allocates a new *non-zero-filled* and non-pooled `Buffer` of `size` bytes.  The
259  `size` must be less than or equal to the value of
260  `require('buffer').kMaxLength` (on 64-bit architectures, `kMaxLength` is
261  `(2^31)-1`). Otherwise, a [`RangeError`][] is thrown. A zero-length Buffer will
262  be created if a `size` less than or equal to 0 is specified.
263  
264  The underlying memory for `Buffer` instances created in this way is *not
265  initialized*. The contents of the newly created `Buffer` are unknown and
266  *may contain sensitive data*. Use [`buf.fill(0)`][] to initialize such
267  `Buffer` instances to zeroes.
268  
269  When using `Buffer.allocUnsafe()` to allocate new `Buffer` instances,
270  allocations under 4KB are, by default, sliced from a single pre-allocated
271  `Buffer`. This allows applications to avoid the garbage collection overhead of
272  creating many individually allocated Buffers. This approach improves both
273  performance and memory usage by eliminating the need to track and cleanup as
274  many `Persistent` objects.
275  
276  However, in the case where a developer may need to retain a small chunk of
277  memory from a pool for an indeterminate amount of time, it may be appropriate
278  to create an un-pooled Buffer instance using `Buffer.allocUnsafeSlow()` then
279  copy out the relevant bits.
280  
281  ```js
282  // need to keep around a few small chunks of memory
283  const store = [];
284  
285  socket.on('readable', () => {
286    const data = socket.read();
287    // allocate for retained data
288    const sb = Buffer.allocUnsafeSlow(10);
289    // copy the data into the new allocation
290    data.copy(sb, 0, 0, 10);
291    store.push(sb);
292  });
293  ```
294  
295  Use of `Buffer.allocUnsafeSlow()` should be used only as a last resort *after*
296  a developer has observed undue memory retention in their applications.
297  
298  A `TypeError` will be thrown if `size` is not a number.
299  
300  ### All the Rest
301  
302  The rest of the `Buffer` API is exactly the same as in node.js.
303  [See the docs](https://nodejs.org/api/buffer.html).
304  
305  
306  ## Related links
307  
308  - [Node.js issue: Buffer(number) is unsafe](https://github.com/nodejs/node/issues/4660)
309  - [Node.js Enhancement Proposal: Buffer.from/Buffer.alloc/Buffer.zalloc/Buffer() soft-deprecate](https://github.com/nodejs/node-eps/pull/4)
310  
311  ## Why is `Buffer` unsafe?
312  
313  Today, the node.js `Buffer` constructor is overloaded to handle many different argument
314  types like `String`, `Array`, `Object`, `TypedArrayView` (`Uint8Array`, etc.),
315  `ArrayBuffer`, and also `Number`.
316  
317  The API is optimized for convenience: you can throw any type at it, and it will try to do
318  what you want.
319  
320  Because the Buffer constructor is so powerful, you often see code like this:
321  
322  ```js
323  // Convert UTF-8 strings to hex
324  function toHex (str) {
325    return new Buffer(str).toString('hex')
326  }
327  ```
328  
329  ***But what happens if `toHex` is called with a `Number` argument?***
330  
331  ### Remote Memory Disclosure
332  
333  If an attacker can make your program call the `Buffer` constructor with a `Number`
334  argument, then they can make it allocate uninitialized memory from the node.js process.
335  This could potentially disclose TLS private keys, user data, or database passwords.
336  
337  When the `Buffer` constructor is passed a `Number` argument, it returns an
338  **UNINITIALIZED** block of memory of the specified `size`. When you create a `Buffer` like
339  this, you **MUST** overwrite the contents before returning it to the user.
340  
341  From the [node.js docs](https://nodejs.org/api/buffer.html#buffer_new_buffer_size):
342  
343  > `new Buffer(size)`
344  >
345  > - `size` Number
346  >
347  > The underlying memory for `Buffer` instances created in this way is not initialized.
348  > **The contents of a newly created `Buffer` are unknown and could contain sensitive
349  > data.** Use `buf.fill(0)` to initialize a Buffer to zeroes.
350  
351  (Emphasis our own.)
352  
353  Whenever the programmer intended to create an uninitialized `Buffer` you often see code
354  like this:
355  
356  ```js
357  var buf = new Buffer(16)
358  
359  // Immediately overwrite the uninitialized buffer with data from another buffer
360  for (var i = 0; i < buf.length; i++) {
361    buf[i] = otherBuf[i]
362  }
363  ```
364  
365  
366  ### Would this ever be a problem in real code?
