data = array(); // Set auth to false (only valid for an user object) $this->auth = false; // Some system/server variables, directly generated by phpbb_system_info methods. Used like an array. // We use the phpbb:: one, because it could've been modified and being a completely different class $this->system =& phpbb::$instances['server-vars']; } /** * Specifiy the need for a session id within the URL * * @param bool $need_sid Specify if the session id is needed or not. Default is false. * @access public */ public function need_sid($need_sid = false) { $this->need_sid = $need_sid; } /** * Start session management * * This is where all session activity begins. We gather various pieces of * information from the client and server. We test to see if a session already * exists. If it does, fine and dandy. If it doesn't we'll go on to create a * new one ... pretty logical heh? We also examine the system load (if we're * running on a system which makes such information readily available) and * halt if it's above an admin definable limit. * * @param bool $update_session_page If true the session page gets updated. * This can be set to false to circumvent certain scripts to update the users last visited page. * * @return bool True if the session exist or has been created, else False. * @access public */ public function session_begin($update_session_page = true) { // Give us some basic information $this->time_now = time(); $this->cookie_data = array('u' => 0, 'k' => ''); $this->update_session_page = $update_session_page; $this->page = $this->system['page']; $this->ip = $this->system['ip']; if (phpbb_request::is_set(phpbb::$config['cookie_name'] . '_sid', phpbb_request::COOKIE) || phpbb_request::is_set(phpbb::$config['cookie_name'] . '_u', phpbb_request::COOKIE)) { $this->cookie_data['u'] = request_var(phpbb::$config['cookie_name'] . '_u', 0, false, true); $this->cookie_data['k'] = request_var(phpbb::$config['cookie_name'] . '_k', '', false, true); $this->session_id = request_var(phpbb::$config['cookie_name'] . '_sid', '', false, true); if (empty($this->session_id)) { $this->session_id = request_var('sid', ''); $this->cookie_data = array('u' => 0, 'k' => ''); $this->need_sid = true; } } else { $this->session_id = request_var('sid', ''); $this->need_sid = true; } $this->extra_url = array(); // Now check for an existing session if ($this->session_exist()) { return true; } // If we reach here then no (valid) session exists. So we'll create a new one return $this->session_create(); } /** * Create a new session * * If upon trying to start a session we discover there is nothing existing we * jump here. Additionally this method is called directly during login to regenerate * the session for the specific user. In this method we carry out a number of tasks; * garbage collection, (search)bot checking, banned user comparison. Basically * though this method will result in a new session for a specific user. * * @param int $user_id The user id to create the session for. * @param bool $set_admin Set the users admin field to identify him/her as an admin? * @param bool $persist_login Allow persistent login * @param bool $viewonline If false then the user will be logged in as hidden * * @return bool True if session got created successfully. * @access public */ public function session_create($user_id = false, $set_admin = false, $persist_login = false, $viewonline = true) { // There is one case where we need to add a "failsafe" user... when we are not able to query the database if (!phpbb::registered('db')) { $this->data = $this->default_data(); return true; } // If the data array is filled, chances are high that there was a different session active if (sizeof($this->data)) { // Kill the session and do not create a new one $this->session_kill(false); } $this->data = array(); // Do we allow autologin on this board? No? Then override anything // that may be requested here if (!phpbb::$config['allow_autologin']) { $this->cookie_data['k'] = $persist_login = false; } // Check for autologin key. ;) if ($this->auth !== false && method_exists($this->auth, 'autologin')) { $this->data = $this->auth->autologin(); if (sizeof($this->data)) { $this->cookie_data['k'] = ''; $this->cookie_data['u'] = $this->data['user_id']; } } // NULL indicates we need to check for a bot later. Sometimes it is apparant that it is not a bot. ;) No need to always check this. $bot = NULL; // If we're presented with an autologin key we'll join against it. // Else if we've been passed a user_id we'll grab data based on that if (isset($this->cookie_data['k']) && $this->cookie_data['k'] && $this->cookie_data['u'] && !sizeof($this->data)) { $sql = 'SELECT u.