%PDF- %PDF-
Direktori : /www/varak.net/wiki.varak.net/includes/auth/ |
Current File : /www/varak.net/wiki.varak.net/includes/auth/ThrottlePreAuthenticationProvider.php |
<?php /** * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * http://www.gnu.org/copyleft/gpl.html * * @file * @ingroup Auth */ namespace MediaWiki\Auth; use BagOStuff; use Config; /** * A pre-authentication provider to throttle authentication actions. * * Adding this provider will throttle account creations and primary authentication attempts * (more specifically, any authentication that returns FAIL on failure). Secondary authentication * cannot be easily throttled on a framework level (since it would typically return UI on failure); * secondary providers are expected to do their own throttling. * @ingroup Auth * @since 1.27 */ class ThrottlePreAuthenticationProvider extends AbstractPreAuthenticationProvider { /** @var array */ protected $throttleSettings; /** @var Throttler */ protected $accountCreationThrottle; /** @var Throttler */ protected $passwordAttemptThrottle; /** @var BagOStuff */ protected $cache; /** * @param array $params * - accountCreationThrottle: (array) Condition array for the account creation throttle; an array * of arrays in a format like $wgPasswordAttemptThrottle, passed to the Throttler constructor. * - passwordAttemptThrottle: (array) Condition array for the password attempt throttle, in the * same format as accountCreationThrottle. * - cache: (BagOStuff) Where to store the throttle, defaults to the local cluster instance. */ public function __construct( $params = [] ) { $this->throttleSettings = array_intersect_key( $params, [ 'accountCreationThrottle' => true, 'passwordAttemptThrottle' => true ] ); $this->cache = $params['cache'] ?? \ObjectCache::getLocalClusterInstance(); } public function setConfig( Config $config ) { parent::setConfig( $config ); $accountCreationThrottle = $this->config->get( 'AccountCreationThrottle' ); // Handle old $wgAccountCreationThrottle format (number of attempts per 24 hours) if ( !is_array( $accountCreationThrottle ) ) { $accountCreationThrottle = [ [ 'count' => $accountCreationThrottle, 'seconds' => 86400, ] ]; } // @codeCoverageIgnoreStart $this->throttleSettings += [ // @codeCoverageIgnoreEnd 'accountCreationThrottle' => $accountCreationThrottle, 'passwordAttemptThrottle' => $this->config->get( 'PasswordAttemptThrottle' ), ]; if ( !empty( $this->throttleSettings['accountCreationThrottle'] ) ) { $this->accountCreationThrottle = new Throttler( $this->throttleSettings['accountCreationThrottle'], [ 'type' => 'acctcreate', 'cache' => $this->cache, ] ); } if ( !empty( $this->throttleSettings['passwordAttemptThrottle'] ) ) { $this->passwordAttemptThrottle = new Throttler( $this->throttleSettings['passwordAttemptThrottle'], [ 'type' => 'password', 'cache' => $this->cache, ] ); } } public function testForAccountCreation( $user, $creator, array $reqs ) { if ( !$this->accountCreationThrottle || !$creator->isPingLimitable() ) { return \StatusValue::newGood(); } $ip = $this->manager->getRequest()->getIP(); if ( !\Hooks::run( 'ExemptFromAccountCreationThrottle', [ $ip ] ) ) { $this->logger->debug( __METHOD__ . ": a hook allowed account creation w/o throttle\n" ); return \StatusValue::newGood(); } $result = $this->accountCreationThrottle->increase( null, $ip, __METHOD__ ); if ( $result ) { $message = wfMessage( 'acct_creation_throttle_hit' )->params( $result['count'] ) ->durationParams( $result['wait'] ); return \StatusValue::newFatal( $message ); } return \StatusValue::newGood(); } public function testForAuthentication( array $reqs ) { if ( !$this->passwordAttemptThrottle ) { return \StatusValue::newGood(); } $ip = $this->manager->getRequest()->getIP(); try { $username = AuthenticationRequest::getUsernameFromRequests( $reqs ); } catch ( \UnexpectedValueException $e ) { $username = ''; } // Get everything this username could normalize to, and throttle each one individually. // If nothing uses usernames, just throttle by IP. $usernames = $this->manager->normalizeUsername( $username ); $result = false; foreach ( $usernames as $name ) { $r = $this->passwordAttemptThrottle->increase( $name, $ip, __METHOD__ ); if ( $r && ( !$result || $result['wait'] < $r['wait'] ) ) { $result = $r; } } if ( $result ) { $message = wfMessage( 'login-throttled' )->durationParams( $result['wait'] ); return \StatusValue::newFatal( $message ); } else { $this->manager->setAuthenticationSessionData( 'LoginThrottle', [ 'users' => $usernames, 'ip' => $ip ] ); return \StatusValue::newGood(); } } /** * @param null|\User $user * @param AuthenticationResponse $response */ public function postAuthentication( $user, AuthenticationResponse $response ) { if ( $response->status !== AuthenticationResponse::PASS ) { return; } elseif ( !$this->passwordAttemptThrottle ) { return; } $data = $this->manager->getAuthenticationSessionData( 'LoginThrottle' ); if ( !$data ) { // this can occur when login is happening via AuthenticationRequest::$loginRequest // so testForAuthentication is skipped $this->logger->info( 'throttler data not found for {user}', [ 'user' => $user->getName() ] ); return; } foreach ( $data['users'] as $name ) { $this->passwordAttemptThrottle->clear( $name, $data['ip'] ); } } }