diff options
Diffstat (limited to 'phpBB/phpbb/session.php')
| -rw-r--r-- | phpBB/phpbb/session.php | 1521 | 
1 files changed, 1521 insertions, 0 deletions
diff --git a/phpBB/phpbb/session.php b/phpBB/phpbb/session.php new file mode 100644 index 0000000000..ea421ffcf3 --- /dev/null +++ b/phpBB/phpbb/session.php @@ -0,0 +1,1521 @@ +<?php +/** +* +* @package phpBB3 +* @copyright (c) 2005 phpBB Group +* @license http://opensource.org/licenses/gpl-2.0.php GNU General Public License v2 +* +*/ + +namespace phpbb; + +/** +* Session class +* @package phpBB3 +*/ +class session +{ +	var $cookie_data = array(); +	var $page = array(); +	var $data = array(); +	var $browser = ''; +	var $forwarded_for = ''; +	var $host = ''; +	var $session_id = ''; +	var $ip = ''; +	var $load = 0; +	var $time_now = 0; +	var $update_session_page = true; + +	/** +	* Extract current session page +	* +	* @param string $root_path current root path (phpbb_root_path) +	*/ +	static function extract_current_page($root_path) +	{ +		global $request, $symfony_request, $phpbb_filesystem; + +		$page_array = array(); + +		// First of all, get the request uri... +		$script_name = $symfony_request->getScriptName(); +		$args = explode('&', $symfony_request->getQueryString()); + +		// If we are unable to get the script name we use REQUEST_URI as a failover and note it within the page array for easier support... +		if (!$script_name) +		{ +			$script_name = htmlspecialchars_decode($request->server('REQUEST_URI')); +			$script_name = (($pos = strpos($script_name, '?')) !== false) ? substr($script_name, 0, $pos) : $script_name; +			$page_array['failover'] = 1; +		} + +		// Replace backslashes and doubled slashes (could happen on some proxy setups) +		$script_name = str_replace(array('\\', '//'), '/', $script_name); + +		// Now, remove the sid and let us get a clean query string... +		$use_args = array(); + +		// Since some browser do not encode correctly we need to do this with some "special" characters... +		// " -> %22, ' => %27, < -> %3C, > -> %3E +		$find = array('"', "'", '<', '>'); +		$replace = array('%22', '%27', '%3C', '%3E'); + +		foreach ($args as $key => $argument) +		{ +			if (strpos($argument, 'sid=') === 0) +			{ +				continue; +			} + +			$use_args[] = str_replace($find, $replace, $argument); +		} +		unset($args); + +		// The following examples given are for an request uri of {path to the phpbb directory}/adm/index.php?i=10&b=2 + +		// The current query string +		$query_string = trim(implode('&', $use_args)); + +		// basenamed page name (for example: index.php) +		$page_name = (substr($script_name, -1, 1) == '/') ? '' : basename($script_name); +		$page_name = urlencode(htmlspecialchars($page_name)); + +		$symfony_request_path = $phpbb_filesystem->clean_path($symfony_request->getPathInfo()); +		if ($symfony_request_path !== '/') +		{ +			$page_name .= $symfony_request_path; +		} + +		// current directory within the phpBB root (for example: adm) +		$root_dirs = explode('/', str_replace('\\', '/', phpbb_realpath($root_path))); +		$page_dirs = explode('/', str_replace('\\', '/', phpbb_realpath('./'))); +		$intersection = array_intersect_assoc($root_dirs, $page_dirs); + +		$root_dirs = array_diff_assoc($root_dirs, $intersection); +		$page_dirs = array_diff_assoc($page_dirs, $intersection); + +		$page_dir = str_repeat('../', sizeof($root_dirs)) . implode('/', $page_dirs); + +		if ($page_dir && substr($page_dir, -1, 1) == '/') +		{ +			$page_dir = substr($page_dir, 0, -1); +		} + +		// Current page from phpBB root (for example: adm/index.php?i=10&b=2) +		$page = (($page_dir) ? $page_dir . '/' : '') . $page_name; +		if ($query_string) +		{ +			$page .= '?' . $query_string; +		} + +		// The script path from the webroot to the current directory (for example: /phpBB3/adm/) : always prefixed with / and ends in / +		$script_path = $symfony_request->getBasePath(); + +		// The script path from the webroot to the phpBB root (for example: /phpBB3/) +		$script_dirs = explode('/', $script_path); +		array_splice($script_dirs, -sizeof($page_dirs)); +		$root_script_path = implode('/', $script_dirs) . (sizeof($root_dirs) ? '/' . implode('/', $root_dirs) : ''); + +		// We are on the base level (phpBB root == webroot), lets adjust the variables a bit... +		if (!$root_script_path) +		{ +			$root_script_path = ($page_dir) ? str_replace($page_dir, '', $script_path) : $script_path; +		} + +		$script_path .= (substr($script_path, -1, 1) == '/') ? '' : '/'; +		$root_script_path .= (substr($root_script_path, -1, 1) == '/') ? '' : '/'; + +		$page_array += array( +			'page_name'			=> $page_name, +			'page_dir'			=> $page_dir, + +			'query_string'		=> $query_string, +			'script_path'		=> str_replace(' ', '%20', htmlspecialchars($script_path)), +			'root_script_path'	=> str_replace(' ', '%20', htmlspecialchars($root_script_path)), + +			'page'				=> $page, +			'forum'				=> request_var('f', 0), +		); + +		return $page_array; +	} + +	/** +	* Get valid hostname/port. HTTP_HOST is used, SERVER_NAME if HTTP_HOST not present. +	*/ +	function extract_current_hostname() +	{ +		global $config, $request; + +		// Get hostname +		$host = htmlspecialchars_decode($request->header('Host', $request->server('SERVER_NAME'))); + +		// Should be a string and lowered +		$host = (string) strtolower($host); + +		// If host is equal the cookie domain or the server name (if config is set), then we assume it is valid +		if ((isset($config['cookie_domain']) && $host === $config['cookie_domain']) || (isset($config['server_name']) && $host === $config['server_name'])) +		{ +			return $host; +		} + +		// Is the host actually a IP? If so, we use the IP... (IPv4) +		if (long2ip(ip2long($host)) === $host) +		{ +			return $host; +		} + +		// Now return the hostname (this also removes any port definition). The http:// is prepended to construct a valid URL, hosts never have a scheme assigned +		$host = @parse_url('http://' . $host); +		$host = (!empty($host['host'])) ? $host['host'] : ''; + +		// Remove any portions not removed by parse_url (#) +		$host = str_replace('#', '', $host); + +		// If, by any means, the host is now empty, we will use a "best approach" way to guess one +		if (empty($host)) +		{ +			if (!empty($config['server_name'])) +			{ +				$host = $config['server_name']; +			} +			else if (!empty($config['cookie_domain'])) +			{ +				$host = (strpos($config['cookie_domain'], '.') === 0) ? substr($config['cookie_domain'], 1) : $config['cookie_domain']; +			} +			else +			{ +				// Set to OS hostname or localhost +				$host = (function_exists('php_uname')) ? php_uname('n') : 'localhost'; +			} +		} + +		// It may be still no valid host, but for sure only a hostname (we may further expand on the cookie domain... if set) +		return $host; +	} + +	/** +	* Start session management +	* +	* This is where all session activity begins. We gather various pieces of +	* information from the client and server. We test to see if a session already +	* exists. If it does, fine and dandy. If it doesn't we'll go on to create a +	* new one ... pretty logical heh? We also examine the system load (if we're +	* running on a system which makes such information readily available) and +	* halt if it's above an admin definable limit. +	* +	* @param bool $update_session_page if true the session page gets updated. +	*			This can be set to circumvent certain scripts to update the users last visited page. +	*/ +	function session_begin($update_session_page = true) +	{ +		global $phpEx, $SID, $_SID, $_EXTRA_URL, $db, $config, $phpbb_root_path; +		global $request, $phpbb_container; + +		// Give us some basic information +		$this->time_now				= time(); +		$this->cookie_data			= array('u' => 0, 'k' => ''); +		$this->update_session_page	= $update_session_page; +		$this->browser				= $request->header('User-Agent'); +		$this->referer				= $request->header('Referer'); +		$this->forwarded_for		= $request->header('X-Forwarded-For'); + +		$this->host					= $this->extract_current_hostname(); +		$this->page					= $this->extract_current_page($phpbb_root_path); + +		// if the forwarded for header shall be checked we have to validate its contents +		if ($config['forwarded_for_check']) +		{ +			$this->forwarded_for = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $this->forwarded_for)); + +			// split the list of IPs +			$ips = explode(' ', $this->forwarded_for); +			foreach ($ips as $ip) +			{ +				// check IPv4 first, the IPv6 is hopefully only going to be used very seldomly +				if (!empty($ip) && !preg_match(get_preg_expression('ipv4'), $ip) && !preg_match(get_preg_expression('ipv6'), $ip)) +				{ +					// contains invalid data, don't use the forwarded for header +					$this->forwarded_for = ''; +					break; +				} +			} +		} +		else +		{ +			$this->forwarded_for = ''; +		} + +		if ($request->is_set($config['cookie_name'] . '_sid', \phpbb\request\request_interface::COOKIE) || $request->is_set($config['cookie_name'] . '_u', \phpbb\request\request_interface::COOKIE)) +		{ +			$this->cookie_data['u'] = request_var($config['cookie_name'] . '_u', 0, false, true); +			$this->cookie_data['k'] = request_var($config['cookie_name'] . '_k', '', false, true); +			$this->session_id 		= request_var($config['cookie_name'] . '_sid', '', false, true); + +			$SID = (defined('NEED_SID')) ? '?sid=' . $this->session_id : '?sid='; +			$_SID = (defined('NEED_SID')) ? $this->session_id : ''; + +			if (empty($this->session_id)) +			{ +				$this->session_id = $_SID = request_var('sid', ''); +				$SID = '?sid=' . $this->session_id; +				$this->cookie_data = array('u' => 0, 'k' => ''); +			} +		} +		else +		{ +			$this->session_id = $_SID = request_var('sid', ''); +			$SID = '?sid=' . $this->session_id; +		} + +		$_EXTRA_URL = array(); + +		// Why no forwarded_for et al? Well, too easily spoofed. With the results of my recent requests +		// it's pretty clear that in the majority of cases you'll at least be left with a proxy/cache ip. +		$this->ip = htmlspecialchars_decode($request->server('REMOTE_ADDR')); +		$this->ip = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $this->ip)); + +		// split the list of IPs +		$ips = explode(' ', trim($this->ip)); + +		// Default IP if REMOTE_ADDR is invalid +		$this->ip = '127.0.0.1'; + +		foreach ($ips as $ip) +		{ +			if (function_exists('phpbb_ip_normalise')) +			{ +				// Normalise IP address +				$ip = phpbb_ip_normalise($ip); + +				if (empty($ip)) +				{ +					// IP address is invalid. +					break; +				} + +				// IP address is valid. +				$this->ip = $ip; + +				// Skip legacy code. +				continue; +			} + +			if (preg_match(get_preg_expression('ipv4'), $ip)) +			{ +				$this->ip = $ip; +			} +			else if (preg_match(get_preg_expression('ipv6'), $ip)) +			{ +				// Quick check for IPv4-mapped address in IPv6 +				if (stripos($ip, '::ffff:') === 0) +				{ +					$ipv4 = substr($ip, 7); + +					if (preg_match(get_preg_expression('ipv4'), $ipv4)) +					{ +						$ip = $ipv4; +					} +				} + +				$this->ip = $ip; +			} +			else +			{ +				// We want to use the last valid address in the chain +				// Leave foreach loop when address is invalid +				break; +			} +		} + +		$this->load = false; + +		// Load limit check (if applicable) +		if ($config['limit_load'] || $config['limit_search_load']) +		{ +			if ((function_exists('sys_getloadavg') && $load = sys_getloadavg()) || ($load = explode(' ', @file_get_contents('/proc/loadavg')))) +			{ +				$this->load = array_slice($load, 0, 1); +				$this->load = floatval($this->load[0]); +			} +			else +			{ +				set_config('limit_load', '0'); +				set_config('limit_search_load', '0'); +			} +		} + +		// if no session id is set, redirect to index.php +		$session_id = $request->variable('sid', ''); +		if (defined('NEED_SID') && (empty($session_id) || $this->session_id !== $session_id)) +		{ +			send_status_line(401, 'Unauthorized'); +			redirect(append_sid("{$phpbb_root_path}index.$phpEx")); +		} + +		// if session id is set +		if (!empty($this->session_id)) +		{ +			$sql = 'SELECT u.*, s.* +				FROM ' . SESSIONS_TABLE . ' s, ' . USERS_TABLE . " u +				WHERE s.session_id = '" . $db->sql_escape($this->session_id) . "' +					AND u.user_id = s.session_user_id"; +			$result = $db->sql_query($sql); +			$this->data = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); + +			// Did the session exist in the DB? +			if (isset($this->data['user_id'])) +			{ +				// Validate IP length according to admin ... enforces an IP +				// check on bots if admin requires this +//				$quadcheck = ($config['ip_check_bot'] && $this->data['user_type'] & USER_BOT) ? 