* FROM ' . USERS_TABLE . ' u, ' . SESSIONS_KEYS_TABLE . ' k WHERE u.user_id = ' . (int) $this->cookie_data['u'] . ' AND u.user_type IN (' . phpbb::USER_NORMAL . ', ' . phpbb::USER_FOUNDER . ") AND k.user_id = u.user_id AND k.key_id = '" . phpbb::$db->sql_escape(md5($this->cookie_data['k'])) . "'"; $result = phpbb::$db->sql_query($sql); $this->data = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); $bot = false; } else if ($user_id !== false && !sizeof($this->data)) { $this->cookie_data['k'] = ''; $this->cookie_data['u'] = $user_id; $sql = 'SELECT * FROM ' . USERS_TABLE . ' WHERE user_id = ' . (int) $this->cookie_data['u'] . ' AND user_type IN (' . phpbb::USER_NORMAL . ', ' . phpbb::USER_FOUNDER . ')'; $result = phpbb::$db->sql_query($sql); $this->data = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); $bot = false; } if ($bot === NULL) { $bot = $this->check_bot(); } // If no data was returned one or more of the following occurred: // Key didn't match one in the DB // User does not exist // User is inactive // User is bot if (!sizeof($this->data) || !is_array($this->data)) { $this->cookie_data['k'] = ''; $this->cookie_data['u'] = ($bot) ? $bot : ANONYMOUS; if (!$bot) { $sql = 'SELECT * FROM ' . USERS_TABLE . ' WHERE user_id = ' . (int) $this->cookie_data['u']; } else { // We give bots always the same session if it is not yet expired. $sql = 'SELECT u.*, s.* FROM ' . USERS_TABLE . ' u LEFT JOIN ' . SESSIONS_TABLE . ' s ON (s.session_user_id = u.user_id) WHERE u.user_id = ' . (int) $bot; } $result = phpbb::$db->sql_query($sql); $this->data = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); $this->is_registered = false; } else { $this->is_registered = true; $this->is_guest = false; $this->is_founder = $this->data['user_type'] == phpbb::USER_FOUNDER; } // Force user id to be integer... $this->data['user_id'] = (int) $this->data['user_id']; // Code for ANONYMOUS user, INACTIVE user and BOTS if (!$this->is_registered) { // Set last visit date to 'now' $this->data['session_last_visit'] = $this->time_now; $this->is_bot = ($bot) ? true : false; // If our friend is a bot, we re-assign a previously assigned session if ($this->is_bot && $bot == $this->data['user_id'] && $this->data['session_id']) { if ($this->session_valid(false)) { $this->session_id = $this->data['session_id']; // Only update session DB a minute or so after last update or if page changes if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->system['page']['page'])) { $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now; $sql_ary = array('session_time' => $this->time_now, 'session_last_visit' => $this->time_now, 'session_admin' => 0); if ($this->update_session_page) { $sql_ary['session_page'] = substr($this->system['page']['page'], 0, 199); } $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . phpbb::$db->sql_build_array('UPDATE', $sql_ary) . " WHERE session_id = '" . phpbb::$db->sql_escape($this->session_id) . "'"; phpbb::$db->sql_query($sql); // Update the last visit time $sql = 'UPDATE ' . USERS_TABLE . ' SET user_lastvisit = ' . (int) $this->data['session_time'] . ' WHERE user_id = ' . (int) $this->data['user_id']; phpbb::$db->sql_query($sql); } $this->session_id = ''; return true; } else { // If the ip and browser does not match make sure we only have one bot assigned to one session phpbb::$db->sql_query('DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . $this->data['user_id']); } } } else { // Code for registered users $this->data['session_last_visit'] = (!empty($this->data['session_time'])) ? $this->data['session_time'] : (($this->data['user_lastvisit']) ? $this->data['user_lastvisit'] : $this->time_now); $this->is_bot = false; } // At this stage we should have a filled data array, defined cookie u and k data. // data array should contain recent session info if we're a real user and a recent // session exists in which case session_id will also be set // Is user banned? Are they excluded? Won't return on ban, exists within method if ($this->data['user_type'] != phpbb::USER_FOUNDER) { if (!phpbb::$config['forwarded_for_check']) { $this->check_ban($this->data['user_id'], $this->system['ip']); } else { $ips = explode(', ', $this->forwarded_for); $ips[] = $this->system['ip']; $this->check_ban($this->data['user_id'], $ips); } } $session_autologin = (($this->cookie_data['k'] || $persist_login) && $this->is_registered) ? true : false; $set_admin = ($set_admin && $this->is_registered) ? true : false; // Create or update the session $sql_ary = array( 'session_user_id' => (int) $this->data['user_id'], 'session_start' => (int) $this->time_now, 'session_last_visit' => (int) $this->data['session_last_visit'], 'session_time' => (int) $this->time_now, 'session_browser' => (string) trim(substr($this->system['browser'], 0, 149)), 'session_forwarded_for' => (string) $this->system['forwarded_for'], 'session_ip' => (string) $this->system['ip'], 'session_autologin' => ($session_autologin) ? 