X-Git-Url: http://git.osdn.net/view?a=blobdiff_plain;f=spam%2Fspam.php;h=080b91dde9e9646c29bb13c69a1108c65b4d5b0c;hb=72cb6cbd83b39a12fb31fdb4232338dd6d73e8f0;hp=22d33672914502f915c308d09759357f61332c55;hpb=b049eb75165dc05e8cfa69a447ec4ae84c79b589;p=pukiwiki%2Fpukiwiki_sandbox.git diff --git a/spam/spam.php b/spam/spam.php index 22d3367..7216a5f 100644 --- a/spam/spam.php +++ b/spam/spam.php @@ -1,453 +1,341 @@ = 4.3.0): preg_match_all(PREG_OFFSET_CAPTURE): $method['uri_XXX'] related feature -// Return an array of URIs in the $string -// [OK] http://nasty.example.org#nasty_string -// [OK] http://nasty.example.org:80/foo/xxx#nasty_string/bar -// [OK] ftp://nasty.example.org:80/dfsdfs -// [OK] ftp://cnn.example.com&story=breaking_news@10.0.0.1/top_story.htm (from RFC3986) -function uri_pickup($string = '', $normalize = TRUE, - $preserve_rawuri = FALSE, $preserve_chunk = TRUE) -{ - // Not available for: IDN(ignored) - $array = array(); - preg_match_all( - // scheme://userinfo@host:port/path/or/pathinfo/maybefile.and?query=string#fragment - // Refer RFC3986 (Regex below is not strict) - '#(\b[a-z][a-z0-9.+-]{1,8})://' . // 1: Scheme - '(?:' . - '([^\s<>"\'\[\]/\#?@]*)' . // 2: Userinfo (Username) - '@)?' . - '(' . - // 3: Host - '\[[0-9a-f:.]+\]' . '|' . // IPv6([colon-hex and dot]): RFC2732 - '(?:[0-9]{1-3}\.){3}[0-9]{1-3}' . '|' . // IPv4(dot-decimal): 001.22.3.44 - '[^\s<>"\'\[\]:/\#?]+' . // FQDN: foo.example.org - ')' . - '(?::([0-9]*))?' . // 4: Port - '((?:/+[^\s<>"\'\[\]/\#]+)*/+)?' . // 5: Directory path or path-info - '([^\s<>"\'\[\]\#]+)?' . // 6: File and query string - '(?:\#([a-z0-9._~%!$&\'()*+,;=:@-]*))?' . // 7: Fragment - '#i', - $string, $array, PREG_SET_ORDER | PREG_OFFSET_CAPTURE - ); - //var_dump(recursive_map('htmlspecialchars', $array)); +if (! defined('SPAM_INI_FILE')) define('SPAM_INI_FILE', 'spam.ini.php'); +if (! defined('DOMAIN_INI_FILE')) define('DOMAIN_INI_FILE', 'domain.ini.php'); - // Shrink $array - static $parts = array( - 1 => 'scheme', 2 => 'userinfo', 3 => 'host', 4 => 'port', - 5 => 'path', 6 => 'file', 7 => 'fragment' - ); - $default = array(''); - foreach(array_keys($array) as $uri) { - array_rename_keys($array[$uri], $parts, TRUE, $default); - $offset = $array[$uri]['scheme'][1]; // Scheme's offset - - foreach(array_keys($array[$uri]) as $part) { - // Remove offsets for each part - $array[$uri][$part] = & $array[$uri][$part][0]; - } - - if ($normalize) { - $array[$uri]['scheme'] = scheme_normalize($array[$uri]['scheme']); - //if ($array[$uri]['scheme'] === '') { - // // Ignore - // unset ($array[$uri]); - // continue; - //} - - $array[$uri]['host'] = strtolower($array[$uri]['host']); - $array[$uri]['port'] = port_normalize($array[$uri]['port'], $array[$uri]['scheme'], FALSE); - $array[$uri]['path'] = path_normalize($array[$uri]['path']); - //$array[$uri]['uri'] = uri_array_implode($array[$uri]); - if ($preserve_rawuri) $array[$uri]['rawuri'] = & $array[$uri][0]; - } else { - $array[$uri]['uri'] = & $array[$uri][0]; // Raw - } - unset($array[$uri][0]); // Matched string itself - if (! $preserve_chunk) { - unset( - $array[$uri]['scheme'], - $array[$uri]['userinfo'], - $array[$uri]['host'], - $array[$uri]['port'], - $array[$uri]['path'], - $array[$uri]['file'], - $array[$uri]['fragment'] - ); - } +// --------------------- +// Compat etc - $array[$uri]['offset'] = $offset; - $array[$uri]['area'] = 0; +// (PHP 4 >= 4.2.0): var_export(): mail-reporting and dump related +if (! function_exists('var_export')) { + function var_export() { + return 'var_export() is not found on this server' . "\n"; } - - return $array; } -// Domain exposure callback (See spam_uri_pickup_preprocess()) -// http://victim.example.org/?foo+site:nasty.example.com+bar -// => http://nasty.example.com/?refer=victim.example.org -// NOTE: 'refer=' is not so good for (at this time). -// Consider about using IP address of the victim, try to avoid that. -function _preg_replace_callback_domain_exposure($matches = array()) +// (PHP 4 >= 4.2.0): preg_grep() enables invert option +function preg_grep_invert($pattern = '//', $input = array()) { - $result = ''; + static $invert; + if (! isset($invert)) $invert = defined('PREG_GREP_INVERT'); - // Preserve the victim URI as a complicity or ... - if (isset($matches[5])) { - $result = - $matches[1] . '://' . // scheme - $matches[2] . '/' . // victim.example.org - $matches[3]; // The rest of all (before victim) + if ($invert) { + return preg_grep($pattern, $input, PREG_GREP_INVERT); + } else { + $result = preg_grep($pattern, $input); + if ($result) { + return array_diff($input, preg_grep($pattern, $input)); + } else { + return $input; + } } +} - // Flipped URI - $result = - $matches[1] . '://' . // scheme - $matches[4] . // nasty.example.com - '/?refer=' . strtolower($matches[2]) . // victim.example.org - ' ' . $result; - return $result; -} +// --------------------- +// Utilities -// Preprocess: rawurldecode() and adding space(s) to detect/count some URIs _if possible_ -// NOTE: It's maybe danger to var_dump(result). [e.g. 