4 : $config['ip_check']; + +				if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false) +				{ +					$s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']); +					$u_ip = short_ipv6($this->ip, $config['ip_check']); +				} +				else +				{ +					$s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check'])); +					$u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check'])); +				} + +				$s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : ''; +				$u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : ''; + +				$s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : ''; +				$u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : ''; + +				// referer checks +				// The @ before $config['referer_validation'] suppresses notices present while running the updater +				$check_referer_path = (@$config['referer_validation'] == REFERER_VALIDATE_PATH); +				$referer_valid = true; + +				// we assume HEAD and TRACE to be foul play and thus only whitelist GET +				if (@$config['referer_validation'] && strtolower($request->server('REQUEST_METHOD')) !== 'get') +				{ +					$referer_valid = $this->validate_referer($check_referer_path); +				} + +				if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for && $referer_valid) +				{ +					$session_expired = false; + +					// Check whether the session is still valid if we have one +					$method = basename(trim($config['auth_method'])); + +					$provider = $phpbb_container->get('auth.provider.' . $method); + +					if (!($provider instanceof \phpbb\auth\provider\provider_interface)) +					{ +						throw new \RuntimeException($provider . ' must implement \phpbb\auth\provider\provider_interface'); +					} + +					$ret = $provider->validate_session($this->data); +					if ($ret !== null && !$ret) +					{ +						$session_expired = true; +					} + +					if (!$session_expired) +					{ +						// Check the session length timeframe if autologin is not enabled. +						// Else check the autologin length... and also removing those having autologin enabled but no longer allowed board-wide. +						if (!$this->data['session_autologin']) +						{ +							if ($this->data['session_time'] < $this->time_now - ($config['session_length'] + 60)) +							{ +								$session_expired = true; +							} +						} +						else if (!$config['allow_autologin'] || ($config['max_autologin_time'] && $this->data['session_time'] < $this->time_now - (86400 * (int) $config['max_autologin_time']) + 60)) +						{ +							$session_expired = true; +						} +					} + +					if (!$session_expired) +					{ +						// Only update session DB a minute or so after last update or if page changes +						if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page'])) +						{ +							$sql_ary = array('session_time' => $this->time_now); + +							if ($this->update_session_page) +							{ +								$sql_ary['session_page'] = substr($this->page['page'], 0, 199); +								$sql_ary['session_forum_id'] = $this->page['forum']; +							} + +							$db->sql_return_on_error(true); + +							$this->update_session($sql_ary); + +							$db->sql_return_on_error(false); + +							// If the database is not yet updated, there will be an error due to the session_forum_id +							// @todo REMOVE for 3.0.2 +							if ($result === false) +							{ +								unset($sql_ary['session_forum_id']); + +								$this->update_session($sql_ary); +							} + +							if ($this->data['user_id'] != ANONYMOUS && !empty($config['new_member_post_limit']) && $this->data['user_new'] && $config['new_member_post_limit'] <= $this->data['user_posts']) +							{ +								$this->leave_newly_registered(); +							} +						} + +						$this->data['is_registered'] = ($this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false; +						$this->data['is_bot'] = (!$this->data['is_registered'] && $this->data['user_id'] != ANONYMOUS) ? true : false; +						$this->data['user_lang'] = basename($this->data['user_lang']); + +						return true; +					} +				} +				else +				{ +					// Added logging temporarly to help debug bugs... +					if (defined('DEBUG') && $this->data['user_id'] != ANONYMOUS) +					{ +						if ($referer_valid) +						{ +							add_log('critical', 'LOG_IP_BROWSER_FORWARDED_CHECK', $u_ip, $s_ip, $u_browser, $s_browser, htmlspecialchars($u_forwarded_for), htmlspecialchars($s_forwarded_for)); +						} +						else +						{ +							add_log('critical', 'LOG_REFERER_INVALID', $this->referer); +						} +					} +				} +			} +		} + +		// If we reach here then no (valid) session exists. So we'll create a new one +		return $this->session_create(); +	} + +	/** +	* Create a new session +	* +	* If upon trying to start a session we discover there is nothing existing we +	* jump here. Additionally this method is called directly during login to regenerate +	* the session for the specific user. In this method we carry out a number of tasks; +	* garbage collection, (search)bot checking, banned user comparison. Basically +	* though this method will result in a new session for a specific user. +	*/ +	function session_create($user_id = false, $set_admin = false, $persist_login = false, $viewonline = true) +	{ +		global $SID, $_SID, $db, $config, $cache, $phpbb_root_path, $phpEx, $phpbb_container; + +		$this->data = array(); + +		/* Garbage collection ... remove old sessions updating user information +		// if necessary. It means (potentially) 11 queries but only infrequently +		if ($this->time_now > $config['session_last_gc'] + $config['session_gc']) +		{ +			$this->session_gc(); +		}*/ + +		// Do we allow autologin on this board? No? Then override anything +		// that may be requested here +		if (!$config['allow_autologin']) +		{ +			$this->cookie_data['k'] = $persist_login = false; +		} + +		/** +		* Here we do a bot check, oh er saucy! No, not that kind of bot +		* check. We loop through the list of bots defined by the admin and +		* see if we have any useragent and/or IP matches. If we do, this is a +		* bot, act accordingly +		*/ +		$bot = false; +		$active_bots = $cache->obtain_bots(); + +		foreach ($active_bots as $row) +		{ +			if ($row['bot_agent'] && preg_match('#' . str_replace('\*', '.