1 : 0, 'session_admin' => ($set_admin) ? 1 : 0, 'session_viewonline' => ($viewonline) ? 1 : 0, ); if ($this->update_session_page) { $sql_ary['session_page'] = (string) substr($this->system['page']['page'], 0, 199); } phpbb::$db->sql_return_on_error(true); // Delete old session, if user id now different from anonymous if (!defined('IN_ERROR_HANDLER')) { // We do not care about the user id, because we assign a new session later $sql = 'DELETE FROM ' . SESSIONS_TABLE . " WHERE session_id = '" . phpbb::$db->sql_escape($this->session_id) . "'"; $result = phpbb::$db->sql_query($sql); // If there were no sessions or the session id empty (then the affected rows will be empty too), then we have a brand new session and can check the active sessions limit if ((!$result || !phpbb::$db->sql_affectedrows()) && (empty($this->data['session_time']) && phpbb::$config['active_sessions'])) { $sql = 'SELECT COUNT(session_id) AS sessions FROM ' . SESSIONS_TABLE . ' WHERE session_time >= ' . ($this->time_now - 60); $result = phpbb::$db->sql_query($sql); $row = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); if ((int) $row['sessions'] > (int) phpbb::$config['active_sessions']) { header('HTTP/1.1 503 Service Unavailable'); trigger_error('BOARD_UNAVAILABLE'); } } } $this->session_id = $this->data['session_id'] = md5(phpbb::$security->unique_id()); $sql_ary['session_id'] = (string) $this->session_id; $sql = 'INSERT INTO ' . SESSIONS_TABLE . ' ' . phpbb::$db->sql_build_array('INSERT', $sql_ary); phpbb::$db->sql_query($sql); phpbb::$db->sql_return_on_error(false); // Regenerate autologin/persistent login key if ($session_autologin) { $this->set_login_key(); } // refresh data $this->data = array_merge($this->data, $sql_ary); if (!$bot) { $cookie_expire = $this->time_now + ((phpbb::$config['max_autologin_time']) ? 86400 * (int) phpbb::$config['max_autologin_time'] : 31536000); $this->set_cookie('u', $this->cookie_data['u'], $cookie_expire); $this->set_cookie('k', $this->cookie_data['k'], $cookie_expire); $this->set_cookie('sid', $this->session_id, $cookie_expire); unset($cookie_expire); // Only one session entry present... $sql = 'SELECT COUNT(session_id) AS sessions FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . (int) $this->data['user_id'] . ' AND session_time >= ' . (int) ($this->time_now - (max(phpbb::$config['session_length'], phpbb::$config['form_token_lifetime']))); $result = phpbb::$db->sql_query($sql); $row = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); if ((int) $row['sessions'] <= 1 || empty($this->data['user_form_salt'])) { $this->data['user_form_salt'] = phpbb::$security->unique_id(); // Update the form key $sql = 'UPDATE ' . USERS_TABLE . ' SET user_form_salt = \'' . phpbb::$db->sql_escape($this->data['user_form_salt']) . '\' WHERE user_id = ' . (int) $this->data['user_id']; phpbb::$db->sql_query($sql); } } else { $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now; // Update the last visit time $sql = 'UPDATE ' . USERS_TABLE . ' SET user_lastvisit = ' . (int) $this->data['session_time'] . ' WHERE user_id = ' . (int) $this->data['user_id']; phpbb::$db->sql_query($sql); $this->session_id = ''; } return true; } /** * Kills a session * * This method does what it says on the tin. It will delete a pre-existing session. * It resets cookie information (destroying any autologin key within that cookie data) * and update the users information from the relevant session data. It will then * grab guest user information. * * @param bool $new_session If true a new session will be generated after the original one got killed. * @access public */ public function session_kill($new_session = true) { $sql = 'DELETE FROM ' . SESSIONS_TABLE . " WHERE session_id = '" . phpbb::$db->sql_escape($this->session_id) . "' AND session_user_id = " . (int) $this->data['user_id']; phpbb::$db->sql_query($sql); // Allow connecting logout with external auth method logout if ($this->auth !