'javascript:'] -// [OK] http://victim.example.org/go?http%3A%2F%2Fnasty.example.org -// [OK] http://victim.example.org/http://nasty.example.org -function spam_uri_pickup_preprocess($string = '') +// Very roughly, shrink the lines of var_export() +// NOTE: If the same data exists, it must be corrupted. +function var_export_shrink($expression, $return = FALSE, $ignore_numeric_keys = FALSE) { - if (! is_string($string)) return ''; + $result = var_export($expression, TRUE); - $string = rawurldecode($string); - - // Domain exposure (See _preg_replace_callback_domain_exposure()) - $string = preg_replace_callback( - array( - // Something Google: http://www.google.com/supported_domains - '#(http)://([a-z0-9.]+\.google\.[a-z]{2,3}(?:\.[a-z]{2})?)/' . - '([a-z0-9?=&.%_+-]+)' . // ?query=foo+ - '\bsite:([a-z0-9.%_-]+)' . // site:nasty.example.com - '()' . // Preserve? - '#i', - ), - '_preg_replace_callback_domain_exposure', - $string + $result = preg_replace( + // Remove a newline and spaces + '# => \n *array \(#', ' => array (', + $result ); - // URI exposure (uriuri => uri uri) - $string = preg_replace( - array( - '#(? #m', '$1', + $result + ); + } - return $string; + if ($return) { + return $result; + } else { + echo $result; + return NULL; + } } -// TODO: Area selection (Check BBCode only, check anchor only, check ...) -// Main function of spam-uri pickup -function spam_uri_pickup($string = '') +// Data structure: Create an array they _refer_only_one_ value +function one_value_array($num = 0, $value = NULL) { - $string = spam_uri_pickup_preprocess($string); - - $array = uri_pickup($string); - - // Area elevation for '(especially external)link' intension - if (! empty($array)) { - // Anchor tags by preg_match_all() - // [OK] visit http://nasty.example.com/ - // [OK] discount foobar - // [NG] visit http://ng.example.com _not_ended_ - // [NG] Good site! test - $areas = array(); - preg_match_all('#]*href[^>]*>.*?]*(>)#i', - $string, $areas, PREG_SET_ORDER | PREG_OFFSET_CAPTURE); - //var_dump(recursive_map('htmlspecialchars', $areas)); - foreach(array_keys($areas) as $area) { - $areas[$area] = array( - $areas[$area][0][1], // Area start () - $areas[$area][1][1], // Area end () - ); - } - area_measure($areas, $array); - - // phpBB's "BBCode" by preg_match_all() - // [url]http://nasty.example.com/[/url] - // [link]http://nasty.example.com/[/link] - // [url=http://nasty.example.com]visit http://nasty.example.com/[/url] - // [link http://nasty.example.com/]buy something[/link] - // ?? [url=][/url] - $areas = array(); - preg_match_all('#\[(url|link)\b[^\]]*\].*?\[/\1\b[^\]]*(\])#i', - $string, $areas, PREG_SET_ORDER | PREG_OFFSET_CAPTURE); - //var_dump(recursive_map('htmlspecialchars', $areas)); - foreach(array_keys($areas) as $area) { - $areas[$area] = array( - $areas[$area][0][1], // Area start ([url]) - $areas[$area][2][1], // Area end ([/url]) - ); - } - area_measure($areas, $array); - - // Various Wiki syntax - // [text_or_uri>text_or_uri] - // [text_or_uri:text_or_uri] - // [text_or_uri|text_or_uri] - // [text_or_uri->text_or_uri] - // [text_or_uri text_or_uri] // MediaWiki - // MediaWiki: [http://nasty.example.com/ visit http://nasty.example.com/] - - // Remove 'offset's for area_measure() - //foreach(array_keys($array) as $key) - // unset($array[$key]['offset']); + $num = max(0, intval($num)); + $array = array(); + + for ($i = 0; $i < $num; $i++) { + $array[] = & $value; } return $array; } -// $array['something'] => $array['wanted'] -function array_rename_keys(& $array, $keys = array('from' => 'to'), $force = FALSE, $default = '') +// Reverse $string with specified delimiter +function delimiter_reverse($string = 'foo.bar.example.com', $from_delim = '.', $to_delim = NULL) { - if (! is_array($array) || ! is_array($keys)) + $to_null = ($to_delim === NULL); + + if (! is_string($from_delim) || (! $to_null && ! is_string($to_delim))) { + return FALSE; + } + if (is_array($string)) { + // Map, Recurse + $count = count($string); + $from = one_value_array($count, $from_delim); + if ($to_null) { + // Note: array_map() vanishes all keys + return array_map('delimiter_reverse', $string, $from); + } else { + $to = one_value_array($count, $to_delim); + // Note: array_map() vanishes all keys + return array_map('delimiter_reverse', $string, $from, $to); + } + } + if (! is_string($string)) { return FALSE; + } - // Nondestructive test - if (! $force) - foreach(array_keys($keys) as $from) - if (! isset($array[$from])) - return FALSE; + // Returns com.example.bar.foo + if ($to_null) $to_delim = & $from_delim; + return implode($to_delim, array_reverse(explode($from_delim, $string))); +} - foreach($keys as $from => $to) { - if ($from === $to) continue; - if (! $force || isset($array[$from])) { - $array[$to] = & $array[$from]; - unset($array[$from]); - } else { - $array[$to] = $default; +// ksort() by domain +function ksort_by_domain(& $array) +{ + $sort = array(); + foreach(array_keys($array) as $key) { + $reversed = delimiter_reverse($key); + if ($reversed !