*?', preg_quote($row['bot_agent'], '#')) . '#i', $this->browser)) +			{ +				$bot = $row['user_id']; +			} + +			// If ip is supplied, we will make sure the ip is matching too... +			if ($row['bot_ip'] && ($bot || !$row['bot_agent'])) +			{ +				// Set bot to false, then we only have to set it to true if it is matching +				$bot = false; + +				foreach (explode(',', $row['bot_ip']) as $bot_ip) +				{ +					$bot_ip = trim($bot_ip); + +					if (!$bot_ip) +					{ +						continue; +					} + +					if (strpos($this->ip, $bot_ip) === 0) +					{ +						$bot = (int) $row['user_id']; +						break; +					} +				} +			} + +			if ($bot) +			{ +				break; +			} +		} + +		$method = basename(trim($config['auth_method'])); + +		$provider = $phpbb_container->get('auth.provider.' . $method); +		$this->data = $provider->autologin(); + +		if (sizeof($this->data)) +		{ +			$this->cookie_data['k'] = ''; +			$this->cookie_data['u'] = $this->data['user_id']; +		} + +		// If we're presented with an autologin key we'll join against it. +		// Else if we've been passed a user_id we'll grab data based on that +		if (isset($this->cookie_data['k']) && $this->cookie_data['k'] && $this->cookie_data['u'] && !sizeof($this->data)) +		{ +			$sql = 'SELECT u.* +				FROM ' . USERS_TABLE . ' u, ' . SESSIONS_KEYS_TABLE . ' k +				WHERE u.user_id = ' . (int) $this->cookie_data['u'] . ' +					AND u.user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ") +					AND k.user_id = u.user_id +					AND k.key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'"; +			$result = $db->sql_query($sql); +			$this->data = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); +			$bot = false; +		} +		else if ($user_id !== false && !sizeof($this->data)) +		{ +			$this->cookie_data['k'] = ''; +			$this->cookie_data['u'] = $user_id; + +			$sql = 'SELECT * +				FROM ' . USERS_TABLE . ' +				WHERE user_id = ' . (int) $this->cookie_data['u'] . ' +					AND user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ')'; +			$result = $db->sql_query($sql); +			$this->data = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); +			$bot = false; +		} + +		// Bot user, if they have a SID in the Request URI we need to get rid of it +		// otherwise they'll index this page with the SID, duplicate content oh my! +		if ($bot && isset($_GET['sid'])) +		{ +			send_status_line(301, 'Moved Permanently'); +			redirect(build_url(array('sid'))); +		} + +		// If no data was returned one or more of the following occurred: +		// Key didn't match one in the DB +		// User does not exist +		// User is inactive +		// User is bot +		if (!sizeof($this->data) || !is_array($this->data)) +		{ +			$this->cookie_data['k'] = ''; +			$this->cookie_data['u'] = ($bot) ? $bot : ANONYMOUS; + +			if (!$bot) +			{ +				$sql = 'SELECT * +					FROM ' . USERS_TABLE . ' +					WHERE user_id = ' . (int) $this->cookie_data['u']; +			} +			else +			{ +				// We give bots always the same session if it is not yet expired. +				$sql = 'SELECT u.*, s.* +					FROM ' . USERS_TABLE . ' u +					LEFT JOIN ' . SESSIONS_TABLE . ' s ON (s.session_user_id = u.user_id) +					WHERE u.user_id = ' . (int) $bot; +			} + +			$result = $db->sql_query($sql); +			$this->data = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); +		} + +		if ($this->data['user_id'] != ANONYMOUS && !$bot) +		{ +			$this->data['session_last_visit'] = (isset($this->data['session_time']) && $this->data['session_time']) ? $this->data['session_time'] : (($this->data['user_lastvisit']) ? $this->data['user_lastvisit'] : time()); +		} +		else +		{ +			$this->data['session_last_visit'] = $this->time_now; +		} + +		// Force user id to be integer... +		$this->data['user_id'] = (int) $this->data['user_id']; + +		// At this stage we should have a filled data array, defined cookie u and k data. +		// data array should contain recent session info if we're a real user and a recent +		// session exists in which case session_id will also be set + +		// Is user banned? Are they excluded? Won't return on ban, exists within method +		if ($this->data['user_type'] != USER_FOUNDER) +		{ +			if (!$config['forwarded_for_check']) +			{ +				$this->check_ban($this->data['user_id'], $this->ip); +			} +			else +			{ +				$ips = explode(' ', $this->forwarded_for); +				$ips[] = $this->ip; +				$this->check_ban($this->data['user_id'], $ips); +			} +		} + +		$this->data['is_registered'] = (!$bot && $this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false; +		$this->data['is_bot'] = ($bot) ? true : false; + +		// If our friend is a bot, we re-assign a previously assigned session +		if ($this->data['is_bot'] && $bot == $this->data['user_id'] && $this->data['session_id']) +		{ +			// Only assign the current session if the ip, browser and forwarded_for match... +			if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false) +			{ +				$s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']); +				$u_ip = short_ipv6($this->ip, $config['ip_check']); +			} +			else +			{ +				$s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check'])); +				$u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check'])); +			} + +			$s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : ''; +			$u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : ''; + +			$s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : ''; +			$u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : ''; + +			if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for) +			{ +				$this->session_id = $this->data['session_id']; + +				// Only update session DB a minute or so after last update or if page changes +				if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page'])) +				{ +					$this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now; + +					$sql_ary = array('session_time' => $this->time_now, 'session_last_visit' => $this->time_now, 'session_admin' => 0); + +					if ($this->update_session_page) +					{ +						$sql_ary['session_page'] = substr($this->page['page'], 0, 199); +						$sql_ary['session_forum_id'] = $this->page['forum']; +					} + +					$this->update_session($sql_ary); + +					// Update the last visit time +					$sql = 'UPDATE ' . USERS_TABLE . ' +						SET user_lastvisit = ' . (int) $this->data['session_time'] . ' +						WHERE user_id = ' . (int) $this->data['user_id']; +					$db->sql_query($sql); +				} + +				$SID = '?sid='; +				$_SID = ''; +				return true; +			} +			else +			{ +				// If the ip and browser does not match make sure we only have one bot assigned to one session +				$db->sql_query('DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . $this->data['user_id']); +			} +		} + +		$session_autologin = (($this->cookie_data['k'] || $persist_login) && $this->data['is_registered']) ? true : false; +		$set_admin = ($set_admin && $this->data['is_registered']) ? true : false; + +		// Create or update the session +		$sql_ary = array( +			'session_user_id'		=> (int) $this->data['user_id'], +			'session_start'			=> (int) $this->time_now, +			'session_last_visit'	=> (int) $this->data['session_last_visit'], +			'session_time'			=> (int) $this->time_now, +			'session_browser'		=> (string) trim(substr($this->browser, 0, 149)), +			'session_forwarded_for'	=> (string) $this->forwarded_for, +			'session_ip'			=> (string) $this->ip, +			'session_autologin'		=> ($session_autologin) ? 1 : 0, +			'session_admin'			=> ($set_admin) ? 1 : 0, +			'session_viewonline'	=> ($viewonline) ? 1 : 0, +		); + +		if ($this->update_session_page) +		{ +			$sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199); +			$sql_ary['session_forum_id'] = $this->page['forum']; +		} + +		$db->sql_return_on_error(true); + +		$sql = 'DELETE +			FROM ' . SESSIONS_TABLE . ' +			WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\' +				AND session_user_id = ' . ANONYMOUS; + +		if (!defined('IN_ERROR_HANDLER') && (!$this->session_id || !$db->sql_query($sql) || !$db->sql_affectedrows())) +		{ +			// Limit new sessions in 1 minute period (if required) +			if (empty($this->data['session_time']) && $config['active_sessions']) +			{ +//				$db->sql_return_on_error(false); + +				$sql = 'SELECT COUNT(session_id) AS sessions +					FROM ' . SESSIONS_TABLE . ' +					WHERE session_time >= ' . ($this->time_now - 60); +				$result = $db->sql_query($sql); +				$row = $db->sql_fetchrow($result); +				$db->sql_freeresult($result); + +				if ((int) $row['sessions'] > (int) $config['active_sessions']) +				{ +					send_status_line(503, 'Service Unavailable'); +					trigger_error('BOARD_UNAVAILABLE'); +				} +			} +		} + +		// Since we re-create the session id here, the inserted row must be unique. Therefore, we display potential errors. +		// Commented out because it will not allow forums to update correctly +//		$db->sql_return_on_error(false); + +		// Something quite important: session_page always holds the *last* page visited, except for the *first* visit. +		// We are not able to simply have an empty session_page btw, therefore we need to tell phpBB how to detect this special case. +		// If the session id is empty, we have a completely new one and will set an "identifier" here. This identifier is able to be checked later. +		if (empty($this->data['session_id'])) +		{ +			// This is a temporary variable, only set for the very first visit +			$this->data['session_created'] = true; +		} + +		$this->session_id = $this->data['session_id'] = md5(unique_id()); + +		$sql_ary['session_id'] = (string) $this->session_id; +		$sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199); +		$sql_ary['session_forum_id'] = $this->page['forum']; + +		$sql = 'INSERT INTO ' . SESSIONS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary); +		$db->sql_query($sql); + +		$db->sql_return_on_error(false); + +		// Regenerate autologin/persistent login key +		if ($session_autologin) +		{ +			$this->set_login_key(); +		} + +		// refresh data +		$SID = '?sid=' . $this->session_id; +		$_SID = $this->session_id; +		$this->data = array_merge($this->data, $sql_ary); + +		if (!$bot) +		{ +			$cookie_expire = $this->time_now + (($config['max_autologin_time']) ? 86400 * (int) $config['max_autologin_time'] : 31536000); + +			$this->set_cookie('u', $this->cookie_data['u'], $cookie_expire); +			$this->set_cookie('k', $this->cookie_data['k'], $cookie_expire); +			$this->set_cookie('sid', $this->session_id, $cookie_expire); + +			unset($cookie_expire); + +			$sql = 'SELECT COUNT(session_id) AS sessions +					FROM ' . SESSIONS_TABLE . ' +					WHERE session_user_id = ' . (int) $this->data['user_id'] . ' +					AND session_time >= ' . (int) ($this->time_now - (max($config['session_length'], $config['form_token_lifetime']))); +			$result = $db->sql_query($sql); +			$row = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); + +			if ((int) $row['sessions'] <= 1 || empty($this->data['user_form_salt'])) +			{ +				$this->data['user_form_salt'] = unique_id(); +				// Update the form key +				$sql = 'UPDATE ' . USERS_TABLE . ' +					SET user_form_salt = \'' . $db->sql_escape($this->data['user_form_salt']) . '\' +					WHERE user_id = ' . (int) $this->data['user_id']; +				$db->sql_query($sql); +			} +		} +		else +		{ +			$this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now; + +			// Update the last visit time +			$sql = 'UPDATE ' . USERS_TABLE . ' +				SET user_lastvisit = ' . (int) $this->data['session_time'] . ' +				WHERE user_id = ' . (int) $this->data['user_id']; +			$db->sql_query($sql); + +			$SID = '?sid='; +			$_SID = ''; +		} + +		return true; +	} + +	/** +	* Kills a session +	* +	* This method does what it says on the tin. It will delete a pre-existing session. +	* It resets cookie information (destroying any autologin key within that cookie data) +	* and update the users information from the relevant session data. It will then +	* grab guest user information. +	*/ +	function session_kill($new_session = true) +	{ +		global $SID, $_SID, $db, $config, $phpbb_root_path, $phpEx, $phpbb_container; + +		$sql = 'DELETE FROM ' . SESSIONS_TABLE . " +			WHERE session_id = '" . $db->sql_escape($this->session_id) . "' +				AND session_user_id = " . (int) $this->data['user_id']; +		$db->sql_query($sql); + +		// Allow connecting logout with external auth method logout +		$method = basename(trim($config['auth_method'])); + +		$provider = $phpbb_container->get('auth.provider.' . $method); +		$provider->logout($this->data, $new_session); + +		