== false && method_exists($this->auth, 'logout')) { $this->auth->logout($this, $new_session); } if ($this->data['user_id'] != ANONYMOUS) { // Delete existing session, update last visit info first! if (!isset($this->data['session_time'])) { $this->data['session_time'] = time(); } $sql = 'UPDATE ' . USERS_TABLE . ' SET user_lastvisit = ' . (int) $this->data['session_time'] . ' WHERE user_id = ' . (int) $this->data['user_id']; phpbb::$db->sql_query($sql); if ($this->cookie_data['k']) { $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' WHERE user_id = ' . (int) $this->data['user_id'] . " AND key_id = '" . phpbb::$db->sql_escape(md5($this->cookie_data['k'])) . "'"; phpbb::$db->sql_query($sql); } // Reset the data array $this->data = array(); $sql = 'SELECT * FROM ' . USERS_TABLE . ' WHERE user_id = ' . ANONYMOUS; $result = phpbb::$db->sql_query($sql); $this->data = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); } $cookie_expire = $this->time_now - 31536000; $this->set_cookie('u', '', $cookie_expire); $this->set_cookie('k', '', $cookie_expire); $this->set_cookie('sid', '', $cookie_expire); unset($cookie_expire); $this->session_id = ''; // To make sure a valid session is created we create one for the anonymous user if ($new_session) { $this->session_create(ANONYMOUS); } } /** * Session garbage collection * * This looks a lot more complex than it really is. Effectively we are * deleting any sessions older than an admin definable limit. Due to the * way in which we maintain session data we have to ensure we update user * data before those sessions are destroyed. In addition this method * removes autologin key information that is older than an admin defined * limit. * * @access public */ public function session_gc() { $batch_size = 10; if (!$this->time_now) { $this->time_now = time(); } // Firstly, delete guest sessions $sql = 'DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . ANONYMOUS . ' AND session_time < ' . (int) ($this->time_now - phpbb::$config['session_length']); phpbb::$db->sql_query($sql); // Get expired sessions, only most recent for each user $sql = 'SELECT session_user_id, session_page, MAX(session_time) AS recent_time FROM ' . SESSIONS_TABLE . ' WHERE session_time < ' . ($this->time_now - phpbb::$config['session_length']) . ' GROUP BY session_user_id, session_page'; $result = phpbb::$db->sql_query_limit($sql, $batch_size); $del_user_id = array(); $del_sessions = 0; while ($row = phpbb::$db->sql_fetchrow($result)) { $sql = 'UPDATE ' . USERS_TABLE . ' SET user_lastvisit = ' . (int) $row['recent_time'] . ", user_lastpage = '" . phpbb::$db->sql_escape($row['session_page']) . "' WHERE user_id = " . (int) $row['session_user_id']; phpbb::$db->sql_query($sql); $del_user_id[] = (int) $row['session_user_id']; $del_sessions++; } phpbb::$db->sql_freeresult($result); if (sizeof($del_user_id)) { // Delete expired sessions $sql = 'DELETE FROM ' . SESSIONS_TABLE . ' WHERE ' . phpbb::$db->sql_in_set('session_user_id', $del_user_id) . ' AND session_time < ' . ($this->time_now - phpbb::$config['session_length']); phpbb::$db->sql_query($sql); } if ($del_sessions < $batch_size) { // Less than 10 users, update gc timer ... else we want gc // called again to delete other sessions set_config('session_last_gc', $this->time_now, true); if (phpbb::$config['max_autologin_time']) { $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' WHERE last_login < ' . (time() - (86400 * (int) phpbb::$config['max_autologin_time'])); phpbb::$db->sql_query($sql); } // only called from CRON; should be a safe workaround until the infrastructure gets going if (!class_exists('captcha_factory')) { include(PHPBB_ROOT_PATH . "includes/captcha/captcha_factory." . PHP_EXT); } captcha_factory::garbage_collect(phpbb::$config['captcha_plugin']); } return; } /** * Sets a cookie of the given name with the specified data for the given length of time. If no time is specified, a session cookie will be set. * * @param string $name Name of the cookie, will be automatically prefixed with the phpBB cookie name. Track becomes [cookie_name]_track then. * @param string $cookiedata The data to hold within the cookie * @param int $cookietime The expiration time as UNIX timestamp. If 0 is provided, a session cookie is set. * * @access public */ public function set_cookie($name, $cookiedata, $cookietime) { $name_data = rawurlencode(phpbb::$config['cookie_name'] . '_' . $name) . '=' . rawurlencode($cookiedata); $expire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $cookietime); $domain = (!phpbb::$config['cookie_domain'] || phpbb::$config['cookie_domain'] == 'localhost' || phpbb::$config['cookie_domain'] == '127.0.0.1') ? '' : '; domain=' . phpbb::$config['cookie_domain']; header('Set-Cookie: ' . $name_data . (($cookietime) ? '; expires=' . $expire : '') . '; path=' . phpbb::$config['cookie_path'] . $domain . ((!phpbb::$config['cookie_secure']) ? '' : '; secure') . '; HttpOnly', false); } /** * Check for banned user * * Checks whether the supplied user is banned by id, ip or email. If no parameters * are passed to the method pre-existing session data is used. If $return is false * this routine does not return on finding a banned user, it outputs a relevant * message and stops execution. * * @param int $user_id The user id to check. If false then do not check user ids * @param string|array $user_ips Can contain a string with one IP or an array of multiple IPs. If false then no ips are checked. * @param int $user_email The email address to check * @param bool $return If false then the banned message is displayed and script halted * * @return bool|string True if banned and no reason given. * False if not banned. A ban reason if banned and ban reason given. Check for !== false. * @access public */ public function check_ban($user_id = false, $user_ips = false, $user_email = false, $return = false) { if (defined('IN_CHECK_BAN')) { return; } $banned = false; $cache_ttl = 3600; $where_sql = array(); $sql = 'SELECT ban_ip, ban_userid, ban_email, ban_exclude, ban_give_reason, ban_end FROM ' . BANLIST_TABLE . ' WHERE '; // Determine which entries to check, only return those if ($user_email === false) { $where_sql[] = "ban_email = ''"; } if ($user_ips === false) { $where_sql[] = "(ban_ip = '' OR ban_exclude = 1)"; } if ($user_id === false) { $where_sql[] = '(ban_userid = 0 OR ban_exclude = 1)'; } else { $cache_ttl = ($user_id == ANONYMOUS) ? 3600 : 0; $_sql = '(ban_userid = ' . $user_id; if ($user_email !== false) { $_sql .= " OR ban_email <> ''"; } if ($user_ips !== false) { $_sql .= " OR ban_ip <> ''"; } $_sql .= ')'; $where_sql[] = $_sql; } $sql .= (sizeof($where_sql)) ? implode(' AND ', $where_sql) : ''; $result = phpbb::$db->sql_query($sql, $cache_ttl); $ban_triggered_by = 'user'; while ($row = phpbb::$db->sql_fetchrow($result)) { if ($row['ban_end'] && $row['ban_end'] < time()) { continue; } $ip_banned = false; if (!empty($row['ban_ip'])) { if (!is_array($user_ips)) { $ip_banned = preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ips); } else { foreach ($user_ips as $user_ip) { if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ip)) { $ip_banned = true; break; } } } } if ((!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) || $ip_banned || (!empty($row['ban_email']) && preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_email'], '#')) . '$#i', $user_email))) { if (!empty($row['ban_exclude'])) { $banned = false; break; } else { $banned = true; $ban_row = $row; if (!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) { $ban_triggered_by = 'user'; } else if ($ip_banned) { $ban_triggered_by = 'ip'; } else { $ban_triggered_by = 'email'; } // Don't break. Check if there is an exclude rule for this user } } } phpbb::$db->sql_freeresult($result); if ($banned && !$return) { // If the session is empty we need to create a valid one... if (empty($this->session_id)) { // This seems to be no longer needed? - #14971 // $this->session_create(ANONYMOUS); } // Initiate environment ... since it won't be set at this stage $this->setup(); // Logout the user, banned users are unable to use the normal 'logout' link if ($this->data['user_id'] != ANONYMOUS) { $this->session_kill(); } // We show a login box here to allow founders accessing the board if banned by IP if (defined('IN_LOGIN') && $this->data['user_id'] == ANONYMOUS) { $this->setup('ucp'); $this->is_registered = $this->is_bot = $this->is_founder = false; $this->is_guest = true; // Set as a precaution to allow login_box() handling this case correctly as well as this function not being executed again. define('IN_CHECK_BAN', 1); login_box('index.' . PHP_EXT); // The false here is needed, else the user is able to circumvent the ban. $this->session_kill(false); } // Ok, we catch the case of an empty session id for the anonymous user... // This can happen if the user is logging in, banned by username and the login_box() being called "again". if (empty($this->session_id) && defined('IN_CHECK_BAN')) { $this->session_create(ANONYMOUS); } // Determine which message to output $till_date = ($ban_row['ban_end']) ? $this->format_date($ban_row['ban_end']) : ''; $message = ($ban_row['ban_end']) ? 'BOARD_BAN_TIME' : 'BOARD_BAN_PERM'; $message = sprintf($this->lang[$message], $till_date, '', ''); $message .= ($ban_row['ban_give_reason']) ? '

