302 lines
9.3 KiB
PHP
302 lines
9.3 KiB
PHP
<?php
|
|
/* $Id$ */
|
|
// vim: expandtab sw=4 ts=4 sts=4:
|
|
|
|
/**
|
|
* This library is used with the server IP allow/deny host authentication
|
|
* feature
|
|
*/
|
|
|
|
|
|
/**
|
|
* Gets the "true" IP address of the current user
|
|
*
|
|
* @return string the ip of the user
|
|
*
|
|
* @access private
|
|
*/
|
|
function PMA_getIp()
|
|
{
|
|
global $REMOTE_ADDR;
|
|
global $HTTP_X_FORWARDED_FOR, $HTTP_X_FORWARDED, $HTTP_FORWARDED_FOR, $HTTP_FORWARDED;
|
|
global $HTTP_VIA, $HTTP_X_COMING_FROM, $HTTP_COMING_FROM;
|
|
|
|
// Get some server/environment variables values
|
|
if (empty($REMOTE_ADDR)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['REMOTE_ADDR'])) {
|
|
$REMOTE_ADDR = $_SERVER['REMOTE_ADDR'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['REMOTE_ADDR'])) {
|
|
$REMOTE_ADDR = $_ENV['REMOTE_ADDR'];
|
|
}
|
|
else if (@getenv('REMOTE_ADDR')) {
|
|
$REMOTE_ADDR = getenv('REMOTE_ADDR');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_X_FORWARDED_FOR)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
|
|
$HTTP_X_FORWARDED_FOR = $_SERVER['HTTP_X_FORWARDED_FOR'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_X_FORWARDED_FOR'])) {
|
|
$HTTP_X_FORWARDED_FOR = $_ENV['HTTP_X_FORWARDED_FOR'];
|
|
}
|
|
else if (@getenv('HTTP_X_FORWARDED_FOR')) {
|
|
$HTTP_X_FORWARDED_FOR = getenv('HTTP_X_FORWARDED_FOR');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_X_FORWARDED)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_X_FORWARDED'])) {
|
|
$HTTP_X_FORWARDED = $_SERVER['HTTP_X_FORWARDED'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_X_FORWARDED'])) {
|
|
$HTTP_X_FORWARDED = $_ENV['HTTP_X_FORWARDED'];
|
|
}
|
|
else if (@getenv('HTTP_X_FORWARDED')) {
|
|
$HTTP_X_FORWARDED = getenv('HTTP_X_FORWARDED');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_FORWARDED_FOR)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_FORWARDED_FOR'])) {
|
|
$HTTP_FORWARDED_FOR = $_SERVER['HTTP_FORWARDED_FOR'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_FORWARDED_FOR'])) {
|
|
$HTTP_FORWARDED_FOR = $_ENV['HTTP_FORWARDED_FOR'];
|
|
}
|
|
else if (@getenv('HTTP_FORWARDED_FOR')) {
|
|
$HTTP_FORWARDED_FOR = getenv('HTTP_FORWARDED_FOR');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_FORWARDED)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_FORWARDED'])) {
|
|
$HTTP_FORWARDED = $_SERVER['HTTP_FORWARDED'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_FORWARDED'])) {
|
|
$HTTP_FORWARDED = $_ENV['HTTP_FORWARDED'];
|
|
}
|
|
else if (@getenv('HTTP_FORWARDED')) {
|
|
$HTTP_FORWARDED = getenv('HTTP_FORWARDED');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_VIA)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_VIA'])) {
|
|
$HTTP_VIA = $_SERVER['HTTP_VIA'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_VIA'])) {
|
|
$HTTP_VIA = $_ENV['HTTP_VIA'];
|
|
}
|
|
else if (@getenv('HTTP_VIA')) {
|
|