== FALSE) { + $sort[$reversed] = $key; } } + ksort($sort, SORT_STRING); - return TRUE; + $result = array(); + foreach($sort as $key) { + $result[$key] = & $array[$key]; + } + + $array = $result; } -// If in doubt, it's a little doubtful -function area_measure($areas, & $array, $belief = -1, $a_key = 'area', $o_key = 'offset') +// Roughly strings(1) using PCRE +// This function is useful to: +// * Reduce the size of data, from removing unprintable binary data +// * Detect _bare_strings_ from binary data +// References: +// http://www.freebsd.org/cgi/man.cgi?query=strings (Man-page of GNU strings) +// http://www.pcre.org/pcre.txt +// Note: mb_ereg_replace() is one of mbstring extension's functions +// and need to init its encoding. +function strings($binary = '', $min_len = 4, $ignore_space = FALSE, $multibyte = FALSE) { - if (! is_array($areas) || ! is_array($array)) return; - - $areas_keys = array_keys($areas); - foreach(array_keys($array) as $u_index) { - $offset = isset($array[$u_index][$o_key]) ? - intval($array[$u_index][$o_key]) : 0; - foreach($areas_keys as $a_index) { - if (isset($array[$u_index][$a_key])) { - $offset_s = intval($areas[$a_index][0]); - $offset_e = intval($areas[$a_index][1]); - // [Area => inside <= Area] - if ($offset_s < $offset && $offset < $offset_e) { - $array[$u_index][$a_key] += $belief; - } - } - } + // String only + $binary = (is_array($binary) || $binary === TRUE) ? '' : strval($binary); + + $regex = $ignore_space ? + '[^[:graph:] \t\n]+' : // Remove "\0" etc, and readable spaces + '[^[:graph:][:space:]]+'; // Preserve readable spaces if possible + + $binary = $multibyte ? + mb_ereg_replace($regex, "\n", $binary) : + preg_replace('/' . $regex . '/s', "\n", $binary); + + if ($ignore_space) { + $binary = preg_replace( + array( + '/[ \t]{2,}/', + '/^[ \t]/m', + '/[ \t]$/m', + ), + array( + ' ', + '', + '' + ), + $binary); } + + if ($min_len > 1) { + // The last character seems "\n" or not + $br = (! empty($binary) && $binary[strlen($binary) - 1] == "\n") ? "\n" : ''; + + $min_len = min(1024, intval($min_len)); + $regex = '/^.{' . $min_len . ',}/S'; + $binary = implode("\n", preg_grep($regex, explode("\n", $binary))) . $br; + } + + return $binary; } // --------------------- -// Part Two +// Utilities: Arrays -// Scheme normalization: Renaming the schemes -// snntp://example.org => nntps://example.org -// NOTE: Keep the static lists simple. See also port_normalize(). -function scheme_normalize($scheme = '', $considerd_harmfull = TRUE) +// Count leaves (A leaf = value that is not an array, or an empty array) +function array_count_leaves($array = array(), $count_empty = FALSE) { - // Abbreviations considerable they don't have link intension - static $abbrevs = array( - 'ttp' => 'http', - 'ttps' => 'https', - ); + if (! is_array($array) || (empty($array) && $count_empty)) return 1; - // Alias => normalized - static $aliases = array( - 'pop' => 'pop3', - 'news' => 'nntp', - 'imap4' => 'imap', - 'snntp' => 'nntps', - 'snews' => 'nntps', - 'spop3' => 'pop3s', - 'pops' => 'pop3s', - ); + // Recurse + $count = 0; + foreach ($array as $part) { + $count += array_count_leaves($part, $count_empty); + } + return $count; +} - $scheme = strtolower(trim($scheme)); - if (isset($abbrevs[$scheme])) { - if ($considerd_harmfull) { - $scheme = $abbrevs[$scheme]; +// Merge two leaves +// Similar to PHP array_merge_leaves(), except strictly preserving keys as string +function array_merge_leaves($array1, $array2, $sort_keys = TRUE) +{ + // Array(s) only + $is_array1 = is_array($array1); + $is_array2 = is_array($array2); + if ($is_array1) { + if ($is_array2) { + ; // Pass } else { - $scheme = ''; + return $array1; } + } else if ($is_array2) { + return $array2; + } else { + return $array2; // Not array ($array1 is overwritten) } - if (isset($aliases[$scheme])) $scheme = $aliases[$scheme]; - return $scheme; + $keys_all = array_merge(array_keys($array1), array_keys($array2)); + if ($sort_keys) sort($keys_all, SORT_STRING); + + $result = array(); + foreach($keys_all as $key) { + $isset1 = isset($array1[$key]); + $isset2 = isset($array2[$key]); + if ($isset1 && $isset2) { + // Recurse + $result[$key] = array_merge_leaves($array1[$key], $array2[$key], $sort_keys); + } else if ($isset1) { + $result[$key] = & $array1[$key]; + } else { + $result[$key] = & $array2[$key]; + } + } + return $result; } -// Port normalization: Suppress the (redundant) default port -// HTTP://example.org:80/ => http://example.org/ -// HTTP://example.org:8080/ => http://example.org:8080/ -// HTTPS://example.org:443/ => https://example.org/ -function port_normalize($port, $scheme, $scheme_normalize = TRUE) +// An array-leaves to a flat array +function array_flat_leaves($array, $unique = TRUE) { - // Schemes that users _maybe_ want to add protocol-handlers - // to their web browsers. (and attackers _maybe_ want to use ...) - // Reference: http://www.iana.org/assignments/port-numbers - static $array = array( - // scheme => default port - 'ftp' => 21, - 'ssh' => 22, - 'telnet' => 23, - 'smtp' => 25, - 'tftp' => 69, - 'gopher' => 70, - 'finger' => 79, - 'http' => 80, - 'pop3' => 110, - 'sftp' => 115, - 'nntp' => 119, - 'imap' => 143, - 'irc' => 194, - 'wais' => 210, - 'https' => 443, - 'nntps' => 563, - 'rsync' => 873, - 'ftps' => 990, - 'telnets' => 992, - 'imaps' => 993, - 'ircs' => 994, - 'pop3s' => 995, - 'mysql' => 3306, - ); - - $port = trim($port); - if ($port === '') return $port; + if (! is_array($array)) return $array; - if ($scheme_normalize) $scheme = scheme_normalize($scheme); - if (isset($array[$scheme]) && $port == $array[$scheme]) - $port = ''; // Ignore the defaults + $tmp = array(); + foreach(array_keys($array) as $key) { + if (is_array($array[$key])) { + // Recurse + foreach(array_flat_leaves($array[$key]) as $_value) { + $tmp[] = $_value; + } + } else { + $tmp[] = & $array[$key]; + } + } - return $port; + return $unique ? array_values(array_unique($tmp)) : $tmp; } -// Path normalization -// http://example.org => http://example.org/ -// http://example.org#hoge => http://example.org/#hoge -// http://example.org/path/a/b/./c////./d => http://example.org/path/a/b/c/d -// http://example.org/path/../../a/../back => http://example.org/back -function path_normalize($path = '', $divider = '/', $addroot = TRUE) +// $array['something'] => $array['wanted'] +function array_rename_keys(& $array, $keys = array('from' => 'to'), $force = FALSE, $default = '') { - if (! is_string($path) || $path == '') { - $path = $addroot ? $divider : ''; - } else { - $path = trim($path); - $last = ($path[strlen($path) - 1] == $divider) ? $divider : ''; - $array = explode($divider, $path); + if (! is_array($array) || ! is_array($keys)) return FALSE; - // Remove paddings - foreach(array_keys($array) as $key) { - if ($array[$key] == '' || $array[$key] == '.') - unset($array[$key]); - } - // Back-track - $tmp = array(); - foreach($array as $value) { - if ($value == '..') { - array_pop($tmp); - } else { - array_push($tmp, $value); + // Nondestructive test + if (! $force) { + foreach(array_keys($keys) as $from) { + if (! isset($array[$from])) { + return FALSE; } } - $array = & $tmp; + } - $path = $addroot ? $divider : ''; - if (! empty($array)) $path .= implode($divider, $array) . $last; + foreach($keys as $from => $to) { + if ($from === $to) continue; + if (! $force || isset($array[$from])) { + $array[$to] = & $array[$from]; + unset($array[$from]); + } else { + $array[$to] = $default; + } } - return $path; + return TRUE; } -// An URI array => An URI (See uri_pickup()) -function uri_array_implode($uri = array()) +// Remove redundant values from array() +function array_unique_recursive($array = array()) { - if (empty($uri) || ! is_array($uri)) return NULL; - + if (! is_array($array)) return $array; + $tmp = array(); - if (isset($uri['scheme']) && $uri['scheme'] !== '') { - $tmp[] = & $uri['scheme']; - $tmp[] = '://'; - } - if (isset($uri['userinfo']) && $uri['userinfo'] !== '') { - $tmp[] = & $uri['userinfo']; - $tmp[] = '@'; - } - if (isset($uri['host']) && $uri['host'] !== '') { - $tmp[] = & $uri['host']; - } - if (isset($uri['port']) && $uri['port'] !== '') { - $tmp[] = ':'; - $tmp[] = & $uri['port']; - } - if (isset($uri['path']) && $uri['path'] !== '') { - $tmp[] = & $uri['path']; - } - if (isset($uri['file']) && $uri['file'] !== '') { - $tmp[] = & $uri['file']; - } - if (isset($uri['fragment']) && $uri['fragment'] !== '') { - $tmp[] = '#'; - $tmp[] = & $uri['fragment']; + foreach($array as $key => $value){ + if (is_array($value)) { + $array[$key] = array_unique_recursive($value); + } else { + if (isset($tmp[$value])) { + unset($array[$key]); + } else { + $tmp[$value] = TRUE; + } + } } - return implode('', $tmp); + return $array; } + // --------------------- // Part One : Checker +// Rough implementation of globbing +// +// USAGE: $regex = '/^' . generate_glob_regex('*.txt', '/') . '$/i'; +// function generate_glob_regex($string = '', $divider = '/') { static $from = array( - 0 => '*', - 1 => '?', - 2 => '\[', - 3 => '\]', - 4 => '[', - 5 => ']', + 1 => '*', + 11 => '?', + // 22 => '[', // Maybe cause regex compilation error (e.g. '[]') + // 23 => ']', // ); static $mid = array( - 0 => '_AST_', - 1 => '_QUE_', - 2 => '_eRBR_', - 3 => '_eLBR_', - 4 => '_RBR_', - 5 => '_LBR_', + 1 => '_AST_', + 11 => '_QUE_', + // 22 => '_RBR_', + // 23 => '_LBR_', ); static $to = array( - 0 => '.*', - 1 => '.', - 2 => '\[', - 3 => '\]', - 4 => '[', - 5 => ']', + 1 => '.*', + 11 => '.', + // 22 => '[', + // 23 => ']', ); + if (! is_string($string)) return ''; + $string = str_replace($from, $mid, $string); // Hide $string = preg_quote($string, $divider); $string = str_replace($mid, $to, $string); // Unhide @@ -455,210 +343,738 @@ function generate_glob_regex($string = '', $divider = '/') return $string; } -// TODO: Ignore list -// TODO: require_or_include_once(another file) -function is_badhost($hosts = '', $asap = TRUE) +// Generate host (FQDN, IPv4, ...) regex +// 'localhost' : Matches with 'localhost' only +// 'example.org' : Matches with 'example.org' only (See host_normalize() about 'www') +// '.example.org' : Matches with ALL FQDN ended with '.example.org' +// '*.example.org' : Almost the same of '.example.org' except 'www.example.org' +// '10.20.30.40' : Matches with IPv4 address '10.20.30.40' only +// [TODO] '192.' : Matches with all IPv4 hosts started with '192.' +// TODO: IPv4, CIDR?, IPv6 +function generate_host_regex($string = '', $divider = '/') { - static $blocklist_regex; - - if (! isset($blocklist_regex)) { - $blocklist_regex = array(); - $blocklist = array( - // Deny all uri - //'*', - - // IP address or ... - //'10.20.*.*', // 10.20.example.com also matches - //'\[1\]', - - // Too much malicious sub-domains - '*.blogspot.com', - - // 2006-11 dev - 'wwwtahoo.com', - - // 2006-11 dev - '*.infogami.com', - - // 2006/11/19 17:50 dev - '*.google0site.org', - '*.bigpricesearch.org', - '*.osfind.org', - '*.bablomira.biz', - ); - foreach ($blocklist as $part) { - $blocklist_regex[] = '#^' . generate_glob_regex($part, '#') . '$#i'; + if (! is_string($string)) return ''; + + if (mb_strpos($string, '.') === FALSE) { + // localhost + return generate_glob_regex($string, $divider); + } + + if (is_ip($string)) { + // IPv4 + return generate_glob_regex($string, $divider); + } else { + // FQDN or something + $part = explode('.', $string, 2); + if ($part[0] == '') { + // .example.org + $part[0] = '(?:.