2015-01-21 22:35:48 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
if (!defined('GNUSOCIAL')) { exit(1); }
|
|
|
|
|
|
|
|
class AntiBrutePlugin extends Plugin {
|
2019-06-03 01:56:52 +01:00
|
|
|
const PLUGIN_VERSION = '2.0.0';
|
2015-01-21 22:35:48 +00:00
|
|
|
protected $failed_attempts = 0;
|
|
|
|
protected $unauthed_user = null;
|
|
|
|
protected $client_ip = null;
|
|
|
|
|
|
|
|
const FAILED_LOGIN_IP_SECTION = 'failed_login_ip';
|
|
|
|
|
2015-06-05 14:34:14 +01:00
|
|
|
public function initialize()
|
|
|
|
{
|
|
|
|
// This probably needs some work. For example with IPv6 you can easily generate new IPs...
|
|
|
|
$client_ip = common_client_ip();
|
|
|
|
$this->client_ip = $client_ip[0] ?: $client_ip[1]; // [0] is proxy, [1] should be the real IP
|
|
|
|
}
|
|
|
|
|
2015-01-21 22:35:48 +00:00
|
|
|
public function onStartCheckPassword($nickname, $password, &$authenticatedUser)
|
|
|
|
{
|
|
|
|
if (common_is_email($nickname)) {
|
|
|
|
$this->unauthed_user = User::getKV('email', common_canonical_email($nickname));
|
|
|
|
} else {
|
|
|
|
$this->unauthed_user = User::getKV('nickname', Nickname::normalize($nickname));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!$this->unauthed_user instanceof User) {
|
|
|
|
// Unknown username continue processing StartCheckPassword (maybe uninitialized LDAP user etc?)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->failed_attempts = (int)$this->unauthed_user->getPref(self::FAILED_LOGIN_IP_SECTION, $this->client_ip);
|
|
|
|
switch (true) {
|
|
|
|
case $this->failed_attempts >= 5:
|
|
|
|
common_log(LOG_WARNING, sprintf('Multiple failed login attempts for user %s from IP %s - brute force attack?',
|
|
|
|
$this->unauthed_user->getNickname(), $this->client_ip));
|
|
|
|
// 5 seconds is a good max waiting time anyway...
|
|
|
|
sleep($this->failed_attempts % 5 + 1);
|
|
|
|
break;
|
|
|
|
case $this->failed_attempts > 0:
|
|
|
|
common_debug(sprintf('Previously failed login on user %s from IP %s - sleeping %u seconds.',
|
|
|
|
$this->unauthed_user->getNickname(), $this->client_ip, $this->failed_attempts));
|
|
|
|
sleep($this->failed_attempts);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
// No sleeping if it's our first failed attempt.
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function onEndCheckPassword($nickname, $password, $authenticatedUser)
|
|
|
|
{
|
|
|
|
if ($authenticatedUser instanceof User) {
|
|
|
|
// We'll trust this IP for this user and remove failed logins for the database..
|
|
|
|
$authenticatedUser->delPref(self::FAILED_LOGIN_IP_SECTION, $this->client_ip);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// See if we have an unauthed user from before. If not, it might be because the User did
|
|
|
|
// not exist yet (such as autoregistering with LDAP, OpenID etc.).
|
|
|
|
if ($this->unauthed_user instanceof User) {
|
|
|
|
// And if the login failed, we'll increment the attempt count.
|
|
|
|
common_debug(sprintf('Failed login tests for user %s from IP %s',
|
|
|
|
$this->unauthed_user->getNickname(), $this->client_ip));
|
|
|
|
$this->unauthed_user->setPref(self::FAILED_LOGIN_IP_SECTION, $this->client_ip, ++$this->failed_attempts);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-08-12 15:03:30 +01:00
|
|
|
public function onPluginVersion(array &$versions): bool
|
2015-01-21 22:35:48 +00:00
|
|
|
{
|
|
|
|
$versions[] = array('name' => 'AntiBrute',
|
2019-06-03 01:56:52 +01:00
|
|
|
'version' => self::PLUGIN_VERSION,
|
2015-01-21 22:35:48 +00:00
|
|
|
'author' => 'Mikael Nordfeldth',
|
2019-11-21 00:21:22 +00:00
|
|
|
'homepage' => GNUSOCIAL_ENGINE_URL,
|
2015-01-21 22:35:48 +00:00
|
|
|
'description' =>
|
|
|
|
// TRANS: Plugin description.
|
|
|
|
_m('Anti bruteforce method(s).'));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|