$HTTP_VIA = getenv('HTTP_VIA');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_X_COMING_FROM)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_X_COMING_FROM'])) {
|
|
$HTTP_X_COMING_FROM = $_SERVER['HTTP_X_COMING_FROM'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_X_COMING_FROM'])) {
|
|
$HTTP_X_COMING_FROM = $_ENV['HTTP_X_COMING_FROM'];
|
|
}
|
|
else if (@getenv('HTTP_X_COMING_FROM')) {
|
|
$HTTP_X_COMING_FROM = getenv('HTTP_X_COMING_FROM');
|
|
}
|
|
} // end if
|
|
if (empty($HTTP_COMING_FROM)) {
|
|
if (!empty($_SERVER) && isset($_SERVER['HTTP_COMING_FROM'])) {
|
|
$HTTP_COMING_FROM = $_SERVER['HTTP_COMING_FROM'];
|
|
}
|
|
else if (!empty($_ENV) && isset($_ENV['HTTP_COMING_FROM'])) {
|
|
$HTTP_COMING_FROM = $_ENV['HTTP_COMING_FROM'];
|
|
}
|
|
else if (@getenv('HTTP_COMING_FROM')) {
|
|
$HTTP_COMING_FROM = getenv('HTTP_COMING_FROM');
|
|
}
|
|
} // end if
|
|
|
|
// Gets the default ip sent by the user
|
|
if (!empty($REMOTE_ADDR)) {
|
|
$direct_ip = $REMOTE_ADDR;
|
|
}
|
|
|
|
// Gets the proxy ip sent by the user
|
|
$proxy_ip = '';
|
|
if (!empty($HTTP_X_FORWARDED_FOR)) {
|
|
$proxy_ip = $HTTP_X_FORWARDED_FOR;
|
|
} else if (!empty($HTTP_X_FORWARDED)) {
|
|
$proxy_ip = $HTTP_X_FORWARDED;
|
|
} else if (!empty($HTTP_FORWARDED_FOR)) {
|
|
$proxy_ip = $HTTP_FORWARDED_FOR;
|
|
} else if (!empty($HTTP_FORWARDED)) {
|
|
$proxy_ip = $HTTP_FORWARDED;
|
|
} else if (!empty($HTTP_VIA)) {
|
|
$proxy_ip = $HTTP_VIA;
|
|
} else if (!empty($HTTP_X_COMING_FROM)) {
|
|
$proxy_ip = $HTTP_X_COMING_FROM;
|
|
} else if (!empty($HTTP_COMING_FROM)) {
|
|
$proxy_ip = $HTTP_COMING_FROM;
|
|
} // end if... else if...
|
|
|
|
// Returns the true IP if it has been found, else FALSE
|
|
if (empty($proxy_ip)) {
|
|
// True IP without proxy
|
|
return $direct_ip;
|
|
} else {
|
|
$is_ip = preg_match('|^([0-9]{1,3}\.){3,3}[0-9]{1,3}|', $proxy_ip, $regs = array());
|
|
if ($is_ip && (count($regs) > 0)) {
|
|
// True IP behind a proxy
|
|
return $regs[0];
|
|
} else {
|
|
// Can't define IP: there is a proxy but we don't have
|
|
// information about the true IP
|
|
return FALSE;
|
|
}
|
|
} // end if... else...
|
|
} // end of the 'PMA_getIp()' function
|
|
|
|
|
|
/**
|
|
* Based on IP Pattern Matcher
|
|
* Originally by J.Adams <jna@retina.net>
|
|
* Found on <http://www.php.net/manual/en/function.ip2long.php>
|
|
* Modified by Robbat2 <robbat2@users.sourceforge.net>
|
|
*
|
|
* Matches:
|
|
* xxx.xxx.xxx.xxx (exact)
|
|
* xxx.xxx.xxx.[yyy-zzz] (range)
|
|
* xxx.xxx.xxx.xxx/nn (CIDR)
|
|
*
|
|
* Does not match:
|
|
* xxx.xxx.xxx.xx[yyy-zzz] (range, partial octets not supported)
|
|
*
|
|
* @param string string of IP range to match
|
|
* @param string string of IP to test against range
|
|
*
|
|
* @return boolean always true
|
|
*
|
|
* @access public
|
|
*/
|
|
function PMA_ipMaskTest($testRange, $ipToTest)
|
|
{
|
|
$result = TRUE;
|
|
|
|
if (preg_match('|([0-9]+)\.([0-9]+)\.([0-9]+)\.([0-9]+)/([0-9]+)|', $testRange, $regs = array())) {
|
|
// performs a mask match
|
|
$ipl = ip2long($ipToTest);
|
|