if ($this->data['user_id'] != ANONYMOUS) +		{ +			// Delete existing session, update last visit info first! +			if (!isset($this->data['session_time'])) +			{ +				$this->data['session_time'] = time(); +			} + +			$sql = 'UPDATE ' . USERS_TABLE . ' +				SET user_lastvisit = ' . (int) $this->data['session_time'] . ' +				WHERE user_id = ' . (int) $this->data['user_id']; +			$db->sql_query($sql); + +			if ($this->cookie_data['k']) +			{ +				$sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' +					WHERE user_id = ' . (int) $this->data['user_id'] . " +						AND key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'"; +				$db->sql_query($sql); +			} + +			// Reset the data array +			$this->data = array(); + +			$sql = 'SELECT * +				FROM ' . USERS_TABLE . ' +				WHERE user_id = ' . ANONYMOUS; +			$result = $db->sql_query($sql); +			$this->data = $db->sql_fetchrow($result); +			$db->sql_freeresult($result); +		} + +		$cookie_expire = $this->time_now - 31536000; +		$this->set_cookie('u', '', $cookie_expire); +		$this->set_cookie('k', '', $cookie_expire); +		$this->set_cookie('sid', '', $cookie_expire); +		unset($cookie_expire); + +		$SID = '?sid='; +		$this->session_id = $_SID = ''; + +		// To make sure a valid session is created we create one for the anonymous user +		if ($new_session) +		{ +			$this->session_create(ANONYMOUS); +		} + +		return true; +	} + +	/** +	* Session garbage collection +	* +	* This looks a lot more complex than it really is. Effectively we are +	* deleting any sessions older than an admin definable limit. Due to the +	* way in which we maintain session data we have to ensure we update user +	* data before those sessions are destroyed. In addition this method +	* removes autologin key information that is older than an admin defined +	* limit. +	*/ +	function session_gc() +	{ +		global $db, $config, $phpbb_root_path, $phpEx; + +		$batch_size = 10; + +		if (!$this->time_now) +		{ +			$this->time_now = time(); +		} + +		// Firstly, delete guest sessions +		$sql = 'DELETE FROM ' . SESSIONS_TABLE . ' +			WHERE session_user_id = ' . ANONYMOUS . ' +				AND session_time < ' . (int) ($this->time_now - $config['session_length']); +		$db->sql_query($sql); + +		// Get expired sessions, only most recent for each user +		$sql = 'SELECT session_user_id, session_page, MAX(session_time) AS recent_time +			FROM ' . SESSIONS_TABLE . ' +			WHERE session_time < ' . ($this->time_now - $config['session_length']) . ' +			GROUP BY session_user_id, session_page'; +		$result = $db->sql_query_limit($sql, $batch_size); + +		$del_user_id = array(); +		$del_sessions = 0; + +		while ($row = $db->sql_fetchrow($result)) +		{ +			$sql = 'UPDATE ' . USERS_TABLE . ' +				SET user_lastvisit = ' . (int) $row['recent_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "' +				WHERE user_id = " . (int) $row['session_user_id']; +			$db->sql_query($sql); + +			$del_user_id[] = (int) $row['session_user_id']; +			$del_sessions++; +		} +		$db->sql_freeresult($result); + +		if (sizeof($del_user_id)) +		{ +			// Delete expired sessions +			$sql = 'DELETE FROM ' . SESSIONS_TABLE . ' +				WHERE ' . $db->sql_in_set('session_user_id', $del_user_id) . ' +					AND session_time < ' . ($this->time_now - $config['session_length']); +			$db->sql_query($sql); +		} + +		if ($del_sessions < $batch_size) +		{ +			// Less than 10 users, update gc timer ... else we want gc +			// called again to delete other sessions +			set_config('session_last_gc', $this->time_now, true); + +			if ($config['max_autologin_time']) +			{ +				$sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' +					WHERE last_login < ' . (time() - (86400 * (int) $config['max_autologin_time'])); +				$db->sql_query($sql); +			} + +			// only called from CRON; should be a safe workaround until the infrastructure gets going +			if (!class_exists('phpbb_captcha_factory', false)) +			{ +				include($phpbb_root_path . "includes/captcha/captcha_factory." . $phpEx); +			} +			$captcha_factory = new \phpbb_captcha_factory(); +			$captcha_factory->garbage_collect($config['captcha_plugin']); + +			$sql = 'DELETE FROM ' . LOGIN_ATTEMPT_TABLE . ' +				WHERE attempt_time < ' . (time() - (int) $config['ip_login_limit_time']); +			$db->sql_query($sql); +		} + +		return; +	} + +	/** +	* Sets a cookie +	* +	* Sets a cookie of the given name with the specified data for the given length of time. If no time is specified, a session cookie will be set. +	* +	* @param string $name		Name of the cookie, will be automatically prefixed with the phpBB cookie name. track becomes [cookie_name]_track then. +	* @param string $cookiedata	The data to hold within the cookie +	* @param int $cookietime	The expiration time as UNIX timestamp. If 0 is provided, a session cookie is set. +	* @param bool $httponly		Use HttpOnly. Defaults to true. Use false to make cookie accessible by client-side scripts. +	*/ +	function set_cookie($name, $cookiedata, $cookietime, $httponly = true) +	{ +		global $config; + +		$name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($cookiedata); +		$expire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $cookietime); +		$domain = (!$config['cookie_domain'] || $config['cookie_domain'] == 'localhost' || $config['cookie_domain'] == '127.0.0.1') ? '' : '; domain=' . $config['cookie_domain']; + +		header('Set-Cookie: ' . $name_data . (($cookietime) ? '; expires=' . $expire : '') . '; path=' . $config['cookie_path'] . $domain . ((!$config['cookie_secure']) ? '' : '; secure') . ';' . (($httponly) ? ' HttpOnly' : ''), false); +	} + +	/** +	* Check for banned user +	* +	* Checks whether the supplied user is banned by id, ip or email. If no parameters +	* are passed to the method pre-existing session data is used. If $return is false +	* this routine does not return on finding a banned user, it outputs a relevant +	* message and stops execution. +	* +	* @param string|array	$user_ips	Can contain a string with one IP or an array of multiple IPs +	*/ +	function check_ban($user_id = false, $user_ips = false, $user_email = false, $return = false) +	{ +		global $config, $db; + +		if (defined('IN_CHECK_BAN')) +		{ +			return; +		} + +		$banned = false; +		$cache_ttl = 3600; +		$where_sql = array(); + +		$sql = 'SELECT ban_ip, ban_userid, ban_email, ban_exclude, ban_give_reason, ban_end +			FROM ' . BANLIST_TABLE . ' +			WHERE '; + +		// Determine which entries to check, only return those +		if ($user_email === false) +		{ +			$where_sql[] = "ban_email = ''"; +		} + +		if ($user_ips === false) +		{ +			$where_sql[] = "(ban_ip = '' OR ban_exclude = 1)"; +		} + +		if ($user_id === false) +		{ +			$where_sql[] = '(ban_userid = 0 OR ban_exclude = 1)'; +		} +		else +		{ +			$cache_ttl = ($user_id == ANONYMOUS) ? 