367  
368  Yes. It's surprisingly common to forget to check the type of your variables in a
369  dynamically-typed language like JavaScript.
370  
371  Usually the consequences of assuming the wrong type is that your program crashes with an
372  uncaught exception. But the failure mode for forgetting to check the type of arguments to
373  the `Buffer` constructor is more catastrophic.
374  
375  Here's an example of a vulnerable service that takes a JSON payload and converts it to
376  hex:
377  
378  ```js
379  // Take a JSON payload {str: "some string"} and convert it to hex
380  var server = http.createServer(function (req, res) {
381    var data = ''
382    req.setEncoding('utf8')
383    req.on('data', function (chunk) {
384      data += chunk
385    })
386    req.on('end', function () {
387      var body = JSON.parse(data)
388      res.end(new Buffer(body.str).toString('hex'))
389    })
390  })
391  
392  server.listen(8080)
393  ```
394  
395  In this example, an http client just has to send:
396  
397  ```json
398  {
399    "str": 1000
400  }
401  ```
402  
403  and it will get back 1,000 bytes of uninitialized memory from the server.
404  
405  This is a very serious bug. It's similar in severity to the
406  [the Heartbleed bug](http://heartbleed.com/) that allowed disclosure of OpenSSL process
407  memory by remote attackers.
408  
409  
410  ### Which real-world packages were vulnerable?
411  
412  #### [`bittorrent-dht`](https://www.npmjs.com/package/bittorrent-dht)
413  
414  [Mathias Buus](https://github.com/mafintosh) and I
415  ([Feross Aboukhadijeh](http://feross.org/)) found this issue in one of our own packages,
416  [`bittorrent-dht`](https://www.npmjs.com/package/bittorrent-dht). The bug would allow
417  anyone on the internet to send a series of messages to a user of `bittorrent-dht` and get
418  them to reveal 20 bytes at a time of uninitialized memory from the node.js process.
419  
420  Here's
421  [the commit](https://github.com/feross/bittorrent-dht/commit/6c7da04025d5633699800a99ec3fbadf70ad35b8)
422  that fixed it. We released a new fixed version, created a
423  [Node Security Project disclosure](https://nodesecurity.io/advisories/68), and deprecated all
424  vulnerable versions on npm so users will get a warning to upgrade to a newer version.
425  
426  #### [`ws`](https://www.npmjs.com/package/ws)
427  
428  That got us wondering if there were other vulnerable packages. Sure enough, within a short
429  period of time, we found the same issue in [`ws`](https://www.npmjs.com/package/ws), the
430  most popular WebSocket implementation in node.js.
431  
432  If certain APIs were called with `Number` parameters instead of `String` or `Buffer` as
433  expected, then uninitialized server memory would be disclosed to the remote peer.
434  
435  These were the vulnerable methods:
436  
437  ```js
438  socket.send(number)
439  socket.ping(number)
440  socket.pong(number)
441  ```
442  
443  Here's a vulnerable socket server with some echo functionality:
444  
445  ```js
446  server.on('connection', function (socket) {
447    socket.on('message', function (message) {
448      message = JSON.parse(message)
449      if (message.type === 'echo') {
450        socket.send(message.data) // send back the user's message
451      }
452    })
453  })
454  ```
455  
456  `socket.send(number)` called on the server, will disclose server memory.
457  
458  Here's [the release](https://github.com/websockets/ws/releases/tag/1.0.1) where the issue
459  was fixed, with a more detailed explanation. Props to
460  [Arnout Kazemier](https://github.com/3rd-Eden) for the quick fix. Here's the
461  [Node Security Project disclosure](https://nodesecurity.io/advisories/67).
462  
463  
464  ### What's the solution?
465  
466  It's important that node.js offers a fast way to get memory otherwise performance-critical
467  applications would needlessly get a lot slower.
468  
469  But we need a better way to *signal our intent* as programmers. **When we want
470  uninitialized memory, we should request it explicitly.**
471  
472  Sensitive functionality should not be packed into a developer-friendly API that loosely
473  accepts many different types. This type of API encourages the lazy practice of passing
474  variables in without checking the type very carefully.
475  
476  #### A new API: `Buffer.allocUnsafe(number)`
477  
478  The functionality of creating buffers with uninitialized memory should be part of another
479  API. We propose `Buffer.allocUnsafe(number)`. This way, it's not part of an API that
480  frequently gets user input of all sorts of different types passed into it.