*\.)?'; + } else if ($part[0] == '*') { + // *.example.org + $part[0] = '.*\.'; + } else { + // example.org, etc + return generate_glob_regex($string, $divider); + } + $part[1] = generate_glob_regex($part[1], $divider); + return implode('', $part); + } +} + +// Rough hostname checker +// TODO: Strict digit, 0x, CIDR, '999.999.999.999', ':', '::G' +function is_ip($string = '') +{ + if (! is_string($string)) return FALSE; + + if (strpos($string, ':') !== FALSE) { + return 6; // Seems IPv6 + } + + if (preg_match('/^' . + '(?:[0-9]{1,3}\.){3}[0-9]{1,3}' . '|' . + '(?:[0-9]{1,3}\.){1,3}' . '$/', + $string)) { + return 4; // Seems IPv4(dot-decimal) + } + + return FALSE; // Seems not IP +} + +// Load SPAM_INI_FILE and return parsed one +function get_blocklist($list = '') +{ + static $regexes; + + if ($list === NULL) { + $regexes = NULL; // Unset + return array(); + } + + if (! isset($regexes)) { + $regexes = array(); + if (file_exists(SPAM_INI_FILE)) { + $blocklist = array(); + + include(SPAM_INI_FILE); + // $blocklist['list'] = array( + // //'goodhost' => FALSE; + // 'badhost' => TRUE; + // ); + // $blocklist['badhost'] = array( + // '*.blogspot.com', // Blog services's subdomains (only) + // 'IANA-examples' => '#^(?:.*\.)?example\.(?:com|net|org)$#', + // ); + + foreach(array( + 'pre', + 'list', + ) as $special) { + + if (! isset($blocklist[$special])) continue; + + $regexes[$special] = $blocklist[$special]; + + foreach(array_keys($blocklist[$special]) as $_list) { + if (! isset($blocklist[$_list])) continue; + + foreach ($blocklist[$_list] as $key => $value) { + if (is_array($value)) { + $regexes[$_list][$key] = array(); + foreach($value as $_key => $_value) { + get_blocklist_add($regexes[$_list][$key], $_key, $_value); + } + } else { + get_blocklist_add($regexes[$_list], $key, $value); + } + } + + unset($blocklist[$_list]); + } + } } } - $result = 0; + if ($list === '') { + return $regexes; // ALL of + } else if (isset($regexes[$list])) { + return $regexes[$list]; // A part of + } else { + return array(); // Found nothing + } +} + +// Subroutine of get_blocklist(): Add new regex to the $array +function get_blocklist_add(& $array, $key = 0, $value = '*.example.org/path/to/file.html') +{ + if (is_string($key)) { + $array[$key] = & $value; // Treat $value as a regex for FQDN(host)s + } else { + $array[$value] = '#^' . generate_host_regex($value, '#') . '$#i'; + } +} + +// Blocklist metrics: Separate $host, to $blocked and not blocked +function blocklist_distiller(& $hosts, $keys = array('goodhost', 'badhost'), $asap = FALSE) +{ if (! is_array($hosts)) $hosts = array($hosts); - foreach($hosts as $host) { - if (! is_string($host)) $host = ''; - foreach ($blocklist_regex as $regex) { - if (preg_match($regex, $host)) { - ++$result; - if ($asap) { - return $result; - } else { - break; // Check next host + if (! is_array($keys)) $keys = array($keys); + + $list = get_blocklist('list'); + $blocked = array(); + + foreach($keys as $key){ + foreach (get_blocklist($key) as $label => $regex) { + if (is_array($regex)) { + foreach($regex as $_label => $_regex) { + $group = preg_grep($_regex, $hosts); + if ($group) { + $hosts = array_diff($hosts, $group); + $blocked[$key][$label][$_label] = $group; + if ($asap && $list[$key]) break; + } + } + } else { + $group = preg_grep($regex, $hosts); + if ($group) { + $hosts = array_diff($hosts, $group); + $blocked[$key][$label] = $group; + if ($asap && $list[$key]) break; } } } } - return $result; + return $blocked; +} + + +// --------------------- + + +// Default (enabled) methods and thresholds (for content insertion) +function check_uri_spam_method($times = 1, $t_area = 0, $rule = TRUE) +{ + $times = intval($times); + $t_area = intval($t_area); + + $positive = array( + // Thresholds + 'quantity' => 8 * $times, // Allow N URIs + 'non_uniqhost' => 3 * $times, // Allow N duped (and normalized) Hosts + //'non_uniquri'=> 3 * $times, // Allow N duped (and normalized) URIs + + // Areas + 'area_anchor' => $t_area, // Using HTML tag + 'area_bbcode' => $t_area, // Using [url] or [link] BBCode + //'uri_anchor' => $t_area, // URI inside HTML tag + //'uri_bbcode' => $t_area, // URI inside [url] or [link] BBCode + ); + if ($rule) { + $bool = array( + // Rules + //'asap' => TRUE, // Quit or return As Soon As Possible + 'uniqhost' => TRUE, // Show uniq host (at block notification mail) + 'badhost' => TRUE, // Check badhost + ); + } else { + $bool = array(); + } + + // Remove non-$positive values + foreach (array_keys($positive) as $key) { + if ($positive[$key] < 0) unset($positive[$key]); + } + + return $positive + $bool; } -// TODO return TRUE or FALSE! // Simple/fast spam check -function check_uri_spam($target = '', $method = array(), $asap = TRUE) +function check_uri_spam($target = '', $method = array()) { - $is_spam = FALSE; + // Return value $progress = array( - 'quantity' => 0, - 'area' => 0, - 'non_uniq' => 0, - 'uniqhost' => 0, - 'badhost' => 0, - ); + 'method' => array( + // Theme to do => Dummy, optional value, or optional array() + //'quantity' => 8, + //'uniqhost' => TRUE, + //'non_uniqhost'=> 3, + //'non_uniquri' => 3, + //'badhost' => TRUE, + //'area_anchor' => 0, + //'area_bbcode' => 0, + //'uri_anchor' => 0, + //'uri_bbcode' => 0, + ), + 'sum' => array( + // Theme => Volume