' . sprintf($this->lang['BOARD_BAN_REASON'], $ban_row['ban_give_reason']) : ''; $message .= '

' . $this->lang['BAN_TRIGGERED_BY_' . strtoupper($ban_triggered_by)] . ''; // To circumvent session_begin returning a valid value and the check_ban() not called on second page view, we kill the session again $this->session_kill(false); // A very special case... we are within the cron script which is not supposed to print out the ban message... show blank page if (defined('IN_CRON')) { garbage_collection(); exit_handler(); exit; } trigger_error($message); } return ($banned && $ban_row['ban_give_reason']) ? $ban_row['ban_give_reason'] : $banned; } /** * Check if ip is blacklisted * This should be called only where absolutly necessary * * Only IPv4 (rbldns does not support AAAA records/IPv6 lookups) * * @param string $mode Possible modes are: register and post * spamhaus.org is used for both modes. Spamcop.net is additionally used for register. * @param string $ip The ip to check. If false then the current IP is used * * @return bool|array False if ip is not blacklisted, else an array([checked server], [lookup]) * @author satmd (from the php manual) * @access public */ public function check_dnsbl($mode, $ip = false) { if ($ip === false) { $ip = $this->system['ip']; } $dnsbl_check = array( 'sbl-xbl.spamhaus.org' => 'http://www.spamhaus.org/query/bl?ip=', ); if ($mode == 'register') { $dnsbl_check['bl.spamcop.net'] = 'http://spamcop.net/bl.shtml?'; } if ($ip) { $quads = explode('.', $ip); $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0]; // Need to be listed on all servers... $listed = true; $info = array(); foreach ($dnsbl_check as $dnsbl => $lookup) { if (phpbb_checkdnsrr($reverse_ip . '.' . $dnsbl . '.', 'A') === true) { $info = array($dnsbl, $lookup . $ip); } else { $listed = false; } } if ($listed) { return $info; } } return false; } /** * Set/Update a persistent login key * * This method creates or updates a persistent session key. When a user makes * use of persistent (formerly auto-) logins a key is generated and stored in the * DB. When they revisit with the same key it's automatically updated in both the * DB and cookie. Multiple keys may exist for each user representing different * browsers or locations. As with _any_ non-secure-socket no passphrase login this * remains vulnerable to exploit. * * @param int $user_id The user id. If false the current users user id will be used * @param string $key A login key. If false then the current users login key stored within the cookie will be used * @param string $user_ip The users ip. If false, then the current users IP will be used * @access public */ public function set_login_key($user_id = false, $key = false, $user_ip = false) { $user_id = ($user_id === false) ? $this->data['user_id'] : $user_id; $user_ip = ($user_ip === false) ? $this->system['ip'] : $user_ip; $key = ($key === false) ? (($this->cookie_data['k']) ? $this->cookie_data['k'] : false) : $key; $key_id = phpbb::$security->unique_id(hexdec(substr($this->session_id, 0, 8))); $sql_ary = array( 'key_id' => (string) md5($key_id), 'last_ip' => (string) $this->system['ip'], 'last_login' => (int) $this->time_now, ); if (!$key) { $sql_ary += array( 'user_id' => (int) $user_id ); } if ($key) { $sql = 'UPDATE ' . SESSIONS_KEYS_TABLE . ' SET ' . phpbb::$db->sql_build_array('UPDATE', $sql_ary) . ' WHERE user_id = ' . (int) $user_id . " AND key_id = '" . phpbb::$db->sql_escape(md5($key)) . "'"; } else { $sql = 'INSERT INTO ' . SESSIONS_KEYS_TABLE . ' ' . phpbb::$db->sql_build_array('INSERT', $sql_ary); } phpbb::$db->sql_query($sql); $this->cookie_data['k'] = $key_id; } /** * Reset all login keys for the specified user * * This method removes all current login keys for a specified (or the current) * user. It will be called on password change to render old keys unusable * * @param int $user_id The user id. If false then the current users user id is used. * @access public */ public function reset_login_keys($user_id = false) { $user_id = ($user_id === false) ? $this->data['user_id'] : $user_id; $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' WHERE user_id = ' . (int) $user_id; phpbb::$db->sql_query($sql); // Let's also clear any current sessions for the specified user_id // If it's the current user then we'll leave this session intact $sql_where = 'session_user_id = ' . (int) $user_id; $sql_where .