481  
482  ```js
483  var buf = Buffer.allocUnsafe(16) // careful, uninitialized memory!
484  
485  // Immediately overwrite the uninitialized buffer with data from another buffer
486  for (var i = 0; i < buf.length; i++) {
487    buf[i] = otherBuf[i]
488  }
489  ```
490  
491  
492  ### How do we fix node.js core?
493  
494  We sent [a PR to node.js core](https://github.com/nodejs/node/pull/4514) (merged as
495  `semver-major`) which defends against one case:
496  
497  ```js
498  var str = 16
499  new Buffer(str, 'utf8')
500  ```
501  
502  In this situation, it's implied that the programmer intended the first argument to be a
503  string, since they passed an encoding as a second argument. Today, node.js will allocate
504  uninitialized memory in the case of `new Buffer(number, encoding)`, which is probably not
505  what the programmer intended.
506  
507  But this is only a partial solution, since if the programmer does `new Buffer(variable)`
508  (without an `encoding` parameter) there's no way to know what they intended. If `variable`
509  is sometimes a number, then uninitialized memory will sometimes be returned.
510  
511  ### What's the real long-term fix?
512  
513  We could deprecate and remove `new Buffer(number)` and use `Buffer.allocUnsafe(number)` when
514  we need uninitialized memory. But that would break 1000s of packages.
515  
516  ~~We believe the best solution is to:~~
517  
518  ~~1. Change `new Buffer(number)` to return safe, zeroed-out memory~~
519  
520  ~~2. Create a new API for creating uninitialized Buffers. We propose: `Buffer.allocUnsafe(number)`~~
521  
522  #### Update
523  
524  We now support adding three new APIs:
525  
526  - `Buffer.from(value)` - convert from any type to a buffer
527  - `Buffer.alloc(size)` - create a zero-filled buffer
528  - `Buffer.allocUnsafe(size)` - create an uninitialized buffer with given size
529  
530  This solves the core problem that affected `ws` and `bittorrent-dht` which is
531  `Buffer(variable)` getting tricked into taking a number argument.
532  
533  This way, existing code continues working and the impact on the npm ecosystem will be
534  minimal. Over time, npm maintainers can migrate performance-critical code to use
535  `Buffer.allocUnsafe(number)` instead of `new Buffer(number)`.
536  
537  
538  ### Conclusion
539  
540  We think there's a serious design issue with the `Buffer` API as it exists today. It
541  promotes insecure software by putting high-risk functionality into a convenient API
542  with friendly "developer ergonomics".
543  
544  This wasn't merely a theoretical exercise because we found the issue in some of the
545  most popular npm packages.
546  
547  Fortunately, there's an easy fix that can be applied today. Use `safe-buffer` in place of
548  `buffer`.
549  
550  ```js
551  var Buffer = require('safe-buffer').Buffer
552  ```
553  
554  Eventually, we hope that node.js core can switch to this new, safer behavior. We believe
555  the impact on the ecosystem would be minimal since it's not a breaking change.
556  Well-maintained, popular packages would be updated to use `Buffer.alloc` quickly, while
557  older, insecure packages would magically become safe from this attack vector.
558  
559  
560  ## links
561  
562  - [Node.js PR: buffer: throw if both length and enc are passed](https://github.com/nodejs/node/pull/4514)
563  - [Node Security Project disclosure for `ws`](https://nodesecurity.io/advisories/67)
564  - [Node Security Project disclosure for`bittorrent-dht`](https://nodesecurity.io/advisories/68)
565  
566  
567  ## credit
568  
569  The original issues in `bittorrent-dht`
570  ([disclosure](https://nodesecurity.io/advisories/68)) and
571  `ws` ([disclosure](https://nodesecurity.io/advisories/67)) were discovered by
572  [Mathias Buus](https://github.com/mafintosh) and
573  [Feross Aboukhadijeh](http://feross.org/).
574  
575  Thanks to [Adam Baldwin](https://github.com/evilpacket) for helping disclose these issues
576  and for his work running the [Node Security Project](https://nodesecurity.io/).
577  
578  Thanks to [John Hiesey](https://github.com/jhiesey) for proofreading this README and
579  auditing the code.
580  
581  
582  ## license
583  
584  MIT. Copyright (C) [Feross Aboukhadijeh](http://feross.org)