found (int) + ), + 'is_spam' => array( + // Flag. If someting defined here, + // one or more spam will be included + // in this report + ), + 'blocked' => array( + // Hosts blocked + //'category' => array( + // 'host', + //) + ), + 'hosts' => array( + // Hosts not blocked + ), + ); + + // ---------------------------------------- + // Aliases + + $sum = & $progress['sum']; + $is_spam = & $progress['is_spam']; + $progress['method'] = & $method; // Argument + $blocked = & $progress['blocked']; + $hosts = & $progress['hosts']; + $asap = isset($method['asap']); + + // ---------------------------------------- + // Init if (! is_array($method) || empty($method)) { - // Default - $method = array( - 'quantity' => 8, // Allow N URIs - 'area' => TRUE, - 'non_uniq' => 3, // Allow N times dupe - 'badhost' => TRUE, - ); + $method = check_uri_spam_method(); } + foreach(array_keys($method) as $key) { + if (! isset($sum[$key])) $sum[$key] = 0; + } + if (! isset($sum['quantity'])) $sum['quantity'] = 0; + + // ---------------------------------------- + // Recurse if (is_array($target)) { foreach($target as $str) { - // Recurse - list($is_spam, $_progress) = check_uri_spam($str, $method); - $progress['quantity'] += $_progress['quantity']; - $progress['area'] += $_progress['area']; - $progress['non_uniq'] += $_progress['non_uniq']; - $progress['uniqhost'] += $_progress['uniqhost']; - $progress['badhost'] += $_progress['badhost']; - if ($asap || $is_spam) break; - } - } else { - $pickups = spam_uri_pickup($target); - $progress['quantity'] += count($pickups); + if (! is_string($str)) continue; - if (! empty($pickups)) { + $_progress = check_uri_spam($str, $method); // Recurse - // URI quantity - if ((! $is_spam || ! $asap) && isset($method['quantity']) && - $progress['quantity'] > $method['quantity']) { - $is_spam = TRUE; - } - //var_dump($method['quantity'], $is_spam); - - // Using invalid area - if ((! $is_spam || ! $asap) && isset($method['area'])) { - foreach($pickups as $pickup) { - if ($pickup['area'] < 0) { - ++$progress['area']; - $is_spam = TRUE; - if ($asap) break; - } + // Merge $sum + $_sum = & $_progress['sum']; + foreach (array_keys($_sum) as $key) { + if (! isset($sum[$key])) { + $sum[$key] = & $_sum[$key]; + } else { + $sum[$key] += $_sum[$key]; } } - //var_dump($method['area'], $is_spam); - // URI uniqueness (and removing non-uniques) - if ((! $is_spam || ! $asap) && isset($method['non_uniq'])) { - $uris = array(); - foreach ($pickups as $key => $pickup) { - $uris[$key] = uri_array_implode($pickup); - } - $count = count($uris); - $uris = array_unique($uris); - $progress['non_uniq'] += $count - count($uris); - if ($progress['non_uniq'] > $method['non_uniq']) { - $is_spam = TRUE; + // Merge $is_spam + $_is_spam = & $_progress['is_spam']; + foreach (array_keys($_is_spam) as $key) { + $is_spam[$key] = TRUE; + if ($asap) break; + } + if ($asap && $is_spam) break; + + // Merge only + $blocked = array_merge_leaves($blocked, $_progress['blocked'], FALSE); + $hosts = array_merge_leaves($hosts, $_progress['hosts'], FALSE); + } + + // Unique values + $blocked = array_unique_recursive($blocked); + $hosts = array_unique_recursive($hosts); + + // Recount $sum['badhost'] + $sum['badhost'] = array_count_leaves($blocked); + + return $progress; + } + + // ---------------------------------------- + // Area measure + + if (! $asap || ! $is_spam) { + + // Method pickup + $_method = array(); + foreach(array( + 'area_anchor', // There's HTML anchor tag + 'area_bbcode', // There's 'BBCode' linking tag + ) as $key) { + if (isset($method[$key])) $_method[$key] = TRUE; + } + + if ($_method) { + $_asap = isset($method['asap']) ? array('asap' => TRUE) : array(); + $_result = area_pickup($target, $_method + $_asap); + } else { + $_result = FALSE; + } + + if ($_result) { + foreach(array_keys($_method) as $key) { + $sum[$key] = $_result[$key]; + if (isset($method[$key]) && $sum[$key] > $method[$key]) { + $is_spam[$key] = TRUE; } - if (! $asap || ! $is_spam) { - foreach (array_diff(array_keys($pickups), - array_keys($uris)) as $remove) { - unset($pickups[$remove]); - } + } + $_result = NULL; + } + } + + // Return if ... + if ($asap && $is_spam) return $progress; + + // ---------------------------------------- + // URI: Pickup + + $pickups = uri_pickup_normalize(spam_uri_pickup($target, $method)); + $hosts = array(); + foreach ($pickups as $key => $pickup) { + $hosts[$key] = & $pickup['host']; + } + + // Return if ... + if (empty($pickups)) return $progress; + + // ---------------------------------------- + // URI: Bad host (Separate good/bad hosts from $hosts) + + if ((! $asap || ! $is_spam) && isset($method['badhost'])) { + $list = get_blocklist('pre'); + $blocked = blocklist_distiller($hosts, array_keys($list), $asap); + foreach($list as $key=>$type){ + if (! $type) unset($blocked[$key]); // Ignore goodhost etc + } + unset($list); + if (! empty($blocked)) $is_spam['badhost'] = TRUE; + } + + // Return if ... + if ($asap && $is_spam) return $progress; + + // Remove blocked from $pickups + foreach(array_keys($pickups) as $key) { + if (! isset($hosts[$key])) { + unset($pickups[$key]); + } + } + + // ---------------------------------------- + // URI: Check quantity + + $sum['quantity'] += count($pickups); + // URI quantity + if ((! $asap || ! $is_spam) && isset($method['quantity']) && + $sum['quantity'] > $method['quantity']) { + $is_spam['quantity'] = TRUE; + } + + // ---------------------------------------- + // URI: used inside HTML anchor tag pair + + if ((! $asap || ! $is_spam) && isset($method['uri_anchor'])) { + $key = 'uri_anchor'; + foreach($pickups as $pickup) { + if (isset($pickup['area'][$key])) { + $sum[$key] += $pickup['area'][$key]; + if(isset($method[$key]) && + $sum[$key] > $method[$key]) { + $is_spam[$key] = TRUE; + if ($asap && $is_spam) break; } - unset($uris); - //var_dump($uris, $pickups); + if ($asap && $is_spam) break; } - //var_dump($method['non_uniq'], $is_spam); + } + } - // Bad host - if ((! $is_spam || ! $asap) && isset($method['badhost'])) { - $hosts = array(); - foreach ($pickups as $pickup) { - $hosts[] = & $pickup['host']; + // ---------------------------------------- + // URI: used inside 'BBCode' pair + + if ((! $asap || ! $is_spam) && isset($method['uri_bbcode'])) { + $key = 'uri_bbcode'; + foreach($pickups as $pickup) { + if (isset($pickup['area'][$key])) { + $sum[$key] += $pickup['area'][$key]; + if(isset($method[$key]) && + $sum[$key] > $method[$key]) { + $is_spam[$key] = TRUE; + if ($asap && $is_spam) break; } - $hosts = array_unique($hosts); - $progress['uniqhost'] += count($hosts); - $count = is_badhost($hosts, $asap); - $progress['badhost'] += $count; - if ($count !== 0) $is_spam = TRUE; + if ($asap && $is_spam) break; + } + } + } + + // ---------------------------------------- + // URI: Uniqueness (and removing non-uniques) + + if ((! $asap || ! $is_spam) && isset($method['non_uniquri'])) { + + $uris = array(); + foreach (array_keys($pickups) as $key) { + $uris[$key] = uri_pickup_implode($pickups[$key]); + } + $count = count($uris); + $uris = array_unique($uris); + $sum['non_uniquri'] += $count - count($uris); + if ($sum['non_uniquri'] > $method['non_uniquri']) { + $is_spam['non_uniquri'] = TRUE; + } + if (! $asap || ! $is_spam) { + foreach (array_diff(array_keys($pickups), + array_keys($uris)) as $remove) { + unset($pickups[$remove]); } - //var_dump($method['badhost'], $is_spam); } + unset($uris); } - return array($is_spam, $progress); + // Return if ... + if ($asap && $is_spam) return $progress; + + // ---------------------------------------- + // Host: Uniqueness (uniq / non-uniq) + + $hosts = array_unique($hosts); + + if (isset($sum['uniqhost'])) $sum['uniqhost'] += count($hosts); + if ((! $asap || ! $is_spam) && isset($method['non_uniqhost'])) { + $sum['non_uniqhost'] = $sum['quantity'] - $sum['uniqhost']; + if ($sum['non_uniqhost'] > $method['non_uniqhost']) { + $is_spam['non_uniqhost'] = TRUE; + } + } + + // Return if ... + if ($asap && $is_spam) return $progress; + + // ---------------------------------------- + // URI: Bad host (Separate good/bad hosts from $hosts) + + if ((! $asap || ! $is_spam) && isset($method['badhost'])) { + $list = get_blocklist('list'); + $blocked = array_merge_leaves( + $blocked, + blocklist_distiller($hosts, array_keys($list), $asap), + FALSE + ); + foreach($list as $key=>$type){ + if (! $type) unset($blocked[$key]); // Ignore goodhost etc + } + unset($list); + if (! empty($blocked)) $is_spam['badhost'] = TRUE; + } + + // Return if ... + //if ($asap && $is_spam) return $progress; + + // ---------------------------------------- + // End + + return $progress; } // --------------------- +// Reporting -// Check User-Agent (not testing yet) -function is_invalid_useragent($ua_name = '' /*, $ua_vars = ''*/ ) +// Summarize $progress (blocked only) +function summarize_spam_progress($progress = array(), $blockedonly = FALSE) { - return $ua_name === ''; + if ($blockedonly) { + $tmp = array_keys($progress['is_spam']); + } else { + $tmp = array(); + $method = & $progress['method']; + if (isset($progress['sum'])) { + foreach ($progress['sum'] as $key => $value) { + if (isset($method[$key]) && $value) { + $tmp[] = $key . '(' . $value . ')'; + } + } + } + } + + return implode(', ', $tmp); } -// --------------------- +function summarize_detail_badhost($progress = array()) +{ + if (! isset($progress['blocked']) || empty($progress['blocked'])) return ''; + + // Flat per group + $blocked = array(); + foreach($progress['blocked'] as $list => $lvalue) { + foreach($lvalue as $group => $gvalue) { + $flat = implode(', ', array_flat_leaves($gvalue)); + if ($flat === $group) { + $blocked[$list][] = $flat; + } else { + $blocked[$list][$group] = $flat; + } + } + } -// TODO: Separate check-part(s) and mail part -// TODO: Mail to administrator with more measurement data? -// Simple/fast spam filter ($target: 'a string' or an array()) -function pkwk_spamfilter($action, $page, $target = array('title' => ''), $method = array()) + // Shrink per list + // From: 'A-1' => array('ie.to') + // To: 'A-1' => 'ie.to' + foreach($blocked as $list => $lvalue) { + if (is_array($lvalue) && + count($lvalue) == 1 && + is_numeric(key($lvalue))) { + $blocked[$list] = current($lvalue); + } + } + + return var_export_shrink($blocked, TRUE, TRUE); +} + +function summarize_detail_newtral($progress = array()) { - $is_spam = FALSE; + if (! isset($progress['hosts']) || + ! is_array($progress['hosts']) || + empty($progress['hosts'])) return ''; + + // Generate a responsible $trie + $trie = array(); + foreach($progress['hosts'] as $value) { + // 'A.foo.bar.example.com' + $resp = whois_responsibility($value); // 'example.com' + if (empty($resp)) { + // One or more test, or do nothing here + $resp = strval($value); + $rest = ''; + } else { + $rest = rtrim(substr($value, 0, - strlen($resp)), '.'); // 'A.foo.bar' + } + $trie = array_merge_leaves($trie, array($resp => array($rest => NULL)), FALSE); + } - //$is_spam = is_invalid_useragent('NOTYET'); - if ($is_spam) { - $action .