= ($user_id === $this->data['user_id']) ? " AND session_id <> '" . phpbb::$db->sql_escape($this->session_id) . "'" : ''; $sql = 'DELETE FROM ' . SESSIONS_TABLE . " WHERE $sql_where"; phpbb::$db->sql_query($sql); // We're changing the password of the current user and they have a key // Lets regenerate it to be safe if ($user_id === $this->data['user_id'] && $this->cookie_data['k']) { $this->set_login_key($user_id); } } /** * Reset all admin sessions * * @access public */ public function unset_admin() { $sql = 'UPDATE ' . SESSIONS_TABLE . " SET session_admin = 0 WHERE session_id = '" . phpbb::$db->sql_escape($this->session_id) . "'"; phpbb::$db->sql_query($sql); } /** * Check if a valid, non-expired session exist. Also make sure it errors out correctly if we do not have a db-setup yet. ;) * * @return bool True if a valid, non-expired session exist * @access private */ private function session_exist() { // If session is empty or does not match the session within the URL (if required - set by NEED_SID), then we need a new session if (empty($this->session_id) || ($this->need_sid && $this->session_id !== phpbb_request::variable('sid', '', false, phpbb_request::GET))) { return false; } // If the db is not initialized/registered, then we also need a new session (we are not able to go forward then... if (!phpbb::registered('db')) { return false; } // Now finally check the db for our provided session $sql = 'SELECT u.*, s.* FROM ' . SESSIONS_TABLE . ' s, ' . USERS_TABLE . " u WHERE s.session_id = '" . phpbb::$db->sql_escape($this->session_id) . "' AND u.user_id = s.session_user_id"; $result = phpbb::$db->sql_query($sql); $row = phpbb::$db->sql_fetchrow($result); phpbb::$db->sql_freeresult($result); // Also new session if it has not been found. ;) if (!$row) { return false; } $this->data = $row; // Now check the ip, the browser, forwarded for and referer if (!$this->session_valid()) { return false; } // Ok, we are not finished yet. We need to know if the session is expired // Check whether the session is still valid if we have one if ($this->auth !== false && method_exists($this->auth, 'validate_session')) { if (!$this->auth->validate_session($this)) { return false; } } // Check the session length timeframe if autologin is not enabled. // Else check the autologin length... and also removing those having autologin enabled but no longer allowed board-wide. if (!$this->data['session_autologin']) { if ($this->data['session_time'] < $this->time_now - (phpbb::$config['session_length'] + 60)) { return false; } } else if (!phpbb::$config['allow_autologin'] || (phpbb::$config['max_autologin_time'] && $this->data['session_time'] < $this->time_now - (86400 * (int) phpbb::$config['max_autologin_time']) + 60)) { return false; } // Only update session DB a minute or so after last update or if page changes if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->system['page']['page'])) { $sql_ary = array('session_time' => $this->time_now); if ($this->update_session_page) { $sql_ary['session_page'] = substr($this->system['page']['page'], 0, 199); $sql_ary['session_forum_id'] = $this->system['page']['forum']; } $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . phpbb::$db->sql_build_array('UPDATE', $sql_ary) . " WHERE session_id = '" . phpbb::$db->sql_escape($this->session_id) . "'"; phpbb::$db->sql_query($sql); } $this->is_registered = ($this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == phpbb::USER_NORMAL || $this->data['user_type'] == phpbb::USER_FOUNDER)) ? true : false; $this->is_bot = (!$this->is_registered && $this->data['user_id'] != ANONYMOUS) ? true : false; $this->is_founder = $this->data['user_type'] == phpbb::USER_FOUNDER; $this->is_guest = (!