3600 : 0; +			$_sql = '(ban_userid = ' . $user_id; + +			if ($user_email !== false) +			{ +				$_sql .= " OR ban_email <> ''"; +			} + +			if ($user_ips !== false) +			{ +				$_sql .= " OR ban_ip <> ''"; +			} + +			$_sql .= ')'; + +			$where_sql[] = $_sql; +		} + +		$sql .= (sizeof($where_sql)) ? implode(' AND ', $where_sql) : ''; +		$result = $db->sql_query($sql, $cache_ttl); + +		$ban_triggered_by = 'user'; +		while ($row = $db->sql_fetchrow($result)) +		{ +			if ($row['ban_end'] && $row['ban_end'] < time()) +			{ +				continue; +			} + +			$ip_banned = false; +			if (!empty($row['ban_ip'])) +			{ +				if (!is_array($user_ips)) +				{ +					$ip_banned = preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ips); +				} +				else +				{ +					foreach ($user_ips as $user_ip) +					{ +						if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ip)) +						{ +							$ip_banned = true; +							break; +						} +					} +				} +			} + +			if ((!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) || +				$ip_banned || +				(!empty($row['ban_email']) && preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_email'], '#')) . '$#i', $user_email))) +			{ +				if (!empty($row['ban_exclude'])) +				{ +					$banned = false; +					break; +				} +				else +				{ +					$banned = true; +					$ban_row = $row; + +					if (!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) +					{ +						$ban_triggered_by = 'user'; +					} +					else if ($ip_banned) +					{ +						$ban_triggered_by = 'ip'; +					} +					else +					{ +						$ban_triggered_by = 'email'; +					} + +					// Don't break. Check if there is an exclude rule for this user +				} +			} +		} +		$db->sql_freeresult($result); + +		if ($banned && !$return) +		{ +			global $template; + +			// If the session is empty we need to create a valid one... +			if (empty($this->session_id)) +			{ +				// This seems to be no longer needed? - #14971 +//				$this->session_create(ANONYMOUS); +			} + +			// Initiate environment ... since it won't be set at this stage +			$this->setup(); + +			// Logout the user, banned users are unable to use the normal 'logout' link +			if ($this->data['user_id'] != ANONYMOUS) +			{ +				$this->session_kill(); +			} + +			// We show a login box here to allow founders accessing the board if banned by IP +			if (defined('IN_LOGIN') && $this->data['user_id'] == ANONYMOUS) +			{ +				global $phpEx; + +				$this->setup('ucp'); +				$this->data['is_registered'] = $this->data['is_bot'] = false; + +				// Set as a precaution to allow login_box() handling this case correctly as well as this function not being executed again. +				define('IN_CHECK_BAN', 1); + +				login_box("index.$phpEx"); + +				// The false here is needed, else the user is able to circumvent the ban. +				$this->session_kill(false); +			} + +			// Ok, we catch the case of an empty session id for the anonymous user... +			// This can happen if the user is logging in, banned by username and the login_box() being called "again". +			if (empty($this->session_id) && defined('IN_CHECK_BAN')) +			{ +				$this->session_create(ANONYMOUS); +			} + +			// Determine which message to output +			$till_date = ($ban_row['ban_end']) ? $this->format_date($ban_row['ban_end']) : ''; +			$message = ($ban_row['ban_end']) ? 'BOARD_BAN_TIME' : 'BOARD_BAN_PERM'; + +			$message = sprintf($this->lang[$message], $till_date, '<a href="mailto:' . $config['board_contact'] . '">', '</a>'); +			$message .= ($ban_row['ban_give_reason']) ? '<br /><br />' . sprintf($this->lang['BOARD_BAN_REASON'], $ban_row['ban_give_reason']) : ''; +			$message .= '<br /><br /><em>' . $this->lang['BAN_TRIGGERED_BY_' . strtoupper($ban_triggered_by)] . '</em>'; + +			// To circumvent session_begin returning a valid value and the check_ban() not called on second page view, we kill the session again +			$this->session_kill(false); + +			// A very special case... we are within the cron script which is not supposed to print out the ban message... show blank page +			if (defined('IN_CRON')) +			{ +				garbage_collection(); +				exit_handler(); +				exit; +			} + +			trigger_error($message); +		} + +		return ($banned && $ban_row['ban_give_reason']) ? $ban_row['ban_give_reason'] : $banned; +	} + +	/** +	* Check if ip is blacklisted +	* This should be called only where absolutly necessary +	* +	* Only IPv4 (rbldns does not support AAAA records/IPv6 lookups) +	* +	* @author satmd (from the php manual) +	* @param string $mode register/post - spamcop for example is ommitted for posting +	* @return false if ip is not blacklisted, else an array([checked server], [lookup]) +	*/ +	function check_dnsbl($mode, $ip = false) +	{ +		if ($ip === false) +		{ +			$ip = $this->ip; +		} + +		// Neither Spamhaus nor Spamcop supports IPv6 addresses. +		if (strpos($ip, ':') !