$rangel = ip2long($regs[1] . '.' . $regs[2] . '.' . $regs[3] . '.' . $regs[4]);
|
|
|
|
$maskl = 0;
|
|
|
|
for ($i = 0; $i < 31; $i++) {
|
|
if ($i < $regs[5] - 1) {
|
|
$maskl = $maskl + pow(2, (30 - $i));
|
|
} // end if
|
|
} // end for
|
|
|
|
if (($maskl & $rangel) == ($maskl & $ipl)) {
|
|
return TRUE;
|
|
} else {
|
|
return FALSE;
|
|
}
|
|
} else {
|
|
// range based
|
|
$maskocts = explode('.', $testRange);
|
|
$ipocts = explode('.', $ipToTest);
|
|
|
|
// perform a range match
|
|
for ($i = 0; $i < 4; $i++) {
|
|
if (preg_match('|\[([0-9]+)\-([0-9]+)\]|', $maskocts[$i], $regs)) {
|
|
if (($ipocts[$i] > $regs[2])
|
|
|| ($ipocts[$i] < $regs[1])) {
|
|
$result = FALSE;
|
|
} // end if
|
|
} else {
|
|
if ($maskocts[$i] <> $ipocts[$i]) {
|
|
$result = FALSE;
|
|
} // end if
|
|
} // end if/else
|
|
} //end for
|
|
} //end if/else
|
|
|
|
return $result;
|
|
} // end of the "PMA_IPMaskTest()" function
|
|
|
|
|
|
/**
|
|
* Runs through IP Allow/Deny rules the use of it below for more information
|
|
*
|
|
* @param string 'allow' | 'deny' type of rule to match
|
|
*
|
|
* @return bool Matched a rule ?
|
|
*
|
|
* @access public
|
|
*
|
|
* @see PMA_getIp()
|
|
*/
|
|
function PMA_allowDeny($type)
|
|
{
|
|
global $cfg;
|
|
|
|
// Grabs true IP of the user and returns if it can't be found
|
|
$remote_ip = PMA_getIp();
|
|
if (empty($remote_ip)) {
|
|
return FALSE;
|
|
}
|
|
|
|
// copy username
|
|
$username = $cfg['Server']['user'];
|
|
|
|
// copy rule database
|
|
$rules = $cfg['Server']['AllowDeny']['rules'];
|
|
|
|
// lookup table for some name shortcuts
|
|
$shortcuts = array(
|
|
'all' => '0.0.0.0/0',
|
|
'localhost' => '127.0.0.1/8'
|
|
);
|
|
|
|
// Provide some useful shortcuts if server gives us address:
|
|
if (isset($_SERVER['SERVER_ADDR'])) {
|
|
$shortcuts['localnetA'] = $_SERVER['SERVER_ADDR'] . '/8';
|
|
$shortcuts['localnetB'] = $_SERVER['SERVER_ADDR'] . '/16';
|
|
$shortcuts['localnetC'] = $_SERVER['SERVER_ADDR'] . '/24';
|
|
}
|
|
|
|
foreach ($rules AS $rule) {
|
|
// extract rule data
|
|
$rule_data = explode(' ', $rule);
|
|
|
|
// check for rule type
|
|
if ($rule_data[0] != $type) {
|
|
continue;
|
|
}
|
|
|
|
// check for username
|
|
if (($rule_data[1] != '%') //wildcarded first
|
|
&& ($rule_data[1] != $username)) {
|
|
continue;
|
|
}
|
|
|
|
// check if the config file has the full string with an extra
|
|
// 'from' in it and if it does, just discard it
|
|
if ($rule_data[2] == 'from') {
|
|
$rule_data[2] = $rule_data[3];
|
|
}
|
|
|
|
// Handle shortcuts with above array
|
|
// DON'T use "array_key_exists" as it's only PHP 4.1 and newer.
|
|
if (isset($shortcuts[$rule_data[2]])) {
|
|
$rule_data[2] = $shortcuts[$rule_data[2]];
|
|
}
|
|
|
|
// Add code for host lookups here
|
|
// Excluded for the moment
|
|
|
|
// Do the actual matching now
|
|
if (PMA_ipMaskTest($rule_data[2], $remote_ip)) {
|
|
return TRUE;
|
|
}
|
|
} // end while
|
|
|
|
return FALSE;
|
|
} // end of the "PMA_AllowDeny()" function
|
|
|
|
?>
|