$curIP ) { $curIP = IP::canonicalize( $curIP ); if ( wfIsTrustedProxy( $curIP ) ) { if ( isset( $ipchain[$i + 1] ) && IP::isPublic( $ipchain[$i + 1] ) ) { $ip = $ipchain[$i + 1]; } } else { break; } } wfDebug( "IP: $ip\n" ); $wgIP = $ip; return $ip; } /** * Checks if an IP is a trusted proxy providor * Useful to tell if X-Fowarded-For data is possibly bogus * Squid cache servers for the site and AOL are whitelisted * @param string $ip * @return bool */ function wfIsTrustedProxy( $ip ) { global $wgSquidServers, $wgSquidServersNoPurge; if ( in_array( $ip, $wgSquidServers ) || in_array( $ip, $wgSquidServersNoPurge ) || wfIsAOLProxy( $ip ) ) { $trusted = true; } else { $trusted = false; } wfRunHooks( 'IsTrustedProxy', array( &$ip, &$trusted ) ); return $trusted; } /** * Forks processes to scan the originating IP for an open proxy server * MemCached can be used to skip IPs that have already been scanned */ function wfProxyCheck() { global $wgBlockOpenProxies, $wgProxyPorts, $wgProxyScriptPath; global $wgUseMemCached, $wgMemc, $wgProxyMemcExpiry; global $wgProxyKey; if ( !$wgBlockOpenProxies ) { return; } $ip = wfGetIP(); # Get MemCached key $skip = false; if ( $wgUseMemCached ) { $mcKey = wfMemcKey( 'proxy', 'ip', $ip ); $mcValue = $wgMemc->get( $mcKey ); if ( $mcValue ) { $skip = true; } } # Fork the processes if ( !$skip ) { $title = SpecialPage::getTitleFor( 'Blockme' ); $iphash = md5( $ip . $wgProxyKey ); $url = $title->getFullURL( 'ip='.$iphash ); foreach ( $wgProxyPorts as $port ) { $params = implode( ' ', array( escapeshellarg( $wgProxyScriptPath ), escapeshellarg( $ip ), escapeshellarg( $port ), escapeshellarg( $url ) )); exec( "php $params &>/dev/null &" ); } # Set MemCached key if ( $wgUseMemCached ) { $wgMemc->set( $mcKey, 1, $wgProxyMemcExpiry ); } } } /** * Convert a network specification in CIDR notation to an integer network and a number of bits * @return array(string, int) */ function wfParseCIDR( $range ) { return IP::parseCIDR( $range ); } /** * Check if an IP address is in the local proxy list * @return bool */ function wfIsLocallyBlockedProxy( $ip ) { global $wgProxyList; $fname = 'wfIsLocallyBlockedProxy'; if ( !$wgProxyList ) { return false; } wfProfileIn( $fname ); if ( !is_array( $wgProxyList ) ) { # Load from the specified file $wgProxyList = array_map( 'trim', file( $wgProxyList ) ); } if ( !is_array( $wgProxyList ) ) { $ret = false; } elseif ( array_search( $ip, $wgProxyList ) !== false ) { $ret = true; } elseif ( array_key_exists( $ip, $wgProxyList ) ) { # Old-style flipped proxy list $ret = true; } else { $ret = false; } wfProfileOut( $fname ); return $ret; } /** * TODO: move this list to the database in a global IP info table incorporating * trusted ISP proxies, blocked IP addresses and open proxies. * @return bool */ function wfIsAOLProxy( $ip ) { $ranges = array( '64.12.96.0/19', '149.174.160.0/20', '152.163.240.0/21', '152.163.248.0/22', '152.163.252.0/23', '152.163.96.0/22', '152.163.100.0/23', '195.93.32.0/22', '195.93.48.0/22', '195.93.64.0/19', '195.93.96.0/19', '195.93.16.0/20', '198.81.0.0/22', '198.81.16.0/20', '198.81.8.0/23', '202.67.64.128/25', '205.188.192.0/20', '205.188.208.0/23', '205.188.112.0/20', '205.188.146.144/30', '207.200.112.0/21', ); static $parsedRanges; if ( is_null( $parsedRanges ) ) { $parsedRanges = array(); foreach ( $ranges as $range ) { $parsedRanges[] = IP::parseRange( $range ); } } $hex = IP::toHex( $ip ); foreach ( $parsedRanges as $range ) { if ( $hex >= $range[0] && $hex <= $range[1] ) { return true; } } return false; }