$this->is_registered && $this->data['user_id'] == ANONYMOUS) ? true : false; $this->data['user_lang'] = basename($this->data['user_lang']); return true; } /** * Check if the request originated from the same page. * * @param bool $check_script_path If true, the path will be checked as well * * @return bool True if the referer is valid * @access private */ private function validate_referer($check_script_path = false) { // no referer - nothing to validate, user's fault for turning it off (we only check on POST; so meta can't be the reason) if (empty($this->system['referer']) || empty($this->system['host'])) { return true; } // Specialchar host, because it's the only one not specialchared $host = htmlspecialchars($this->system['host']); $ref = substr($this->system['referer'], strpos($this->system['referer'], '://') + 3); if (!(stripos($ref, $host) === 0)) { return false; } else if ($check_script_path && rtrim($this->system['page']['root_script_path'], '/') !== '') { $ref = substr($ref, strlen($host)); $server_port = $this->system['port']; if ($server_port !== 80 && $server_port !== 443 && stripos($ref, ":$server_port") === 0) { $ref = substr($ref, strlen(":$server_port")); } if (!(stripos(rtrim($ref, '/'), rtrim($this->system['page']['root_script_path'], '/')) === 0)) { return false; } } return true; } /** * Fill data array with a "faked" user account * * @return array Default user data array * @access private */ private function default_data() { return array( 'user_id' => ANONYMOUS, ); } /** * Check for a bot by comparing user agent and ip * * Here we do a bot check, oh er saucy! No, not that kind of bot * check. We loop through the list of bots defined by the admin and * see if we have any useragent and/or IP matches. If we do, this is a * bot, act accordingly * * @return bool True if it is a bot. * @access private */ private function check_bot() { $bot = false; foreach (phpbb_cache::obtain_bots() as $row) { if ($row['bot_agent'] && preg_match('#' . str_replace('\*', '.*?', preg_quote($row['bot_agent'], '#')) . '#i', $this->system['browser'])) { $bot = $row['user_id']; } // If ip is supplied, we will make sure the ip is matching too... if ($row['bot_ip'] && ($bot || !$row['bot_agent'])) { // Set bot to false, then we only have to set it to true if it is matching $bot = false; foreach (explode(',', $row['bot_ip']) as $bot_ip) { if (strpos($this->system['ip'], $bot_ip) === 0) { $bot = (int) $row['user_id']; break; } } } if ($bot) { break; } } return $bot; } /** * Check if session is valid by comparing ip, forwarded for, browser and referer * * @param bool $log_failure If true then a non-match will be logged. Can cause huge logs. * * @return bool True if the session is valid * @access private */ private function session_valid($log_failure = true) { // Validate IP length according to admin ... enforces an IP // check on bots if admin requires this // $quadcheck = (phpbb::$config['ip_check_bot'] && $this->data['user_type'] & USER_BOT) ? 4 : phpbb::$config['ip_check']; if (strpos($this->system['ip'], ':') !== false && strpos($this->data['session_ip'], ':') !== false) { $session_ip = short_ipv6($this->data['session_ip'], phpbb::$config['ip_check']); $user_ip = short_ipv6($this->system['ip'], phpbb::$config['ip_check']); } else { $session_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, phpbb::$config['ip_check'])); $user_ip = implode('.', array_slice(explode('.', $this->system['ip']), 0, phpbb::$config['ip_check'])); } $session_browser = (phpbb::$config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : ''; $user_browser = (phpbb::$config['browser_check']) ? trim(strtolower(substr($this->system['browser'], 0, 149))) : ''; $session_forwarded_for = (phpbb::$config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : ''; $user_forwarded_for = (phpbb::$config['forwarded_for_check']) ? substr($this->system['forwarded_for'], 0, 254) : ''; // referer checks $check_referer_path = phpbb::$config['referer_validation'] == REFERER_VALIDATE_PATH; $referer_valid = true; // we assume HEAD and TRACE to be foul play and thus only whitelist GET if (phpbb::$config['referer_validation'] && $this->system['request_method']) { $referer_valid = $this->validate_referer($check_referer_path); } if ($user_ip !== $session_ip || $user_browser !== $session_browser || $user_forwarded_for !== $session_forwarded_for || !$referer_valid) { // Added logging temporarly to help debug bugs... if (phpbb::$base_config['debug_extra'] && $this->data['user_id'] != ANONYMOUS && $log_failure) { if ($referer_valid) { add_log('critical', 'LOG_IP_BROWSER_FORWARDED_CHECK', $user_ip, $session_ip, $user_browser, $session_browser, htmlspecialchars($user_forwarded_for), htmlspecialchars($session_forwarded_for)); } else { add_log('critical', 'LOG_REFERER_INVALID', $this->system['referer']); } } return false; } return true; } } ?>