== false) +		{ +			return false; +		} + +		$dnsbl_check = array( +			'sbl.spamhaus.org'	=> 'http://www.spamhaus.org/query/bl?ip=', +		); + +		if ($mode == 'register') +		{ +			$dnsbl_check['bl.spamcop.net'] = 'http://spamcop.net/bl.shtml?'; +		} + +		if ($ip) +		{ +			$quads = explode('.', $ip); +			$reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0]; + +			// Need to be listed on all servers... +			$listed = true; +			$info = array(); + +			foreach ($dnsbl_check as $dnsbl => $lookup) +			{ +				if (phpbb_checkdnsrr($reverse_ip . '.' . $dnsbl . '.', 'A') === true) +				{ +					$info = array($dnsbl, $lookup . $ip); +				} +				else +				{ +					$listed = false; +				} +			} + +			if ($listed) +			{ +				return $info; +			} +		} + +		return false; +	} + +	/** +	* Check if URI is blacklisted +	* This should be called only where absolutly necessary, for example on the submitted website field +	* This function is not in use at the moment and is only included for testing purposes, it may not work at all! +	* This means it is untested at the moment and therefore commented out +	* +	* @param string $uri URI to check +	* @return true if uri is on blacklist, else false. Only blacklist is checked (~zero FP), no grey lists +	function check_uribl($uri) +	{ +		// Normally parse_url() is not intended to parse uris +		// We need to get the top-level domain name anyway... change. +		$uri = parse_url($uri); + +		if ($uri === false || empty($uri['host'])) +		{ +			return false; +		} + +		$uri = trim($uri['host']); + +		if ($uri) +		{ +			// One problem here... the return parameter for the "windows" method is different from what +			// we expect... this may render this check useless... +			if (phpbb_checkdnsrr($uri . '.multi.uribl.com.', 'A') === true) +			{ +				return true; +			} +		} + +		return false; +	} +	*/ + +	/** +	* Set/Update a persistent login key +	* +	* This method creates or updates a persistent session key. When a user makes +	* use of persistent (formerly auto-) logins a key is generated and stored in the +	* DB. When they revisit with the same key it's automatically updated in both the +	* DB and cookie. Multiple keys may exist for each user representing different +	* browsers or locations. As with _any_ non-secure-socket no passphrase login this +	* remains vulnerable to exploit. +	*/ +	function set_login_key($user_id = false, $key = false, $user_ip = false) +	{ +		global $config, $db; + +		$user_id = ($user_id === false) ? $this->data['user_id'] : $user_id; +		$user_ip = ($user_ip === false) ? $this->ip : $user_ip; +		$key = ($key === false) ? (($this->cookie_data['k']) ? $this->cookie_data['k'] : false) : $key; + +		$key_id = unique_id(hexdec(substr($this->session_id, 0, 8))); + +		$sql_ary = array( +			'key_id'		=> (string) md5($key_id), +			'last_ip'		=> (string) $this->ip, +			'last_login'	=> (int) time() +		); + +		if (!$key) +		{ +			$sql_ary += array( +				'user_id'	=> (int) $user_id +			); +		} + +		if ($key) +		{ +			$sql = 'UPDATE ' . SESSIONS_KEYS_TABLE . ' +				SET ' . $db->sql_build_array('UPDATE', $sql_ary) . ' +				WHERE user_id = ' . (int) $user_id . " +					AND key_id = '" . $db->sql_escape(md5($key)) . "'"; +		} +		else +		{ +			$sql = 'INSERT INTO ' . SESSIONS_KEYS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary); +		} +		$db->sql_query($sql); + +		$this->cookie_data['k'] = $key_id; + +		return false; +	} + +	/** +	* Reset all login keys for the specified user +	* +	* This method removes all current login keys for a specified (or the current) +	* user. It will be called on password change to render old keys unusable +	*/ +	function reset_login_keys($user_id = false) +	{ +		global $config, $db; + +		$user_id = ($user_id === false) ? (int) $this->data['user_id'] : (int) $user_id; + +		$sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' +			WHERE user_id = ' . (int) $user_id; +		$db->sql_query($sql); + +		// If the user is logged in, update last visit info first before deleting sessions +		$sql = 'SELECT session_time, session_page +			FROM ' . SESSIONS_TABLE . ' +			WHERE session_user_id = ' . (int) $user_id . ' +			ORDER BY session_time DESC'; +		$result = $db->sql_query_limit($sql, 1); +		$row = $db->sql_fetchrow($result); +		$db->sql_freeresult($result); + +		if ($row) +		{ +			$sql = 'UPDATE ' . USERS_TABLE . ' +				SET user_lastvisit = ' . (int) $row['session_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "' +				WHERE user_id = " . (int) $user_id; +			$db->sql_query($sql); +		} + +		// Let's also clear any current sessions for the specified user_id +		// If it's the current user then we'll leave this session intact +		$sql_where = 'session_user_id = ' . (int) $user_id; +		$sql_where .= ($user_id === (int) $this->data['user_id']) ? " AND session_id <> '" . $db->sql_escape($this->session_id) . "'" : ''; + +		$sql = 'DELETE FROM ' . SESSIONS_TABLE . " +			WHERE $sql_where"; +		$db->sql_query($sql); + +		// We're changing the password of the current user and they have a key +		// Lets regenerate it to be safe +		if ($user_id === (int) $this->data['user_id'] && $this->cookie_data['k']) +		{ +			$this->set_login_key($user_id); +		} +	} + + +	/** +	* Check if the request originated from the same page. +	* @param bool $check_script_path If true, the path will be checked as well +	*/ +	function validate_referer($check_script_path = false) +	{ +		global $config, $request; + +		// no referer - nothing to validate, user's fault for turning it off (we only check on POST; so meta can't be the reason) +		if (empty($this->referer) || empty($this->host)) +		{ +			return true; +		} + +		$host = htmlspecialchars($this->host); +		$ref = substr($this->referer, strpos($this->referer, '://') + 3); + +		if (!(stripos($ref, $host) === 0) && (!$config['force_server_vars'] || !(stripos($ref, $config['server_name']) === 0))) +		{ +			return false; +		} +		else if ($check_script_path && rtrim($this->page['root_script_path'], '/') !== '') +		{ +			$ref = substr($ref, strlen($host)); +			$server_port = $request->server('SERVER_PORT', 0); + +			if ($server_port !== 80 && $server_port !== 443 && stripos($ref, ":$server_port") === 0) +			{ +				$ref = substr($ref, strlen(":$server_port")); +			} + +			if (!(stripos(rtrim($ref, '/'), rtrim($this->page['root_script_path'], '/')) === 0)) +			{ +				return false; +			} +		} + +		return true; +	} + + +	function unset_admin() +	{ +		global $db; +		$sql = 'UPDATE ' . SESSIONS_TABLE . ' +			SET session_admin = 0 +			WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\''; +		$db->sql_query($sql); +	} + +	/** +	* Update the session data +	* +	* @param array $session_data associative array of session keys to be updated +	* @param string $session_id optional session_id, defaults to current user's session_id +	*/ +	public function update_session($session_data, $session_id = null) +	{ +		global $db; + +		$session_id = ($session_id) ? $session_id : $this->session_id; + +		$sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $session_data) . " +			WHERE session_id = '" . $db->sql_escape($session_id) . "'"; +		$db->sql_query($sql); +	} +}  | 
