2012-04-29 19:15:06 +02:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-11 11:58:15 +02:00
|
|
|
* PrivateBin
|
2012-04-29 19:15:06 +02:00
|
|
|
*
|
|
|
|
* a zero-knowledge paste bin
|
|
|
|
*
|
2016-07-11 11:58:15 +02:00
|
|
|
* @link https://github.com/PrivateBin/PrivateBin
|
2012-04-29 19:15:06 +02:00
|
|
|
* @copyright 2012 Sébastien SAUVAGE (sebsauvage.net)
|
2016-07-19 13:56:52 +02:00
|
|
|
* @license https://www.opensource.org/licenses/zlib-license.php The zlib/libpng License
|
2020-01-08 19:31:06 +01:00
|
|
|
* @version 1.3.2
|
2012-04-29 19:15:06 +02:00
|
|
|
*/
|
2016-12-12 18:43:23 +01:00
|
|
|
|
2016-12-12 18:49:08 +01:00
|
|
|
namespace PrivateBin\Persistence;
|
2016-08-09 11:54:42 +02:00
|
|
|
|
|
|
|
use PrivateBin\Configuration;
|
2016-07-21 17:09:48 +02:00
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
/**
|
2016-08-09 11:54:42 +02:00
|
|
|
* TrafficLimiter
|
2012-04-29 19:15:06 +02:00
|
|
|
*
|
|
|
|
* Handles traffic limiting, so no user does more than one call per 10 seconds.
|
|
|
|
*/
|
2016-08-09 11:54:42 +02:00
|
|
|
class TrafficLimiter extends AbstractPersistence
|
2012-04-29 19:15:06 +02:00
|
|
|
{
|
|
|
|
/**
|
2015-08-16 15:55:31 +02:00
|
|
|
* time limit in seconds, defaults to 10s
|
|
|
|
*
|
2012-04-29 19:15:06 +02:00
|
|
|
* @access private
|
|
|
|
* @static
|
|
|
|
* @var int
|
|
|
|
*/
|
|
|
|
private static $_limit = 10;
|
|
|
|
|
2015-09-26 17:57:46 +02:00
|
|
|
/**
|
|
|
|
* key to fetch IP address
|
|
|
|
*
|
|
|
|
* @access private
|
|
|
|
* @static
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private static $_ipKey = 'REMOTE_ADDR';
|
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
/**
|
|
|
|
* set the time limit in seconds
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
|
|
|
* @param int $limit
|
|
|
|
*/
|
|
|
|
public static function setLimit($limit)
|
|
|
|
{
|
|
|
|
self::$_limit = $limit;
|
|
|
|
}
|
|
|
|
|
2015-09-26 17:57:46 +02:00
|
|
|
/**
|
|
|
|
* set configuration options of the traffic limiter
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
2016-08-09 11:54:42 +02:00
|
|
|
* @param Configuration $conf
|
2015-09-26 17:57:46 +02:00
|
|
|
*/
|
2016-08-09 11:54:42 +02:00
|
|
|
public static function setConfiguration(Configuration $conf)
|
2015-09-26 17:57:46 +02:00
|
|
|
{
|
|
|
|
self::setLimit($conf->getKey('limit', 'traffic'));
|
|
|
|
self::setPath($conf->getKey('dir', 'traffic'));
|
2016-07-26 08:19:35 +02:00
|
|
|
if (($option = $conf->getKey('header', 'traffic')) !== null) {
|
2015-09-26 17:57:46 +02:00
|
|
|
$httpHeader = 'HTTP_' . $option;
|
2016-07-26 08:19:35 +02:00
|
|
|
if (array_key_exists($httpHeader, $_SERVER) && !empty($_SERVER[$httpHeader])) {
|
2015-09-26 17:57:46 +02:00
|
|
|
self::$_ipKey = $httpHeader;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-08-10 17:41:46 +02:00
|
|
|
* get a HMAC of the current visitors IP address
|
2015-09-26 17:57:46 +02:00
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
2016-08-10 17:41:46 +02:00
|
|
|
* @param string $algo
|
2015-09-26 17:57:46 +02:00
|
|
|
* @return string
|
|
|
|
*/
|
2016-08-10 17:41:46 +02:00
|
|
|
public static function getHash($algo = 'sha512')
|
2015-09-26 17:57:46 +02:00
|
|
|
{
|
2016-08-10 17:41:46 +02:00
|
|
|
return hash_hmac($algo, $_SERVER[self::$_ipKey], ServerSalt::get());
|
2015-09-26 17:57:46 +02:00
|
|
|
}
|
|
|
|
|
2012-04-29 19:15:06 +02:00
|
|
|
/**
|
|
|
|
* traffic limiter
|
|
|
|
*
|
|
|
|
* Make sure the IP address makes at most 1 request every 10 seconds.
|
|
|
|
*
|
|
|
|
* @access public
|
|
|
|
* @static
|
2018-11-19 13:07:25 +01:00
|
|
|
* @throws \Exception
|
2012-04-29 19:15:06 +02:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-09-26 17:57:46 +02:00
|
|
|
public static function canPass()
|
2012-04-29 19:15:06 +02:00
|
|
|
{
|
2015-09-26 17:57:46 +02:00
|
|
|
// disable limits if set to less then 1
|
2016-07-26 08:19:35 +02:00
|
|
|
if (self::$_limit < 1) {
|
|
|
|
return true;
|
|
|
|
}
|
2013-10-30 23:54:42 +01:00
|
|
|
|
2013-11-01 01:15:14 +01:00
|
|
|
$file = 'traffic_limiter.php';
|
2018-07-29 15:43:28 +02:00
|
|
|
if (self::_exists($file)) {
|
|
|
|
require self::getPath($file);
|
|
|
|
$tl = $GLOBALS['traffic_limiter'];
|
|
|
|
} else {
|
|
|
|
$tl = array();
|
2012-04-29 19:15:06 +02:00
|
|
|
}
|
|
|
|
|
2016-08-10 17:41:46 +02:00
|
|
|
// purge file of expired hashes to keep it small
|
2018-07-29 15:43:28 +02:00
|
|
|
$now = time();
|
2016-07-26 08:19:35 +02:00
|
|
|
foreach ($tl as $key => $time) {
|
|
|
|
if ($time + self::$_limit < $now) {
|
2012-04-29 19:15:06 +02:00
|
|
|
unset($tl[$key]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-29 15:43:28 +02:00
|
|
|
// this hash is used as an array key, hence a shorter algo is used
|
2016-08-10 17:41:46 +02:00
|
|
|
$hash = self::getHash('sha256');
|
|
|
|
if (array_key_exists($hash, $tl) && ($tl[$hash] + self::$_limit >= $now)) {
|
2012-04-29 19:15:06 +02:00
|
|
|
$result = false;
|
|
|
|
} else {
|
2016-08-10 17:41:46 +02:00
|
|
|
$tl[$hash] = time();
|
2016-08-15 16:45:47 +02:00
|
|
|
$result = true;
|
2012-04-29 19:15:06 +02:00
|
|
|
}
|
2013-11-01 01:15:14 +01:00
|
|
|
self::_store(
|
2012-04-29 19:15:06 +02:00
|
|
|
$file,
|
|
|
|
'<?php' . PHP_EOL .
|
2018-07-29 15:43:28 +02:00
|
|
|
'$GLOBALS[\'traffic_limiter\'] = ' . var_export($tl, true) . ';'
|
2012-04-29 19:15:06 +02:00
|
|
|
);
|
|
|
|
return $result;
|
|
|
|
}
|
|
|
|
}
|