= ' (Invalid User-Agent)'; - } else { - list($is_spam) = check_uri_spam($target, $method); + // Format: var_export_shrink() -like output + $result = array(); + ksort_by_domain($trie); + foreach(array_keys($trie) as $key) { + ksort_by_domain($trie[$key]); + if (count($trie[$key]) == 1 && key($trie[$key]) == '') { + // Just one 'responsibility.example.com' + $result[] = ' \'' . $key . '\','; + } else { + // One subdomain-or-host, or several ones + $subs = array(); + foreach(array_keys($trie[$key]) as $sub) { + if ($sub == '') { + $subs[] = $key; // 'example.com' + } else { + $subs[] = $sub . '. '; // 'A.foo.bar. ' + } + } + $result[] = ' \'' . $key . '\' => \'' . implode(', ', $subs) . '\','; + } + unset($trie[$key]); } + return + 'array (' . "\n" . + implode("\n", $result) . "\n" . + ')'; +} - if ($is_spam) { - // Mail to administrator(s) - global $notify, $notify_subject; - if ($notify) { - $footer['ACTION'] = $action; - $footer['PAGE'] = '[blocked] ' . $page; - $footer['URI'] = get_script_uri() . '?' . rawurlencode($page); - $footer['USER_AGENT'] = TRUE; - $footer['REMOTE_ADDR'] = TRUE; - pkwk_mail_notify($notify_subject, var_export($target, TRUE), $footer); - unset($footer); + +// Check responsibility-root of the FQDN +// 'foo.bar.example.com' => 'example.com' (.com has the last whois for it) +// 'foo.bar.example.au' => 'example.au' (.au has the last whois for it) +// 'foo.bar.example.edu.au' => 'example.edu.au' (.edu.au has the last whois for it) +// 'foo.bar.example.act.edu.au' => 'example.act.edu.au' (.act.edu.au has the last whois for it) +function whois_responsibility($fqdn = 'foo.bar.example.com', $parent = FALSE, $implicit = TRUE) +{ + static $domain; + + if ($fqdn === NULL) { + $domain = NULL; // Unset + return ''; + } + if (! is_string($fqdn)) return ''; + + if (is_ip($fqdn)) return $fqdn; + + if (! isset($domain)) { + $domain = array(); + if (file_exists(DOMAIN_INI_FILE)) { + include(DOMAIN_INI_FILE); // Set + } + } + + $result = array(); + $dcursor = & $domain; + $array = array_reverse(explode('.', $fqdn)); + $i = 0; + while(TRUE) { + if (! isset($array[$i])) break; + $acursor = $array[$i]; + if (is_array($dcursor) && isset($dcursor[$acursor])) { + $result[] = & $array[$i]; + $dcursor = & $dcursor[$acursor]; + } else { + if (! $parent && isset($acursor)) { + $result[] = & $array[$i]; // Whois servers must know this subdomain + } + break; } + ++$i; + } + + // Implicit responsibility: Top-Level-Domains must not be yours + // 'bar.foo.something' => 'foo.something' + if ($implicit && count($result) == 1 && count($array) > 1) { + $result[] = & $array[1]; } - if ($is_spam) spam_exit(); + return $result ? implode('.', array_reverse($result)) : ''; } + // --------------------- +// Exit + +// Freeing memories +function spam_dispose() +{ + get_blocklist(NULL); + whois_responsibility(NULL); +} // Common bahavior for blocking // NOTE: Call this function from various blocking feature, to disgueise the reason 'why blocked' -function spam_exit() +function spam_exit($mode = '', $data = array()) { - die("\n"); + $exit = TRUE; + + switch ($mode) { + case '': + echo("\n"); + break; + case 'dump': + echo('
' . "\n");
+			echo htmlspecialchars(var_export($data, TRUE));
+			echo('
' . "\n"); + break; + }; + + if ($exit) exit; // Force exit +} + + +// --------------------- +// Simple filtering + +// TODO: Record them +// Simple/fast spam filter ($target: 'a string' or an array()) +function pkwk_spamfilter($action, $page, $target = array('title' => ''), $method = array(), $exitmode = '') +{ + $progress = check_uri_spam($target, $method); + + if (empty($progress['is_spam'])) { + spam_dispose(); + } else { + +// TODO: detect encoding from $target for mbstring functions +// $tmp = array(); +// foreach(array_keys($target) as $key) { +// $tmp[strings($key, 0, FALSE, TRUE)] = strings($target[$key], 0, FALSE, TRUE); // Removing "\0" etc +// } +// $target = & $tmp; + + pkwk_spamnotify($action, $page, $target, $progress, $method); + spam_exit($exitmode, $progress); + } +} + +// --------------------- +// PukiWiki original + +// Mail to administrator(s) +function pkwk_spamnotify($action, $page, $target = array('title' => ''), $progress = array(), $method = array()) +{ + global $notify, $notify_subject; + + if (! $notify) return; + + $asap = isset($method['asap']); + + $summary['ACTION'] = 'Blocked by: ' . summarize_spam_progress($progress, TRUE); + if (! $asap) { + $summary['METRICS'] = summarize_spam_progress($progress); + } + + $tmp = summarize_detail_badhost($progress); + if ($tmp != '') $summary['DETAIL_BADHOST'] = $tmp; + + $tmp = summarize_detail_newtral($progress); + if (! $asap && $tmp != '') $summary['DETAIL_NEUTRAL_HOST'] = $tmp; + + $summary['COMMENT'] = $action; + $summary['PAGE'] = '[blocked] ' . (is_pagename($page) ? $page : ''); + $summary['URI'] = get_script_uri() . '?' . rawurlencode($page); + $summary['USER_AGENT'] = TRUE; + $summary['REMOTE_ADDR'] = TRUE; + pkwk_mail_notify($notify_subject, var_export($target, TRUE), $summary, TRUE); } ?>